Users Guide

Setting Timeout for EXEC Privilege Mode................................................................................................................... 80
Using Telnet to get to Another Network Device...........................................................................................................81
Lock CONFIGURATION Mode........................................................................................................................................81
Viewing the Conguration Lock Status................................................................................................................... 81
5 802.1X..........................................................................................................................................................83
Port-Authentication Process..........................................................................................................................................85
EAP over RADIUS......................................................................................................................................................85
Conguring 802.1X...........................................................................................................................................................86
Related Conguration Tasks..................................................................................................................................... 86
Important Points to Remember......................................................................................................................................86
Enabling 802.1X.................................................................................................................................................................87
Conguring dot1x Prole ................................................................................................................................................88
Conguring MAC addresses for a do1x Prole.............................................................................................................89
Conguring the Static MAB and MAB Prole .............................................................................................................89
Conguring Critical VLAN ..............................................................................................................................................90
Conguring Request Identity Re-Transmissions............................................................................................................91
Conguring a Quiet Period after a Failed Authentication...................................................................................... 91
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 92
Re-Authenticating a Port................................................................................................................................................ 93
Conguring Timeouts......................................................................................................................................................94
Conguring Dynamic VLAN Assignment with Port Authentication.......................................................................... 95
Guest and Authentication-Fail VLANs.......................................................................................................................... 96
Conguring a Guest VLAN....................................................................................................................................... 96
Conguring an Authentication-Fail VLAN...............................................................................................................96
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)....................................98
Optimizing CAM Utilization During the Attachment of ACLs to VLANs...................................................................98
Guidelines for Conguring ACL VLAN Groups.............................................................................................................99
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters................................................ 99
Conguring ACL VLAN Groups................................................................................................................................99
Conguring FP Blocks for VLAN Parameters.......................................................................................................100
Viewing CAM Usage....................................................................................................................................................... 101
Allocating FP Blocks for VLAN Processes.................................................................................................................. 102
7 Access Control Lists (ACLs)....................................................................................................................... 104
IP Access Control Lists (ACLs).....................................................................................................................................105
CAM Usage...............................................................................................................................................................106
Implementing ACLs on Dell Networking OS..........................................................................................................106
Important Points to Remember.................................................................................................................................... 108
Conguration Task List for Route Maps................................................................................................................108
Conguring Match Routes.......................................................................................................................................110
Conguring Set Conditions.......................................................................................................................................111
Congure a Route Map for Route Redistribution..................................................................................................112
Congure a Route Map for Route Tagging............................................................................................................ 113
Continue Clause........................................................................................................................................................ 113
Contents
5