Contents
ix
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-03
IEEE 802.1x Accounting Attribute-Value Pairs
8-8
Using 802.1x Readiness Check
8-9
Using IEEE 802.1x Authentication with VLAN Assignment
8-10
Using IEEE 802.1x Authentication with Per-User ACLs
8-11
Using IEEE 802.1x Authentication with Guest VLAN
8-12
Using IEEE 802.1x Authentication with Restricted VLAN
8-13
Using IEEE 802.1x Authentication with Inaccessible Authentication Bypass
8-14
Using IEEE 802.1x Authentication with Voice VLAN Ports
8-15
Using IEEE 802.1x Authentication with Port Security
8-15
Using IEEE 802.1x Authentication with Wake-on-LAN
8-16
Using IEEE 802.1x Authentication with MAC Authentication Bypass
8-17
Network Admission Control Layer 2 IEEE 802.1x Validation
8-18
Using Voice Aware 802.1x Security
8-18
Using Web Authentication
8-19
Web Authentication with Automatic MAC Check
8-19
Configuring IEEE 802.1x Authentication
8-20
Default IEEE 802.1x Authentication Configuration
8-20
IEEE 802.1x Authentication Configuration Guidelines
8-22
IEEE 802.1x Authentication
8-22
VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication
Bypass
8-23
MAC Authentication Bypass
8-23
Configuring 802.1x Readiness Check
8-24
Configuring Voice Aware 802.1x Security
8-25
Configuring IEEE 802.1x Authentication
8-26
Configuring the Switch-to-RADIUS-Server Communication
8-27
Configuring the Host Mode
8-29
Configuring Periodic Re-Authentication
8-29
Manually Re-Authenticating a Client Connected to a Port
8-30
Changing the Quiet Period
8-30
Changing the Switch-to-Client Retransmission Time
8-31
Setting the Switch-to-Client Frame-Retransmission Number
8-32
Setting the Re-Authentication Number
8-32
Configuring IEEE 802.1x Accounting
8-33
Configuring a Guest VLAN
8-34
Configuring a Restricted VLAN
8-35
Configuring the Inaccessible Authentication Bypass Feature
8-36
Configuring IEEE 802.1x Authentication with WoL
8-39
Configuring MAC Authentication Bypass
8-39
Configuring NAC Layer 2 IEEE 802.1x Validation
8-40