10-2
Catalyst 2960 and 2960-S Switch Software Configuration Guide
OL-8603-09
Chapter 10 Configuring IEEE 802.1x Port-Based Authentication
Understanding IEEE 802.1x Port-Based Authentication
802.1x Multiple Authentication Mode, page 10-15
MAC Move, page 10-16
MAC Replace, page 10-16
802.1x Accounting, page 10-17
802.1x Accounting Attribute-Value Pairs, page 10-17
802.1x Readiness Check, page 10-18
802.1x Authentication with VLAN Assignment, page 10-19
Using 802.1x Authentication with Per-User ACLs, page 10-20
802.1x Authentication with Guest VLAN, page 10-24
802.1x Authentication with Restricted VLAN, page 10-25
802.1x Authentication with Inaccessible Authentication Bypass, page 10-26
Note To use IEEE 802.1x authentication with inaccessible authentication bypass, the switch must be
running the LAN base image.
802.1x Authentication with Voice VLAN Ports, page 10-27
802.1x Authentication with Port Security, page 10-28
802.1x Authentication with Wake-on-LAN, page 10-29
Note To use IEEE 802.1x authentication with wake-on-LAN, the switch must be running th e LAN
base image.
802.1x Authentication with MAC Authentication Bypass, page 10-30
802.1x User Distribution, page 10-31
Network Admission Control Layer 2 802.1x Validation, page 10-32
Note To use Network Admission Control, the switch must be running the LAN base image.
Flexible Authentication Ordering, page 10-32
Open1x Authentication, page 10-33
Using Voice Aware 802.1x Security, page 10-33
802.1x Supplicant and Authenticator Switches with Network Edge Access Topology (NEAT),
page 10-33
802.1x Authentication with Downloadable ACLs and Redirect UR Ls, page 10-21
Using IEEE 802.1x Authentication with ACLs and the RADIUS Filter-Id Attribute, page 10-35
Note To use IEEE 802.1x authentication with ACLs and the Filter-Id attribute, the switch must be
running the LAN base image.
Common Session ID, page 10-35