EAP … 8-2
EAPOL … 8-8
eap-radius … 8-18
enabling on ports … 8-14
enabling on switch … 8-19
features … 8-2
general setup … 8-11
GVRP effect … 8-46
LACP not allowed … 8-47
local … 8-18
local username and password … 8-3
MD5…8-7
messages … 8-47
open VLAN
authorized client … 8-21
configuration … 8-27, 8-29
general operation … 8-20
mode … 8-20
operating notes … 8-30
operating rules … 8-24
PVID, no … 8-39
security breach … 8-30
set up … 8-26
status, viewing … 8-39
suspended VLAN … 8-40
unauthorized client … 8-21
use models … 8-21
VLAN, after authentication … 8-21, 8-25,
8-30
VLAN, tagged … 8-20, 8-21, 8-22, 8-25, 8-30,
8-41
operation … 8-5
overview … 8-2
port-security, with 802.1x … 8-31
RADIUS … 8-2
RADIUS host IP address … 8-19
rules of operation … 8-9
show commands … 8-37
show commands, supplicant … 8-42
statistics … 8-37
supplicant operation … 8-7
supplicant operation, switch-port … 8-6
supplicant state … 8-42
supplicant statistics, note … 8-42
supplicant, configuring … 8-33
supplicant, configuring switch port … 8-35
supplicant, enabling … 8-34
switch username and password … 8-3
terminology … 8-7
troubleshooting, gvrp … 8-43
used with port-security … 8-31
VLAN operation … 8-43
prior to … 9-33, 9-34, 9-37
Privacy Enhanced Mode (PEM)
See SSH.
proxy
web server … 9-37
Q - R
quick start … 1-10
RADIUS
accounting … 5-2, 5-16
accounting, configuration outline … 5-18
accounting, configure server access … 5-19
accounting, configure types on switch … 5-21
accounting, exec … 5-17, 5-21
accounting, interim updating … 5-23
accounting, network … 5-21
accounting, operating rules … 5-18
accounting, server failure … 5-18
accounting, session-blocking … 5-23
accounting, start-stop method … 5-22
accounting, statistics terms … 5-25
accounting, stop-only method … 5-22
accounting, system … 5-17, 5-21
authentication options … 5-2
authentication, local … 5-15
bypass RADIUS server … 5-9
commands, accounting … 5-16
commands, switch … 5-6
configuration outline … 5-6
configure server access … 5-10
configuring switch global parameters … 5-12
general setup … 5-5
local authentication … 5-9
MD5 … 5-4
messages … 5-30
network accounting … 5-17
operating rules, switch … 5-4
security … 5-9
security note … 5-2
server access order … 5-18
server access order, changing … 5-28
servers, multiple … 5-13
show accounting … 5-27
Index – 3