Users Guide

14 Contents
What is IEEE 802.1X? . . . . . . . . . . . . . . . . 318
What are the 802.1X Port Authentication Modes?
. 319
What are Authentication Host Modes
. . . . . . . 320
What is MAC Authentication Bypass?
. . . . . . . 321
What is the Role of 802.1X in VLAN Assignment?
. 323
What is Monitor Mode?
. . . . . . . . . . . . . . . 327
How Does the Authentication Server Assign
DiffServ Policy or ACLs?
. . . . . . . . . . . . . . 329
What is the Internal Authentication Server?
. . . . 329
Default 802.1X Values
. . . . . . . . . . . . . . . . 330
Configuring IEEE 802.1X (Web)
. . . . . . . . . . . 331
Captive Portal
. . . . . . . . . . . . . . . . . . . . . . 355
Captive Portal Overview
. . . . . . . . . . . . . . 355
Default Captive Portal Behavior and Settings
. . . 363
Configuring Captive Portal (Web)
. . . . . . . . . . 365
Configuring Captive Portal (CLI)
. . . . . . . . . . 381
Captive Portal Configuration Example
. . . . . . . 387
In Case Of Problems in Captive Portal Deployment
391
10 Monitoring and Logging System Information 393
System Monitoring Overview . . . . . . . . . . . . . . 393
What System Information Is Monitored?
. . . . . . 393
Why Is System Information Needed?
. . . . . . . . 394
Where Are Log Messages Sent?
. . . . . . . . . . 394
What Are the Severity Levels?
. . . . . . . . . . . 395
What Are the System Startup and Operation Logs?
395
What Is the Log Message Format?
. . . . . . . . . 396
What Factors Should Be Considered When
Configuring Logging?
. . . . . . . . . . . . . . . . 398
Default Log Settings
. . . . . . . . . . . . . . . . . . . 399