Setup Guide
Restoring Factory Default Environment Variables................................................................................................. 80
Viewing the Reason for Last System Reboot............................................................................................................... 81
Disabling Syslog Messages for SNMP Authentication Failure Events....................................................................... 81
5 802.1X..........................................................................................................................................................82
Port-Authentication Process.......................................................................................................................................... 84
EAP over RADIUS......................................................................................................................................................84
Conguring 802.1X...........................................................................................................................................................85
Related Conguration Tasks..................................................................................................................................... 85
Important Points to Remember......................................................................................................................................85
Enabling 802.1X................................................................................................................................................................ 86
Conguring Request Identity Re-Transmissions...........................................................................................................86
Conguring a Quiet Period after a Failed Authentication......................................................................................87
Forcibly Authorizing or Unauthorizing a Port................................................................................................................87
Re-Authenticating a Port................................................................................................................................................88
Conguring Timeouts......................................................................................................................................................88
Conguring Dynamic VLAN Assignment with Port Authentication...........................................................................89
Guest and Authentication-Fail VLANs.......................................................................................................................... 90
Conguring a Guest VLAN....................................................................................................................................... 90
Conguring an Authentication-Fail VLAN...............................................................................................................90
6 Access Control Lists (ACLs)......................................................................................................................... 91
IP Access Control Lists (ACLs)...................................................................................................................................... 92
CAM Usage.................................................................................................................................................................93
Implementing ACLs on Dell EMC Networking OS................................................................................................. 93
Important Points to Remember......................................................................................................................................94
Conguration Task List for Route Maps................................................................................................................. 95
Conguring Match Routes........................................................................................................................................96
Conguring Set Conditions.......................................................................................................................................98
Congure a Route Map for Route Redistribution.................................................................................................. 99
Congure a Route Map for Route Tagging.............................................................................................................99
Continue Clause....................................................................................................................................................... 100
IP Fragment Handling.................................................................................................................................................... 100
IP Fragments ACL Examples...................................................................................................................................100
Layer 4 ACL Rules Examples................................................................................................................................... 101
Congure a Standard IP ACL.........................................................................................................................................101
Conguring a Standard IP ACL Filter..................................................................................................................... 102
Congure an Extended IP ACL.....................................................................................................................................103
Conguring Filters with a Sequence Number.......................................................................................................103
Conguring Filters Without a Sequence Number................................................................................................ 105
Congure Layer 2 and Layer 3 ACLs........................................................................................................................... 105
Assign an IP ACL to an Interface..................................................................................................................................106
Applying an IP ACL.........................................................................................................................................................106
Counting ACL Hits....................................................................................................................................................107
Congure Ingress ACLs..................................................................................................................................................107
Congure Egress ACLs.................................................................................................................................................. 107
Contents
5










