Users Guide

Table Of Contents
Setting Timeout for EXEC Privilege Mode................................................................................................................... 83
Using Telnet to get to Another Network Device..........................................................................................................83
Lock CONFIGURATION Mode....................................................................................................................................... 84
Viewing the Conguration Lock Status...................................................................................................................84
LPC Bus Quality Degradation......................................................................................................................................... 84
LBQA (LPC Bus Quality Analyzer) Failure Detection mode..................................................................................85
Reloading the system...................................................................................................................................................... 85
Viewing the Reason for Last System Reboot.............................................................................................................. 86
5 802.1X..........................................................................................................................................................87
Port-Authentication Process..........................................................................................................................................89
EAP over RADIUS......................................................................................................................................................89
Conguring 802.1X...........................................................................................................................................................90
Related Conguration Tasks..................................................................................................................................... 90
Important Points to Remember......................................................................................................................................90
Conguring dot1x Prole .................................................................................................................................................91
Conguring MAC addresses for a do1x Prole..............................................................................................................91
Conguring the Static MAB and MAB Prole ..............................................................................................................91
Conguring Critical VLAN ..............................................................................................................................................92
Enabling 802.1X................................................................................................................................................................ 94
Conguring Request Identity Re-Transmissions...........................................................................................................95
Conguring a Quiet Period after a Failed Authentication..................................................................................... 96
Forcibly Authorizing or Unauthorizing a Port................................................................................................................97
Re-Authenticating a Port................................................................................................................................................ 97
Conguring Timeouts......................................................................................................................................................98
Conguring Dynamic VLAN Assignment with Port Authentication.......................................................................... 99
Guest and Authentication-Fail VLANs.........................................................................................................................100
Conguring a Guest VLAN...................................................................................................................................... 101
Conguring an Authentication-Fail VLAN..............................................................................................................101
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).................................. 103
Optimizing CAM Utilization During the Attachment of ACLs to VLANs................................................................. 103
Guidelines for Conguring ACL VLAN Groups........................................................................................................... 104
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters...............................................104
Conguring ACL VLAN Groups.............................................................................................................................. 104
Conguring FP Blocks for VLAN Parameters.......................................................................................................105
Viewing CAM Usage...................................................................................................................................................... 106
Allocating FP Blocks for VLAN Processes...................................................................................................................107
7 Access Control Lists (ACLs)....................................................................................................................... 109
IP Access Control Lists (ACLs)......................................................................................................................................110
CAM Usage.................................................................................................................................................................111
Implementing ACLs on Dell EMC Networking OS................................................................................................. 111
Important Points to Remember.....................................................................................................................................113
Conguration Task List for Route Maps.................................................................................................................113
Conguring Match Routes.......................................................................................................................................115
Contents
5