Dell S6000-ON Switch User Manual


  Open as PDF
of 1100
 
Using Telnet to get to Another Network Device............................................................................... 82
Lock CONFIGURATION Mode............................................................................................................83
Viewing the Configuration Lock Status........................................................................................83
Restoring the Factory Default Settings.............................................................................................. 84
Important Points to Remember....................................................................................................84
Restoring Factory Default Environment Variables.......................................................................84
5 802.1X................................................................................................................... 87
The Port-Authentication Process.......................................................................................................88
EAP over RADIUS...........................................................................................................................90
Configuring 802.1X.............................................................................................................................90
Related Configuration Tasks.........................................................................................................90
Important Points to Remember..........................................................................................................91
Enabling 802.1X...................................................................................................................................92
Configuring Request Identity Re-Transmissions............................................................................... 93
Configuring a Quiet Period after a Failed Authentication........................................................... 94
Forcibly Authorizing or Unauthorizing a Port.................................................................................... 95
Re-Authenticating a Port....................................................................................................................96
Configuring Timeouts......................................................................................................................... 97
Configuring Dynamic VLAN Assignment with Port Authentication..................................................98
Guest and Authentication-Fail VLANs................................................................................................99
Configuring a Guest VLAN..........................................................................................................100
Configuring an Authentication-Fail VLAN..................................................................................100
6 Access Control Lists (ACLs)............................................................................ 102
IP Access Control Lists (ACLs).......................................................................................................... 102
CAM Usage.................................................................................................................................. 103
Implementing ACLs on Dell Networking OS............................................................................. 104
Important Points to Remember........................................................................................................105
Configuration Task List for Route Maps.....................................................................................105
Configuring Match Routes..........................................................................................................108
Configuring Set Conditions........................................................................................................ 109
Configure a Route Map for Route Redistribution....................................................................... 111
Configure a Route Map for Route Tagging.................................................................................111
Continue Clause.......................................................................................................................... 112
IP Fragment Handling........................................................................................................................112
IP Fragments ACL Examples........................................................................................................113
Layer 4 ACL Rules Examples........................................................................................................113
Configure a Standard IP ACL.............................................................................................................114
Configuring a Standard IP ACL Filter...........................................................................................115
Configure an Extended IP ACL..........................................................................................................116
Configuring Filters with a Sequence Number............................................................................ 116
5