Concept Guide
Lock CONFIGURATION Mode....................................................................................................................................... 84
Viewing the Conguration Lock Status...................................................................................................................84
Recovering from a Forgotten Password....................................................................................................................... 84
Recovering from a Forgotten Enable Password.................................................................................................... 85
Recovering from a Failed Start...................................................................................................................................... 86
Restoring the Factory Default Settings.........................................................................................................................87
Important Points to Remember................................................................................................................................87
Restoring Factory Default Environment Variables..................................................................................................87
Dell EMC Networking OS Security Hardening............................................................................................................. 88
Dell EMC Networking OS Image Verication......................................................................................................... 89
Startup Conguration Verication...........................................................................................................................90
Conguring the root User Password........................................................................................................................91
Locking Access to GRUB Interface..........................................................................................................................91
Enabling User Lockout for Failed Login Attempts..................................................................................................92
5 802.1X..........................................................................................................................................................93
Port-Authentication Process..........................................................................................................................................95
EAP over RADIUS......................................................................................................................................................95
Conguring 802.1X...........................................................................................................................................................96
Related Conguration Tasks..................................................................................................................................... 96
Important Points to Remember......................................................................................................................................96
Enabling 802.1X.................................................................................................................................................................97
Conguring MAC addresses for a do1x Prole.............................................................................................................98
Conguring Request Identity Re-Transmissions...........................................................................................................99
Conguring a Quiet Period after a Failed Authentication..................................................................................... 99
Forcibly Authorizing or Unauthorizing a Port..............................................................................................................100
Re-Authenticating a Port............................................................................................................................................... 101
Conguring Timeouts.....................................................................................................................................................102
Conguring Dynamic VLAN Assignment with Port Authentication......................................................................... 103
Guest and Authentication-Fail VLANs.........................................................................................................................104
Conguring a Guest VLAN......................................................................................................................................104
Conguring an Authentication-Fail VLAN............................................................................................................. 104
Conguring dot1x Prole .............................................................................................................................................. 105
Conguring the Static MAB and MAB Prole ........................................................................................................... 106
Conguring Critical VLAN ............................................................................................................................................ 107
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).................................. 108
Optimizing CAM Utilization During the Attachment of ACLs to VLANs................................................................. 108
Guidelines for Conguring ACL VLAN Groups........................................................................................................... 109
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters...............................................109
Conguring ACL VLAN Groups.............................................................................................................................. 109
Conguring FP Blocks for VLAN Parameters........................................................................................................110
Viewing CAM Usage........................................................................................................................................................111
Allocating FP Blocks for VLAN Processes................................................................................................................... 112
7 Access Control Lists (ACLs)........................................................................................................................114
Contents
5










