Contents
viii
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-03
Controlling Switch Access with Kerberos
7-32
Understanding Kerberos
7-32
Kerberos Operation
7-34
Authenticating to a Boundary Switch
7-34
Obtaining a TGT from a KDC
7-35
Authenticating to Network Services
7-35
Configuring Kerberos
7-35
Configuring the Switch for Local Authentication and Authorization
7-36
Configuring the Switch for Secure Shell
7-37
Understanding SSH
7-37
SSH Servers, Integrated Clients, and Supported Versions
7-37
Limitations
7-38
Configuring SSH
7-38
Configuration Guidelines
7-38
Setting Up the Switch to Run SSH
7-39
Configuring the SSH Server
7-40
Displaying the SSH Configuration and Status
7-41
Configuring the Switch for Secure Socket Layer HTTP
7-41
Understanding Secure HTTP Servers and Clients
7-41
Certificate Authority Trustpoints
7-42
CipherSuites
7-43
Configuring Secure HTTP Servers and Clients
7-44
Default SSL Configuration
7-44
SSL Configuration Guidelines
7-44
Configuring a CA Trustpoint
7-44
Configuring the Secure HTTP Server
7-45
Configuring the Secure HTTP Client
7-47
Displaying Secure HTTP Server and Client Status
7-47
Configuring the Switch for Secure Copy Protocol
7-48
Information About Secure Copy
7-48
C H A P T E R
8
Configuring IEEE 802.1x Port-Based Authentication
8-1
Understanding IEEE 802.1x Port-Based Authentication
8-1
Device Roles
8-2
Authentication Process
8-3
Authentication Initiation and Message Exchange
8-5
Ports in Authorized and Unauthorized States
8-7
IEEE 802.1x Host Mode
8-7
IEEE 802.1x Accounting
8-8