Administrator Guide

Ignoring the Startup Conguration and Booting from the Factory-Default Conguration..................................... 81
Recovering from a Failed Start.......................................................................................................................................82
Restoring Factory-Default Settings............................................................................................................................... 82
Important Point to Remember..................................................................................................................................82
Restoring Factory-Default Boot Environment Variables....................................................................................... 83
Using Hashes to Verify Software Images Before Installation..................................................................................... 84
Verifying System Images on C9010 Components........................................................................................................85
When System Images on C9010 Components Do Not Match.............................................................................86
Manually Resetting the System Image on a C9010 Component......................................................................... 86
Logging in to the Virtual Console of a C9010 Component....................................................................................87
Booting the C9010 from an Image on a Network Server......................................................................................87
Conguring C9010 Components to Boot from the RPM CP Image....................................................................87
Viewing the Reason for Last System Reboot...............................................................................................................88
5 802.1X......................................................................................................................................................... 89
The Port-Authentication Process...................................................................................................................................91
EAP over RADIUS......................................................................................................................................................92
Conguring 802.1X...........................................................................................................................................................93
Related Conguration Tasks..................................................................................................................................... 93
Important Points to Remember......................................................................................................................................93
Enabling 802.1X................................................................................................................................................................ 94
Conguring dot1x Prole ................................................................................................................................................96
Conguring MAC addresses for a do1x Prole.............................................................................................................96
Conguring the Static MAB and MAB Prole ............................................................................................................. 97
Conguring Critical VLAN ..............................................................................................................................................98
Conguring Request Identity Re-Transmissions...........................................................................................................98
Conguring a Quiet Period after a Failed Authentication........................................................................................... 99
Forcibly Authorizing or Unauthorizing a Port..............................................................................................................100
Re-Authenticating a Port............................................................................................................................................... 101
Conguring Dynamic VLAN Assignment with Port Authentication..........................................................................101
Guest and Authentication-Fail VLANs.........................................................................................................................102
Conguring a Guest VLAN......................................................................................................................................103
Conguring an Authentication-Fail VLAN............................................................................................................. 104
Conguring Timeouts.............................................................................................................................................. 105
Multi-Host Authentication.............................................................................................................................................106
Conguring Multi-Host AuthenticationConguring Single-Host Authentication..............................................107
Multi-Supplicant Authentication...................................................................................................................................108
Conguring Multi-Supplicant AuthenticationRestricting Multi-Supplicant Authentication.............................109
MAC Authentication Bypass..........................................................................................................................................110
MAB in Single-host and Multi-Host Mode.............................................................................................................110
MAB in Multi-Supplicant Authentication Mode......................................................................................................111
Conguring MAC Authentication Bypass................................................................................................................111
Dynamic CoS with 802.1X.............................................................................................................................................. 112
6 Access Control Lists (ACLs)........................................................................................................................114
IP Access Control Lists (ACLs)......................................................................................................................................114
Contents
5