Contents
ix
Catalyst 3560 Switch Software Configuration Guide
78-16156-01
Controlling Switch Access with RADIUS 8-18
Understanding RADIUS 8-18
RADIUS Operation 8-19
Configuring RADIUS 8-20
Default RADIUS Configuration 8-20
Identifying the RADIUS Server Host 8-21
Configuring RADIUS Login Authentication 8-23
Defining AAA Server Groups 8-25
Configuring RADIUS Authorization for User Privileged Access and Network Services 8-27
Starting RADIUS Accounting 8-28
Configuring Settings for All RADIUS Servers 8-29
Configuring the Switch to Use Vendor-Specific RADIUS Attributes 8-29
Configuring the Switch for Vendor-Proprietary RADIUS Server Communication 8-31
Displaying the RADIUS Configuration 8-31
Controlling Switch Access with Kerberos 8-32
Understanding Kerberos 8-32
Kerberos Operation 8-34
Authenticating to a Boundary Switch 8-35
Obtaining a TGT from a KDC 8-35
Authenticating to Network Services 8-35
Configuring Kerberos 8-36
Configuring the Switch for Local Authentication and Authorization 8-36
Configuring the Switch for Secure Shell 8-37
Understanding SSH 8-38
SSH Servers, Integrated Clients, and Supported Versions 8-38
Limitations 8-38
Configuring SSH 8-39
Configuration Guidelines 8-39
Setting Up the Switch to Run SSH 8-39
Configuring the SSH Server 8-40
Displaying the SSH Configuration and Status 8-41
CHAPTER
9 Configuring 802.1X Port-Based Authentication 9-1
Understanding 802.1X Port-Based Authentication 9-1
Device Roles 9-2
Authentication Initiation and Message Exchange 9-3
Ports in Authorized and Unauthorized States 9-4
Supported Topologies 9-4
Using 802.1X with Port Security 9-5