About 802.1X Port-Based Authentication
Ports in Authorized and Unauthorized States, page 49-4
•
802.1X Host Mode, page 49-6
•
802.1X Violation Mode, page 49-8
•
Using MAC Move, page 49-9
•
Using MAC Replace, page 49-9
•
Using 802.1X with VLAN Assignment, page 49-9
•
Using 802.1X for Guest VLANs, page 49-10
•
Using 802.1X with MAC Authentication Bypass, page 49-11
•
Using 802.1X with Web-Based Authentication, page 49-13
•
Using 802.1X with Inaccessible Authentication Bypass, page 49-14
•
Using 802.1X with Unidirectional Controlled Port, page 49-15
•
•
Using 802.1X with VLAN User Distribution, page 49-15
•
Using 802.1X with Authentication Failed VLAN Assignment, page 49-16
•
Using 802.1X with Port Security, page 49-18
Using 802.1X Authentication with ACL Assignments and Redirect URLs, page 49-19
•
Using 802.1X with RADIUS-Provided Session Timeouts, page 49-20
•
Using 802.1X with Voice VLAN Ports, page 49-21
•
Using Voice Aware 802.1x Security, page 49-21
•
Using Multiple Domain Authentication and Multiple Authentication, page 49-22
•
Multi-Authentication Per User VLAN Authentication, page 49-23
•
Limiting Login for Users, page 49-24
•
802.1X Supplicant and Authenticator Switches with Network Edge Access Topology, page 49-24
•
How 802.1X Fails on a Port, page 49-25
•
Supported Topologies, page 49-26
•
Device Roles
With 802.1X port-based authentication, network devices have specific roles.
is described below.
Catalyst 4500 Series Switch, Cisco IOS Software Configuration Guide - Cisco IOS XE 3.9.xE and IOS 15.2(5)Ex
49-2
Chapter 49
Configuring 802.1X Port-Based Authentication
Figure 49-1
shows the role of each device, which