Users Guide

Using Telnet to get to Another Network Device............................................................................................................... 76
Lock CONFIGURATION Mode..........................................................................................................................................76
Viewing the Conguration Lock Status.......................................................................................................................77
Recovering from a Forgotten Password............................................................................................................................77
Recovering from a Forgotten Enable Password.......................................................................................................... 78
Recovering from a Failed Start......................................................................................................................................... 79
Restoring the Factory Default Settings.............................................................................................................................79
Important Points to Remember.................................................................................................................................. 79
Restoring Factory Default Environment Variables.......................................................................................................80
5 802.1ag..........................................................................................................................82
Ethernet CFM.................................................................................................................................................................. 82
Maintenance Domains...................................................................................................................................................... 83
Maintenance Points..........................................................................................................................................................83
Maintenance End Points...................................................................................................................................................84
Implementation Information..............................................................................................................................................84
Conguring the CFM....................................................................................................................................................... 85
Related Conguration Tasks....................................................................................................................................... 85
Enable Ethernet CFM.......................................................................................................................................................85
Creating a Maintenance Domain.......................................................................................................................................85
Creating a Maintenance Association.................................................................................................................................86
Create Maintenance Points.............................................................................................................................................. 86
Creating a Maintenance End Point............................................................................................................................. 86
Creating a Maintenance Intermediate Point................................................................................................................ 87
Displaying the MP Databases......................................................................................................................................87
Continuity Check Messages.............................................................................................................................................88
Enabling CCM............................................................................................................................................................ 89
Enabling Cross-Checking........................................................................................................................................... 89
Sending Loopback Messages and Responses...................................................................................................................89
Sending Linktrace Messages and Responses................................................................................................................... 89
Caching Link Trace.....................................................................................................................................................90
Enabling CFM SNMP Traps...............................................................................................................................................91
Displaying Ethernet CFM Statistics.................................................................................................................................. 92
6 802.1X........................................................................................................................... 94
Port-Authentication Process............................................................................................................................................ 95
EAP over RADIUS...................................................................................................................................................... 96
Conguring 802.1X............................................................................................................................................................97
Related Conguration Tasks....................................................................................................................................... 97
Important Points to Remember.........................................................................................................................................97
Enabling 802.1X................................................................................................................................................................ 98
Conguring Request Identity Re-Transmissions................................................................................................................99
Conguring a Quiet Period after a Failed Authentication...........................................................................................100
Forcibly Authorizing or Unauthorizing a Port................................................................................................................... 101
Re-Authenticating a Port.................................................................................................................................................101
Conguring Timeouts......................................................................................................................................................102
5