Users Guide
Verifying System Images on C9010 Components............................................................................................ 78
When System Images on C9010 Components Do Not Match.................................................................79
Manually Resetting the System Image on a C9010 Component.............................................................80
Logging in to the Virtual Console of a C9010 Component......................................................................80
Booting the C9010 from an Image on a Network Server..........................................................................80
Configuring C9010 Components to Boot from the RPM CP Image.......................................................81
5 802.1X......................................................................................................................................................................82
The Port-Authentication Process......................................................................................................................... 84
EAP over RADIUS................................................................................................................................................ 85
Configuring 802.1X.................................................................................................................................................. 86
Related Configuration Tasks............................................................................................................................ 86
Important Points to Remember............................................................................................................................ 86
Enabling 802.1X........................................................................................................................................................ 87
Configuring dot1x Profile ...................................................................................................................................... 89
Configuring MAC addresses for a do1x Profile.................................................................................................. 89
Configuring the Static MAB and MAB Profile .................................................................................................... 90
Configuring Critical VLAN ......................................................................................................................................91
Configuring Request Identity Re-Transmissions............................................................................................... 91
Configuring a Quiet Period after a Failed Authentication............................................................................... 92
Forcibly Authorizing or Unauthorizing a Port.................................................................................................... 93
Re-Authenticating a Port........................................................................................................................................94
Configuring Dynamic VLAN Assignment with Port Authentication.............................................................. 94
Guest and Authentication-Fail VLANs..................................................................................................................95
Configuring a Guest VLAN................................................................................................................................96
Configuring an Authentication-Fail VLAN..................................................................................................... 97
Configuring Timeouts....................................................................................................................................... 98
Multi-Host Authentication......................................................................................................................................99
Configuring Multi-Host AuthenticationConfiguring Single-Host Authentication..............................100
Multi-Supplicant Authentication......................................................................................................................... 102
Configuring Multi-Supplicant AuthenticationRestricting Multi-Supplicant Authentication.............102
MAC Authentication Bypass.................................................................................................................................103
MAB in Single-host and Multi-Host Mode.................................................................................................. 103
MAB in Multi-Supplicant Authentication Mode......................................................................................... 104
Configuring MAC Authentication Bypass....................................................................................................104
Dynamic CoS with 802.1X.................................................................................................................................... 105
6 Access Control Lists (ACLs)............................................................................................................................... 107
IP Access Control Lists (ACLs)..............................................................................................................................107
CAM Usage........................................................................................................................................................ 108
User-Configurable CAM Allocation..............................................................................................................109
Allocating CAM for Ingress ACLs on the Port Extender........................................................................... 109
Allocating CAM for Egress ACLs on the Port Extender............................................................................. 111
Implementing ACLs ......................................................................................................................................... 112
IP Fragment Handling............................................................................................................................................ 113
IP Fragments ACL Examples........................................................................................................................... 113
Layer 4 ACL Rules Examples...........................................................................................................................114
Contents
5