Dell S6100 Configuration Manual page 5

Hide thumbs Also See for S6100:
Table of Contents

Advertisement

LBQA (LPC Bus Quality Analyzer) Failure Detection mode..................................................................................80
Restoring the Factory Default Settings........................................................................................................................ 80
Important Points to Remember................................................................................................................................80
Restoring Factory Default Environment Variables.................................................................................................. 81
Reloading the system...................................................................................................................................................... 82
5 802.1X..........................................................................................................................................................84
Port-Authentication Process.......................................................................................................................................... 86
EAP over RADIUS...................................................................................................................................................... 87
Configuring 802.1X........................................................................................................................................................... 87
Related Configuration Tasks..................................................................................................................................... 87
Important Points to Remember......................................................................................................................................88
Enabling 802.1X................................................................................................................................................................ 88
Configuring dot1x Profile ................................................................................................................................................89
Configuring MAC addresses for a do1x Profile.............................................................................................................90
Configuring the Static MAB and MAB Profile .............................................................................................................90
Configuring Critical VLAN .............................................................................................................................................. 91
Configuring Request Identity Re-Transmissions...........................................................................................................92
Configuring a Quiet Period after a Failed Authentication..................................................................................... 92
Configuring a Quiet Period after a Failed Authentication........................................................................................... 93
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 94
Re-Authenticating a Port................................................................................................................................................95
Configuring Dynamic VLAN Assignment with Port Authentication.......................................................................... 96
Guest and Authentication-Fail VLANs...........................................................................................................................97
Configuring a Guest VLAN........................................................................................................................................97
Configuring an Authentication-Fail VLAN............................................................................................................... 97
Configuring Timeouts................................................................................................................................................ 98
Multi-Host Authentication.............................................................................................................................................. 99
Configuring Multi-Host AuthenticationConfiguring Single-Host Authentication.............................................. 101
Multi-Supplicant Authentication................................................................................................................................... 102
MAC Authentication Bypass......................................................................................................................................... 103
MAB in Single-host and Multi-Host Mode............................................................................................................104
MAB in Multi-Supplicant Authentication Mode....................................................................................................104
Configuring MAC Authentication Bypass..............................................................................................................104
Dynamic CoS with 802.1X............................................................................................................................................. 105
6 Access Control Lists (ACLs)....................................................................................................................... 107
IP Access Control Lists (ACLs).....................................................................................................................................108
CAM Usage............................................................................................................................................................... 109
Implementing ACLs on Dell Networking OS..........................................................................................................109
Configure ACL Range Profiles.................................................................................................................................. 111
Important Points to Remember......................................................................................................................................111
Configuration Task List for Route Maps................................................................................................................. 112
Configuring Match Routes....................................................................................................................................... 114
Configuring Set Conditions......................................................................................................................................115
Contents
5

Advertisement

Table of Contents
loading

Table of Contents