Service Manual

Viewing the Configuration Lock Status......................................................................................................... 80
Reloading the system...............................................................................................................................................81
Restoring the Factory Default Settings................................................................................................................ 82
Important Points to Remember.......................................................................................................................82
Restoring Factory Default Environment Variables.......................................................................................82
5 802.1X......................................................................................................................................................................84
Port-Authentication Process................................................................................................................................. 86
EAP over RADIUS................................................................................................................................................ 87
Configuring 802.1X..................................................................................................................................................88
Related Configuration Tasks............................................................................................................................ 88
Important Points to Remember............................................................................................................................ 88
Enabling 802.1X........................................................................................................................................................ 89
Configuring dot1x Profile ...................................................................................................................................... 90
Configuring MAC addresses for a do1x Profile...................................................................................................91
Configuring the Static MAB and MAB Profile .....................................................................................................91
Configuring Critical VLAN ..................................................................................................................................... 92
Configuring Request Identity Re-Transmissions............................................................................................... 93
Configuring a Quiet Period after a Failed Authentication..........................................................................93
Forcibly Authorizing or Unauthorizing a Port.................................................................................................... 94
Re-Authenticating a Port........................................................................................................................................ 95
Configuring Timeouts............................................................................................................................................. 96
Configuring Dynamic VLAN Assignment with Port Authentication...............................................................97
Guest and Authentication-Fail VLANs..................................................................................................................98
Configuring a Guest VLAN................................................................................................................................98
Configuring an Authentication-Fail VLAN.....................................................................................................98
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).............................. 100
Optimizing CAM Utilization During the Attachment of ACLs to VLANs.....................................................100
Guidelines for Configuring ACL VLAN Groups.................................................................................................101
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters.................................. 101
Configuring ACL VLAN Groups......................................................................................................................101
Configuring FP Blocks for VLAN Parameters..............................................................................................102
Viewing CAM Usage...............................................................................................................................................103
Allocating FP Blocks for VLAN Processes......................................................................................................... 104
7 Access Control Lists (ACLs)............................................................................................................................... 106
IP Access Control Lists (ACLs)..............................................................................................................................107
CAM Usage........................................................................................................................................................ 108
Implementing ACLs on Dell Networking OS..............................................................................................108
Important Points to Remember...........................................................................................................................110
Configuration Task List for Route Maps.......................................................................................................110
Configuring Match Routes.............................................................................................................................. 112
Configuring Set Conditions.............................................................................................................................113
Configure a Route Map for Route Redistribution...................................................................................... 114
Configure a Route Map for Route Tagging................................................................................................. 115
Continue Clause................................................................................................................................................115
Contents
5