Users Guide

Lock CONFIGURATION Mode....................................................................................................................................... 78
Viewing the Conguration Lock Status...................................................................................................................78
Recovering from a Forgotten Password....................................................................................................................... 79
Recovering from a Forgotten Enable Password.................................................................................................... 80
Recovering from a Failed Start....................................................................................................................................... 81
Restoring the Factory Default Settings......................................................................................................................... 81
Important Points to Remember................................................................................................................................ 81
Restoring Factory Default Environment Variables................................................................................................. 82
5 802.1X..........................................................................................................................................................84
Port-Authentication Process..........................................................................................................................................86
EAP over RADIUS......................................................................................................................................................86
Conguring 802.1X........................................................................................................................................................... 87
Related Conguration Tasks..................................................................................................................................... 87
Important Points to Remember......................................................................................................................................87
Enabling 802.1X................................................................................................................................................................ 88
Conguring MAC addresses for a do1x Prole.............................................................................................................89
Conguring Request Identity Re-Transmissions...........................................................................................................90
Conguring a Quiet Period after a Failed Authentication..................................................................................... 90
Forcibly Authorizing or Unauthorizing a Port................................................................................................................91
Re-Authenticating a Port................................................................................................................................................92
Conguring Timeouts...................................................................................................................................................... 93
Conguring Dynamic VLAN Assignment with Port Authentication...........................................................................94
Guest and Authentication-Fail VLANs.......................................................................................................................... 95
Conguring a Guest VLAN....................................................................................................................................... 95
Conguring an Authentication-Fail VLAN...............................................................................................................95
Conguring dot1x Prole ................................................................................................................................................96
Conguring the Static MAB and MAB Prole ............................................................................................................. 97
Conguring Critical VLAN ..............................................................................................................................................98
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)....................................99
Optimizing CAM Utilization During the Attachment of ACLs to VLANs...................................................................99
Guidelines for Conguring ACL VLAN Groups........................................................................................................... 100
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters...............................................100
Conguring ACL VLAN Groups.............................................................................................................................. 100
Conguring FP Blocks for VLAN Parameters........................................................................................................101
Viewing CAM Usage...................................................................................................................................................... 102
Allocating FP Blocks for VLAN Processes.................................................................................................................. 103
7 Access Control Lists (ACLs)....................................................................................................................... 105
IP Access Control Lists (ACLs).....................................................................................................................................106
CAM Usage............................................................................................................................................................... 107
Implementing ACLs on Dell Networking OS..........................................................................................................107
IP Fragment Handling.................................................................................................................................................... 109
IP Fragments ACL Examples...................................................................................................................................109
Layer 4 ACL Rules Examples...................................................................................................................................109
Contents
5