Contents
xxix
Catalyst 6500 Series Switch Software Configuration Guide—Release 8.7
OL-8978-04
C H A P T E R
41
Configuring MAC Authentication Bypass
41-1
Understanding How MAC Authentication Bypass Works
41-2
Overview
41-2
Understanding Reauthentication of MAC Addresses
41-2
Understanding MAC Authentication Bypass States
41-3
Understanding MAC Authentication Bypass Events
41-4
MAC Authentication Bypass Configuration Guidelines and Restrictions
41-4
Configuring MAC Authentication Bypass
41-6
Enabling or Disabling MAC Authentication Bypass Globally
41-6
Enabling or Disabling MAC Authentication Bypass on a Port
41-6
Initializing the MAC Authentication Bypass State for a Port
41-7
Reauthenticating the MAC Address for a Port
41-7
Specifying the Shutdown Timeout Period
41-7
Specifying the AuthFail Timeout Period
41-8
Specifying the Reauthentication Timeout Period
41-8
Enabling or Disabling Reauthentication
41-9
Specifying the Security Violation Mode
41-9
Enabling or Disabling MAC Authentication Bypass RADIUS Accounting
41-9
Configuring a PVLAN on a MAC Authentication Bypass-Enabled Port
41-10
Configuring MAC Authentication Bypass on a PVLAN Port
41-11
Displaying MAC Authentication Bypass Information
41-11
Displaying the MAC Authentication Bypass Global Configuration
41-12
Configuring MAC Authentication Bypass with ACL Assignments
41-13
Configuring MAC Authentication Bypass with QoS ACLs
41-13
Configuring Agentless Hosts for NAC Auditing with MAB
41-14
NAC Agentless Hosts Auditing Overview
41-14
Configuring the Switch
41-14
Configuring the Cisco Secure ACS Server
41-15
Installing and Configuring the NAC Audit Server
41-16
Displaying the Agentless Host Posture Tokens
41-16
Interaction of Agentless Host Audit with Security Features
41-17
C H A P T E R
42
Configuring Web-Based Proxy Authentication
42-1
Understanding How Web-Based Proxy Authentication Works
42-2
Device Roles
42-2
Authentication Initiation and Message Exchange
42-3
Host Detection and HTTP Traffic Interception
42-4
Access Control
42-5
Supported HTML Pages for Web-Based Proxy Authentication
42-5