Dell C9000 Series Networking Configuration Manual page 5

Hide thumbs Also See for C9000 Series:
Table of Contents

Advertisement

Using Telnet to Access Another Network Device............................................................. 85
Lock CONFIGURATION Mode...............................................................................................86
Viewing the Configuration Lock Status......................................................................... 86
Recovering from a Forgotten Password .............................................................................87
Configuration............................................................................................................................ 88
Recovering from a Failed Start.............................................................................................. 88
Restoring Factory-Default Settings...................................................................................... 89
Important Point to Remember........................................................................................ 89
Restoring Factory-Default Boot Environment Variables............................................90
Using Hashes to Verify Software Images Before Installation.......................................... 91
Verifying System Images on C9010 Components............................................................ 93
When System Images on C9010 Components Do Not Match................................ 93
Logging in to the Virtual Console of a C9010 Component...................................... 95
Booting the C9010 from an Image on a Network Server..........................................95
5 802.1X....................................................................................................................................... 97
The Port-Authentication Process......................................................................................... 99
EAP over RADIUS...............................................................................................................101
Configuring 802.1X.................................................................................................................101
Related Configuration Tasks...........................................................................................101
Important Points to Remember.......................................................................................... 102
Enabling 802.1X...................................................................................................................... 103
Configuring dot1x Profile .....................................................................................................105
Configuring MAC addresses for a do1x Profile................................................................ 106
Configuring the Static MAB and MAB Profile .................................................................. 106
Configuring Critical VLAN ....................................................................................................107
Configuring Request Identity Re-Transmissions.............................................................108
Configuring a Quiet Period after a Failed Authentication............................................. 109
Forcibly Authorizing or Unauthorizing a Port...................................................................110
Re-Authenticating a Port....................................................................................................... 111
Guest and Authentication-Fail VLANs................................................................................ 113
Configuring a Guest VLAN.............................................................................................. 114
Configuring an Authentication-Fail VLAN................................................................... 115
Configuring Timeouts...................................................................................................... 116
Multi-Host Authentication.....................................................................................................117
Configuring Multi-Host AuthenticationConfiguring Single-Host
Authentication...................................................................................................................120
Multi-Supplicant Authentication..........................................................................................121
Version 9.10(0.0)
5

Advertisement

Table of Contents
loading

Table of Contents