![](https://pdfstore-manualsonline.prod.a.ki/pdfasset/6/30/63096e50-8ee1-4c84-b87d-32eeabc07e61/63096e50-8ee1-4c84-b87d-32eeabc07e61-bg56.png)
1-24
Software Configuration Guide—Release 15.0(2)SG
OL-23818-01
Chapter 1 Product Overview
Security Features
• Hardware-Based Control Plane Policing, page 1-26
• IP Source Guard for Static Hosts, page 1-27
• IP Source Guard, page 1-27
• Local Authentication, RADIUS, and TACACS+ Authentication, page 1-27
• Network Admission Control, page 1-27
• Network Security with ACLs, page 1-28
• Port Security, page 1-28
• PPPoE Intermediate Agent, page 1-29
• Storm Control, page 1-29
• uRPF Strict Mode, page 1-29
• Utilities, page 1-30
• Web-based Authentication, page 1-30
802.1X Identity-Based Network Security
This security feature consists of the following:
• 802.1X Authentication for Guest VLANs—Allows you to use VLAN assignment to limit network
access for certain users.
• 802.1X Authentication Failed Open Assignment—Allows you to configure a switch to handle the
case when a device fails to authenticate itself correctly through 802.1X (for example, not providing
the correct password).
• 802.1X Authentication with ACL Assignment—Downloads per-host policies such as ACLs and
redirect URLs to the switch from the RADIUS server during 802.1X or MAB authentication of the
host.
• 802.1X Authentication with Per-User ACL and Filter-ID ACL—Allows ACL policy enforcement
using a third-party AAA server.
• 802.1X Convergence—Provides consistency between the switching business units in 802.1X
configuration and implementation.
• 802.1X Protocol—Provides a means for a host that is connected to a switch port to be authenticated
before it is given access to the switch services.
• 802.1X RADIUS accounting—Allows you to track the use of network devices.
• 802.1X Supplicant and Authenticator Switches with Network Edge Access Topology
(NEAT)—Extends identity to areas outside the wiring closet (such as conference rooms). NEAT is
designed for deployment scenarios where a switch acting as 802.1X authenticator to end-hosts (PC
or Cisco IP-phones) is placed in an unsecured location (outside wiring closet); the authenticator
switch cannot always be trusted.
• 802.1X with Authentication Failed VLAN Assignment—Allows you to provide access for
authentication failed users on a per-port basis. Authentication failed users are end hosts that are
802.1X-capable but do not have valid credentials in an authentication server or end hosts that do not
give any username and password combination in the authentication pop-up window on the user side.