
Command History This guide is platform-specific. For command information about other platforms, refer
to the relevant
Dell Networking OS Command Line Reference Guide
.
The following is a list of the Dell Networking OS version history for this command.
Version
Description
9.9(0.0)
Introduced on the C9010.
9.2(1.0)
Introduced on the Z9500.
8.3.19.0
Introduced on the S4820T.
8.3.11.1
Introduced on the Z9000.
8.3.7.0
Introduced on the S4810.
7.7.1.0
Authentication key length increased to 42 characters.
7.6.1.0
Introduced on the S-Series.
7.5.1.0
Introduced on the C-Series.
6.2.1.1
Introduced on the E-Series.
Usage Information The key configured with this command must match the key configured on the TACACS
+ daemon.
Port Authentication (802.1X)
Commands
An authentication server must authenticate a client connected to an 802.1X switch port. Until the
authentication, only Extensible Authentication Protocol over LAN (EAPOL) traffic is allowed through the port
to which a client is connected. After authentication is successful, normal traffic passes through the port.
The Dell Networking OS supports RADIUS and Active Directory environments using 802.1X Port
Authentication.
Important Points to Remember
The system limits network access for certain users by using VLAN assignments. 802.1X with VLAN assignment
has these characteristics when configured on the switch and the RADIUS server.
• 802.1X is not supported on the LAG or the channel members of a LAG.
• If no VLAN is supplied by the RADIUS server or if 802.1X authorization is disabled, the port is configured
in its access VLAN after successful authentication.
• If 802.1X authorization is enabled but the VLAN information from the RADIUS server is not valid, the port
returns to the Unauthorized state and remains in the configured access VLAN. This prevents ports from
appearing unexpectedly in an inappropriate VLAN due to a configuration error. Configuration errors
create an entry in Syslog.
Security
1963
Содержание C9000 series
Страница 1: ...Dell Networking Command Line Reference Guide for the C9000 Series Version 9 10 0 0 ...
Страница 394: ...deny 14551 666 Dell Access Control Lists ACL 394 ...
Страница 877: ...algorithm FIPS Cryptography 877 ...
Страница 1297: ...Total 5 0 Total 5 active route s using 952 bytes IPv6 Basics 1297 ...
Страница 1711: ...Vl 200 Dell Policy based Routing PBR 1711 ...
Страница 2277: ...Example Dell show run vrf test3 ip vrf test3 description IT Department Virtual Routing and Forwarding VRF 2277 ...