9-2
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
OL-12247-04
Chapter 9 Configuring IEEE 802.1x Port-Based Authentication
Understanding IEEE 802.1x Port-Based Authentication
•
•
802.1x Multiple Authentication Mode, page 9-13
•
•
•
802.1x Accounting Attribute-Value Pairs, page 9-15
•
802.1x Readiness Check, page 9-16
•
802.1x Authentication with VLAN Assignment, page 9-16
•
802.1x Authentication with Per-User ACLs, page 9-17
•
802.1x Multiple Authentication Mode, page 9-13
•
802.1x Authentication with Guest VLAN, page 9-20
•
802.1x Authentication with Restricted VLAN, page 9-21
•
802.1x Authentication with Inaccessible Authentication Bypass, page 9-22
•
802.1x User Distribution, page 9-26
•
802.1x Authentication with Voice VLAN Ports, page 9-24
•
802.1x Authentication with Port Security, page 9-24
•
802.1x Authentication with Downloadable ACLs and Redirect URLs, page 9-18
•
VLAN ID-based MAC Authentication, page 9-20
•
802.1x Authentication with Wake-on-LAN, page 9-25
•
802.1x Authentication with MAC Authentication Bypass, page 9-26
•
Network Admission Control Layer 2 802.1x Validation, page 9-28
•
Multidomain Authentication, page 9-29
•
Flexible Authentication Ordering, page 9-28
•
Open1x Authentication, page 9-28
•
802.1x Supplicant and Authenticator Switches with Network Edge Access Topology (NEAT),
page 9-30