White Papers
Important Points to Remember................................................................................................................................79
Restoring Factory Default Environment Variables................................................................................................. 79
Viewing the Reason for Last System Reboot............................................................................................................... 81
5 802.1X..........................................................................................................................................................82
Port-Authentication Process.......................................................................................................................................... 84
EAP over RADIUS......................................................................................................................................................84
Conguring 802.1X...........................................................................................................................................................85
Related Conguration Tasks..................................................................................................................................... 85
Important Points to Remember......................................................................................................................................85
Enabling 802.1X................................................................................................................................................................ 86
Conguring dot1x Prole ................................................................................................................................................ 87
Conguring MAC addresses for a do1x Prole.............................................................................................................88
Conguring the Static MAB and MAB Prole .............................................................................................................88
Conguring Critical VLAN ..............................................................................................................................................89
Conguring Request Identity Re-Transmissions...........................................................................................................90
Conguring a Quiet Period after a Failed Authentication..................................................................................... 90
Forcibly Authorizing or Unauthorizing a Port................................................................................................................91
Re-Authenticating a Port................................................................................................................................................92
Conguring Timeouts...................................................................................................................................................... 93
Conguring Dynamic VLAN Assignment with Port Authentication...........................................................................94
Guest and Authentication-Fail VLANs.......................................................................................................................... 95
Conguring a Guest VLAN....................................................................................................................................... 95
Conguring an Authentication-Fail VLAN...............................................................................................................95
6 Access Control Lists (ACLs).........................................................................................................................97
IP Access Control Lists (ACLs)...................................................................................................................................... 98
CAM Usage................................................................................................................................................................ 99
Implementing ACLs on Dell EMC Networking OS................................................................................................. 99
Congure ACL Range Proles................................................................................................................................. 101
Important Points to Remember.................................................................................................................................... 102
Conguration Task List for Route Maps................................................................................................................ 102
Conguring Match Routes...................................................................................................................................... 104
Conguring Set Conditions.....................................................................................................................................105
Congure a Route Map for Route Redistribution.................................................................................................106
Congure a Route Map for Route Tagging............................................................................................................107
Continue Clause........................................................................................................................................................107
IP Fragment Handling.....................................................................................................................................................107
IP Fragments ACL Examples...................................................................................................................................108
Layer 4 ACL Rules Examples...................................................................................................................................108
Congure a Standard IP ACL........................................................................................................................................109
Conguring a Standard IP ACL Filter......................................................................................................................110
Congure an Extended IP ACL.......................................................................................................................................111
Conguring Filters with a Sequence Number.........................................................................................................111
Conguring Filters Without a Sequence Number................................................................................................. 114
Congure Layer 2 and Layer 3 ACLs............................................................................................................................ 114
Contents
5










