Users Guide

14 Contents
Public Key SSH Authentication Example . . . . . . 310
Associating a User With an SSH Key
. . . . . . . . 318
Authorization
. . . . . . . . . . . . . . . . . . . . . . . 320
Exec Authorization Capabilities
. . . . . . . . . . . 320
Authorization Examples
. . . . . . . . . . . . . . . 322
RADIUS Change of Authorization
. . . . . . . . . . 324
TACACS Authorization
. . . . . . . . . . . . . . . 328
Accounting
. . . . . . . . . . . . . . . . . . . . . . . . 332
RADIUS Accounting
. . . . . . . . . . . . . . . . 332
IEEE 802.1X
. . . . . . . . . . . . . . . . . . . . . . . . 334
What is IEEE 802.1X?
. . . . . . . . . . . . . . . . 334
What are the 802.1X Port Authentication
Modes?
. . . . . . . . . . . . . . . . . . . . . . . 335
What is MAC-Based 802.1X Authentication?
. . . . 336
What is the Role of 802.1X in VLAN
Assignment?
. . . . . . . . . . . . . . . . . . . . 339
What is Monitor Mode?
. . . . . . . . . . . . . . . 341
How Does the Authentication Server Assign
DiffServ Policy or ACLs?
. . . . . . . . . . . . . . 343
What is the Internal Authentication Server?
. . . . 344
Default 802.1X Values
. . . . . . . . . . . . . . . . 344
Configuring IEEE 802.1X (Web)
. . . . . . . . . . . 345
Captive Portal
. . . . . . . . . . . . . . . . . . . . . . 370
Captive Portal Overview
. . . . . . . . . . . . . . 370
Default Captive Portal Behavior and Settings
. . . 378
Configuring Captive Portal (Web)
. . . . . . . . . . 380
Configuring Captive Portal (CLI)
. . . . . . . . . . 396
Captive Portal Configuration Example
. . . . . . . 402
In Case Of Problems in Captive Portal
Deployment
. . . . . . . . . . . . . . . . . . . . . 406