Users Guide

Restoring Factory Default Environment Variables..................................................................................................77
Reloading the system...................................................................................................................................................... 79
5 802.1X......................................................................................................................................................... 80
Port-Authentication Process..........................................................................................................................................82
EAP over RADIUS......................................................................................................................................................83
Conguring 802.1X...........................................................................................................................................................83
Related Conguration Tasks..................................................................................................................................... 83
Important Points to Remember......................................................................................................................................84
Enabling 802.1X................................................................................................................................................................ 84
Conguring dot1x Prole ................................................................................................................................................85
Conguring MAC addresses for a do1x Prole.............................................................................................................86
Conguring the Static MAB and MAB Prole .............................................................................................................86
Conguring Critical VLAN ..............................................................................................................................................87
Conguring Request Identity Re-Transmissions...........................................................................................................88
Conguring a Quiet Period after a Failed Authentication..................................................................................... 88
Conguring a Quiet Period after a Failed Authentication........................................................................................... 89
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 90
Re-Authenticating a Port.................................................................................................................................................91
Conguring Dynamic VLAN Assignment with Port Authentication...........................................................................92
Guest and Authentication-Fail VLANs.......................................................................................................................... 93
Conguring a Guest VLAN....................................................................................................................................... 93
Conguring an Authentication-Fail VLAN...............................................................................................................93
Conguring Timeouts................................................................................................................................................94
Multi-Host Authentication.............................................................................................................................................. 95
Conguring Multi-Host AuthenticationConguring Single-Host Authentication............................................... 97
Multi-Supplicant Authentication.................................................................................................................................... 98
Conguring Multi-Supplicant AuthenticationRestricting Multi-Supplicant Authentication..............................98
MAC Authentication Bypass...........................................................................................................................................99
MAB in Single-host and Multi-Host Mode............................................................................................................100
MAB in Multi-Supplicant Authentication Mode....................................................................................................100
Conguring MAC Authentication Bypass..............................................................................................................100
Dynamic CoS with 802.1X.............................................................................................................................................. 101
6 Access Control Lists (ACLs)....................................................................................................................... 103
IP Access Control Lists (ACLs).....................................................................................................................................104
CAM Usage...............................................................................................................................................................104
Implementing ACLs on Dell Networking OS..........................................................................................................105
Important Points to Remember.................................................................................................................................... 107
Conguration Task List for Route Maps................................................................................................................ 107
Conguring Match Routes...................................................................................................................................... 109
Conguring Set Conditions......................................................................................................................................110
Congure a Route Map for Route Redistribution.................................................................................................. 111
Congure a Route Map for Route Tagging............................................................................................................ 112
Continue Clause........................................................................................................................................................ 112
IP Fragment Handling..................................................................................................................................................... 113
Contents
5