Contents
ix
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-03
IEEE 802.1x Accounting Attribute-Value Pairs 8-8
Using 802.1x Readiness Check 8-9
Using IEEE 802.1x Authentication with VLAN Assignment 8-10
Using IEEE 802.1x Authentication with Per-User ACLs 8-11
Using IEEE 802.1x Authentication with Guest VLAN 8-12
Using IEEE 802.1x Authentication with Restricted VLAN 8-13
Using IEEE 802.1x Authentication with Inaccessible Authentication Bypass 8-14
Using IEEE 802.1x Authentication with Voice VLAN Ports 8-15
Using IEEE 802.1x Authentication with Port Security 8-15
Using IEEE 802.1x Authentication with Wake-on-LAN 8-16
Using IEEE 802.1x Authentication with MAC Authentication Bypass 8-17
Network Admission Control Layer 2 IEEE 802.1x Validation 8-18
Using Voice Aware 802.1x Security 8-18
Using Web Authentication 8-19
Web Authentication with Automatic MAC Check 8-19
Configuring IEEE 802.1x Authentication 8-20
Default IEEE 802.1x Authentication Configuration 8-20
IEEE 802.1x Authentication Configuration Guidelines 8-22
IEEE 802.1x Authentication 8-22
VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication
Bypass
8-23
MAC Authentication Bypass 8-23
Configuring 802.1x Readiness Check 8-24
Configuring Voice Aware 802.1x Security 8-25
Configuring IEEE 802.1x Authentication 8-26
Configuring the Switch-to-RADIUS-Server Communication 8-27
Configuring the Host Mode 8-29
Configuring Periodic Re-Authentication 8-29
Manually Re-Authenticating a Client Connected to a Port 8-30
Changing the Quiet Period 8-30
Changing the Switch-to-Client Retransmission Time 8-31
Setting the Switch-to-Client Frame-Retransmission Number 8-32
Setting the Re-Authentication Number 8-32
Configuring IEEE 802.1x Accounting 8-33
Configuring a Guest VLAN 8-34
Configuring a Restricted VLAN 8-35
Configuring the Inaccessible Authentication Bypass Feature 8-36
Configuring IEEE 802.1x Authentication with WoL 8-39
Configuring MAC Authentication Bypass 8-39
Configuring NAC Layer 2 IEEE 802.1x Validation 8-40