Concept Guide
Restoring Factory Default Environment Variables.................................................................................................. 81
Viewing the Reason for Last System Reboot...............................................................................................................82
Disabling Syslog Messages for SNMP Authentication Failure Events.......................................................................83
5 802.1X..........................................................................................................................................................84
Port-Authentication Process..........................................................................................................................................86
EAP over RADIUS......................................................................................................................................................86
Conguring 802.1X........................................................................................................................................................... 87
Related Conguration Tasks..................................................................................................................................... 87
Important Points to Remember......................................................................................................................................87
Enabling 802.1X................................................................................................................................................................ 88
Conguring Request Identity Re-Transmissions...........................................................................................................89
Conguring a Quiet Period after a Failed Authentication..................................................................................... 90
Forcibly Authorizing or Unauthorizing a Port................................................................................................................91
Re-Authenticating a Port.................................................................................................................................................91
Conguring Timeouts...................................................................................................................................................... 92
Conguring Dynamic VLAN Assignment with Port Authentication...........................................................................93
Guest and Authentication-Fail VLANs.......................................................................................................................... 94
Conguring a Guest VLAN....................................................................................................................................... 95
Conguring an Authentication-Fail VLAN...............................................................................................................95
6 Access Control Lists (ACLs).........................................................................................................................97
IP Access Control Lists (ACLs)...................................................................................................................................... 98
CAM Usage................................................................................................................................................................ 99
Implementing ACLs on Dell EMC Networking OS................................................................................................. 99
Important Points to Remember.....................................................................................................................................101
Conguration Task List for Route Maps.................................................................................................................101
Conguring Match Routes...................................................................................................................................... 103
Conguring Set Conditions.....................................................................................................................................105
Congure a Route Map for Route Redistribution.................................................................................................106
Congure a Route Map for Route Tagging........................................................................................................... 106
Continue Clause........................................................................................................................................................107
IP Fragment Handling.....................................................................................................................................................107
IP Fragments ACL Examples...................................................................................................................................107
Layer 4 ACL Rules Examples...................................................................................................................................108
Congure a Standard IP ACL........................................................................................................................................108
Conguring a Standard IP ACL Filter.....................................................................................................................109
Congure an Extended IP ACL......................................................................................................................................110
Conguring Filters with a Sequence Number........................................................................................................110
Conguring Filters Without a Sequence Number................................................................................................. 112
Congure Layer 2 and Layer 3 ACLs............................................................................................................................ 113
Assign an IP ACL to an Interface...................................................................................................................................113
Applying an IP ACL..........................................................................................................................................................113
Counting ACL Hits.....................................................................................................................................................114
Congure Ingress ACLs.................................................................................................................................................. 114
Congure Egress ACLs...................................................................................................................................................115
Contents
5










