Contents
36
Software Configuration Guide—Release IOS XE 3.6.0E and IOS 15.2(2)E
OL-30933-01
Configuring MACsec Encryption 44-1
Understanding Media Access Control Security
and MACsec Key Agreement
44-2
MKA Policies 44-2
Virtual Ports 44-3
MACsec 44-3
MACsec, MKA, and 802.1X Host Modes 44-3
Single-Host Mode 44-4
Multiple-Host Mode 44-4
MKA Statistics 44-4
Configuring MACsec and MACsec Key Agreement 44-6
Default MACsec MACsec Key Agreement Configuration 44-6
Configuring an MKA Policy 44-6
Configuring MACsec on an Interface 44-7
Understanding Cisco TrustSec MACsec 44-8
Configuring Cisco TrustSec MACsec 44-10
Configuring Cisco TrustSec Credentials on the Switch 44-10
Configuring Cisco TrustSec Switch-to-Switch Link Security in 802.1X Mode 44-11
Configuring Cisco TrustSec Switch-to-Switch Link Security in Manual Mode 44-12
Cisco TrustSec Switch-to-Switch Link Security Configuration Example 44-14
Configuring 802.1X Port-Based Authentication 45-1
About 802.1X Port-Based Authentication 45-1
Device Roles 45-2
802.1X and Network Access Control 45-3
Authentication Initiation and Message Exchange 45-4
Ports in Authorized and Unauthorized States 45-5
802.1X Host Mode 45-6
Single-Host Mode 45-7
Multiple-Hosts Mode 45-7
Multidomain Authentication Mode 45-7
Multiauthentication Mode 45-8
Pre-authentication Open Access 45-8
802.1X Violation Mode 45-8
Using MAC Move 45-9
Using MAC Replace 45-9
Using 802.1X with VLAN Assignment 45-10
Using 802.1X for Guest VLANs 45-11
Usage Guidelines for Using 802.1X Authentication with Guest VLANs 45-11