Important Points to Remember................................................................................................................................80
Reloading the system...................................................................................................................................................... 82
5 802.1X..........................................................................................................................................................84
Port-Authentication Process.......................................................................................................................................... 86
EAP over RADIUS...................................................................................................................................................... 87
Configuring 802.1X........................................................................................................................................................... 87
Related Configuration Tasks..................................................................................................................................... 87
Important Points to Remember......................................................................................................................................88
Enabling 802.1X................................................................................................................................................................ 88
Configuring dot1x Profile ................................................................................................................................................89
Configuring Critical VLAN .............................................................................................................................................. 91
Re-Authenticating a Port................................................................................................................................................95
Configuring a Guest VLAN........................................................................................................................................97
Configuring Timeouts................................................................................................................................................ 98
Multi-Host Authentication.............................................................................................................................................. 99
Multi-Supplicant Authentication................................................................................................................................... 102
MAC Authentication Bypass......................................................................................................................................... 103
Dynamic CoS with 802.1X............................................................................................................................................. 105
6 Access Control Lists (ACLs)....................................................................................................................... 107
IP Access Control Lists (ACLs).....................................................................................................................................108
CAM Usage............................................................................................................................................................... 109
Configure ACL Range Profiles.................................................................................................................................. 111
Important Points to Remember......................................................................................................................................111
Configuring Match Routes....................................................................................................................................... 114
Configuring Set Conditions......................................................................................................................................115
Contents
5