Users Guide

Setting Timeout for EXEC Privilege Mode...................................................................................................................80
Using Telnet to get to Another Network Device..........................................................................................................81
Lock CONFIGURATION Mode....................................................................................................................................... 81
Viewing the Configuration Lock Status...................................................................................................................81
5 802.1X......................................................................................................................................................... 83
Port-Authentication Process......................................................................................................................................... 85
EAP over RADIUS......................................................................................................................................................85
Configuring 802.1X.......................................................................................................................................................... 86
Related Configuration Tasks.................................................................................................................................... 86
Important Points to Remember..................................................................................................................................... 86
Enabling 802.1X................................................................................................................................................................87
Configuring dot1x Profile ................................................................................................................................................88
Configuring MAC addresses for a do1x Profile............................................................................................................ 89
Configuring the Static MAB and MAB Profile ............................................................................................................ 89
Configuring Critical VLAN ..............................................................................................................................................90
Configuring Request Identity Re-Transmissions.......................................................................................................... 91
Configuring a Quiet Period after a Failed Authentication......................................................................................91
Forcibly Authorizing or Unauthorizing a Port...............................................................................................................92
Re-Authenticating a Port................................................................................................................................................93
Configuring Timeouts......................................................................................................................................................94
Configuring Dynamic VLAN Assignment with Port Authentication.......................................................................... 95
Guest and Authentication-Fail VLANs.......................................................................................................................... 96
Configuring a Guest VLAN....................................................................................................................................... 96
Configuring an Authentication-Fail VLAN...............................................................................................................96
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)...................................98
Optimizing CAM Utilization During the Attachment of ACLs to VLANs..................................................................98
Guidelines for Configuring ACL VLAN Groups.............................................................................................................99
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters................................................99
Configuring ACL VLAN Groups............................................................................................................................... 99
Configuring FP Blocks for VLAN Parameters...................................................................................................... 100
Viewing CAM Usage.......................................................................................................................................................101
Allocating FP Blocks for VLAN Processes.................................................................................................................. 102
7 Access Control Lists (ACLs).......................................................................................................................104
IP Access Control Lists (ACLs)....................................................................................................................................105
CAM Usage...............................................................................................................................................................106
Implementing ACLs on Dell Networking OS......................................................................................................... 106
Important Points to Remember....................................................................................................................................108
Configuration Task List for Route Maps............................................................................................................... 108
Configuring Match Routes.......................................................................................................................................110
Configuring Set Conditions.......................................................................................................................................111
Configure a Route Map for Route Redistribution................................................................................................. 112
Configure a Route Map for Route Tagging........................................................................................................... 113
Continue Clause........................................................................................................................................................ 113
Contents
5