White Papers

Setting Timeout for EXEC Privilege Mode................................................................................................................... 82
Using Telnet to get to Another Network Device..........................................................................................................83
Lock CONFIGURATION Mode....................................................................................................................................... 83
Viewing the Conguration Lock Status...................................................................................................................83
Viewing the Reason for Last System Reboot...............................................................................................................84
5 802.1X......................................................................................................................................................... 85
Port-Authentication Process.......................................................................................................................................... 87
EAP over RADIUS...................................................................................................................................................... 87
Conguring 802.1X...........................................................................................................................................................88
Related Conguration Tasks..................................................................................................................................... 88
Important Points to Remember......................................................................................................................................88
Enabling 802.1X................................................................................................................................................................ 89
Conguring dot1x Prole ................................................................................................................................................90
Conguring MAC addresses for a do1x Prole..............................................................................................................91
Conguring the Static MAB and MAB Prole ..............................................................................................................91
Conguring Critical VLAN ..............................................................................................................................................92
Conguring Request Identity Re-Transmissions...........................................................................................................93
Conguring a Quiet Period after a Failed Authentication..................................................................................... 93
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 94
Re-Authenticating a Port................................................................................................................................................95
Conguring Timeouts......................................................................................................................................................96
Conguring Dynamic VLAN Assignment with Port Authentication...........................................................................97
Guest and Authentication-Fail VLANs.......................................................................................................................... 98
Conguring a Guest VLAN....................................................................................................................................... 98
Conguring an Authentication-Fail VLAN...............................................................................................................98
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).................................. 100
Optimizing CAM Utilization During the Attachment of ACLs to VLANs................................................................. 100
Guidelines for Conguring ACL VLAN Groups............................................................................................................ 101
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters............................................... 101
Conguring ACL VLAN Groups...............................................................................................................................101
Conguring FP Blocks for VLAN Parameters.......................................................................................................102
Viewing CAM Usage...................................................................................................................................................... 103
Allocating FP Blocks for VLAN Processes.................................................................................................................. 104
7 Access Control Lists (ACLs)....................................................................................................................... 106
IP Access Control Lists (ACLs)..................................................................................................................................... 107
CAM Usage...............................................................................................................................................................108
Implementing ACLs on Dell EMC Networking OS................................................................................................108
Important Points to Remember.....................................................................................................................................110
Conguration Task List for Route Maps.................................................................................................................110
Conguring Match Routes.......................................................................................................................................112
Conguring Set Conditions......................................................................................................................................113
Congure a Route Map for Route Redistribution..................................................................................................114
Congure a Route Map for Route Tagging............................................................................................................ 115
Contents
5