Setup Guide

Important Points to Remember................................................................................................................................85
Restoring Factory Default Environment Variables................................................................................................. 86
Viewing the Reason for Last System Reboot...............................................................................................................87
Disabling Syslog Messages for SNMP Authentication Failure Events.......................................................................88
5 802.1X......................................................................................................................................................... 89
Port-Authentication Process...........................................................................................................................................91
EAP over RADIUS.......................................................................................................................................................91
Conguring 802.1X...........................................................................................................................................................92
Related Conguration Tasks..................................................................................................................................... 92
Important Points to Remember......................................................................................................................................92
Enabling 802.1X................................................................................................................................................................ 93
Conguring dot1x Prole ................................................................................................................................................94
Conguring MAC addresses for a do1x Prole.............................................................................................................95
Conguring the Static MAB and MAB Prole .............................................................................................................95
Conguring Critical VLAN ..............................................................................................................................................96
Conguring Request Identity Re-Transmissions........................................................................................................... 97
Conguring a Quiet Period after a Failed Authentication......................................................................................97
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 98
Re-Authenticating a Port................................................................................................................................................99
Conguring Timeouts.................................................................................................................................................... 100
Conguring Dynamic VLAN Assignment with Port Authentication..........................................................................101
Guest and Authentication-Fail VLANs.........................................................................................................................102
Conguring a Guest VLAN......................................................................................................................................102
Conguring an Authentication-Fail VLAN............................................................................................................. 102
6 Access Control Lists (ACLs).......................................................................................................................104
IP Access Control Lists (ACLs).....................................................................................................................................105
CAM Usage...............................................................................................................................................................106
Implementing ACLs on Dell EMC Networking OS................................................................................................106
Congure ACL Range Proles................................................................................................................................ 108
Important Points to Remember....................................................................................................................................109
Conguration Task List for Route Maps................................................................................................................109
Conguring Match Routes........................................................................................................................................111
Conguring Set Conditions......................................................................................................................................112
Congure a Route Map for Route Redistribution..................................................................................................113
Congure a Route Map for Route Tagging............................................................................................................ 114
Continue Clause........................................................................................................................................................ 114
IP Fragment Handling..................................................................................................................................................... 115
IP Fragments ACL Examples................................................................................................................................... 115
Layer 4 ACL Rules Examples................................................................................................................................... 115
Congure a Standard IP ACL.........................................................................................................................................116
Conguring a Standard IP ACL Filter...................................................................................................................... 117
Congure an Extended IP ACL......................................................................................................................................118
Conguring Filters with a Sequence Number........................................................................................................118
Conguring Filters Without a Sequence Number................................................................................................. 121
Contents
5