Administrator Guide

Recovering from a Forgotten Enable Password on the Z9000...................................................75
Recovering from a Failed Start on the Z9000 System.......................................................................76
Restoring the Factory Default Settings...............................................................................................77
Z9000MXL Switch..........................................................................................................................77
Important Points to Remember.................................................................................................... 77
Restoring Factory Default Environment Variables........................................................................77
5 802.1X...................................................................................................................80
The Port-Authentication Process....................................................................................................... 81
EAP over RADIUS...........................................................................................................................83
Configuring 802.1X............................................................................................................................. 83
Related Configuration Tasks.........................................................................................................83
Important Points to Remember......................................................................................................... 84
Enabling 802.1X...................................................................................................................................84
Configuring Request Identity Re-Transmissions...............................................................................86
Configuring a Quiet Period after a Failed Authentication........................................................... 86
Forcibly Authorizing or Unauthorizing a Port.................................................................................... 87
Re-Authenticating a Port....................................................................................................................88
Configuring Timeouts.........................................................................................................................89
Configuring Dynamic VLAN Assignment with Port Authentication..................................................90
Guest and Authentication-Fail VLANs................................................................................................ 91
Configuring a Guest VLAN............................................................................................................92
Configuring an Authentication-Fail VLAN....................................................................................92
6 Access Control Lists (ACLs).............................................................................. 94
IP Access Control Lists (ACLs)............................................................................................................ 95
CAM Usage.................................................................................................................................... 95
Implementing ACLs on Dell Networking OS................................................................................97
IP Fragment Handling......................................................................................................................... 98
IP Fragments ACL Examples......................................................................................................... 98
Layer 4 ACL Rules Examples.........................................................................................................99
Configure a Standard IP ACL............................................................................................................100
Configuring a Standard IP ACL Filter.......................................................................................... 101
Configure an Extended IP ACL......................................................................................................... 102
Configuring Filters with a Sequence Number............................................................................102
Configuring Filters Without a Sequence Number......................................................................103
Configure Layer 2 and Layer 3 ACLs................................................................................................104
Assign an IP ACL to an Interface...................................................................................................... 105
Applying an IP ACL............................................................................................................................105
Counting ACL Hits.......................................................................................................................106
Configure Ingress ACLs.................................................................................................................... 106
Configure Egress ACLs......................................................................................................................107