Contents
xi
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
OL-21521-01
Configuring SSH 10-46
Configuration Guidelines 10-46
Setting Up the Switch to Run SSH 10-46
Configuring the SSH Server 10-47
Displaying the SSH Configuration and Status 10-48
Configuring the Switch for Secure Socket Layer HTTP 10-49
Understanding Secure HTTP Servers and Clients 10-49
Certificate Authority Trustpoints 10-49
CipherSuites 10-51
Configuring Secure HTTP Servers and Clients 10-51
Default SSL Configuration 10-51
SSL Configuration Guidelines 10-52
Configuring a CA Trustpoint 10-52
Configuring the Secure HTTP Server 10-53
Configuring the Secure HTTP Client 10-54
Displaying Secure HTTP Server and Client Status 10-55
Configuring the Switch for Secure Copy Protocol 10-55
Information About Secure Copy 10-56
CHAPTER
11 Configuring IEEE 802.1x Port-Based Authentication 11-1
Understanding IEEE 802.1x Port-Based Authentication 11-1
Device Roles 11-3
Authentication Process 11-4
Authentication Initiation and Message Exchange 11-6
Authentication Manager 11-8
Port-Based Authentication Methods 11-8
Per-User ACLs and Filter-Ids 11-9
Authentication Manager CLI Commands 11-9
Ports in Authorized and Unauthorized States 11-10
802.1x Authentication and Switch Stacks 11-11
802.1x Host Mode 11-12
802.1x Multiple Authentication Mode 11-12
MAC Move 11-13
802.1x Accounting 11-13
802.1x Accounting Attribute-Value Pairs 11-13
802.1x Readiness Check 11-14
802.1x Authentication with VLAN Assignment 11-15
802.1x Authentication with Per-User ACLs 11-16