Deployment Guide

Table Of Contents
The change in authentication happens when:
Add or remove an authentication server (RADIUS/TACACS+)
Modify an AAA authentication/authorization list
Change to role-only (RBAC) mode
The re-authentication is also applicable for authenticated 802.1x devices. When there is a change in the
authentication servers, the supplicants connected to all the ports are forced to re-authenticate.
Example
Dell(config)#aaa reauthenticate enable
Dell(config)#aaa authentication login vty_auth_list radius
Force all logged-in users to re-authenticate (y/n)?
Dell(config)#radius-server host 192.100.0.12
Force all logged-in users to re-authenticate (y/n)?
access-class
Restrict incoming connections to a particular IP address in a defined IP access control list (ACL).
C9000 Series
Syntax
access-class access-list-name
To delete a setting, use the no access-class command.
Parameters
access-list-name
Enter the name of an established IP Standard ACL.
Defaults Not configured.
Command Modes LINE
Command
History
This guide is platform-specific. For command information about other platforms, refer to the relevant Dell
Networking OS Command Line Reference Guide.
The following is a list of the Dell Networking OS version history for this command.
Version Description
9.9(0.0) Introduced on the C9010.
9.2(1.0) Introduced on the Z9500.
8.3.19.0 Introduced on the S4820T.
8.3.11.1 Introduced on the Z9000.
8.3.7.0 Introduced on the S4810.
7.6.1.0 Introduced on the S-Series.
7.5.1.0 Introduced on the C-Series.
6.2.1.1 Introduced on the E-Series.
Related
Commands
line applies an authentication method list to the designated terminal lines.
ip access-list standard names (or selects) a standard access list to filter based on the IP address.
ip access-list extended names (or selects) an extended access list based on the IP addresses or
protocols.
Security 1511