Administrator Guide

Setting Timeout for EXEC Privilege Mode...................................................................................................................83
Using Telnet to get to Another Network Device.........................................................................................................83
Lock CONFIGURATION Mode.......................................................................................................................................84
Viewing the Configuration Lock Status.................................................................................................................. 84
Reloading the system......................................................................................................................................................84
Restoring the Factory Default Settings........................................................................................................................85
Important Points to Remember............................................................................................................................... 85
Restoring Factory Default Environment Variables................................................................................................ 86
5 802.1X......................................................................................................................................................... 88
Port-Authentication Process......................................................................................................................................... 90
EAP over RADIUS......................................................................................................................................................90
Configuring 802.1X...........................................................................................................................................................91
Related Configuration Tasks.....................................................................................................................................91
Important Points to Remember......................................................................................................................................91
Enabling 802.1X................................................................................................................................................................92
Configuring dot1x Profile ................................................................................................................................................93
Configuring MAC addresses for a do1x Profile............................................................................................................ 94
Configuring the Static MAB and MAB Profile .............................................................................................................94
Configuring Critical VLAN ..............................................................................................................................................95
Configuring Request Identity Re-Transmissions..........................................................................................................96
Configuring a Quiet Period after a Failed Authentication.....................................................................................96
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 97
Re-Authenticating a Port................................................................................................................................................98
Configuring Timeouts......................................................................................................................................................99
Configuring Dynamic VLAN Assignment with Port Authentication.........................................................................100
Guest and Authentication-Fail VLANs..........................................................................................................................101
Configuring a Guest VLAN.......................................................................................................................................101
Configuring an Authentication-Fail VLAN..............................................................................................................101
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)................................. 103
Optimizing CAM Utilization During the Attachment of ACLs to VLANs.................................................................103
Guidelines for Configuring ACL VLAN Groups........................................................................................................... 104
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters.............................................. 104
Configuring ACL VLAN Groups..............................................................................................................................104
Configuring FP Blocks for VLAN Parameters...................................................................................................... 105
Viewing CAM Usage...................................................................................................................................................... 106
Allocating FP Blocks for VLAN Processes.................................................................................................................. 107
Unified Forwarding Table (UFT) Modes..................................................................................................................... 108
Configuring UFT Modes.......................................................................................................................................... 108
7 Access Control Lists (ACLs)....................................................................................................................... 110
IP Access Control Lists (ACLs)......................................................................................................................................111
CAM Usage................................................................................................................................................................112
Implementing ACLs on Dell Networking OS.......................................................................................................... 112
Important Points to Remember.....................................................................................................................................114
Contents
5