Users Guide

LBQA (LPC Bus Quality Analyzer) Failure Detection mode..................................................................................80
Restoring the Factory Default Settings........................................................................................................................ 80
Important Points to Remember................................................................................................................................80
Restoring Factory Default Environment Variables.................................................................................................. 81
Reloading the system...................................................................................................................................................... 82
5 802.1X..........................................................................................................................................................84
Port-Authentication Process..........................................................................................................................................86
EAP over RADIUS...................................................................................................................................................... 87
Conguring 802.1X........................................................................................................................................................... 87
Related Conguration Tasks..................................................................................................................................... 87
Important Points to Remember......................................................................................................................................88
Enabling 802.1X................................................................................................................................................................ 88
Conguring dot1x Prole ................................................................................................................................................89
Conguring MAC addresses for a do1x Prole.............................................................................................................90
Conguring the Static MAB and MAB Prole .............................................................................................................90
Conguring Critical VLAN .............................................................................................................................................. 91
Conguring Request Identity Re-Transmissions...........................................................................................................92
Conguring a Quiet Period after a Failed Authentication..................................................................................... 92
Conguring a Quiet Period after a Failed Authentication........................................................................................... 93
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 94
Re-Authenticating a Port................................................................................................................................................95
Conguring Dynamic VLAN Assignment with Port Authentication.......................................................................... 96
Guest and Authentication-Fail VLANs...........................................................................................................................97
Conguring a Guest VLAN........................................................................................................................................97
Conguring an Authentication-Fail VLAN............................................................................................................... 97
Conguring Timeouts................................................................................................................................................98
Multi-Host Authentication.............................................................................................................................................. 99
Conguring Multi-Host AuthenticationConguring Single-Host Authentication..............................................101
Multi-Supplicant Authentication...................................................................................................................................102
Conguring Multi-Supplicant AuthenticationRestricting Multi-Supplicant Authentication.............................102
MAC Authentication Bypass......................................................................................................................................... 103
MAB in Single-host and Multi-Host Mode............................................................................................................104
MAB in Multi-Supplicant Authentication Mode....................................................................................................104
Conguring MAC Authentication Bypass..............................................................................................................104
Dynamic CoS with 802.1X............................................................................................................................................. 105
6 Access Control Lists (ACLs)....................................................................................................................... 107
IP Access Control Lists (ACLs).....................................................................................................................................108
CAM Usage...............................................................................................................................................................109
Implementing ACLs on Dell Networking OS..........................................................................................................109
Congure ACL Range Proles..................................................................................................................................111
Important Points to Remember......................................................................................................................................111
Conguration Task List for Route Maps.................................................................................................................112
Conguring Match Routes.......................................................................................................................................114
Conguring Set Conditions......................................................................................................................................115
Contents
5