Dell FCX624-I Laptop User Manual


  Open as PDF
of 1494
 
PowerConnect B-Series FCX Configuration Guide xxxv
53-1002266-01
Configuring web authentication options . . . . . . . . . . . . . . . . . . . 1320
Enabling RADIUS accounting for web authentication . . . . . 1320
Changing the login mode (HTTPS or HTTP) . . . . . . . . . . . . . 1321
Specifying trusted ports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1321
Specifying hosts that are permanently authenticated . . . . 1321
Configuring the re-authentication period . . . . . . . . . . . . . . . 1322
Defining the web authentication cycle . . . . . . . . . . . . . . . . . 1322
Limiting the number of web authentication attempts. . . . . 1322
Clearing authenticated hosts from the web
authentication table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1323
Setting and clearing the block duration for web
authentication attempts . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1323
Manually blocking and unblocking a specific host . . . . . . . 1323
Limiting the number of authenticated hosts . . . . . . . . . . . . 1324
Filtering DNS queries. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1324
Forcing re-authentication when ports are down . . . . . . . . . 1324
Forcing re-authentication after an inactive period . . . . . . . 1325
Defining the web authorization redirect address . . . . . . . . 1325
Deleting a web authentication VLAN . . . . . . . . . . . . . . . . . . 1326
Web authentication pages . . . . . . . . . . . . . . . . . . . . . . . . . . 1326
Displaying web authentication information. . . . . . . . . . . . . . . . . 1333
Displaying the web authentication configuration . . . . . . . . 1333
Displaying a list of authenticated hosts . . . . . . . . . . . . . . . . 1335
Displaying a list of hosts attempting to authenticate . . . . . 1336
Displaying a list of blocked hosts . . . . . . . . . . . . . . . . . . . . . 1336
Displaying a list of local user databases . . . . . . . . . . . . . . . 1337
Displaying a list of users in a local user database . . . . . . . 1337
Displaying passcodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1338
Chapter 38 Protecting Against Denial of Service Attacks
Protecting against Smurf attacks. . . . . . . . . . . . . . . . . . . . . . . . . 1339
Avoiding being an intermediary in a Smurf attack. . . . . . . . 1340
Avoiding being a victim in a Smurf attack . . . . . . . . . . . . . . 1340
Protecting against TCP SYN attacks. . . . . . . . . . . . . . . . . . . . . . . .1341
TCP security enhancement . . . . . . . . . . . . . . . . . . . . . . . . . . 1342
Displaying statistics about packets dropped
because of DoS attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1343
Chapter 39 Inspecting and Tracking DHCP Packets
Dynamic ARP inspection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1345
ARP poisoning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1345
How DAI works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1346
Configuration notes and feature limitations . . . . . . . . . . . . .1347
Configuring DAI. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1347
Displaying ARP inspection status and ports . . . . . . . . . . . . 1349
Displaying the ARP table . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1349