White Papers

Table Of Contents
Restrictions for Limiting the Number of Concurrent Sessions........................................................................ 79
Configuring Concurrent Session Limit....................................................................................................................79
Enabling the System to Clear Existing Sessions.................................................................................................. 79
Track Login Activity..........................................................................................................................................................80
Restrictions for Tracking Login Activity................................................................................................................ 80
Configuring Login Activity Tracking........................................................................................................................80
Display Login Statistics............................................................................................................................................... 81
Recovering from a Forgotten Password..................................................................................................................... 82
Recovering from a Forgotten Enable Password........................................................................................................83
Recovering from a Failed Start...................................................................................................................................... 83
Chapter 6: 802.1X....................................................................................................................... 85
The Port-Authentication Process................................................................................................................................. 86
EAP over RADIUS........................................................................................................................................................87
Configuring 802.1X............................................................................................................................................................88
Important Points to Remember..................................................................................................................................... 88
Enabling 802.1X................................................................................................................................................................. 89
Configuring Request Identity Re-Transmissions..................................................................................................90
Configuring a Quiet Period after a Failed Authentication.................................................................................. 91
Forcibly Authorizing or Unauthorizing a Port..............................................................................................................91
Re-Authenticating a Port................................................................................................................................................ 92
Configuring Timeouts....................................................................................................................................................... 93
Configuring Dynamic VLAN Assignment with Port Authentication...................................................................... 94
Guest and Authentication-Fail VLANs....................................................................................................................95
Configuring a Guest VLAN........................................................................................................................................95
Configuring an Authentication-Fail VLAN............................................................................................................. 95
Chapter 7: Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).... 97
Optimizing CAM Utilization During the Attachment of ACLs to VLANs..............................................................97
Guidelines for Configuring ACL VLAN groups............................................................................................................98
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters.......................................... 99
Configuring ACL VLAN Groups................................................................................................................................99
Configuring FP Blocks for VLAN Parameters.....................................................................................................100
Viewing CAM Usage....................................................................................................................................................... 100
Allocating FP Blocks for VLAN Processes................................................................................................................. 101
Chapter 8: Access Control Lists (ACLs)..................................................................................... 103
IP Access Control Lists (ACLs)....................................................................................................................................104
Implementing ACL on the Dell Networking OS.........................................................................................................104
ACLs and VLANs..............................................................................................................................................................105
ACL Optimization.............................................................................................................................................................105
Determine the Order in which ACLs are Used to Classify Traffic....................................................................... 105
IP Fragment Handling..................................................................................................................................................... 106
IP Fragments ACL Examples.........................................................................................................................................106
Layer 4 ACL Rules Examples........................................................................................................................................ 106
Configure a Standard IP ACL........................................................................................................................................107
Configuring a Standard IP ACL Filter......................................................................................................................... 108
Configure an Extended IP ACL.....................................................................................................................................108
Configuring Filters with a Sequence Number...........................................................................................................108
Contents
5