10-2
Catalyst 3560 Switch Software Configuration Guide
OL-8553-06
Chapter 10 Configuring IEEE 802.1x Port-Based Authentication
Understanding IEEE 802.1x Port-Based Authentication
802.1x Authentication with VLAN Assignment, page 10-14
Using 802.1x Authentication with Per-User ACLs, page 10-15
802.1x Authentication with Guest VLAN, page 10-17
802.1x Authentication with Restricted VLAN, page 10-18
802.1x Authentication with Inaccessible Authentication Bypass, page 10-19
802.1x Authentication with Voice VLAN Ports, page 10-21
802.1x Authentication with Port Security, page 10-21
802.1x Authentication with Wake-on-LAN, page 10-22
802.1x Authentication with MAC Authentication Bypass, page 10-23
Network Admission Control Layer 2 802.1x Validation, page 10-24
Flexible Authentication Ordering, page 10-24
Open1x Authentication, page 10-25
Using Voice Aware 802.1x Security, page 10-25
802.1x Switch Supplicant with Network Edge Access Topology (NEAT), page 10-25
802.1x Authentication with Downloadable ACLs and Redirect URLs, page 10-16
Web Authentication, page 10-26
Device Roles
Devices roles with 802.1x port-based authentication:
Figure 10-1 802.1x Device Roles
Client—the device (workstation) that requests access to the LAN and switch services and responds
to requests from the switch. The workstation must be running 802.1x-compliant client software such
as that offered in the Microsoft Windows XP operating system. (The client is the supplicant in
the 802.1x standard.)
Note To resolve Windows XP network connectivity and 802.1x authentication issues, read the
Microsoft Knowledge Base article at this URL:
http://support.microsoft.com/support/kb/articles/Q303/5/97.ASP
101229
Workstations
(clients)
Authentication
server
(RADIUS)