22 Contents
Default Port Values. . . . . . . . . . . . . . . . . . . 497
Configuring Port Characteristics (Web)
. . . . . . . . 498
Port Configuration
. . . . . . . . . . . . . . . . . 498
Link Dependency Configuration
. . . . . . . . . 501
Link Dependency Summary. . . . . . . . . . . . 503
Configuring Port Characteristics (CLI). . . . . . . . . 504
Configuring Port Settings
. . . . . . . . . . . . . 504
Configuring Link Dependencies . . . . . . . . . 505
Port Configuration Examples . . . . . . . . . . . . . 506
Configuring Port Settings
. . . . . . . . . . . . . 506
Configuring a Link Dependency Groups . . . . . 507
19 Configuring 802.1X and Port-Based
Security . . . . . . . . . . . . . . . . . . . . . . . . . 509
Port-Based Security Overview . . . . . . . . . . . . 509
What is IEEE 802.1X?
. . . . . . . . . . . . . . . 510
What are the 802.1X Port States?. . . . . . . . . 511
What is MAC-Based 802.1X Authentication?. . . 511
What is the Role of 802.1X in VLAN
Assignment?
. . . . . . . . . . . . . . . . . . . 513
What is Monitor Mode?
. . . . . . . . . . . . . . 515
How Does the Authentication Server
Assign DiffServ Filters?
. . . . . . . . . . . . . . 516
What is the Internal Authentication Server?
. . . 517
What is Port Security? . . . . . . . . . . . . . . 517
Default Port-Based Security Values . . . . . . . . . . 518
Configuring Port-Based Security (Web)
. . . . . . . . 519
Dot1x Authentication
. . . . . . . . . . . . . . . 519
Authenticated Users
. . . . . . . . . . . . . . . 522