Contents
xxxii
Software Configuration Guide—Release IOS XE 3.3.0SG and IOS 15.1(1)SG
OL-25340-01
Configuring a Layer 2 Interface as an Isolated PVLAN Trunk Port 42-19
Configuring a Layer 2 Interface as a Promiscuous PVLAN Trunk Port 42-21
Permitting Routing of Secondary VLAN Ingress Traffic 42-23
Configuring PVLAN over EtherChannel 42-24
Configuring a Layer 2 EtherChannel 42-24
Configuring a Layer 2 Etherchannel as a PVLAN Promiscuous Port 42-24
Configuring a Layer 2 EtherChannel as a PVLAN Host Port 42-26
Configuring a Layer 2 EtherChannel as an Isolated PVLAN Trunk Port 42-27
Configuring a Layer 2 Etherchannel as a Promiscuous PVLAN Trunk Port 42-28
CHAPTER
43 Configuring MACsec Encryption 43-1
Understanding Media Access Control Security
and MACsec Key Agreement 43-2
MKA Policies 43-3
Virtual Ports 43-3
MACsec 43-3
MACsec, MKA, and 802.1X Host Modes 43-4
Single-Host Mode 43-4
Multiple-Host Mode 43-4
MKA Statistics 43-5
Configuring MACsec and MKA 43-6
Default MACsec MKA Configuration 43-6
Configuring an MKA Policy 43-6
Configuring MACsec on an Interface 43-7
Understanding Cisco TrustSec MACsec 43-8
Configuring Cisco TrustSec MACsec 43-10
Configuring Cisco TrustSec Credentials on the Switch 43-10
Configuring Cisco TrustSec Switch-to-Switch Link Security in 802.1X Mode 43-11
Configuring Cisco TrustSec Switch-to-Switch Link Security in Manual Mode 43-12
Cisco TrustSec Switch-to-Switch Link Security Configuration Example 43-13
CHAPTER
44 Configuring 802.1X Port-Based Authentication 44-1
About 802.1X Port-Based Authentication 44-1
Device Roles 44-2
802.1X and Network Access Control 44-3
Authentication Initiation and Message Exchange 44-4
Ports in Authorized and Unauthorized States 44-5
802.1X Host Mode 44-6
Single-Host Mode 44-7