EasyManua.ls Logo

Cisco WS-C3020 - Page 9

Cisco WS-C3020
960 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Contents
ix
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-03
IEEE 802.1x Accounting Attribute-Value Pairs 8-8
Using 802.1x Readiness Check 8-9
Using IEEE 802.1x Authentication with VLAN Assignment 8-10
Using IEEE 802.1x Authentication with Per-User ACLs 8-11
Using IEEE 802.1x Authentication with Guest VLAN 8-12
Using IEEE 802.1x Authentication with Restricted VLAN 8-13
Using IEEE 802.1x Authentication with Inaccessible Authentication Bypass 8-14
Using IEEE 802.1x Authentication with Voice VLAN Ports 8-15
Using IEEE 802.1x Authentication with Port Security 8-15
Using IEEE 802.1x Authentication with Wake-on-LAN 8-16
Using IEEE 802.1x Authentication with MAC Authentication Bypass 8-17
Network Admission Control Layer 2 IEEE 802.1x Validation 8-18
Using Voice Aware 802.1x Security 8-18
Using Web Authentication 8-19
Web Authentication with Automatic MAC Check 8-19
Configuring IEEE 802.1x Authentication 8-20
Default IEEE 802.1x Authentication Configuration 8-20
IEEE 802.1x Authentication Configuration Guidelines 8-22
IEEE 802.1x Authentication 8-22
VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication
Bypass
8-23
MAC Authentication Bypass 8-23
Configuring 802.1x Readiness Check 8-24
Configuring Voice Aware 802.1x Security 8-25
Configuring IEEE 802.1x Authentication 8-26
Configuring the Switch-to-RADIUS-Server Communication 8-27
Configuring the Host Mode 8-29
Configuring Periodic Re-Authentication 8-29
Manually Re-Authenticating a Client Connected to a Port 8-30
Changing the Quiet Period 8-30
Changing the Switch-to-Client Retransmission Time 8-31
Setting the Switch-to-Client Frame-Retransmission Number 8-32
Setting the Re-Authentication Number 8-32
Configuring IEEE 802.1x Accounting 8-33
Configuring a Guest VLAN 8-34
Configuring a Restricted VLAN 8-35
Configuring the Inaccessible Authentication Bypass Feature 8-36
Configuring IEEE 802.1x Authentication with WoL 8-39
Configuring MAC Authentication Bypass 8-39
Configuring NAC Layer 2 IEEE 802.1x Validation 8-40

Table of Contents

Related product manuals