Concept Guide

Setting Timeout for EXEC Privilege Mode................................................................................................................... 88
Using Telnet to get to Another Network Device..........................................................................................................88
Lock CONFIGURATION Mode....................................................................................................................................... 89
Viewing the Conguration Lock Status...................................................................................................................89
LPC Bus Quality Degradation.........................................................................................................................................89
LBQA (LPC Bus Quality Analyzer) Failure Detection mode................................................................................. 90
Restoring the Factory Default Settings........................................................................................................................ 90
Important Points to Remember................................................................................................................................90
Restoring Factory Default Environment Variables.................................................................................................. 91
Viewing the Reason for Last System Reboot...............................................................................................................92
5 802.1X..........................................................................................................................................................93
Port-Authentication Process..........................................................................................................................................95
EAP over RADIUS......................................................................................................................................................95
Conguring 802.1X...........................................................................................................................................................96
Related Conguration Tasks..................................................................................................................................... 96
Important Points to Remember......................................................................................................................................96
Enabling 802.1X.................................................................................................................................................................97
Conguring Request Identity Re-Transmissions...........................................................................................................98
Conguring a Quiet Period after a Failed Authentication..................................................................................... 99
Forcibly Authorizing or Unauthorizing a Port..............................................................................................................100
Re-Authenticating a Port.............................................................................................................................................. 100
Conguring Timeouts..................................................................................................................................................... 101
Conguring Dynamic VLAN Assignment with Port Authentication......................................................................... 102
Guest and Authentication-Fail VLANs.........................................................................................................................103
Conguring a Guest VLAN......................................................................................................................................104
Conguring an Authentication-Fail VLAN............................................................................................................. 104
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).................................. 106
Optimizing CAM Utilization During the Attachment of ACLs to VLANs................................................................. 106
Guidelines for Conguring ACL VLAN Groups............................................................................................................107
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters...............................................107
Conguring ACL VLAN Groups.............................................................................................................................. 107
Conguring FP Blocks for VLAN Parameters.......................................................................................................108
Viewing CAM Usage...................................................................................................................................................... 109
Allocating FP Blocks for VLAN Processes................................................................................................................... 110
Unied Forwarding Table (UFT) Modes........................................................................................................................111
Conguring UFT Modes............................................................................................................................................111
7 Access Control Lists (ACLs)........................................................................................................................112
IP Access Control Lists (ACLs)......................................................................................................................................113
CAM Usage................................................................................................................................................................114
Implementing ACLs on Dell EMC Networking OS.................................................................................................114
Important Points to Remember.....................................................................................................................................116
Conguration Task List for Route Maps.................................................................................................................116
Conguring Match Routes.......................................................................................................................................118
Contents
5