Users Guide

Recovering from a Forgotten Enable Password...........................................................................................77
Recovering from a Failed Start.............................................................................................................................. 78
Restoring the Factory Default Settings................................................................................................................ 78
Important Points to Remember.......................................................................................................................79
Restoring Factory Default Environment Variables.......................................................................................79
5 802.1X...................................................................................................................................................................... 81
Port-Authentication Process................................................................................................................................. 83
EAP over RADIUS................................................................................................................................................84
Configuring 802.1X.................................................................................................................................................. 85
Related Configuration Tasks............................................................................................................................ 85
Important Points to Remember............................................................................................................................ 85
Enabling 802.1X........................................................................................................................................................ 86
Configuring MAC addresses for a do1x Profile.................................................................................................. 87
Configuring Request Identity Re-Transmissions...............................................................................................88
Configuring a Quiet Period after a Failed Authentication......................................................................... 88
Forcibly Authorizing or Unauthorizing a Port.................................................................................................... 89
Re-Authenticating a Port........................................................................................................................................90
Configuring Timeouts..............................................................................................................................................91
Configuring Dynamic VLAN Assignment with Port Authentication...............................................................92
Guest and Authentication-Fail VLANs..................................................................................................................93
Configuring a Guest VLAN................................................................................................................................93
Configuring an Authentication-Fail VLAN.....................................................................................................93
Configuring dot1x Profile ...................................................................................................................................... 94
Configuring the Static MAB and MAB Profile .................................................................................................... 95
Configuring Critical VLAN ......................................................................................................................................95
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).................................97
Optimizing CAM Utilization During the Attachment of ACLs to VLANs....................................................... 97
Guidelines for Configuring ACL VLAN Groups.................................................................................................. 98
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters....................................98
Configuring ACL VLAN Groups....................................................................................................................... 98
Configuring FP Blocks for VLAN Parameters................................................................................................99
Viewing CAM Usage.............................................................................................................................................. 100
Allocating FP Blocks for VLAN Processes..........................................................................................................101
7 Access Control Lists (ACLs)............................................................................................................................... 103
IP Access Control Lists (ACLs)............................................................................................................................. 104
CAM Usage.........................................................................................................................................................105
Implementing ACLs on Dell Networking OS.............................................................................................. 105
IP Fragment Handling............................................................................................................................................107
IP Fragments ACL Examples...........................................................................................................................107
Layer 4 ACL Rules Examples.......................................................................................................................... 107
Configure a Standard IP ACL............................................................................................................................... 108
Configuring a Standard IP ACL Filter............................................................................................................109
Configure an Extended IP ACL............................................................................................................................ 110
Configuring Filters with a Sequence Number.............................................................................................110
Contents
5