EasyManua.ls Logo

Cisco WS-C6506 - Page 29

Cisco WS-C6506
1488 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Contents
xxix
Catalyst 6500 Series Switch Software Configuration Guide—Release 8.7
OL-8978-04
CHAPTER
41 Configuring MAC Authentication Bypass 41-1
Understanding How MAC Authentication Bypass Works 41-2
Overview 41-2
Understanding Reauthentication of MAC Addresses 41-2
Understanding MAC Authentication Bypass States 41-3
Understanding MAC Authentication Bypass Events 41-4
MAC Authentication Bypass Configuration Guidelines and Restrictions 41-4
Configuring MAC Authentication Bypass 41-6
Enabling or Disabling MAC Authentication Bypass Globally 41-6
Enabling or Disabling MAC Authentication Bypass on a Port 41-6
Initializing the MAC Authentication Bypass State for a Port 41-7
Reauthenticating the MAC Address for a Port 41-7
Specifying the Shutdown Timeout Period 41-7
Specifying the AuthFail Timeout Period 41-8
Specifying the Reauthentication Timeout Period 41-8
Enabling or Disabling Reauthentication 41-9
Specifying the Security Violation Mode 41-9
Enabling or Disabling MAC Authentication Bypass RADIUS Accounting 41-9
Configuring a PVLAN on a MAC Authentication Bypass-Enabled Port 41-10
Configuring MAC Authentication Bypass on a PVLAN Port 41-11
Displaying MAC Authentication Bypass Information 41-11
Displaying the MAC Authentication Bypass Global Configuration 41-12
Configuring MAC Authentication Bypass with ACL Assignments 41-13
Configuring MAC Authentication Bypass with QoS ACLs 41-13
Configuring Agentless Hosts for NAC Auditing with MAB 41-14
NAC Agentless Hosts Auditing Overview 41-14
Configuring the Switch 41-14
Configuring the Cisco Secure ACS Server 41-15
Installing and Configuring the NAC Audit Server 41-16
Displaying the Agentless Host Posture Tokens 41-16
Interaction of Agentless Host Audit with Security Features 41-17
CHAPTER
42 Configuring Web-Based Proxy Authentication 42-1
Understanding How Web-Based Proxy Authentication Works 42-2
Device Roles 42-2
Authentication Initiation and Message Exchange 42-3
Host Detection and HTTP Traffic Interception 42-4
Access Control 42-5
Supported HTML Pages for Web-Based Proxy Authentication 42-5

Table of Contents

Related product manuals