Reference Guide

5 802.1ag......................................................................................................................79
Ethernet CFM.......................................................................................................................................79
Maintenance Domains........................................................................................................................80
Maintenance Points............................................................................................................................ 80
Maintenance End Points......................................................................................................................81
Implementation Information.............................................................................................................. 82
Configuring the CFM.......................................................................................................................... 82
Related Configuration Tasks.........................................................................................................82
Enabling Ethernet CFM....................................................................................................................... 82
Creating a Maintenance Domain........................................................................................................83
Creating a Maintenance Association..................................................................................................83
Create Maintenance Points................................................................................................................ 83
Creating a Maintenance End Point...............................................................................................84
Creating a Maintenance Intermediate Point................................................................................84
Displaying the MP Databases........................................................................................................85
Continuity Check Messages............................................................................................................... 86
Enabling CCM................................................................................................................................87
Enabling Cross-Checking............................................................................................................. 87
Sending Loopback Messages and Responses....................................................................................87
Sending Linktrace Messages and Responses.....................................................................................88
Caching Link Trace....................................................................................................................... 88
Enabling CFM SNMP Traps................................................................................................................. 89
Displaying Ethernet CFM Statistics..................................................................................................... 91
6 802.1X........................................................................................................................93
The Port-Authentication Process.......................................................................................................94
EAP over RADIUS...........................................................................................................................96
Configuring 802.1X............................................................................................................................. 96
Related Configuration Tasks.........................................................................................................96
Important Points to Remember..........................................................................................................97
Enabling 802.1X...................................................................................................................................98
Configuring Request Identity Re-Transmissions............................................................................... 99
Configuring a Quiet Period after a Failed Authentication......................................................... 100
Forcibly Authorizing or Unauthorizing a Port.................................................................................. 101
Re-Authenticating a Port.................................................................................................................. 102
Configuring Timeouts.......................................................................................................................103
Configuring Dynamic VLAN Assignment with Port Authentication................................................104
Guest and Authentication-Fail VLANs..............................................................................................105
Configuring a Guest VLAN..........................................................................................................106
Configuring an Authentication-Fail VLAN..................................................................................106