Contents

 

 

 

 

Configuring the Switch for Secure Shell

9-37

 

 

 

 

 

 

 

 

Understanding SSH 9-38

 

 

 

 

 

 

 

 

 

 

 

SSH Servers, Integrated Clients, and Supported Versions 9-38

 

 

 

 

Limitations

9-39

 

 

 

 

 

 

 

 

 

 

 

 

Configuring SSH

9-39

 

 

 

 

 

 

 

 

 

 

 

 

Configuration Guidelines

9-39

 

 

 

 

 

 

 

 

 

 

Setting Up the Switch to Run SSH

9-40

 

 

 

 

 

 

 

 

Configuring the SSH Server

9-41

 

 

 

 

 

 

 

 

 

Displaying the SSH Configuration and Status

9-41

 

 

 

 

 

 

Configuring the Switch for Secure Socket Layer HTTP

9-42

 

 

 

 

 

 

Understanding Secure HTTP Servers and Clients

9-42

 

 

 

 

 

 

Certificate Authority Trustpoints

9-42

 

 

 

 

 

 

 

 

CipherSuites

9-44

 

 

 

 

 

 

 

 

 

 

 

 

Configuring Secure HTTP Servers and Clients

9-44

 

 

 

 

 

 

Default SSL Configuration

9-44

 

 

 

 

 

 

 

 

 

SSL Configuration Guidelines

9-45

 

 

 

 

 

 

 

 

 

Configuring a CA Trustpoint

9-45

 

 

 

 

 

 

 

 

 

Configuring the Secure HTTP Server

9-46

 

 

 

 

 

 

 

Configuring the Secure HTTP Client

9-47

 

 

 

 

 

 

 

 

Displaying Secure HTTP Server and Client Status

9-48

 

 

 

 

 

 

Configuring the Switch for Secure Copy Protocol

9-48

 

 

 

 

 

 

 

Information About Secure Copy

9-49

 

 

 

 

 

Configuring IEEE 802.1x Port-Based Authentication 10-1

 

 

C H A P T E R 10

 

 

 

 

 

 

Understanding IEEE 802.1x Port-Based Authentication

10-1

 

 

 

 

 

 

Device Roles 10-2

 

 

 

 

 

 

 

 

 

 

 

 

Authentication Process

10-3

 

 

 

 

 

 

 

 

 

 

 

Authentication Initiation and Message Exchange

10-5

 

 

 

 

 

 

Ports in Authorized and Unauthorized States

10-7

 

 

 

 

 

 

 

IEEE 802.1x Authentication and Switch Stacks

10-7

 

 

 

 

 

 

IEEE 802.1x Host Mode

10-8

 

 

 

 

 

 

 

 

 

 

 

IEEE 802.1x Accounting

10-9

 

 

 

 

 

 

 

 

 

 

 

IEEE 802.1x Accounting Attribute-Value Pairs

10-9

 

 

 

 

 

 

Using IEEE 802.1x Authentication with VLAN Assignment

10-10

 

 

 

 

 

Using IEEE 802.1x Authentication with Per-User ACLs 10-11

 

 

 

 

Using IEEE 802.1x Authentication with Guest VLAN

10-12

 

 

 

 

 

Using IEEE 802.1x Authentication with Restricted VLAN

10-13

 

 

 

 

 

Using IEEE 802.1x Authentication with Inaccessible Authentication Bypass 10-14

 

 

 

 

Using IEEE 802.1x Authentication with Voice VLAN Ports

10-15

 

 

 

 

Catalyst 3750-E and 3560-E Switch Software Configuration Guide

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

x

 

 

 

 

 

 

 

 

 

 

OL-9775-02

 

 

 

 

 

 

 

 

 

 

 

 

 

Page 10
Image 10
Cisco Systems 3750E manual Device Roles