viii
DHCP snooping support for Option 82············································································································331
Recommended configuration procedure····················································································································332
Enabling DHCP snooping ···········································································································································332
Configuring DHCP snooping functions on an interface···························································································333
Displaying DHCP snooping entries ····························································································································334
DHCP snooping configuration example ····················································································································335
Network requirements·········································································································································335
Configuring Switch B ··········································································································································335
Managing services·················································································································································· 338
Overview·······································································································································································338
Managing services·······················································································································································339
Using diagnostic tools············································································································································· 341
Ping················································································································································································341
Traceroute ·····································································································································································341
Ping operation ······························································································································································342
IPv4 ping operation·············································································································································342
IPv6 ping operation·············································································································································343
Traceroute operation ···················································································································································344
IPv4 traceroute operation ···································································································································344
IPv6 traceroute operation ···································································································································345
Configuring 802.1X ··············································································································································· 347
Overview·······································································································································································347
802.1X architecture ············································································································································347
Access control methods ······································································································································347
Controlled/uncontrolled port and port authorization status ···········································································348
802.1X-related protocols····································································································································348
Packet formats······················································································································································349
EAP over RADIUS ················································································································································350
Initiating 802.1X authentication ························································································································350
802.1X authentication procedures····················································································································351
802.1X timers ······················································································································································355
Using 802.1X authentication with other features ····························································································356
Configuration prerequisites·········································································································································358
Recommended configuration procedure····················································································································358
Configuring 802.1X globally ·····································································································································358
Configuring 802.1X on a port ···································································································································360
Configuration guidelines ····································································································································360
Configuration procedure ····································································································································360
Configuring an 802.1X guest VLAN·················································································································362
Configuring an Auth-Fail VLAN ·························································································································362
Configuration examples ··············································································································································363
MAC-based 802.1X configuration example····································································································363
802.1X with ACL assignment configuration example·····················································································369
Configuring AAA ···················································································································································· 378
Overview·······································································································································································378
Recommended AAA configuration procedure··········································································································379
Configuring an ISP domain·········································································································································380
Configuring authentication methods for the ISP domain ·························································································381
Configuring authorization methods for the ISP domain···························································································382
Configuring accounting methods for the ISP domain·······························································································384
AAA configuration example ·······································································································································385
Network requirements·········································································································································385