Users Guide
Setting Timeout for EXEC Privilege Mode...........................................................................85
Using Telnet to get to Another Network Device............................................................... 85
Lock CONFIGURATION Mode...............................................................................................86
Viewing the Configuration Lock Status......................................................................... 86
Restoring the Factory Default Settings................................................................................ 87
Important Points to Remember.......................................................................................87
Restoring Factory Default Environment Variables...................................................... 88
5 802.1X.......................................................................................................................................90
Port-Authentication Process................................................................................................. 92
EAP over RADIUS................................................................................................................94
Configuring 802.1X..................................................................................................................94
Related Configuration Tasks............................................................................................94
Important Points to Remember............................................................................................ 95
Enabling 802.1X........................................................................................................................ 96
Configuring Request Identity Re-Transmissions...............................................................98
Configuring a Quiet Period after a Failed Authentication......................................... 98
Forcibly Authorizing or Unauthorizing a Port.................................................................... 99
Re-Authenticating a Port......................................................................................................100
Configuring Timeouts............................................................................................................101
Configuring Dynamic VLAN Assignment with Port Authentication............................ 102
Guest and Authentication-Fail VLANs................................................................................103
Configuring a Guest VLAN............................................................................................. 104
Configuring an Authentication-Fail VLAN...................................................................104
6 Access Control Lists (ACLs)................................................................................................ 106
IP Access Control Lists (ACLs)............................................................................................. 107
CAM Usage........................................................................................................................ 108
Implementing ACLs on Dell Networking OS..............................................................109
Important Points to Remember...........................................................................................110
Configuration Task List for Route Maps....................................................................... 111
Configuring Match Routes..............................................................................................113
Configuring Set Conditions............................................................................................ 115
Configure a Route Map for Route Redistribution...................................................... 116
Configure a Route Map for Route Tagging................................................................. 116
Continue Clause................................................................................................................117
IP Fragment Handling.............................................................................................................117
IP Fragments ACL Examples........................................................................................... 118
Layer 4 ACL Rules Examples...........................................................................................118
Configure a Standard IP ACL................................................................................................119
Configuring a Standard IP ACL Filter............................................................................120
Configure an Extended IP ACL.............................................................................................121
9.10(0.1)
5










