1-37
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
OL-25303-03
Chapter 1 Configuring IEEE 802.1x Port-Based Authentication
Configuring 802.1x Authentication
Configuring 802.1x Authentication
These sections contain this configuration information:
• Default 802.1x Authentication Configuration, page 1-38
• 802.1x Authentication Configuration Guidelines, page 1-39
• Configuring 802.1x Readiness Check, page 1-41 (optional)
• Configuring Voice Aware 802.1x Security, page 1-42 (optional)
• Configuring the Switch-to-RADIUS-Server Communication, page 1-46 (required)
• Configuring 802.1x Violation Modes, page 1-43
• Configuring 802.1x Authentication, page 1-44
• Configuring the Host Mode, page 1-47 (optional)
• Configuring Periodic Re-Authentication, page 1-48 (optional)
• Manually Re-Authenticating a Client Connected to a Port, page 1-49 (optional)
• Changing the Quiet Period, page 1-49 (optional)
• Changing the Switch-to-Client Retransmission Time, page 1-50 (optional)
• Setting the Switch-to-Client Frame-Retransmission Number, page 1-50 (optional)
• Setting the Re-Authentication Number, page 1-51 (optional)
• Enabling MAC Move, page 1-52 (optional)
• Enabling MAC Replace, page 1-52
• Configuring 802.1x Accounting, page 1-53 (optional)
• Configuring Device Sensor, page 1-54 (optional)
• Configuring a Guest VLAN, page 1-60 (optional)
• Configuring a Restricted VLAN, page 1-62 (optional)
• Configuring Inaccessible Authentication Bypass and Critical Voice VLAN, page 1-63 (optional)
• Configuring 802.1x Authentication with WoL, page 1-66 (optional)
• Configuring MAC Authentication Bypass, page 1-66 (optional)
• Configuring 802.1x User Distribution, page 1-67 (optional)
• Configuring NAC Layer 2 802.1x Validation, page 1-68 (optional)
• Resetting the 802.1x Authentication Configuration to the Default Values, page 1-76 (optional)
• Disabling 802.1x Authentication on the Port, page 1-75 (optional)
• Configuring an Authenticator and a Supplicant Switch with NEAT, page 1-69 (optional)
• Configuring 802.1x Authentication with Downloadable ACLs and Redirect URLs, page 1-71
(optional)
• Configuring VLAN ID-based MAC Authentication, page 1-73 (optional)
• Configuring Flexible Authentication Ordering, page 1-74 (optional)
• Configuring Open1x, page 1-74 (optional)
• Configuring a Web Authentication Local Banner, page 1-75 (optional)
• Disabling 802.1x Authentication on the Port, page 1-75 (optional)