Users Guide

5 802.1X.......................................................................................................................................................... 77
Port-Authentication Process.......................................................................................................................................... 79
EAP over RADIUS......................................................................................................................................................80
Conguring 802.1X............................................................................................................................................................81
Related Conguration Tasks......................................................................................................................................81
Important Points to Remember...................................................................................................................................... 81
Enabling 802.1X................................................................................................................................................................ 82
Conguring dot1x Prole ................................................................................................................................................83
Conguring MAC addresses for a do1x Prole.............................................................................................................84
Conguring the Static MAB and MAB Prole .............................................................................................................84
Conguring Critical VLAN ..............................................................................................................................................85
Conguring Request Identity Re-Transmissions...........................................................................................................86
Conguring a Quiet Period after a Failed Authentication..................................................................................... 86
Conguring a Quiet Period after a Failed Authentication............................................................................................87
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 88
Re-Authenticating a Port................................................................................................................................................ 88
Conguring Dynamic VLAN Assignment with Port Authentication...........................................................................89
Guest and Authentication-Fail VLANs.......................................................................................................................... 90
Conguring a Guest VLAN........................................................................................................................................91
Conguring an Authentication-Fail VLAN............................................................................................................... 91
Conguring Timeouts................................................................................................................................................ 92
Multi-Host Authentication.............................................................................................................................................. 93
Conguring Multi-Host AuthenticationConguring Single-Host Authentication...............................................94
Multi-Supplicant Authentication.................................................................................................................................... 95
Conguring Multi-Supplicant AuthenticationRestricting Multi-Supplicant Authentication..............................96
MAC Authentication Bypass...........................................................................................................................................97
MAB in Single-host and Multi-Host Mode..............................................................................................................97
MAB in Multi-Supplicant Authentication Mode..................................................................................................... 98
Conguring MAC Authentication Bypass............................................................................................................... 98
Dynamic CoS with 802.1X...............................................................................................................................................99
6 Access Control Lists (ACLs)........................................................................................................................101
IP Access Control Lists (ACLs).....................................................................................................................................102
CAM Usage...............................................................................................................................................................102
Implementing ACLs on Dell Networking OS..........................................................................................................103
Important Points to Remember.................................................................................................................................... 104
Conguration Task List for Route Maps................................................................................................................105
Conguring Match Routes...................................................................................................................................... 107
Conguring Set Conditions.....................................................................................................................................108
Congure a Route Map for Route Redistribution.................................................................................................109
Congure a Route Map for Route Tagging............................................................................................................ 110
Continue Clause........................................................................................................................................................ 110
IP Fragment Handling..................................................................................................................................................... 110
IP Fragments ACL Examples.................................................................................................................................... 111
Layer 4 ACL Rules Examples.................................................................................................................................... 111
Congure a Standard IP ACL.........................................................................................................................................112
Contents
5