Setup Guide

Ignoring the Startup Conguration and Booting from the Factory-Default Conguration.....................................83
Recovering from a Failed Start.......................................................................................................................................84
Restoring Factory-Default Settings...............................................................................................................................84
Important Point to Remember................................................................................................................................. 84
Restoring Factory-Default Boot Environment Variables....................................................................................... 85
Using Hashes to Verify Software Images Before Installation..................................................................................... 86
Verifying System Images on C9010 Components........................................................................................................87
When System Images on C9010 Components Do Not Match.............................................................................88
Manually Resetting the System Image on a C9010 Component......................................................................... 88
Logging in to the Virtual Console of a C9010 Component................................................................................... 89
Booting the C9010 from an Image on a Network Server..................................................................................... 89
Conguring C9010 Components to Boot from the RPM CP Image................................................................... 89
Viewing the Reason for Last System Reboot.............................................................................................................. 90
5 802.1X.......................................................................................................................................................... 91
The Port-Authentication Process.................................................................................................................................. 93
EAP over RADIUS......................................................................................................................................................94
Conguring 802.1X...........................................................................................................................................................95
Related Conguration Tasks..................................................................................................................................... 95
Important Points to Remember......................................................................................................................................95
Enabling 802.1X................................................................................................................................................................ 96
Conguring dot1x Prole ................................................................................................................................................98
Conguring MAC addresses for a do1x Prole.............................................................................................................98
Conguring the Static MAB and MAB Prole .............................................................................................................99
Conguring Critical VLAN ............................................................................................................................................ 100
Conguring Request Identity Re-Transmissions......................................................................................................... 100
Conguring a Quiet Period after a Failed Authentication...........................................................................................101
Forcibly Authorizing or Unauthorizing a Port..............................................................................................................102
Re-Authenticating a Port...............................................................................................................................................103
Conguring Dynamic VLAN Assignment with Port Authentication......................................................................... 103
Guest and Authentication-Fail VLANs.........................................................................................................................104
Conguring a Guest VLAN......................................................................................................................................105
Conguring an Authentication-Fail VLAN............................................................................................................. 106
Conguring Timeouts...............................................................................................................................................107
Multi-Host Authentication.............................................................................................................................................108
Conguring Multi-Host AuthenticationConguring Single-Host Authentication............................................. 109
Multi-Supplicant Authentication....................................................................................................................................110
Conguring Multi-Supplicant AuthenticationRestricting Multi-Supplicant Authentication.............................. 111
MAC Authentication Bypass..........................................................................................................................................112
MAB in Single-host and Multi-Host Mode.............................................................................................................112
MAB in Multi-Supplicant Authentication Mode.....................................................................................................113
Conguring MAC Authentication Bypass...............................................................................................................113
Dynamic CoS with 802.1X.............................................................................................................................................. 114
6 Access Control Lists (ACLs)........................................................................................................................116
IP Access Control Lists (ACLs)......................................................................................................................................116
Contents
5