Configuration manual

10-2
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
OL-13270-03
Chapter 10 Configuring IEEE 802.1x Port-Based Authentication
Understanding IEEE 802.1x Port-Based Authentication
IEEE 802.1x Host Mode, page 10-11
IEEE 802.1x Accounting, page 10-13
IEEE 802.1x Accounting Attribute-Value Pairs, page 10-13
“Using 802.1x Readiness Check” section on page 10-14
Using IEEE 802.1x Authentication with VLAN Assignment, page 10-14
Using IEEE 802.1x Authentication with Per-User ACLs, page 10-16
802.1x Multiple Authentication Mode, page 10-12
Using IEEE 802.1x Authentication with Guest VLAN, page 10-18
Using IEEE 802.1x Authentication with Restricted VLAN, page 10-19
Using IEEE 802.1x Authentication with Inaccessible Authentication Bypass, page 10-20
Using IEEE 802.1x Authentication with Voice VLAN Ports, page 10-21
Using IEEE 802.1x Authentication with Port Security, page 10-22
802.1x Authentication with Downloadable ACLs and Redirect URLs, page 10-17
Using IEEE 802.1x Authentication with Wake-on-LAN, page 10-23
Using IEEE 802.1x Authentication with MAC Authentication Bypass, page 10-23
Network Admission Control Layer 2 IEEE 802.1x Validation, page 10-25
Using Multidomain Authentication, page 10-26
Using Web Authentication, page 10-27Flexible Authentication Ordering, page 10-25
Open1x Authentication, page 10-25
802.1x Switch Supplicant with Network Edge Access Topology (NEAT), page 10-30
Device Roles
With IEEE 802.1x port-based authentication, the devices in the network have specific roles as shown in
Figure 10-1.
Figure 10-1 IEEE 802.1x Device Roles
201760
Servers
Blade
switch
Authentication
server
(RADIUS)