Contents
viii
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-03
Controlling Switch Access with Kerberos 7-32
Understanding Kerberos 7-32
Kerberos Operation 7-34
Authenticating to a Boundary Switch 7-34
Obtaining a TGT from a KDC 7-35
Authenticating to Network Services 7-35
Configuring Kerberos 7-35
Configuring the Switch for Local Authentication and Authorization 7-36
Configuring the Switch for Secure Shell 7-37
Understanding SSH 7-37
SSH Servers, Integrated Clients, and Supported Versions 7-37
Limitations 7-38
Configuring SSH 7-38
Configuration Guidelines 7-38
Setting Up the Switch to Run SSH 7-39
Configuring the SSH Server 7-40
Displaying the SSH Configuration and Status 7-41
Configuring the Switch for Secure Socket Layer HTTP 7-41
Understanding Secure HTTP Servers and Clients 7-41
Certificate Authority Trustpoints 7-42
CipherSuites 7-43
Configuring Secure HTTP Servers and Clients 7-44
Default SSL Configuration 7-44
SSL Configuration Guidelines 7-44
Configuring a CA Trustpoint 7-44
Configuring the Secure HTTP Server 7-45
Configuring the Secure HTTP Client 7-47
Displaying Secure HTTP Server and Client Status 7-47
Configuring the Switch for Secure Copy Protocol 7-48
Information About Secure Copy 7-48
CHAPTER
8 Configuring IEEE 802.1x Port-Based Authentication 8-1
Understanding IEEE 802.1x Port-Based Authentication 8-1
Device Roles 8-2
Authentication Process 8-3
Authentication Initiation and Message Exchange 8-5
Ports in Authorized and Unauthorized States 8-7
IEEE 802.1x Host Mode 8-7
IEEE 802.1x Accounting 8-8