Users Guide

Table Of Contents
14 Contents
Public Key SSH Authentication Example . . . . . 329
Associating a User With an SSH Key
. . . . . . . 338
Authorization
. . . . . . . . . . . . . . . . . . . . . . 340
Exec Authorization Capabilities
. . . . . . . . . . 340
Authorization Examples
. . . . . . . . . . . . . . 342
RADIUS Change of Authorization
. . . . . . . . . 344
TACACS Authorization
. . . . . . . . . . . . . . 348
Accounting
. . . . . . . . . . . . . . . . . . . . . . . 352
RADIUS Accounting
. . . . . . . . . . . . . . . 352
IEEE 802.1X
. . . . . . . . . . . . . . . . . . . . . . . 355
What is IEEE 802.1X?
. . . . . . . . . . . . . . . 355
What are the 802.1X Port Authentication Modes?
356
What are Authentication Host Modes
. . . . . . 357
What is MAC Authentication Bypass?
. . . . . . 358
What is the Role of 802.1X in VLAN Assignment?
360
What is Monitor Mode?
. . . . . . . . . . . . . . 364
How Does the Authentication Server Assign
DiffServ Policy or ACLs?
. . . . . . . . . . . . . 366
What is the Internal Authentication Server?
. . . 366
Default 802.1X Values
. . . . . . . . . . . . . . . 367
Configuring IEEE 802.1X (Web)
. . . . . . . . . . 368
Captive Portal
. . . . . . . . . . . . . . . . . . . . . 392
Captive Portal Overview
. . . . . . . . . . . . . 392
Default Captive Portal Behavior and Settings
. . 400
Configuring Captive Portal (Web)
. . . . . . . . . 402
Configuring Captive Portal (CLI)
. . . . . . . . . 418
Captive Portal Configuration Example
. . . . . . 424
In Case Of Problems in Captive Portal Deployment
428
Network Access Control
. . . . . . . . . . . . . . . . 429
Pre-enrollment State
. . . . . . . . . . . . . . . 429