Setup Guide

Recovering from a Forgotten Enable Password...........................................................................................................87
Recovering from a Failed Start on the S6000............................................................................................................. 88
Restoring the Factory Default Settings.........................................................................................................................88
Important Points to Remember................................................................................................................................89
Restoring Factory Default Environment Variables................................................................................................. 89
Viewing the Reason for Last System Reboot.............................................................................................................. 90
Disabling Syslog Messages for SNMP Authentication Failure Events....................................................................... 91
5 802.1X..........................................................................................................................................................92
Port-Authentication Process..........................................................................................................................................94
EAP over RADIUS......................................................................................................................................................94
Conguring 802.1X...........................................................................................................................................................95
Related Conguration Tasks..................................................................................................................................... 95
Important Points to Remember......................................................................................................................................95
Enabling 802.1X................................................................................................................................................................ 96
Conguring dot1x Prole ................................................................................................................................................ 97
Conguring MAC addresses for a do1x Prole.............................................................................................................98
Conguring the Static MAB and MAB Prole .............................................................................................................98
Conguring Critical VLAN ..............................................................................................................................................99
Conguring Request Identity Re-Transmissions......................................................................................................... 100
Conguring a Quiet Period after a Failed Authentication....................................................................................100
Forcibly Authorizing or Unauthorizing a Port...............................................................................................................101
Re-Authenticating a Port...............................................................................................................................................102
Conguring Timeouts.....................................................................................................................................................103
Conguring Dynamic VLAN Assignment with Port Authentication.........................................................................104
Guest and Authentication-Fail VLANs.........................................................................................................................105
Conguring a Guest VLAN......................................................................................................................................105
Conguring an Authentication-Fail VLAN............................................................................................................. 105
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)...................................107
Optimizing CAM Utilization During the Attachment of ACLs to VLANs................................................................. 107
Guidelines for Conguring ACL VLAN Groups........................................................................................................... 108
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters...............................................108
Conguring ACL VLAN Groups.............................................................................................................................. 108
Conguring FP Blocks for VLAN Parameters.......................................................................................................109
Viewing CAM Usage....................................................................................................................................................... 110
Allocating FP Blocks for VLAN Processes....................................................................................................................111
7 Access Control Lists (ACLs)........................................................................................................................113
IP Access Control Lists (ACLs)......................................................................................................................................114
CAM Usage................................................................................................................................................................115
Implementing ACLs on Dell EMC Networking OS................................................................................................ 115
Important Points to Remember..................................................................................................................................... 117
Conguration Task List for Route Maps................................................................................................................. 117
Conguring Match Routes.......................................................................................................................................119
Conguring Set Conditions......................................................................................................................................121
Contents
5