10-2
Catalyst 2960 and 2960-S Switch Software Configuration Guide
OL-8603-09
Chapter 10 Configuring IEEE 802.1x Port-Based Authentication
Understanding IEEE 802.1x Port-Based Authentication
• 802.1x Multiple Authentication Mode, page 10-15
• MAC Move, page 10-16
• MAC Replace, page 10-16
• 802.1x Accounting, page 10-17
• 802.1x Accounting Attribute-Value Pairs, page 10-17
• 802.1x Readiness Check, page 10-18
• 802.1x Authentication with VLAN Assignment, page 10-19
• Using 802.1x Authentication with Per-User ACLs, page 10-20
• 802.1x Authentication with Guest VLAN, page 10-24
• 802.1x Authentication with Restricted VLAN, page 10-25
• 802.1x Authentication with Inaccessible Authentication Bypass, page 10-26
Note To use IEEE 802.1x authentication with inaccessible authentication bypass, the switch must be
running the LAN base image.
• 802.1x Authentication with Voice VLAN Ports, page 10-27
• 802.1x Authentication with Port Security, page 10-28
• 802.1x Authentication with Wake-on-LAN, page 10-29
Note To use IEEE 802.1x authentication with wake-on-LAN, the switch must be running the LAN
base image.
• 802.1x Authentication with MAC Authentication Bypass, page 10-30
• 802.1x User Distribution, page 10-31
• Network Admission Control Layer 2 802.1x Validation, page 10-32
Note To use Network Admission Control, the switch must be running the LAN base image.
• Flexible Authentication Ordering, page 10-32
• Open1x Authentication, page 10-33
• Using Voice Aware 802.1x Security, page 10-33
• 802.1x Supplicant and Authenticator Switches with Network Edge Access Topology (NEAT),
page 10-33
• 802.1x Authentication with Downloadable ACLs and Redirect URLs, page 10-21
• Using IEEE 802.1x Authentication with ACLs and the RADIUS Filter-Id Attribute, page 10-35
Note To use IEEE 802.1x authentication with ACLs and the Filter-Id attribute, the switch must be
running the LAN base image.
• Common Session ID, page 10-35