Configuration manual

Lock CONFIGURATION Mode............................................................................................................74
Viewing the Configuration Lock Status........................................................................................ 74
Recovering from a Forgotten Password on the Z9000 System........................................................75
Recovering from a Forgotten Enable Password on the Z9000.................................................. 76
Recovering from a Failed Start on the Z9000 System.......................................................................77
Restoring the Factory Default Settings...............................................................................................78
Z9000MXL Switch......................................................................................................................... 78
Important Points to Remember....................................................................................................78
Restoring Factory Default Environment Variables....................................................................... 78
6 802.1X................................................................................................................... 81
The Port-Authentication Process.......................................................................................................82
EAP over RADIUS...........................................................................................................................84
Configuring 802.1X............................................................................................................................. 84
Related Configuration Tasks.........................................................................................................84
Important Points to Remember..........................................................................................................85
Enabling 802.1X...................................................................................................................................85
Configuring Request Identity Re-Transmissions............................................................................... 87
Configuring a Quiet Period after a Failed Authentication........................................................... 87
Forcibly Authorizing or Unauthorizing a Port....................................................................................88
Re-Authenticating a Port....................................................................................................................89
Configuring Timeouts.........................................................................................................................90
Configuring Dynamic VLAN Assignment with Port Authentication.................................................. 91
Guest and Authentication-Fail VLANs................................................................................................92
Configuring a Guest VLAN............................................................................................................93
Configuring an Authentication-Fail VLAN....................................................................................93
7 Access Control Lists (ACLs)...............................................................................95
IP Access Control Lists (ACLs)............................................................................................................ 96
CAM Usage....................................................................................................................................96
Implementing ACLs on Dell Networking OS............................................................................... 98
IP Fragment Handling......................................................................................................................... 99
IP Fragments ACL Examples......................................................................................................... 99
Layer 4 ACL Rules Examples.......................................................................................................100
Configure a Standard IP ACL............................................................................................................ 101
Configuring a Standard IP ACL Filter..........................................................................................102
Configure an Extended IP ACL......................................................................................................... 103
Configuring Filters with a Sequence Number............................................................................103
Configuring Filters Without a Sequence Number......................................................................104
Configure Layer 2 and Layer 3 ACLs................................................................................................ 105
Assign an IP ACL to an Interface...................................................................................................... 106
Applying an IP ACL............................................................................................................................106