Users Guide

Lock CONFIGURATION Mode..........................................................................................................................................79
Viewing the Conguration Lock Status.......................................................................................................................79
Recovering from a Forgotten Password........................................................................................................................... 79
Recovering from a Forgotten Enable Password..........................................................................................................80
Recovering from a Failed Start..........................................................................................................................................81
Restoring the Factory Default Settings............................................................................................................................. 81
Important Points to Remember.................................................................................................................................. 82
Restoring Factory Default Environment Variables.......................................................................................................82
5 802.1ag..........................................................................................................................84
Ethernet CFM.................................................................................................................................................................. 84
Maintenance Domains......................................................................................................................................................85
Maintenance Points..........................................................................................................................................................85
Maintenance End Points...................................................................................................................................................86
Implementation Information..............................................................................................................................................86
Conguring the CFM........................................................................................................................................................87
Related Conguration Tasks........................................................................................................................................87
Enabling Ethernet CFM.................................................................................................................................................... 87
Creating a Maintenance Domain.......................................................................................................................................87
Creating a Maintenance Association.................................................................................................................................88
Create Maintenance Points.............................................................................................................................................. 88
Creating a Maintenance End Point............................................................................................................................. 88
Creating a Maintenance Intermediate Point................................................................................................................89
Displaying the MP Databases..................................................................................................................................... 89
Continuity Check Messages.............................................................................................................................................90
Enabling CCM.............................................................................................................................................................91
Enabling Cross-Checking............................................................................................................................................ 91
Sending Loopback Messages and Responses................................................................................................................... 91
Sending Linktrace Messages and Responses................................................................................................................... 92
Caching Link Trace..................................................................................................................................................... 92
Enabling CFM SNMP Traps..............................................................................................................................................93
Displaying Ethernet CFM Statistics.................................................................................................................................. 94
6 802.1X........................................................................................................................... 96
The Port-Authentication Process..................................................................................................................................... 97
EAP over RADIUS...................................................................................................................................................... 98
Conguring 802.1X........................................................................................................................................................... 99
Related Conguration Tasks....................................................................................................................................... 99
Important Points to Remember........................................................................................................................................ 99
Enabling 802.1X...............................................................................................................................................................100
Conguring Request Identity Re-Transmissions............................................................................................................... 101
Conguring a Quiet Period after a Failed Authentication...........................................................................................102
Forcibly Authorizing or Unauthorizing a Port...................................................................................................................103
Re-Authenticating a Port................................................................................................................................................ 103
Conguring Timeouts......................................................................................................................................................104
Conguring Dynamic VLAN Assignment with Port Authentication................................................................................. 105
5