Users Guide
Sending Loopback Messages and Responses..................................................................109
Sending Linktrace Messages and Responses....................................................................110
Caching Link Trace............................................................................................................111
Enabling CFM SNMP Traps....................................................................................................112
Displaying Ethernet CFM Statistics......................................................................................113
6 802.1X..................................................................................................................................... 115
The Port-Authentication Process........................................................................................ 117
EAP over RADIUS.................................................................................................................... 119
RADIUS Attributes for 802.1 Support............................................................................ 119
Configuring 802.1X.................................................................................................................119
Related Configuration Tasks.......................................................................................... 120
Important Points to Remember.................................................................................... 120
Enabling 802.1X.......................................................................................................................121
Configuring MAC addresses for a do1x Profile................................................................ 123
Configuring Request Identity Re-Transmissions............................................................. 123
Configuring a Quiet Period after a Failed Authentication..............................................124
Forcibly Authorizing or Unauthorizing a Port...................................................................125
Re-Authenticating a Port...................................................................................................... 126
Configuring Timeouts............................................................................................................127
Configuring Dynamic VLAN Assignment with Port Authentication.............................128
Guest and Authentication-Fail VLANs................................................................................129
Configuring a Guest VLAN..............................................................................................130
Configuring an Authentication-Fail VLAN...................................................................130
Configuring dot1x Profile .....................................................................................................132
Configuring the Static MAB and MAB Profile ...................................................................132
Configuring Critical VLAN ....................................................................................................133
7 Access Control List (ACL) VLAN Groups and Content Addressable Memory
(CAM)..........................................................................................................................................135
Optimizing CAM Utilization During the Attachment of ACLs to VLANs..................... 135
Guidelines for Configuring ACL VLAN Groups.................................................................136
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters.. 137
Configuring ACL VLAN Groups......................................................................................137
Configuring FP Blocks for VLAN Parameters..............................................................138
Viewing CAM Usage...............................................................................................................139
Allocating FP Blocks for VLAN Processes......................................................................... 140
8 Access Control Lists (ACLs)................................................................................................ 142
IP Access Control Lists (ACLs)............................................................................................. 143
CAM Allocation and CAM Optimization............................................................................ 143
User Configurable CAM Allocation...............................................................................144
6










