Users Guide
Important Points to Remember................................................................................................................................78
Restoring Factory Default Environment Variables................................................................................................. 78
5 802.1X.......................................................................................................................................................... 81
Port-Authentication Process.......................................................................................................................................... 83
EAP over RADIUS......................................................................................................................................................83
Conguring 802.1X...........................................................................................................................................................84
Related Conguration Tasks..................................................................................................................................... 84
Important Points to Remember......................................................................................................................................84
Enabling 802.1X................................................................................................................................................................ 85
Conguring dot1x Prole ................................................................................................................................................86
Conguring MAC addresses for a do1x Prole............................................................................................................. 87
Conguring the Static MAB and MAB Prole ............................................................................................................. 87
Conguring Critical VLAN ..............................................................................................................................................88
Conguring Request Identity Re-Transmissions...........................................................................................................89
Conguring a Quiet Period after a Failed Authentication..................................................................................... 89
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 90
Re-Authenticating a Port.................................................................................................................................................91
Conguring Timeouts...................................................................................................................................................... 92
Conguring Dynamic VLAN Assignment with Port Authentication...........................................................................93
Guest and Authentication-Fail VLANs.......................................................................................................................... 94
Conguring a Guest VLAN....................................................................................................................................... 94
Conguring an Authentication-Fail VLAN...............................................................................................................94
6 Access Control Lists (ACLs)........................................................................................................................ 96
IP Access Control Lists (ACLs).......................................................................................................................................97
CAM Usage.................................................................................................................................................................98
Implementing ACLs on Dell Networking OS...........................................................................................................98
Congure ACL Range Proles................................................................................................................................ 100
Important Points to Remember....................................................................................................................................100
Conguration Task List for Route Maps.................................................................................................................101
Conguring Match Routes...................................................................................................................................... 103
Conguring Set Conditions.....................................................................................................................................104
Congure a Route Map for Route Redistribution.................................................................................................105
Congure a Route Map for Route Tagging........................................................................................................... 106
Continue Clause........................................................................................................................................................106
IP Fragment Handling.................................................................................................................................................... 106
IP Fragments ACL Examples...................................................................................................................................107
Layer 4 ACL Rules Examples...................................................................................................................................107
Congure a Standard IP ACL........................................................................................................................................108
Conguring a Standard IP ACL Filter.....................................................................................................................109
Congure an Extended IP ACL......................................................................................................................................110
Conguring Filters with a Sequence Number........................................................................................................110
Conguring Filters Without a Sequence Number................................................................................................. 113
Congure Layer 2 and Layer 3 ACLs............................................................................................................................ 113
Assign an IP ACL to an Interface...................................................................................................................................114
Contents
5










