![Dell S6000-ON Скачать руководство пользователя страница 5](http://html.mh-extra.com/html/dell/s6000-on/s6000-on_configuration-manual_84557005.webp)
Using Telnet to get to Another Network Device
............................................................................... 78
Lock CONFIGURATION Mode
............................................................................................................78
Viewing the Configuration Lock Status
........................................................................................ 79
Restoring the Factory Default Settings
...............................................................................................79
Important Points to Remember
....................................................................................................79
Restoring Factory Default Environment Variables
.......................................................................80
5 802.1X................................................................................................................... 82
Port-Authentication Process
.............................................................................................................. 83
EAP over RADIUS
...........................................................................................................................85
Configuring 802.1X
............................................................................................................................. 85
Related Configuration Tasks
.........................................................................................................85
Important Points to Remember
......................................................................................................... 86
Enabling 802.1X
...................................................................................................................................86
Configuring Request Identity Re-Transmissions
............................................................................... 88
Configuring a Quiet Period after a Failed Authentication
........................................................... 88
Forcibly Authorizing or Unauthorizing a Port
....................................................................................89
Re-Authenticating a Port
....................................................................................................................90
Configuring Timeouts
......................................................................................................................... 91
Configuring Dynamic VLAN Assignment with Port Authentication
..................................................92
Guest and Authentication-Fail VLANs
................................................................................................93
Configuring a Guest VLAN
............................................................................................................94
Configuring an Authentication-Fail VLAN
....................................................................................94
6 Access Control Lists (ACLs).............................................................................. 96
IP Access Control Lists (ACLs)
............................................................................................................ 96
CAM Usage
.................................................................................................................................... 97
Implementing ACLs on Dell Networking OS
............................................................................... 98
Important Points to Remember
......................................................................................................... 99
Configuration Task List for Route Maps
.....................................................................................100
Configuring Match Routes
..........................................................................................................102
Configuring Set Conditions
........................................................................................................ 103
Configure a Route Map for Route Redistribution
...................................................................... 104
Configure a Route Map for Route Tagging
................................................................................105
Continue Clause
..........................................................................................................................105
IP Fragment Handling
....................................................................................................................... 106
IP Fragments ACL Examples
....................................................................................................... 106
Layer 4 ACL Rules Examples
....................................................................................................... 107
Configure a Standard IP ACL
............................................................................................................108
Configuring a Standard IP ACL Filter
..........................................................................................109
Configure an Extended IP ACL
......................................................................................................... 110
Configuring Filters with a Sequence Number
............................................................................ 110
5
Содержание S6000-ON
Страница 1: ...Dell Configuration Guide for the S6000 ON System 9 9 0 0 ...
Страница 505: ...Figure 60 Inspecting Configuration of LAG 10 on ALPHA Link Aggregation Control Protocol LACP 505 ...
Страница 508: ...Figure 62 Inspecting a LAG Port on BRAVO Using the show interface Command 508 Link Aggregation Control Protocol LACP ...
Страница 509: ...Figure 63 Inspecting LAG 10 Using the show interfaces port channel Command Link Aggregation Control Protocol LACP 509 ...
Страница 552: ...mac address table static multicast mac address vlan vlan id output range interface 552 Microsoft Network Load Balancing ...
Страница 557: ...Figure 80 Configuring OSPF and BGP for MSDP Multicast Source Discovery Protocol MSDP 557 ...
Страница 558: ...Figure 81 Configuring PIM in Multiple Routing Domains 558 Multicast Source Discovery Protocol MSDP ...
Страница 562: ...Figure 83 MSDP Default Peer Scenario 1 562 Multicast Source Discovery Protocol MSDP ...
Страница 563: ...Figure 84 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 563 ...
Страница 564: ...Figure 85 MSDP Default Peer Scenario 3 564 Multicast Source Discovery Protocol MSDP ...
Страница 665: ...Policy based Routing PBR 665 ...
Страница 672: ...ip pim bsr border Remove candidate RP advertisements clear ip pim rp mapping 672 PIM Sparse Mode PIM SM ...
Страница 818: ...Figure 110 Single and Double Tag TPID Match 818 Service Provider Bridging ...
Страница 819: ...Figure 111 Single and Double Tag First byte TPID Match Service Provider Bridging 819 ...
Страница 995: ...Figure 140 Setup OSPF and Static Routes Virtual Routing and Forwarding VRF 995 ...