Users Guide

Using Telnet to Access Another Network Device..............................................................................79
Lock CONFIGURATION Mode........................................................................................................... 80
Viewing the Configuration Lock Status........................................................................................ 81
Recovering from a Forgotten Password ............................................................................................81
Ignoring the Startup Configuration and Booting from the Factory-Default Configuration............ 82
Recovering from a Failed Start........................................................................................................... 82
Restoring Factory-Default Settings.................................................................................................... 83
Important Point to Remember..................................................................................................... 83
Restoring Factory-Default Boot Environment Variables............................................................. 83
Using Hashes to Verify Software Images Before Installation............................................................ 85
Verifying System Images on C9010 Components............................................................................ 86
When System Images on C9010 Components Do Not Match................................................... 87
Manually Resetting the System Image on a C9010 Component................................................88
Logging in to the Virtual Console of a C9010 Component........................................................88
Booting the C9010 from an Image on a Network Server........................................................... 88
Configuring C9010 Components to Boot from the RPM CP Image..........................................89
5 802.1X...................................................................................................................90
The Port-Authentication Process....................................................................................................... 91
EAP over RADIUS...........................................................................................................................93
Configuring 802.1X............................................................................................................................. 93
Related Configuration Tasks.........................................................................................................93
Important Points to Remember......................................................................................................... 94
Enabling 802.1X...................................................................................................................................95
Configuring dot1x Profile ...................................................................................................................97
Configuring MAC addresses for a do1x Profile..................................................................................98
Configuring the Static MAB and MAB Profile ....................................................................................98
Configuring Critical VLAN ..................................................................................................................99
Configuring Request Identity Re-Transmissions.............................................................................100
Configuring a Quiet Period after a Failed Authentication................................................................101
Forcibly Authorizing or Unauthorizing a Port..................................................................................102
Re-Authenticating a Port.................................................................................................................. 103
Configuring Dynamic VLAN Assignment with Port Authentication................................................104
Guest and Authentication-Fail VLANs..............................................................................................105
Configuring a Guest VLAN..........................................................................................................106
Configuring an Authentication-Fail VLAN..................................................................................107
Configuring Timeouts.................................................................................................................108
Multi-Host Authentication................................................................................................................109
Configuring Multi-Host AuthenticationConfiguring Single-Host Authentication.....................111
Multi-Supplicant Authentication....................................................................................................... 112
Configuring Multi-Supplicant AuthenticationRestricting Multi-Supplicant Authentication..... 113
MAC Authentication Bypass..............................................................................................................114
5