Users Guide

Recovering from a Forgotten Password............................................................................................................................76
Recovering from a Forgotten Enable Password.......................................................................................................... 77
Recovering from a Failed Start......................................................................................................................................... 77
Restoring the Factory Default Settings.............................................................................................................................78
Important Points to Remember.................................................................................................................................. 78
Restoring Factory Default Environment Variables....................................................................................................... 79
5 802.1ag.......................................................................................................................... 81
Ethernet CFM...................................................................................................................................................................81
Maintenance Domains...................................................................................................................................................... 82
Maintenance Points..........................................................................................................................................................82
Maintenance End Points...................................................................................................................................................83
Implementation Information..............................................................................................................................................83
Conguring the CFM........................................................................................................................................................84
Related Conguration Tasks....................................................................................................................................... 84
Enabling Ethernet CFM....................................................................................................................................................84
Creating a Maintenance Domain.......................................................................................................................................84
Creating a Maintenance Association.................................................................................................................................85
Create Maintenance Points.............................................................................................................................................. 85
Creating a Maintenance End Point............................................................................................................................. 85
Creating a Maintenance Intermediate Point................................................................................................................86
Displaying the MP Databases..................................................................................................................................... 86
Continuity Check Messages............................................................................................................................................. 87
Enabling CCM............................................................................................................................................................ 88
Enabling Cross-Checking............................................................................................................................................88
Sending Loopback Messages and Responses...................................................................................................................88
Sending Linktrace Messages and Responses................................................................................................................... 89
Caching Link Trace.....................................................................................................................................................89
Enabling CFM SNMP Traps..............................................................................................................................................90
Displaying Ethernet CFM Statistics...................................................................................................................................91
6 802.1X........................................................................................................................... 93
The Port-Authentication Process..................................................................................................................................... 94
EAP over RADIUS...................................................................................................................................................... 95
Conguring 802.1X........................................................................................................................................................... 96
Related Conguration Tasks....................................................................................................................................... 96
Important Points to Remember........................................................................................................................................ 96
Enabling 802.1X................................................................................................................................................................ 97
Conguring Request Identity Re-Transmissions................................................................................................................ 98
Conguring a Quiet Period after a Failed Authentication............................................................................................ 99
Forcibly Authorizing or Unauthorizing a Port.................................................................................................................. 100
Re-Authenticating a Port................................................................................................................................................ 100
Conguring Timeouts...................................................................................................................................................... 101
Conguring Dynamic VLAN Assignment with Port Authentication..................................................................................102
Guest and Authentication-Fail VLANs.............................................................................................................................103
Conguring a Guest VLAN........................................................................................................................................104
5