Users Guide

Important Points to Remember............................................................................................................................... 78
Restoring Factory Default Environment Variables.................................................................................................78
5 802.1X..........................................................................................................................................................81
Port-Authentication Process..........................................................................................................................................83
EAP over RADIUS......................................................................................................................................................83
Configuring 802.1X.......................................................................................................................................................... 84
Related Configuration Tasks.................................................................................................................................... 84
Important Points to Remember..................................................................................................................................... 84
Enabling 802.1X................................................................................................................................................................85
Configuring dot1x Profile ............................................................................................................................................... 86
Configuring MAC addresses for a do1x Profile............................................................................................................ 87
Configuring the Static MAB and MAB Profile .............................................................................................................87
Configuring Critical VLAN ..............................................................................................................................................88
Configuring Request Identity Re-Transmissions..........................................................................................................89
Configuring a Quiet Period after a Failed Authentication.....................................................................................89
Forcibly Authorizing or Unauthorizing a Port...............................................................................................................90
Re-Authenticating a Port................................................................................................................................................ 91
Configuring Timeouts......................................................................................................................................................92
Configuring Dynamic VLAN Assignment with Port Authentication.......................................................................... 93
Guest and Authentication-Fail VLANs.......................................................................................................................... 94
Configuring a Guest VLAN....................................................................................................................................... 94
Configuring an Authentication-Fail VLAN...............................................................................................................94
6 Access Control Lists (ACLs)........................................................................................................................96
IP Access Control Lists (ACLs)......................................................................................................................................97
CAM Usage................................................................................................................................................................ 98
Implementing ACLs on Dell Networking OS...........................................................................................................98
Configure ACL Range Profiles................................................................................................................................100
Important Points to Remember....................................................................................................................................100
Configuration Task List for Route Maps................................................................................................................101
Configuring Match Routes......................................................................................................................................103
Configuring Set Conditions.....................................................................................................................................104
Configure a Route Map for Route Redistribution................................................................................................ 105
Configure a Route Map for Route Tagging.......................................................................................................... 106
Continue Clause....................................................................................................................................................... 106
IP Fragment Handling.................................................................................................................................................... 106
IP Fragments ACL Examples...................................................................................................................................107
Layer 4 ACL Rules Examples.................................................................................................................................. 107
Configure a Standard IP ACL....................................................................................................................................... 108
Configuring a Standard IP ACL Filter.....................................................................................................................109
Configure an Extended IP ACL..................................................................................................................................... 110
Configuring Filters with a Sequence Number........................................................................................................110
Configuring Filters Without a Sequence Number..................................................................................................111
Configure Layer 2 and Layer 3 ACLs............................................................................................................................112
Assign an IP ACL to an Interface.................................................................................................................................. 112
Contents
5