EasyManua.ls Logo

Cisco WS-C6506 - Page 30

Cisco WS-C6506
1488 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Contents
xxx
Catalyst 6500 Series Switch Software Configuration Guide—Release 8.7
OL-8978-04
Multiple Hosts Per Port 42-6
High Availability 42-6
Host State 42-6
Interaction with Other Features 42-7
Default Web-Based Proxy Authentication Configuration 42-8
Web-Based Authentication Guidelines and Restrictions 42-8
Configuring Web-Based Proxy Authentication 42-9
Enabling or Disabling Web-Based Proxy Authentication Globally 42-10
Enabling or Disabling Web-Based Proxy Authentication on a Port 42-10
Initializing Web-Based Proxy Authentication on a Port 42-11
Configuring the Login Page URL 42-11
Configuring the Login-Fail Page URL 42-12
Specifying the Session Timeout Period 42-12
Specifying the Quiet Period 42-12
Specifying the Maximum Login Attempts 42-13
Displaying Web-Based Proxy Authentication Information 42-13
CHAPTER
43 Tracking Host Aging 43-1
Understanding How Host Aging is Tracked 43-2
Configuring IP Device Tracking Globally 43-2
Specifying the IP Device Tracking Interval 43-2
Specifying the IP Device Tracking Count 43-3
Configuring IP Device Tracking on a Port 43-3
Enabling or Disabling IP Device Tracking on a Port with 802.1x Authentication 43-4
Enabling or Disabling IP Device Tracking on a Port with MAC Authentication Bypass 43-4
Enabling or Disabling IP Device Tracking on a Port with Web-Based Proxy Authentication 43-5
Enabling or Disabling IP Device Tracking on a Port with EoU 43-6
CHAPTER
44 Configuring Network Admission Control 44-1
Configuring Network Admission Control with LAN Port IP 44-2
Understanding How Network Admission Control with LAN Port IP Works 44-2
LAN Port IP Posture Validation Summary 44-5
LAN Port IP Hardware and Software Requirements 44-6
LAN Port IP Configuration Guidelines and Restrictions 44-6
Configuring LAN Port IP 44-8
LAN Port IP CLI Command Examples 44-9
Configuring Policy-Based ACLs 44-21
Configuring Inaccessible Authentication Bypass 44-24
LAN Port IP Configuration Example 44-30

Table of Contents

Related product manuals