Cisco Systems 3750E Webcam User Manual


  Open as PDF
of 1236
 
Contents
x
Catalyst 3750-E and 3560-E Switch Software Configuration Guide
OL-9775-02
Configuring the Switch for Secure Shell 9-37
Understanding SSH 9-38
SSH Servers, Integrated Clients, and Supported Versions 9-38
Limitations 9-39
Configuring SSH 9-39
Configuration Guidelines 9-39
Setting Up the Switch to Run SSH 9-40
Configuring the SSH Server 9-41
Displaying the SSH Configuration and Status 9-41
Configuring the Switch for Secure Socket Layer HTTP 9-42
Understanding Secure HTTP Servers and Clients 9-42
Certificate Authority Trustpoints 9-42
CipherSuites 9-44
Configuring Secure HTTP Servers and Clients 9-44
Default SSL Configuration 9-44
SSL Configuration Guidelines 9-45
Configuring a CA Trustpoint 9-45
Configuring the Secure HTTP Server 9-46
Configuring the Secure HTTP Client 9-47
Displaying Secure HTTP Server and Client Status 9-48
Configuring the Switch for Secure Copy Protocol 9-48
Information About Secure Copy 9-49
CHAPTER
10 Configuring IEEE 802.1x Port-Based Authentication 10-1
Understanding IEEE 802.1x Port-Based Authentication 10-1
Device Roles 10-2
Authentication Process 10-3
Authentication Initiation and Message Exchange 10-5
Ports in Authorized and Unauthorized States 10-7
IEEE 802.1x Authentication and Switch Stacks 10-7
IEEE 802.1x Host Mode 10-8
IEEE 802.1x Accounting 10-9
IEEE 802.1x Accounting Attribute-Value Pairs 10-9
Using IEEE 802.1x Authentication with VLAN Assignment 10-10
Using IEEE 802.1x Authentication with Per-User ACLs 10-11
Using IEEE 802.1x Authentication with Guest VLAN 10-12
Using IEEE 802.1x Authentication with Restricted VLAN 10-13
Using IEEE 802.1x Authentication with Inaccessible Authentication Bypass 10-14
Using IEEE 802.1x Authentication with Voice VLAN Ports 10-15