EasyManuals Logo

Cisco Catalyst 3750-X User Manual

Cisco Catalyst 3750-X
1438 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #63 background imageLoading...
Page #63 background image
1-11
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
OL-21521-01
Chapter 1 Overview
Features
IP phone detection enhancement to detect and recognize a Cisco IP phone
Guest VLAN to provide limited services to non-IEEE 802.1x-compliant users
Restricted VLAN to provide limited services to users who are IEEE 802.1x compliant, but do
not have the credentials to authenticate via the standard IEEE 802.1x processes
IEEE 802.1x accounting to track network usage
IEEE 802.1x with wake-on-LAN to allow dormant PCs to be powered on based on the receipt
of a specific Ethernet frame
Voice aware IEEE 802.1x security to apply traffic violation actions only on the VLAN on which
a security violation occurs
Network Edge Access Topology (NEAT) with 802.1x switch supplicant, host authorization with
CISP, and auto enablement to authenticate a switch outside a wiring closet as a supplicant to
another switch.
IEEE 802.1x authentication with downloadable ACLs and redirect URLs to allow per-user ACL
downloads from a Cisco Secure ACS server to an authenticated switch.
Multiple-user authentication to allow more than one host to authenticate on an 802.1x-enabled
port.
MAC authentication bypass to authorize clients based on the client MAC address.
Voice aware IEEE 802.1x and mac authentication bypass (MAB) security violation to shut down
only the data VLAN on a port when a security violation occurs
Network Admission Control (NAC) features:
NAC Layer 2 IEEE 802.1x validation of the antivirus condition or posture of endpoint systems
or clients before granting the devices network access.
For information about configuring NAC L
ayer 2 IEEE 802.1x validation, see the “Configuring
NAC Layer 2 IEEE 802.1x Validation” section on page 11-58.
NAC Layer 2 IP validation of the posture of endpoint systems or clients before granting the
devices network access.
For information about configuring NAC Layer 2 IP validation, see the Network Admi
ssion
Control Software Configuration Guide.
IEEE 802.1x inaccessible authentication bypass.
For information about configuring this feature, see the
Configuring the Inaccessible
Authentication Bypass Feature” section on page 11-53.
Authentication, authorization, and accounting (AAA) down policy for a NAC Layer 2 IP
validation of a host if the AAA server is not available when the posture validation occurs.
For information about this feature, see the Network Adm
ission Control Software Configuration
Guide.
TACACS+, a proprietary feature for managing network security through a TACACS server
RADIUS for verifying the identity of, granting access to, and tracking the actions of remote users
through AAA services
Kerberos security system to authenticate requests for network resources by using a trusted third
party
Secure Socket Layer (SSL) Version 3.0 support for the HTTP 1.1 server authentication, encryption,
and message integrity and HTTP client authentication to allow secure HTTP communications

Table of Contents

Other manuals for Cisco Catalyst 3750-X

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Catalyst 3750-X and is the answer not in the manual?

Cisco Catalyst 3750-X Specifications

General IconGeneral
Switching Capacity160 Gbps
Stacking Bandwidth64 Gbps
Max Stacking Units9
Layer SupportLayer 2 and Layer 3
Form FactorRack-mountable
DRAM256 MB
Flash Memory64 MB
ModelCisco Catalyst 3750-X Series
Ports24 or 48 10/100/1000 Ethernet ports
Uplink Interfaces4 SFP or 2 SFP+
FeaturesStackWise Plus, EnergyWise
ImageIP Base or IP Services
Operating Temperature0 to 40°C
Operating Humidity10 to 85% noncondensing

Related product manuals