Cisco Catalyst 3750-E Software Configuration Manual page 63

Hide thumbs Also See for Catalyst 3750-E:
Table of Contents

Advertisement

Chapter 1
Overview
MAC authentication bypass to authorize clients based on the client MAC address.
Voice aware IEEE 802.1x and mac authentication bypass (MAB) security violation to shut down
only the data VLAN on a port when a security violation occurs
Network Admission Control (NAC) features:
TACACS+, a proprietary feature for managing network security through a TACACS server
OL-9775-08
Support for VLAN assignment on a port configured for multi-auth mode. The RADIUS server
assigns a VLAN to the first host to authenticate on the port, and subsequent hosts use the same
VLAN. Voice VLAN assignment is supported for one IP phone
Port security for controlling access to IEEE 802.1x ports
Voice VLAN to permit a Cisco IP Phone to access the voice VLAN regardless of the authorized
or unauthorized state of the port
IP phone detection enhancement to detect and recognize a Cisco IP phone
Guest VLAN to provide limited services to non-IEEE 802.1x-compliant users
Restricted VLAN to provide limited services to users who are IEEE 802.1x compliant, but do
not have the credentials to authenticate via the standard IEEE 802.1x processes
IEEE 802.1x accounting to track network usage
IEEE 802.1x with wake-on-LAN to allow dormant PCs to be powered on based on the receipt
of a specific Ethernet frame
Voice aware IEEE 802.1x security to apply traffic violation actions only on the VLAN on which
a security violation occurs
Network Edge Access Topology (NEAT) with 802.1x switch supplicant, host authorization with
CISP, and auto enable to authenticate a switch outside a wiring closet as a supplicant to another
switch.
IEEE 802.1x authentication with downloadable ACLs and redirect URLs to allow per-user ACL
downloads from a Cisco Secure ACS server to an authenticated switch.
Multiple-user authentication to allow more than one host to authenticate on an 802.1x-enabled
port.
NAC Layer 2 IEEE 802.1x validation of the antivirus condition or posture of endpoint systems
or clients before granting the devices network access.
For information about configuring NAC Layer 2 IEEE 802.1x validation, see the
NAC Layer 2 IEEE 802.1x Validation" section on page
NAC Layer 2 IP validation of the posture of endpoint systems or clients before granting the
devices network access.
For information about configuring NAC Layer 2 IP validation, see the Network Admission
Control Software Configuration Guide.
IEEE 802.1x inaccessible authentication bypass.
For information about configuring this feature, see the
Authentication Bypass Feature" section on page
Authentication, authorization, and accounting (AAA) down policy for a NAC Layer 2 IP
validation of a host if the AAA server is not available when the posture validation occurs.
For information about this feature, see the Network Admission Control Software Configuration
Guide.
10-59.
"Configuring the Inaccessible
10-54.
Catalyst 3750-E and 3560-E Switch Software Configuration Guide
Features
"Configuring
1-11

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Catalyst3560-e

Table of Contents