10-2
Catalyst 3750 SwitchSoftware Configuration Guide
OL-8550-09
Chapter10 Configuring IEEE 802.1x Port-Based Authentication
Understanding IEEE 802.1x Port-Based Authentication
Authentication Manager, page10-8
Ports in Authorized and Unauthorized States, page 10-11
802.1x Authentication and Switch Stacks, page 10-12
802.1x Host Mode, page 10-13
Multidomain Authentication, page10-13
802.1x Multiple Authentication Mode, page10-14
MAC Move, page10-15
MAC Replace, page10-16
802.1x Accounting, page10-17
802.1x Accounting Attribute-Value Pairs, page10-17
802.1x Readiness Check, page10-18
802.1x Authentication with VLAN Assignment, page10-18
Using 802.1x Authentication with Per-User ACLs, page10-20
802.1x Authentication with Guest VLAN, page10-23
802.1x Authentication with Restricted VLAN, page 10-24
802.1x Authentication with Inaccessible Authentication Bypass, page 10-25
802.1x Authentication with Voice VLAN Ports, page10-27
802.1x Authentication with Port Security, page10-28
802.1x Authentication with Wake-on-LAN, page10-29
802.1x Authentication with MAC Authentication Bypass, page10-29
802.1x User Distribution, page10-31
Network Admission Control Layer 2 802.1x Validation, page10-32
Flexible Authentication Ordering, page10-32
Open1x Authentication, page10-32
Using Voice Aware 802.1x Security, page 10-33
802.1x Supplicant and Authenticator Switches with Network Edge Access Topology (NEAT),
page 10-33
802.1x Authentication with Downloadable ACLs and Redirect URLs, page10-21
Using IEEE 802.1x Authentication with ACLs and the RADIUS Filter-Id Attribute, page10-34
Common Session ID, page 10-35