Concept Guide

Table Of Contents
Setting Timeout for EXEC Privilege Mode................................................................................................................... 82
Using Telnet to get to Another Network Device..........................................................................................................82
Lock CONFIGURATION Mode....................................................................................................................................... 83
Viewing the Conguration Lock Status...................................................................................................................83
Recovering from a Forgotten Password....................................................................................................................... 83
Recovering from a Forgotten Enable Password.....................................................................................................84
Recovering from a Failed Start...................................................................................................................................... 85
Restoring the Factory Default Settings........................................................................................................................ 86
Important Points to Remember................................................................................................................................86
Restoring Factory Default Environment Variables................................................................................................. 86
Dell EMC Networking OS Security Hardening............................................................................................................. 87
Dell EMC Networking OS Image Verication......................................................................................................... 88
Startup Conguration Verication........................................................................................................................... 89
Conguring the root User Password.......................................................................................................................90
Locking Access to GRUB Interface......................................................................................................................... 90
Enabling User Lockout for Failed Login Attempts.................................................................................................. 91
5 802.1X..........................................................................................................................................................92
Port-Authentication Process..........................................................................................................................................94
EAP over RADIUS......................................................................................................................................................94
Conguring 802.1X...........................................................................................................................................................95
Related Conguration Tasks.....................................................................................................................................95
Important Points to Remember......................................................................................................................................95
Enabling 802.1X................................................................................................................................................................ 96
Conguring MAC addresses for a do1x Prole............................................................................................................. 97
Conguring Request Identity Re-Transmissions...........................................................................................................98
Conguring a Quiet Period after a Failed Authentication..................................................................................... 98
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 99
Re-Authenticating a Port.............................................................................................................................................. 100
Conguring Timeouts..................................................................................................................................................... 101
Conguring Dynamic VLAN Assignment with Port Authentication......................................................................... 102
Guest and Authentication-Fail VLANs......................................................................................................................... 103
Conguring a Guest VLAN......................................................................................................................................103
Conguring an Authentication-Fail VLAN............................................................................................................. 103
Conguring dot1x Prole .............................................................................................................................................. 104
Conguring the Static MAB and MAB Prole ........................................................................................................... 105
Conguring Critical VLAN ............................................................................................................................................ 106
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)...................................107
Optimizing CAM Utilization During the Attachment of ACLs to VLANs................................................................. 107
Guidelines for Conguring ACL VLAN Groups........................................................................................................... 108
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters...............................................108
Conguring ACL VLAN Groups.............................................................................................................................. 108
Conguring FP Blocks for VLAN Parameters.......................................................................................................109
Viewing CAM Usage....................................................................................................................................................... 110
Allocating FP Blocks for VLAN Processes....................................................................................................................111
Contents
5