Restoring Factory-Default Boot Environment Variables..............................................................75
5 802.1X...................................................................................................................78
The Port-Authentication Process.......................................................................................................79
EAP over RADIUS...........................................................................................................................81
Configuring 802.1X..............................................................................................................................81
Related Configuration Tasks.........................................................................................................81
Important Points to Remember..........................................................................................................82
Enabling 802.1X...................................................................................................................................82
Configuring Request Identity Re-Transmissions...............................................................................84
Configuring a Quiet Period after a Failed Authentication...........................................................84
Forcibly Authorizing or Unauthorizing a Port....................................................................................85
Re-Authenticating a Port....................................................................................................................86
Configuring Timeouts.........................................................................................................................87
Configuring Dynamic VLAN Assignment with Port Authentication..................................................88
Guest and Authentication-Fail VLANs................................................................................................89
Configuring a Guest VLAN............................................................................................................90
Configuring an Authentication-Fail VLAN....................................................................................90
6 Access Control Lists (ACLs)...............................................................................92
IP Access Control Lists (ACLs)............................................................................................................93
CAM Usage....................................................................................................................................93
Implementing ACLs ......................................................................................................................94
IP Fragment Handling.........................................................................................................................96
IP Fragments ACL Examples.........................................................................................................96
Layer 4 ACL Rules Examples.........................................................................................................96
Configure a Standard IP ACL..............................................................................................................97
Configuring a Standard IP ACL Filter............................................................................................99
Configure an Extended IP ACL.........................................................................................................100
Configuring Filters with a Sequence Number............................................................................100
Configuring Filters Without a Sequence Number......................................................................101
Configure Layer 2 and Layer 3 ACLs................................................................................................102
Using ACL VLAN Groups...................................................................................................................103
Guidelines for Configuring ACL VLAN Groups..........................................................................103
Configuring an ACL VLAN Group...............................................................................................104
Allocating ACL VLAN CAM..........................................................................................................105
Applying an IP ACL to an Interface...................................................................................................105
Configure Ingress ACLs..............................................................................................................106
Configure Egress ACLs................................................................................................................107
Applying Egress Layer 3 ACLs (Control-Plane)..........................................................................107
Counting ACL Hits.......................................................................................................................108
IP Prefix Lists.....................................................................................................................................108