EasyManua.ls Logo

Cisco WS-C3020 - Page 8

Cisco WS-C3020
960 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Contents
viii
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-03
Controlling Switch Access with Kerberos 7-32
Understanding Kerberos 7-32
Kerberos Operation 7-34
Authenticating to a Boundary Switch 7-34
Obtaining a TGT from a KDC 7-35
Authenticating to Network Services 7-35
Configuring Kerberos 7-35
Configuring the Switch for Local Authentication and Authorization 7-36
Configuring the Switch for Secure Shell 7-37
Understanding SSH 7-37
SSH Servers, Integrated Clients, and Supported Versions 7-37
Limitations 7-38
Configuring SSH 7-38
Configuration Guidelines 7-38
Setting Up the Switch to Run SSH 7-39
Configuring the SSH Server 7-40
Displaying the SSH Configuration and Status 7-41
Configuring the Switch for Secure Socket Layer HTTP 7-41
Understanding Secure HTTP Servers and Clients 7-41
Certificate Authority Trustpoints 7-42
CipherSuites 7-43
Configuring Secure HTTP Servers and Clients 7-44
Default SSL Configuration 7-44
SSL Configuration Guidelines 7-44
Configuring a CA Trustpoint 7-44
Configuring the Secure HTTP Server 7-45
Configuring the Secure HTTP Client 7-47
Displaying Secure HTTP Server and Client Status 7-47
Configuring the Switch for Secure Copy Protocol 7-48
Information About Secure Copy 7-48
CHAPTER
8 Configuring IEEE 802.1x Port-Based Authentication 8-1
Understanding IEEE 802.1x Port-Based Authentication 8-1
Device Roles 8-2
Authentication Process 8-3
Authentication Initiation and Message Exchange 8-5
Ports in Authorized and Unauthorized States 8-7
IEEE 802.1x Host Mode 8-7
IEEE 802.1x Accounting 8-8

Table of Contents

Related product manuals