EasyManua.ls Logo

Dell S3048-ON - Page 5

Dell S3048-ON
1036 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Setting Timeout for EXEC Privilege Mode....................................................................................................................81
Using Telnet to get to Another Network Device...........................................................................................................81
Lock CONFIGURATION Mode....................................................................................................................................... 82
Viewing the Conguration Lock Status...................................................................................................................82
LPC Bus Quality Degradation......................................................................................................................................... 82
LBQA (LPC Bus Quality Analyzer) Failure Detection mode..................................................................................83
Reloading the system...................................................................................................................................................... 83
5 802.1X......................................................................................................................................................... 85
Port-Authentication Process.......................................................................................................................................... 87
EAP over RADIUS...................................................................................................................................................... 87
Conguring 802.1X...........................................................................................................................................................88
Related Conguration Tasks..................................................................................................................................... 88
Important Points to Remember......................................................................................................................................88
Conguring dot1x Prole ................................................................................................................................................89
Conguring MAC addresses for a do1x Prole.............................................................................................................89
Conguring the Static MAB and MAB Prole .............................................................................................................89
Conguring Critical VLAN ..............................................................................................................................................90
Enabling 802.1X................................................................................................................................................................ 92
Conguring Request Identity Re-Transmissions...........................................................................................................93
Conguring a Quiet Period after a Failed Authentication..................................................................................... 94
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 95
Re-Authenticating a Port................................................................................................................................................95
Conguring Timeouts......................................................................................................................................................96
Conguring Dynamic VLAN Assignment with Port Authentication...........................................................................97
Guest and Authentication-Fail VLANs.......................................................................................................................... 98
Conguring a Guest VLAN....................................................................................................................................... 99
Conguring an Authentication-Fail VLAN...............................................................................................................99
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)................................... 101
Optimizing CAM Utilization During the Attachment of ACLs to VLANs..................................................................101
Guidelines for Conguring ACL VLAN Groups........................................................................................................... 102
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters...............................................102
Conguring ACL VLAN Groups.............................................................................................................................. 102
Conguring FP Blocks for VLAN Parameters.......................................................................................................103
Viewing CAM Usage...................................................................................................................................................... 104
Allocating FP Blocks for VLAN Processes.................................................................................................................. 105
7 Access Control Lists (ACLs)....................................................................................................................... 107
IP Access Control Lists (ACLs).....................................................................................................................................108
CAM Usage...............................................................................................................................................................109
Implementing ACLs on Dell Networking OS..........................................................................................................109
Important Points to Remember......................................................................................................................................111
Conguration Task List for Route Maps..................................................................................................................111
Conguring Match Routes.......................................................................................................................................113
Conguring Set Conditions......................................................................................................................................114
Contents
5

Table of Contents

Related product manuals