Service Manual

Sending Loopback Messages and Responses.................................................................. 110
Sending Linktrace Messages and Responses.................................................................... 111
Caching Link Trace........................................................................................................... 112
Enabling CFM SNMP Traps....................................................................................................113
Displaying Ethernet CFM Statistics......................................................................................114
6 802.1X..................................................................................................................................... 116
The Port-Authentication Process........................................................................................118
EAP over RADIUS....................................................................................................................120
RADIUS Attributes for 802.1 Support............................................................................120
Configuring 802.1X................................................................................................................ 120
Related Configuration Tasks...........................................................................................121
Important Points to Remember..................................................................................... 121
Enabling 802.1X...................................................................................................................... 122
Configuring MAC addresses for a do1x Profile................................................................ 124
Configuring Request Identity Re-Transmissions............................................................. 124
Configuring a Quiet Period after a Failed Authentication..............................................125
Forcibly Authorizing or Unauthorizing a Port.................................................................. 126
Re-Authenticating a Port...................................................................................................... 127
Configuring Timeouts........................................................................................................... 128
Configuring Dynamic VLAN Assignment with Port Authentication.............................129
Guest and Authentication-Fail VLANs................................................................................130
Configuring a Guest VLAN.............................................................................................. 131
Configuring an Authentication-Fail VLAN................................................................... 131
Configuring dot1x Profile .....................................................................................................133
Configuring the Static MAB and MAB Profile ...................................................................133
Configuring Critical VLAN ....................................................................................................134
7 Access Control List (ACL) VLAN Groups and Content Addressable Memory
(CAM)..........................................................................................................................................136
Optimizing CAM Utilization During the Attachment of ACLs to VLANs..................... 136
Guidelines for Configuring ACL VLAN Groups.................................................................137
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters..138
Configuring ACL VLAN Groups......................................................................................138
Configuring FP Blocks for VLAN Parameters..............................................................139
Viewing CAM Usage.............................................................................................................. 140
Allocating FP Blocks for VLAN Processes..........................................................................141
8 Access Control Lists (ACLs)................................................................................................ 143
IP Access Control Lists (ACLs)............................................................................................. 144
CAM Allocation and CAM Optimization............................................................................ 144
User Configurable CAM Allocation...............................................................................145
6