Setup Guide
LPC Bus Quality Degradation.........................................................................................................................................86
LBQA (LPC Bus Quality Analyzer) Failure Detection mode..................................................................................87
Reloading the system.......................................................................................................................................................87
Restoring the Factory Default Settings.........................................................................................................................88
Important Points to Remember................................................................................................................................88
Restoring Factory Default Environment Variables................................................................................................. 88
Viewing the Reason for Last System Reboot.............................................................................................................. 89
Disabling Syslog Messages for SNMP Authentication Failure Events...................................................................... 89
5 802.1X......................................................................................................................................................... 90
Port-Authentication Process..........................................................................................................................................92
EAP over RADIUS......................................................................................................................................................92
Conguring 802.1X...........................................................................................................................................................93
Related Conguration Tasks..................................................................................................................................... 93
Important Points to Remember......................................................................................................................................93
Enabling 802.1X................................................................................................................................................................ 94
Conguring dot1x Prole ................................................................................................................................................95
Conguring the Static MAB and MAB Prole .............................................................................................................96
Conguring Critical VLAN ..............................................................................................................................................96
Conguring MAC addresses for a do1x Prole............................................................................................................. 97
Conguring Request Identity Re-Transmissions...........................................................................................................98
Conguring a Quiet Period after a Failed Authentication..................................................................................... 98
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 99
Re-Authenticating a Port.............................................................................................................................................. 100
Conguring Timeouts..................................................................................................................................................... 101
Conguring Dynamic VLAN Assignment with Port Authentication......................................................................... 102
Guest and Authentication-Fail VLANs.........................................................................................................................103
Conguring a Guest VLAN......................................................................................................................................103
Conguring an Authentication-Fail VLAN............................................................................................................. 103
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).................................. 105
Optimizing CAM Utilization During the Attachment of ACLs to VLANs................................................................. 105
Guidelines for Conguring ACL VLAN Groups........................................................................................................... 106
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters...............................................106
Conguring ACL VLAN Groups.............................................................................................................................. 106
Conguring FP Blocks for VLAN Parameters....................................................................................................... 107
Viewing CAM Usage...................................................................................................................................................... 108
Allocating FP Blocks for VLAN Processes.................................................................................................................. 109
ACL Optimization to Increase Number of Supported IPv4 ACLs.............................................................................109
Restrictions for ACL Optimization.......................................................................................................................... 110
Optimizing ACL for More Number of IPv4 ACL Rules..........................................................................................110
7 Access Control Lists (ACLs)........................................................................................................................ 111
IP Access Control Lists (ACLs)......................................................................................................................................112
CAM Usage................................................................................................................................................................113
Implementing ACLs on Dell EMC Networking OS.................................................................................................114
Contents
5










