Users Guide

Setting Timeout for EXEC Privilege Mode....................................................................................................................81
Using Telnet to get to Another Network Device..........................................................................................................81
Lock CONFIGURATION Mode.......................................................................................................................................82
Viewing the Configuration Lock Status.................................................................................................................. 82
Reloading the system......................................................................................................................................................82
5 802.1X......................................................................................................................................................... 84
Port-Authentication Process..........................................................................................................................................86
EAP over RADIUS......................................................................................................................................................86
Configuring 802.1X...........................................................................................................................................................87
Related Configuration Tasks.....................................................................................................................................87
Important Points to Remember..................................................................................................................................... 87
Configuring dot1x Profile ................................................................................................................................................88
Configuring MAC addresses for a do1x Profile............................................................................................................ 88
Configuring the Static MAB and MAB Profile .............................................................................................................88
Configuring Critical VLAN ..............................................................................................................................................89
Enabling 802.1X.................................................................................................................................................................91
Configuring Request Identity Re-Transmissions..........................................................................................................92
Configuring a Quiet Period after a Failed Authentication.....................................................................................93
Forcibly Authorizing or Unauthorizing a Port...............................................................................................................94
Re-Authenticating a Port................................................................................................................................................94
Configuring Timeouts......................................................................................................................................................95
Configuring Dynamic VLAN Assignment with Port Authentication.......................................................................... 96
Guest and Authentication-Fail VLANs.......................................................................................................................... 97
Configuring a Guest VLAN....................................................................................................................................... 98
Configuring an Authentication-Fail VLAN...............................................................................................................98
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)................................. 100
Optimizing CAM Utilization During the Attachment of ACLs to VLANs................................................................ 100
Guidelines for Configuring ACL VLAN Groups............................................................................................................101
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters...............................................101
Configuring ACL VLAN Groups...............................................................................................................................101
Configuring FP Blocks for VLAN Parameters.......................................................................................................102
Viewing CAM Usage...................................................................................................................................................... 103
Allocating FP Blocks for VLAN Processes.................................................................................................................. 104
7 Access Control Lists (ACLs)...................................................................................................................... 106
IP Access Control Lists (ACLs).................................................................................................................................... 107
CAM Usage...............................................................................................................................................................108
Implementing ACLs on Dell Networking OS......................................................................................................... 108
Important Points to Remember.....................................................................................................................................110
Configuration Task List for Route Maps................................................................................................................110
Configuring Match Routes.......................................................................................................................................112
Configuring Set Conditions......................................................................................................................................113
Configure a Route Map for Route Redistribution................................................................................................. 114
Configure a Route Map for Route Tagging........................................................................................................... 115
Contents
5