Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide, Rel. 12.2(25)SEF1

Contents
viii
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-01
Configuring the Switch for Secure Shell 6-37
Understanding SSH 6-38
SSH Servers, Integrated Clients, and Supported Versions 6-38
Limitations 6-39
Configuring SSH 6-39
Configuration Guidelines 6-39
Setting Up the Switch to Run SSH 6-39
Configuring the SSH Server 6-41
Displaying the SSH Configuration and Status 6-41
Configuring the Switch for Secure Socket Layer HTTP 6-42
Understanding Secure HTTP Servers and Clients 6-42
Certificate Authority Trustpoints 6-42
CipherSuites 6-44
Configuring Secure HTTP Servers and Clients 6-44
Default SSL Configuration 6-44
SSL Configuration Guidelines 6-45
Configuring a CA Trustpoint 6-45
Configuring the Secure HTTP Server 6-46
Configuring the Secure HTTP Client 6-47
Displaying Secure HTTP Server and Client Status 6-48
Configuring the Switch for Secure Copy Protocol 6-48
Information About Secure Copy 6-49
CHAPTER
7 Configuring IEEE 802.1x Port-Based Authentication 7-1
Understanding IEEE 802.1x Port-Based Authentication 7-1
Device Roles 7-2
Authentication Process 7-3
Authentication Initiation and Message Exchange 7-5
Ports in Authorized and Unauthorized States 7-7
IEEE 802.1x Host Mode 7-8
IEEE 802.1x Accounting 7-9
IEEE 802.1x Accounting Attribute-Value Pairs 7-9
Using IEEE 802.1x Authentication with VLAN Assignment 7-10
Using IEEE 802.1x Authentication with Per-User ACLs 7-11
Using IEEE 802.1x Authentication with Guest VLAN 7-12
Using IEEE 802.1x Authentication with Restricted VLAN 7-13
Using IEEE 802.1x Authentication with Inaccessible Authentication Bypass 7-14
Using IEEE 802.1x Authentication with Voice VLAN Ports 7-15
Using IEEE 802.1x Authentication with Port Security 7-15