10-2
Catalyst 3750 Switch Software Configuration Guide
OL-8550-09
Chapter 10 Configuring IEEE 802.1x Port-Based Authentication
Understanding IEEE 802.1x Port-Based Authentication
• Authentication Manager, page 10-8
• Ports in Authorized and Unauthorized States, page 10-11
• 802.1x Authentication and Switch Stacks, page 10-12
• 802.1x Host Mode, page 10-13
• Multidomain Authentication, page 10-13
• 802.1x Multiple Authentication Mode, page 10-14
• MAC Move, page 10-15
• MAC Replace, page 10-16
• 802.1x Accounting, page 10-17
• 802.1x Accounting Attribute-Value Pairs, page 10-17
• 802.1x Readiness Check, page 10-18
• 802.1x Authentication with VLAN Assignment, page 10-18
• Using 802.1x Authentication with Per-User ACLs, page 10-20
• 802.1x Authentication with Guest VLAN, page 10-23
• 802.1x Authentication with Restricted VLAN, page 10-24
• 802.1x Authentication with Inaccessible Authentication Bypass, page 10-25
• 802.1x Authentication with Voice VLAN Ports, page 10-27
• 802.1x Authentication with Port Security, page 10-28
• 802.1x Authentication with Wake-on-LAN, page 10-29
• 802.1x Authentication with MAC Authentication Bypass, page 10-29
• 802.1x User Distribution, page 10-31
• Network Admission Control Layer 2 802.1x Validation, page 10-32
• Flexible Authentication Ordering, page 10-32
• Open1x Authentication, page 10-32
• Using Voice Aware 802.1x Security, page 10-33
• 802.1x Supplicant and Authenticator Switches with Network Edge Access Topology (NEAT),
page 10-33
• 802.1x Authentication with Downloadable ACLs and Redirect URLs, page 10-21
• Using IEEE 802.1x Authentication with ACLs and the RADIUS Filter-Id Attribute, page 10-34
• Common Session ID, page 10-35