Setup Guide

Reloading the system...................................................................................................................................................... 86
Restoring the Factory Default Settings........................................................................................................................ 86
Important Points to Remember................................................................................................................................87
Restoring Factory Default Environment Variables..................................................................................................87
5 802.1X..........................................................................................................................................................88
Port-Authentication Process..........................................................................................................................................90
EAP over RADIUS......................................................................................................................................................90
Conguring 802.1X........................................................................................................................................................... 91
Related Conguration Tasks......................................................................................................................................91
Important Points to Remember...................................................................................................................................... 91
Enabling 802.1X................................................................................................................................................................ 92
Conguring dot1x Prole ................................................................................................................................................93
Conguring the Static MAB and MAB Prole .............................................................................................................94
Conguring Critical VLAN ..............................................................................................................................................94
Conguring MAC addresses for a do1x Prole.............................................................................................................95
Conguring Request Identity Re-Transmissions...........................................................................................................96
Conguring a Quiet Period after a Failed Authentication..................................................................................... 96
Forcibly Authorizing or Unauthorizing a Port................................................................................................................97
Re-Authenticating a Port................................................................................................................................................98
Conguring Timeouts......................................................................................................................................................99
Conguring Dynamic VLAN Assignment with Port Authentication.........................................................................100
Guest and Authentication-Fail VLANs..........................................................................................................................101
Conguring a Guest VLAN...................................................................................................................................... 101
Conguring an Authentication-Fail VLAN.............................................................................................................. 101
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).................................. 103
Optimizing CAM Utilization During the Attachment of ACLs to VLANs................................................................. 103
Guidelines for Conguring ACL VLAN Groups........................................................................................................... 104
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters...............................................104
Conguring ACL VLAN Groups.............................................................................................................................. 104
Conguring FP Blocks for VLAN Parameters.......................................................................................................105
Viewing CAM Usage...................................................................................................................................................... 106
Allocating FP Blocks for VLAN Processes.................................................................................................................. 108
ACL Optimization to Increase Number of Supported IPv4 ACLs.............................................................................109
Restrictions for ACL Optimization..........................................................................................................................109
Optimizing ACL for More Number of IPv4 ACL Rules.........................................................................................109
7 Access Control Lists (ACLs)........................................................................................................................ 111
IP Access Control Lists (ACLs)......................................................................................................................................112
CAM Usage................................................................................................................................................................112
Implementing ACLs on Dell EMC Networking OS.................................................................................................114
Congure ACL Range Proles....................................................................................................................................... 115
Important Points to Remember.....................................................................................................................................116
Conguration Task List for Route Maps.................................................................................................................116
Conguring Match Routes.......................................................................................................................................119
Contents
5