White Papers

Table Of Contents
Setting Timeout for EXEC Privilege Mode................................................................................................................... 84
Using Telnet to get to Another Network Device..........................................................................................................84
Lock CONFIGURATION Mode.......................................................................................................................................85
Viewing the Conguration Lock Status...................................................................................................................85
Reloading the system...................................................................................................................................................... 85
Restoring the Factory Default Settings........................................................................................................................ 86
Important Points to Remember................................................................................................................................86
Restoring Factory Default Environment Variables..................................................................................................87
Viewing the Reason for Last System Reboot...............................................................................................................88
5 802.1X......................................................................................................................................................... 89
Port-Authentication Process...........................................................................................................................................91
EAP over RADIUS.......................................................................................................................................................91
Conguring 802.1X...........................................................................................................................................................92
Related Conguration Tasks..................................................................................................................................... 92
Important Points to Remember......................................................................................................................................92
Enabling 802.1X................................................................................................................................................................ 93
Conguring dot1x Prole ................................................................................................................................................94
Conguring MAC addresses for a do1x Prole.............................................................................................................95
Conguring the Static MAB and MAB Prole .............................................................................................................95
Conguring Critical VLAN ..............................................................................................................................................96
Conguring Request Identity Re-Transmissions........................................................................................................... 97
Conguring a Quiet Period after a Failed Authentication......................................................................................97
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 98
Re-Authenticating a Port................................................................................................................................................99
Conguring Timeouts.................................................................................................................................................... 100
Conguring Dynamic VLAN Assignment with Port Authentication..........................................................................101
Guest and Authentication-Fail VLANs.........................................................................................................................102
Conguring a Guest VLAN......................................................................................................................................102
Conguring an Authentication-Fail VLAN............................................................................................................. 102
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).................................. 104
Optimizing CAM Utilization During the Attachment of ACLs to VLANs................................................................. 104
Guidelines for Conguring ACL VLAN Groups........................................................................................................... 105
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters...............................................105
Conguring ACL VLAN Groups.............................................................................................................................. 105
Conguring FP Blocks for VLAN Parameters.......................................................................................................106
Viewing CAM Usage.......................................................................................................................................................107
Allocating FP Blocks for VLAN Processes.................................................................................................................. 108
Unied Forwarding Table (UFT) Modes...................................................................................................................... 109
Conguring UFT Modes.......................................................................................................................................... 109
7 Access Control Lists (ACLs)........................................................................................................................110
IP Access Control Lists (ACLs)...................................................................................................................................... 111
CAM Usage................................................................................................................................................................112
Implementing ACLs on Dell EMC Networking OS.................................................................................................112
Contents
5