Users Guide
Setting Timeout for EXEC Privilege Mode................................................................................................................... 86
Using Telnet to get to Another Network Device..........................................................................................................86
Lock CONFIGURATION Mode....................................................................................................................................... 87
Viewing the Conguration Lock Status...................................................................................................................87
Reloading the system.......................................................................................................................................................87
Restoring the Factory Default Settings.........................................................................................................................88
Important Points to Remember................................................................................................................................88
Restoring Factory Default Environment Variables................................................................................................. 89
Viewing the Reason for Last System Reboot.............................................................................................................. 90
5 802.1X.......................................................................................................................................................... 91
Port-Authentication Process.......................................................................................................................................... 93
EAP over RADIUS......................................................................................................................................................93
Conguring 802.1X...........................................................................................................................................................94
Related Conguration Tasks..................................................................................................................................... 94
Important Points to Remember......................................................................................................................................94
Enabling 802.1X................................................................................................................................................................ 95
Conguring dot1x Prole ................................................................................................................................................96
Conguring MAC addresses for a do1x Prole............................................................................................................. 97
Conguring the Static MAB and MAB Prole ............................................................................................................. 97
Conguring Critical VLAN ..............................................................................................................................................98
Conguring Request Identity Re-Transmissions...........................................................................................................99
Conguring a Quiet Period after a Failed Authentication..................................................................................... 99
Forcibly Authorizing or Unauthorizing a Port..............................................................................................................100
Re-Authenticating a Port............................................................................................................................................... 101
Conguring Timeouts.....................................................................................................................................................102
Conguring Dynamic VLAN Assignment with Port Authentication......................................................................... 103
Guest and Authentication-Fail VLANs.........................................................................................................................104
Conguring a Guest VLAN......................................................................................................................................104
Conguring an Authentication-Fail VLAN............................................................................................................. 104
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).................................. 106
Optimizing CAM Utilization During the Attachment of ACLs to VLANs................................................................. 106
Guidelines for Conguring ACL VLAN Groups............................................................................................................107
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters...............................................107
Conguring ACL VLAN Groups.............................................................................................................................. 107
Conguring FP Blocks for VLAN Parameters.......................................................................................................108
Viewing CAM Usage...................................................................................................................................................... 109
Allocating FP Blocks for VLAN Processes................................................................................................................... 110
Unied Forwarding Table (UFT) Modes........................................................................................................................111
Conguring UFT Modes............................................................................................................................................111
7 Access Control Lists (ACLs)........................................................................................................................112
IP Access Control Lists (ACLs)......................................................................................................................................113
CAM Usage................................................................................................................................................................114
Implementing ACLs on Dell EMC Networking OS.................................................................................................114
Contents
5