Reference Guide
Configuring Login Authentication for Terminal Lines..................................................................75
Setting Timeout for EXEC Privilege Mode..........................................................................................76
Using Telnet to get to Another Network Device................................................................................77
Lock CONFIGURATION Mode............................................................................................................ 77
Viewing the Configuration Lock Status........................................................................................78
Restoring the Factory Default Settings...............................................................................................78
Important Points to Remember....................................................................................................78
Restoring Factory Default Environment Variables....................................................................... 79
5 802.1X...................................................................................................................80
Port-Authentication Process...............................................................................................................81
EAP over RADIUS...........................................................................................................................83
Configuring 802.1X............................................................................................................................. 83
Related Configuration Tasks.........................................................................................................83
Important Points to Remember......................................................................................................... 84
Enabling 802.1X...................................................................................................................................84
Configuring Request Identity Re-Transmissions...............................................................................86
Configuring a Quiet Period after a Failed Authentication........................................................... 86
Forcibly Authorizing or Unauthorizing a Port.................................................................................... 87
Re-Authenticating a Port....................................................................................................................88
Configuring Timeouts.........................................................................................................................89
Configuring Dynamic VLAN Assignment with Port Authentication..................................................90
Guest and Authentication-Fail VLANs................................................................................................ 91
Configuring a Guest VLAN............................................................................................................92
Configuring an Authentication-Fail VLAN....................................................................................92
6 Access Control List (ACL) VLAN Groups and Content Addressable
Memory (CAM)........................................................................................................94
Optimizing CAM Utilization During the Attachment of ACLs to VLANs...........................................94
Guidelines for Configuring ACL VLAN Groups.................................................................................. 95
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters..........................96
Configuring ACL VLAN Groups.................................................................................................... 96
Configuring FP Blocks for VLAN Parameters............................................................................... 97
Viewing CAM Usage............................................................................................................................97
Allocating FP Blocks for VLAN Processes.......................................................................................... 99
7 Access Control Lists (ACLs)............................................................................ 100
IP Access Control Lists (ACLs)...........................................................................................................101
CAM Usage...................................................................................................................................101
Implementing ACLs on Dell Networking OS..............................................................................103
Important Points to Remember....................................................................................................... 104
Configuration Task List for Route Maps.....................................................................................104
5










