Dell N3000 Switch User Manual


  Open as PDF
of 1460
 
Contents 23
Port Security (Port-MAC Locking) . . . . . . . . . 539
Captive Portal
. . . . . . . . . . . . . . . . . . . . . . 543
Captive Portal Overview
. . . . . . . . . . . . . . 543
Default Captive Portal Behavior and Settings
. . . 548
Configuring the Captive Portal (Web)
. . . . . . . 550
Configuring Captive Portal (CLI) . . . . . . . . . . 568
Captive Portal Configuration Example . . . . . . . 574
Authentication Manager
. . . . . . . . . . . . . . . . . 578
Overview
. . . . . . . . . . . . . . . . . . . . . . 578
Authentication Restart
. . . . . . . . . . . . . . . 579
802.1X Interaction. . . . . . . . . . . . . . . . . . 579
Authentication Priority . . . . . . . . . . . . . . . 579
Configuration Example—802.1X and MAB
. . . . . 580
Denial of Service
. . . . . . . . . . . . . . . . . . . . 582
20 Configuring Access Control Lists . . . . . 583
ACL Overview . . . . . . . . . . . . . . . . . . . . . . 583
What Are MAC ACLs?
. . . . . . . . . . . . . . . 584
What Are IP ACLs? . . . . . . . . . . . . . . . . . 585
What Is the ACL Redirect Function?
. . . . . . . . 585
What Is the ACL Mirror Function? . . . . . . . . . 585
What Is ACL Logging
. . . . . . . . . . . . . . . . 586
What Are Time-Based ACLs?
. . . . . . . . . . . . 586
What Are the ACL Limitations?. . . . . . . . . . . 587
ACL Configuration Details . . . . . . . . . . . . . . . . 591
How Are ACLs Configured?
. . . . . . . . . . . . . 591
Editing Access Lists . . . . . . . . . . . . . . . . 591
Preventing False ACL Matches. . . . . . . . . . . 591
Using IP and MAC Address Masks
. . . . . . . . . 593