Users Guide

Ignoring the Startup Conguration and Booting from the Factory-Default Conguration.....................................80
Recovering from a Failed Start....................................................................................................................................... 81
Restoring Factory-Default Settings................................................................................................................................81
Important Point to Remember.................................................................................................................................. 81
Restoring Factory-Default Boot Environment Variables....................................................................................... 82
Using Hashes to Verify Software Images Before Installation..................................................................................... 83
Verifying System Images on C9010 Components........................................................................................................84
When System Images on C9010 Components Do Not Match.............................................................................85
Manually Resetting the System Image on a C9010 Component......................................................................... 85
Logging in to the Virtual Console of a C9010 Component................................................................................... 86
Booting the C9010 from an Image on a Network Server..................................................................................... 86
Conguring C9010 Components to Boot from the RPM CP Image................................................................... 86
Viewing the Reason for Last System Reboot...............................................................................................................87
5 802.1X..........................................................................................................................................................88
The Port-Authentication Process.................................................................................................................................. 90
EAP over RADIUS.......................................................................................................................................................91
Conguring 802.1X...........................................................................................................................................................92
Related Conguration Tasks..................................................................................................................................... 92
Important Points to Remember......................................................................................................................................92
Enabling 802.1X................................................................................................................................................................ 93
Conguring dot1x Prole ................................................................................................................................................95
Conguring MAC addresses for a do1x Prole.............................................................................................................95
Conguring the Static MAB and MAB Prole .............................................................................................................96
Conguring Critical VLAN ..............................................................................................................................................97
Conguring Request Identity Re-Transmissions...........................................................................................................97
Conguring a Quiet Period after a Failed Authentication........................................................................................... 98
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 99
Re-Authenticating a Port.............................................................................................................................................. 100
Conguring Dynamic VLAN Assignment with Port Authentication.........................................................................100
Guest and Authentication-Fail VLANs..........................................................................................................................101
Conguring a Guest VLAN......................................................................................................................................102
Conguring an Authentication-Fail VLAN............................................................................................................. 103
Conguring Timeouts...............................................................................................................................................104
Multi-Host Authentication.............................................................................................................................................105
Conguring Multi-Host AuthenticationConguring Single-Host Authentication............................................. 106
Multi-Supplicant Authentication................................................................................................................................... 107
Conguring Multi-Supplicant AuthenticationRestricting Multi-Supplicant Authentication.............................108
MAC Authentication Bypass.........................................................................................................................................109
MAB in Single-host and Multi-Host Mode............................................................................................................109
MAB in Multi-Supplicant Authentication Mode.....................................................................................................110
Conguring MAC Authentication Bypass...............................................................................................................110
Dynamic CoS with 802.1X...............................................................................................................................................111
6 Access Control Lists (ACLs)........................................................................................................................113
IP Access Control Lists (ACLs)......................................................................................................................................113
Contents
5