Users Guide
Restoring Factory-Default Settings...............................................................................................................................79
Important Point to Remember................................................................................................................................. 79
Restoring Factory-Default Boot Environment Variables...................................................................................... 80
Using Hashes to Verify Software Images Before Installation..................................................................................... 81
Verifying System Images on C9010 Components....................................................................................................... 82
When System Images on C9010 Components Do Not Match............................................................................ 83
Manually Resetting the System Image on a C9010 Component......................................................................... 83
Logging in to the Virtual Console of a C9010 Component...................................................................................84
Booting the C9010 from an Image on a Network Server..................................................................................... 84
Configuring C9010 Components to Boot from the RPM CP Image...................................................................84
5 802.1X......................................................................................................................................................... 86
The Port-Authentication Process..................................................................................................................................88
EAP over RADIUS......................................................................................................................................................89
Configuring 802.1X.......................................................................................................................................................... 90
Related Configuration Tasks.................................................................................................................................... 90
Important Points to Remember..................................................................................................................................... 90
Enabling 802.1X.................................................................................................................................................................91
Configuring dot1x Profile ................................................................................................................................................93
Configuring MAC addresses for a do1x Profile............................................................................................................ 93
Configuring the Static MAB and MAB Profile .............................................................................................................94
Configuring Critical VLAN ..............................................................................................................................................95
Configuring Request Identity Re-Transmissions......................................................................................................... 95
Configuring a Quiet Period after a Failed Authentication...........................................................................................96
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 97
Re-Authenticating a Port................................................................................................................................................98
Configuring Dynamic VLAN Assignment with Port Authentication.......................................................................... 98
Guest and Authentication-Fail VLANs.......................................................................................................................... 99
Configuring a Guest VLAN......................................................................................................................................100
Configuring an Authentication-Fail VLAN..............................................................................................................101
Configuring Timeouts...............................................................................................................................................102
Multi-Host Authentication.............................................................................................................................................103
Configuring Multi-Host AuthenticationConfiguring Single-Host Authentication.............................................104
Multi-Supplicant Authentication...................................................................................................................................105
Configuring Multi-Supplicant AuthenticationRestricting Multi-Supplicant Authentication............................106
MAC Authentication Bypass.........................................................................................................................................107
MAB in Single-host and Multi-Host Mode............................................................................................................ 107
MAB in Multi-Supplicant Authentication Mode....................................................................................................108
Configuring MAC Authentication Bypass..............................................................................................................108
Dynamic CoS with 802.1X.............................................................................................................................................109
6 Access Control Lists (ACLs)........................................................................................................................111
IP Access Control Lists (ACLs)......................................................................................................................................111
CAM Usage................................................................................................................................................................112
User-Configurable CAM Allocation.........................................................................................................................113
Allocating CAM for Ingress ACLs on the Port Extender......................................................................................113
Contents
5