Users Guide
Recovering from a Forgotten Enable Password.....................................................................................................77
Recovering from a Failed Start.......................................................................................................................................78
Restoring the Factory Default Settings.........................................................................................................................78
Important Points to Remember................................................................................................................................79
Restoring Factory Default Environment Variables................................................................................................. 79
5 802.1X.......................................................................................................................................................... 81
Port-Authentication Process..........................................................................................................................................83
EAP over RADIUS......................................................................................................................................................84
Conguring 802.1X...........................................................................................................................................................84
Related Conguration Tasks..................................................................................................................................... 84
Important Points to Remember......................................................................................................................................84
Enabling 802.1X................................................................................................................................................................ 85
Conguring MAC addresses for a do1x Prole.............................................................................................................86
Conguring Request Identity Re-Transmissions........................................................................................................... 87
Conguring a Quiet Period after a Failed Authentication......................................................................................87
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 88
Re-Authenticating a Port................................................................................................................................................89
Conguring Timeouts......................................................................................................................................................90
Conguring Dynamic VLAN Assignment with Port Authentication........................................................................... 91
Guest and Authentication-Fail VLANs.......................................................................................................................... 92
Conguring a Guest VLAN....................................................................................................................................... 92
Conguring an Authentication-Fail VLAN...............................................................................................................92
Conguring dot1x Prole ................................................................................................................................................93
Conguring the Static MAB and MAB Prole .............................................................................................................94
Conguring Critical VLAN ..............................................................................................................................................94
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)....................................96
Optimizing CAM Utilization During the Attachment of ACLs to VLANs...................................................................96
Guidelines for Conguring ACL VLAN Groups............................................................................................................. 97
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters................................................ 97
Conguring ACL VLAN Groups................................................................................................................................ 97
Conguring FP Blocks for VLAN Parameters........................................................................................................ 98
Viewing CAM Usage........................................................................................................................................................99
Allocating FP Blocks for VLAN Processes.................................................................................................................. 100
7 Access Control Lists (ACLs)........................................................................................................................101
IP Access Control Lists (ACLs).....................................................................................................................................102
CAM Usage...............................................................................................................................................................102
Implementing ACLs on Dell Networking OS..........................................................................................................103
IP Fragment Handling.................................................................................................................................................... 105
IP Fragments ACL Examples...................................................................................................................................105
Layer 4 ACL Rules Examples.................................................................................................................................. 105
Congure a Standard IP ACL........................................................................................................................................106
Conguring a Standard IP ACL Filter..................................................................................................................... 107
Congure an Extended IP ACL.....................................................................................................................................108
Conguring Filters with a Sequence Number.......................................................................................................108
Contents
5










