Manualsbrain.com
fr
English
Deutsch
Español
Italiano
Português
Русский
조선말, 한국어
日本語
中文
Manuels
Marques
DELL
9.7(0.0)
Manuel D’Utilisation
DELL 9.7(0.0) Manuel D’Utilisation
Télécharger
Aimer
Full screen
Plein écran
Page
de
1039
Aller
Restoring Factory-Default Boot Environment Variables
..............................................................75
5 802.1X................................................................................................................... 78
The Port-Authentication Process
....................................................................................................... 79
EAP over RADIUS
........................................................................................................................... 81
Configuring 802.1X
..............................................................................................................................81
Related Configuration Tasks
......................................................................................................... 81
Important Points to Remember
..........................................................................................................82
Enabling 802.1X
...................................................................................................................................82
Configuring Request Identity Re-Transmissions
............................................................................... 84
Configuring a Quiet Period after a Failed Authentication
........................................................... 84
Forcibly Authorizing or Unauthorizing a Port
.................................................................................... 85
Re-Authenticating a Port
....................................................................................................................86
Configuring Timeouts
......................................................................................................................... 87
Configuring Dynamic VLAN Assignment with Port Authentication
..................................................88
Guest and Authentication-Fail VLANs
................................................................................................89
Configuring a Guest VLAN
............................................................................................................90
Configuring an Authentication-Fail VLAN
....................................................................................90
6 Access Control Lists (ACLs)...............................................................................92
IP Access Control Lists (ACLs)
............................................................................................................ 93
CAM Usage
.................................................................................................................................... 93
Implementing ACLs
......................................................................................................................94
IP Fragment Handling
......................................................................................................................... 96
IP Fragments ACL Examples
......................................................................................................... 96
Layer 4 ACL Rules Examples
.........................................................................................................96
Configure a Standard IP ACL
.............................................................................................................. 97
Configuring a Standard IP ACL Filter
............................................................................................99
Configure an Extended IP ACL
.........................................................................................................100
Configuring Filters with a Sequence Number
............................................................................100
Configuring Filters Without a Sequence Number
...................................................................... 101
Configure Layer 2 and Layer 3 ACLs
................................................................................................ 102
Using ACL VLAN Groups
...................................................................................................................103
Guidelines for Configuring ACL VLAN Groups
.......................................................................... 103
Configuring an ACL VLAN Group
............................................................................................... 104
Allocating ACL VLAN CAM
.......................................................................................................... 105
Applying an IP ACL to an Interface
...................................................................................................105
Configure Ingress ACLs
.............................................................................................................. 106
Configure Egress ACLs
................................................................................................................107
Applying Egress Layer 3 ACLs (Control-Plane)
.......................................................................... 107
Counting ACL Hits
.......................................................................................................................108
IP Prefix Lists
..................................................................................................................................... 108
Préc
Suiv
1
…
3
4
5
6
7
…
1039