Device roles – Dell POWEREDGE M1000E User Manual

Page 264

Advertising
background image

10-2

Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide

OL-13270-03

Chapter 10 Configuring IEEE 802.1x Port-Based Authentication

Understanding IEEE 802.1x Port-Based Authentication

IEEE 802.1x Host Mode, page 10-11

IEEE 802.1x Accounting, page 10-13

IEEE 802.1x Accounting Attribute-Value Pairs, page 10-13

“Using 802.1x Readiness Check” section on page 10-14

Using IEEE 802.1x Authentication with VLAN Assignment, page 10-14

Using IEEE 802.1x Authentication with Per-User ACLs, page 10-16

802.1x Multiple Authentication Mode, page 10-12

Using IEEE 802.1x Authentication with Guest VLAN, page 10-18

Using IEEE 802.1x Authentication with Restricted VLAN, page 10-19

Using IEEE 802.1x Authentication with Inaccessible Authentication Bypass, page 10-20

Using IEEE 802.1x Authentication with Voice VLAN Ports, page 10-21

Using IEEE 802.1x Authentication with Port Security, page 10-22

802.1x Authentication with Downloadable ACLs and Redirect URLs, page 10-17

Using IEEE 802.1x Authentication with Wake-on-LAN, page 10-23

Using IEEE 802.1x Authentication with MAC Authentication Bypass, page 10-23

Network Admission Control Layer 2 IEEE 802.1x Validation, page 10-25

Using Multidomain Authentication, page 10-26

Using Web Authentication, page 10-27Flexible Authentication Ordering, page 10-25

Open1x Authentication, page 10-25

802.1x Switch Supplicant with Network Edge Access Topology (NEAT), page 10-30

Device Roles

With IEEE 802.1x port-based authentication, the devices in the network have specific roles as shown in

Figure 10-1

.

Figure 10-1

IEEE 802.1x Device Roles

201760

Servers

Blade

switch

Authentication

server

(RADIUS)

Advertising