1-11
Catalyst 3750-E and 3560-E Switch Software Configuration Guide
OL-9775-08
Chapter 1 Overview
Features
–
Support for VLAN assignment on a port configured for multi-auth mode. The RADIUS server
assigns a VLAN to the first host to authenticate on the port, and subsequent hosts use the same
VLAN. Voice VLAN assignment is supported for one IP phone
–
Port security for controlling access to IEEE 802.1x ports
–
Voice VLAN to permit a Cisco IP Phone to access the voice VLAN regardless of the authorized
or unauthorized state of the port
–
IP phone detection enhancement to detect and recognize a Cisco IP phone
–
Guest VLAN to provide limited services to non-IEEE 802.1x-compliant users
–
Restricted VLAN to provide limited services to users who are IEEE 802.1x compliant, but do
not have the credentials to authenticate via the standard IEEE 802.1x processes
–
IEEE 802.1x accounting to track network usage
–
IEEE 802.1x with wake-on-LAN to allow dormant PCs to be powered on based on the receipt
of a specific Ethernet frame
–
Voice aware IEEE 802.1x security to apply traffic violation actions only on the VLAN on which
a security violation occurs
–
Network Edge Access Topology (NEAT) with 802.1x switch supplicant, host authorization with
CISP, and auto enable to authenticate a switch outside a wiring closet as a supplicant to another
switch.
–
IEEE 802.1x authentication with downloadable ACLs and redirect URLs to allow per-user ACL
downloads from a Cisco Secure ACS server to an authenticated switch.
–
Multiple-user authentication to allow more than one host to authenticate on an 802.1x-enabled
port.
•
MAC authentication bypass to authorize clients based on the client MAC address.
•
Voice aware IEEE 802.1x and mac authentication bypass (MAB) security violation to shut down
only the data VLAN on a port when a security violation occurs
•
Network Admission Control (NAC) features:
–
NAC Layer 2 IEEE 802.1x validation of the antivirus condition or
posture
of endpoint systems
or clients before granting the devices network access.
For information about configuring NAC Layer 2 IEEE 802.1x validation, see the
NAC Layer 2 IEEE 802.1x Validation” section on page 10-59
.
–
NAC Layer 2 IP validation of the posture
of endpoint systems or clients before granting the
devices network access.
For information about configuring NAC Layer 2 IP validation, see the
Network Admission
Control Software Configuration Guide
.
–
IEEE 802.1x inaccessible authentication bypass.
For information about configuring this feature, see the
Authentication Bypass Feature” section on page 10-54
–
Authentication, authorization, and accounting (AAA) down policy for a NAC Layer 2 IP
validation of a host if the AAA server is not available when the posture validation occurs.
For information about this feature, see the
Network Admission Control Software Configuration
Guide
.
•
, a proprietary feature for managing network security through a TACACS server
Содержание Catalyst 3750-E Series
Страница 48: ...Contents xlviii Catalyst 3750 E and 3560 E Switch Software Configuration Guide OL 9775 08 ...
Страница 52: ...lii Catalyst 3750 E and 3560 E Switch Software Configuration Guide OL 9775 08 Preface ...
Страница 1414: ...Index IN 58 Catalyst 3750 E and 3560 E Switch Software Configuration Guide OL 9775 08 ...