Concept Guide

Setting Timeout for EXEC Privilege Mode................................................................................................................... 86
Using Telnet to get to Another Network Device..........................................................................................................86
Lock CONFIGURATION Mode....................................................................................................................................... 87
Viewing the Conguration Lock Status...................................................................................................................87
LPC Bus Quality Degradation......................................................................................................................................... 87
LBQA (LPC Bus Quality Analyzer) Failure Detection mode..................................................................................88
Reloading the system...................................................................................................................................................... 88
Viewing the Reason for Last System Reboot.............................................................................................................. 89
5 802.1X......................................................................................................................................................... 90
Port-Authentication Process.......................................................................................................................................... 92
EAP over RADIUS......................................................................................................................................................92
Conguring 802.1X...........................................................................................................................................................93
Related Conguration Tasks..................................................................................................................................... 93
Important Points to Remember......................................................................................................................................93
Conguring dot1x Prole ................................................................................................................................................94
Conguring MAC addresses for a do1x Prole.............................................................................................................94
Conguring the Static MAB and MAB Prole .............................................................................................................94
Conguring Critical VLAN ..............................................................................................................................................95
Enabling 802.1X.................................................................................................................................................................97
Conguring Request Identity Re-Transmissions...........................................................................................................98
Conguring a Quiet Period after a Failed Authentication..................................................................................... 99
Forcibly Authorizing or Unauthorizing a Port..............................................................................................................100
Re-Authenticating a Port.............................................................................................................................................. 100
Conguring Timeouts..................................................................................................................................................... 101
Conguring Dynamic VLAN Assignment with Port Authentication......................................................................... 102
Guest and Authentication-Fail VLANs.........................................................................................................................103
Conguring a Guest VLAN......................................................................................................................................104
Conguring an Authentication-Fail VLAN............................................................................................................. 104
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).................................. 106
Optimizing CAM Utilization During the Attachment of ACLs to VLANs................................................................. 106
Guidelines for Conguring ACL VLAN Groups............................................................................................................107
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters...............................................107
Conguring ACL VLAN Groups.............................................................................................................................. 107
Conguring FP Blocks for VLAN Parameters.......................................................................................................108
Viewing CAM Usage...................................................................................................................................................... 109
Allocating FP Blocks for VLAN Processes................................................................................................................... 110
7 Access Control Lists (ACLs)........................................................................................................................112
IP Access Control Lists (ACLs)......................................................................................................................................113
CAM Usage................................................................................................................................................................114
Implementing ACLs on Dell EMC Networking OS.................................................................................................114
Important Points to Remember.....................................................................................................................................116
Conguration Task List for Route Maps.................................................................................................................116
Conguring Match Routes.......................................................................................................................................118
Contents
5