Service Manual

Lock CONFIGURATION Mode..........................................................................................................................................76
Viewing the Conguration Lock Status.......................................................................................................................76
5 802.1ag.......................................................................................................................... 77
Ethernet CFM...................................................................................................................................................................77
Maintenance Domains...................................................................................................................................................... 78
Maintenance Points..........................................................................................................................................................78
Maintenance End Points...................................................................................................................................................79
Implementation Information..............................................................................................................................................79
Conguring the CFM....................................................................................................................................................... 80
Related Conguration Tasks....................................................................................................................................... 80
Enabling Ethernet CFM....................................................................................................................................................80
Creating a Maintenance Domain.......................................................................................................................................80
Creating a Maintenance Association..................................................................................................................................81
Create Maintenance Points............................................................................................................................................... 81
Creating a Maintenance End Point.............................................................................................................................. 81
Creating a Maintenance Intermediate Point................................................................................................................82
Displaying the MP Databases..................................................................................................................................... 82
Continuity Check Messages.............................................................................................................................................83
Enabling CCM............................................................................................................................................................ 84
Enabling Cross-Checking............................................................................................................................................84
Sending Loopback Messages and Responses...................................................................................................................84
Sending Linktrace Messages and Responses................................................................................................................... 85
Caching Link Trace.....................................................................................................................................................85
Enabling CFM SNMP Traps..............................................................................................................................................86
Displaying Ethernet CFM Statistics.................................................................................................................................. 87
6 802.1X........................................................................................................................... 89
The Port-Authentication Process..................................................................................................................................... 90
EAP over RADIUS.......................................................................................................................................................91
Conguring 802.1X........................................................................................................................................................... 92
Related Conguration Tasks....................................................................................................................................... 92
Important Points to Remember........................................................................................................................................ 92
Enabling 802.1X................................................................................................................................................................ 93
Conguring Request Identity Re-Transmissions................................................................................................................ 94
Conguring a Quiet Period after a Failed Authentication............................................................................................ 95
Forcibly Authorizing or Unauthorizing a Port....................................................................................................................96
Re-Authenticating a Port................................................................................................................................................. 96
Conguring Timeouts....................................................................................................................................................... 97
Conguring Dynamic VLAN Assignment with Port Authentication...................................................................................98
Guest and Authentication-Fail VLANs.............................................................................................................................. 99
Conguring a Guest VLAN....................................................................................................................................... 100
Conguring an Authentication-Fail VLAN................................................................................................................. 100
7 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).... 102
Optimizing CAM Utilization During the Attachment of ACLs to VLANs...........................................................................102
5