Dell 9.7(0.0) Plumbing Product User Manual


  Open as PDF
of 1039
 
Restoring Factory-Default Boot Environment Variables..............................................................75
5 802.1X................................................................................................................... 78
The Port-Authentication Process.......................................................................................................79
EAP over RADIUS........................................................................................................................... 81
Configuring 802.1X..............................................................................................................................81
Related Configuration Tasks......................................................................................................... 81
Important Points to Remember..........................................................................................................82
Enabling 802.1X...................................................................................................................................82
Configuring Request Identity Re-Transmissions...............................................................................84
Configuring a Quiet Period after a Failed Authentication........................................................... 84
Forcibly Authorizing or Unauthorizing a Port....................................................................................85
Re-Authenticating a Port....................................................................................................................86
Configuring Timeouts.........................................................................................................................87
Configuring Dynamic VLAN Assignment with Port Authentication..................................................88
Guest and Authentication-Fail VLANs................................................................................................89
Configuring a Guest VLAN............................................................................................................90
Configuring an Authentication-Fail VLAN....................................................................................90
6 Access Control Lists (ACLs)...............................................................................92
IP Access Control Lists (ACLs)............................................................................................................ 93
CAM Usage.................................................................................................................................... 93
Implementing ACLs ......................................................................................................................94
IP Fragment Handling.........................................................................................................................96
IP Fragments ACL Examples.........................................................................................................96
Layer 4 ACL Rules Examples.........................................................................................................96
Configure a Standard IP ACL.............................................................................................................. 97
Configuring a Standard IP ACL Filter............................................................................................99
Configure an Extended IP ACL.........................................................................................................100
Configuring Filters with a Sequence Number............................................................................100
Configuring Filters Without a Sequence Number......................................................................101
Configure Layer 2 and Layer 3 ACLs................................................................................................ 102
Using ACL VLAN Groups...................................................................................................................103
Guidelines for Configuring ACL VLAN Groups.......................................................................... 103
Configuring an ACL VLAN Group...............................................................................................104
Allocating ACL VLAN CAM..........................................................................................................105
Applying an IP ACL to an Interface...................................................................................................105
Configure Ingress ACLs.............................................................................................................. 106
Configure Egress ACLs................................................................................................................107
Applying Egress Layer 3 ACLs (Control-Plane).......................................................................... 107
Counting ACL Hits.......................................................................................................................108
IP Prefix Lists..................................................................................................................................... 108