The Port-Authentication Process.......................................................................................................76
EAP over RADIUS...........................................................................................................................78
Configuring 802.1X............................................................................................................................. 78
Related Configuration Tasks.........................................................................................................78
Important Points to Remember..........................................................................................................79
Enabling 802.1X...................................................................................................................................79
Configuring Request Identity Re-Transmissions................................................................................81
Configuring a Quiet Period after a Failed Authentication............................................................81
Forcibly Authorizing or Unauthorizing a Port....................................................................................82
Re-Authenticating a Port.................................................................................................................... 83
Configuring Timeouts.........................................................................................................................84
Configuring Dynamic VLAN Assignment with Port Authentication..................................................85
Guest and Authentication-Fail VLANs................................................................................................86
Configuring a Guest VLAN............................................................................................................ 87
Configuring an Authentication-Fail VLAN....................................................................................87
6 Access Control Lists (ACLs).............................................................................. 89
IP Access Control Lists (ACLs)............................................................................................................90
CAM Usage....................................................................................................................................90
Implementing ACLs on Dell Networking OS................................................................................92
Important Points to Remember..........................................................................................................93
Configuration Task List for Route Maps.......................................................................................93
Configuring Match Routes............................................................................................................96
Configuring Set Conditions...........................................................................................................97
Configure a Route Map for Route Redistribution........................................................................98
Configure a Route Map for Route Tagging..................................................................................99
Continue Clause............................................................................................................................99
IP Fragment Handling.......................................................................................................................100
IP Fragments ACL Examples.......................................................................................................100
Layer 4 ACL Rules Examples....................................................................................................... 101
Configure a Standard IP ACL............................................................................................................ 102
Configuring a Standard IP ACL Filter..........................................................................................103
Configure an Extended IP ACL.........................................................................................................104
Configuring Filters with a Sequence Number............................................................................104
Configuring Filters Without a Sequence Number......................................................................105
Configure Layer 2 and Layer 3 ACLs................................................................................................ 106
Assign an IP ACL to an Interface.......................................................................................................107
Applying an IP ACL............................................................................................................................ 107
Counting ACL Hits.......................................................................................................................108
Configure Ingress ACLs.................................................................................................................... 108
Configure Egress ACLs..................................................................................................................... 109
Applying Egress Layer 3 ACLs (Control-Plane)...........................................................................110
Komentáře k této Příručce