Administrator Guide

Ignoring the Startup Conguration and Booting from the Factory-Default Conguration.....................................79
Recovering from a Failed Start...................................................................................................................................... 80
Restoring Factory-Default Settings...............................................................................................................................80
Important Point to Remember................................................................................................................................. 80
Restoring Factory-Default Boot Environment Variables........................................................................................ 81
Using Hashes to Verify Software Images Before Installation..................................................................................... 82
Verifying System Images on C9010 Components........................................................................................................83
When System Images on C9010 Components Do Not Match.............................................................................84
Manually Resetting the System Image on a C9010 Component......................................................................... 84
Logging in to the Virtual Console of a C9010 Component................................................................................... 85
Booting the C9010 from an Image on a Network Server..................................................................................... 85
Conguring C9010 Components to Boot from the RPM CP Image................................................................... 85
5 802.1X..........................................................................................................................................................87
The Port-Authentication Process.................................................................................................................................. 89
EAP over RADIUS......................................................................................................................................................90
Conguring 802.1X........................................................................................................................................................... 91
Related Conguration Tasks......................................................................................................................................91
Important Points to Remember...................................................................................................................................... 91
Enabling 802.1X................................................................................................................................................................ 92
Conguring dot1x Prole ................................................................................................................................................94
Conguring MAC addresses for a do1x Prole.............................................................................................................94
Conguring the Static MAB and MAB Prole .............................................................................................................95
Conguring Critical VLAN ..............................................................................................................................................96
Conguring Request Identity Re-Transmissions...........................................................................................................96
Conguring a Quiet Period after a Failed Authentication............................................................................................97
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 98
Re-Authenticating a Port................................................................................................................................................99
Conguring Dynamic VLAN Assignment with Port Authentication.......................................................................... 99
Guest and Authentication-Fail VLANs.........................................................................................................................100
Conguring a Guest VLAN...................................................................................................................................... 101
Conguring an Authentication-Fail VLAN............................................................................................................. 102
Conguring Timeouts...............................................................................................................................................103
Multi-Host Authentication.............................................................................................................................................104
Conguring Multi-Host AuthenticationConguring Single-Host Authentication............................................. 105
Multi-Supplicant Authentication...................................................................................................................................106
Conguring Multi-Supplicant AuthenticationRestricting Multi-Supplicant Authentication.............................107
MAC Authentication Bypass......................................................................................................................................... 108
MAB in Single-host and Multi-Host Mode............................................................................................................108
MAB in Multi-Supplicant Authentication Mode....................................................................................................109
Conguring MAC Authentication Bypass..............................................................................................................109
Dynamic CoS with 802.1X.............................................................................................................................................. 110
6 Access Control Lists (ACLs)........................................................................................................................112
IP Access Control Lists (ACLs)......................................................................................................................................112
CAM Usage................................................................................................................................................................113
Contents
5