Index
IN-21
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
described 38-15
port ACLs
defined 37-2
types of 37-2
Port Aggregation Protocol
See EtherChannel
port-based authentication
accounting 13-13
authentication server
defined 13-2, 14-2
RADIUS server 13-2
client, defined 13-2, 14-2
configuring
guest VLAN 13-42
host mode 13-38
inaccessible authentication bypass 13-44
RADIUS server parameters on the switch 13-4,
13-36, 14-10
restricted VLAN 13-43
default configuration 13-30, 14-10
described 13-1
device roles 13-2, 14-2
downloadable ACLs and redirect URLs
overview 13-18 to 13-19
EAPOL-start frame 13-4
EAP-request/identity frame 13-4
EAP-response/identity frame 13-4
enabling
802.1X authentication 14-10, 14-12
encapsulation 13-2
flexible authentication ordering
overview 13-27
guest VLAN
configuration guidelines 13-21, 13-22
described 13-20
host mode 13-9
inaccessible authentication bypass
configuring 13-44
described 13-22
guidelines 13-33
initiation and message exchange 13-4
magic packet 13-24
maximum number of allowed devices per port 13-34
method lists 13-34
multiple authentication 13-11
per-user ACLs
AAA authorization 13-34
configuration tasks 13-17
described 13-17
RADIUS server attributes 13-17
ports
authorization state and dot1x port-control
command 13-9
authorized and unauthorized 13-9
voice VLAN 13-23
port security
described 13-24
readiness check
configuring 13-14
described 13-14
resetting to default values 13-51
switch
as proxy 13-2, 14-3
RADIUS client 13-2
switch supplicant
configuring 13-47
overview 13-28
user distribution
guidelines 13-26
overview 13-26
VLAN assignment
AAA authorization 13-34
characteristics 13-15
configuration tasks 13-16
described 13-15
voice aware 802.1x security
configuring 13-16
described 13-16