White Papers

Recovering from a Forgotten Enable Password...........................................................................................................82
Recovering from a Failed Start on the S6000............................................................................................................. 82
Restoring the Factory Default Settings.........................................................................................................................83
Important Points to Remember................................................................................................................................83
Restoring Factory Default Environment Variables................................................................................................. 84
Viewing the Reason for Last System Reboot.............................................................................................................. 85
5 802.1X......................................................................................................................................................... 86
Port-Authentication Process..........................................................................................................................................88
EAP over RADIUS......................................................................................................................................................88
Conguring 802.1X...........................................................................................................................................................89
Related Conguration Tasks..................................................................................................................................... 89
Important Points to Remember......................................................................................................................................89
Enabling 802.1X................................................................................................................................................................ 90
Conguring dot1x Prole .................................................................................................................................................91
Conguring MAC addresses for a do1x Prole.............................................................................................................92
Conguring the Static MAB and MAB Prole .............................................................................................................92
Conguring Critical VLAN ..............................................................................................................................................93
Conguring Request Identity Re-Transmissions...........................................................................................................94
Conguring a Quiet Period after a Failed Authentication..................................................................................... 94
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 95
Re-Authenticating a Port................................................................................................................................................96
Conguring Timeouts...................................................................................................................................................... 97
Conguring Dynamic VLAN Assignment with Port Authentication...........................................................................98
Guest and Authentication-Fail VLANs.......................................................................................................................... 99
Conguring a Guest VLAN....................................................................................................................................... 99
Conguring an Authentication-Fail VLAN...............................................................................................................99
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)...................................101
Optimizing CAM Utilization During the Attachment of ACLs to VLANs..................................................................101
Guidelines for Conguring ACL VLAN Groups........................................................................................................... 102
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters...............................................102
Conguring ACL VLAN Groups.............................................................................................................................. 102
Conguring FP Blocks for VLAN Parameters.......................................................................................................103
Viewing CAM Usage...................................................................................................................................................... 104
Allocating FP Blocks for VLAN Processes.................................................................................................................. 105
7 Access Control Lists (ACLs)....................................................................................................................... 107
IP Access Control Lists (ACLs).....................................................................................................................................108
CAM Usage...............................................................................................................................................................109
Implementing ACLs on Dell EMC Networking OS................................................................................................109
Important Points to Remember......................................................................................................................................111
Conguration Task List for Route Maps..................................................................................................................111
Conguring Match Routes.......................................................................................................................................113
Conguring Set Conditions......................................................................................................................................114
Congure a Route Map for Route Redistribution..................................................................................................115
Contents
5