Concept Guide

Lock CONFIGURATION Mode........................................................................................................................................81
Viewing the Conguration Lock Status................................................................................................................... 81
Recovering from a Forgotten Password....................................................................................................................... 82
Recovering from a Forgotten Enable Password.....................................................................................................83
Recovering from a Failed Start.......................................................................................................................................84
Restoring the Factory Default Settings.........................................................................................................................84
Important Points to Remember................................................................................................................................84
Restoring Factory Default Environment Variables................................................................................................. 85
Dell EMC Networking OS Security Hardening............................................................................................................. 86
Dell EMC Networking OS Image Verication......................................................................................................... 86
Startup Conguration Verication............................................................................................................................87
Conguring the root User Password....................................................................................................................... 88
Locking Access to GRUB Interface......................................................................................................................... 89
Enabling User Lockout for Failed Login Attempts..................................................................................................90
5 802.1X.......................................................................................................................................................... 91
Port-Authentication Process.......................................................................................................................................... 93
EAP over RADIUS......................................................................................................................................................93
Conguring 802.1X...........................................................................................................................................................94
Related Conguration Tasks..................................................................................................................................... 94
Important Points to Remember......................................................................................................................................94
Enabling 802.1X................................................................................................................................................................ 95
Conguring MAC addresses for a do1x Prole.............................................................................................................96
Conguring Request Identity Re-Transmissions........................................................................................................... 97
Conguring a Quiet Period after a Failed Authentication......................................................................................97
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 98
Re-Authenticating a Port................................................................................................................................................99
Conguring Timeouts.................................................................................................................................................... 100
Conguring Dynamic VLAN Assignment with Port Authentication..........................................................................101
Guest and Authentication-Fail VLANs.........................................................................................................................102
Conguring a Guest VLAN......................................................................................................................................102
Conguring an Authentication-Fail VLAN............................................................................................................. 102
Conguring dot1x Prole .............................................................................................................................................. 103
Conguring the Static MAB and MAB Prole ........................................................................................................... 104
Conguring Critical VLAN ............................................................................................................................................ 105
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).................................. 106
Optimizing CAM Utilization During the Attachment of ACLs to VLANs................................................................. 106
Guidelines for Conguring ACL VLAN Groups............................................................................................................107
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters...............................................107
Conguring ACL VLAN Groups.............................................................................................................................. 107
Conguring FP Blocks for VLAN Parameters.......................................................................................................108
Viewing CAM Usage...................................................................................................................................................... 109
Allocating FP Blocks for VLAN Processes................................................................................................................... 110
7 Access Control Lists (ACLs)........................................................................................................................112
Contents
5