Setup Guide

Setting Timeout for EXEC Privilege Mode................................................................................................................... 89
Using Telnet to get to Another Network Device..........................................................................................................89
Lock CONFIGURATION Mode.......................................................................................................................................90
Viewing the Conguration Lock Status...................................................................................................................90
Reloading the system...................................................................................................................................................... 90
Restoring the Factory Default Settings......................................................................................................................... 91
Important Points to Remember................................................................................................................................ 91
Restoring Factory Default Environment Variables................................................................................................. 92
Viewing the Reason for Last System Reboot...............................................................................................................93
5 802.1X..........................................................................................................................................................94
Port-Authentication Process..........................................................................................................................................96
EAP over RADIUS......................................................................................................................................................96
Conguring 802.1X........................................................................................................................................................... 97
Related Conguration Tasks..................................................................................................................................... 97
Important Points to Remember......................................................................................................................................97
Enabling 802.1X................................................................................................................................................................ 98
Conguring dot1x Prole ................................................................................................................................................99
Conguring MAC addresses for a do1x Prole........................................................................................................... 100
Conguring the Static MAB and MAB Prole ........................................................................................................... 100
Conguring Critical VLAN .............................................................................................................................................101
Conguring Request Identity Re-Transmissions......................................................................................................... 102
Conguring a Quiet Period after a Failed Authentication....................................................................................102
Forcibly Authorizing or Unauthorizing a Port..............................................................................................................103
Re-Authenticating a Port.............................................................................................................................................. 104
Conguring Timeouts.................................................................................................................................................... 105
Conguring Dynamic VLAN Assignment with Port Authentication.........................................................................106
Guest and Authentication-Fail VLANs......................................................................................................................... 107
Conguring a Guest VLAN......................................................................................................................................107
Conguring an Authentication-Fail VLAN............................................................................................................. 107
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).................................. 109
Optimizing CAM Utilization During the Attachment of ACLs to VLANs................................................................. 109
Guidelines for Conguring ACL VLAN Groups............................................................................................................ 110
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters............................................... 110
Conguring ACL VLAN Groups............................................................................................................................... 110
Conguring FP Blocks for VLAN Parameters.........................................................................................................111
Viewing CAM Usage....................................................................................................................................................... 112
Allocating FP Blocks for VLAN Processes................................................................................................................... 113
Unied Forwarding Table (UFT) Modes....................................................................................................................... 114
Conguring UFT Modes...........................................................................................................................................114
7 Access Control Lists (ACLs)........................................................................................................................115
IP Access Control Lists (ACLs)......................................................................................................................................116
CAM Usage................................................................................................................................................................117
Implementing ACLs on Dell EMC Networking OS.................................................................................................117
Contents
5