Recovering from a Forgotten Enable Password
.....................................................................................................
77
Recovering from a Failed Start
.......................................................................................................................................
78
Restoring the Factory Default Settings
.........................................................................................................................
78
Important Points to Remember
................................................................................................................................
79
Restoring Factory Default Environment Variables
.................................................................................................
79
5 802.1X
..........................................................................................................................................................
81
Port-Authentication Process
..........................................................................................................................................
83
EAP over RADIUS
......................................................................................................................................................
84
Configuring
802.1X
...........................................................................................................................................................
84
Related
Configuration
Tasks
.....................................................................................................................................
84
Important Points to Remember
......................................................................................................................................
84
Enabling 802.1X
................................................................................................................................................................
85
Configuring
MAC addresses for a do1x
Profile
.............................................................................................................
86
Configuring
Request Identity Re-Transmissions
...........................................................................................................
87
Configuring
a Quiet Period after a Failed Authentication
......................................................................................
87
Forcibly Authorizing or Unauthorizing a Port
...............................................................................................................
88
Re-Authenticating a Port
................................................................................................................................................
89
Configuring
Timeouts
......................................................................................................................................................
90
Configuring
Dynamic VLAN Assignment with Port Authentication
...........................................................................
91
Guest and Authentication-Fail VLANs
..........................................................................................................................
92
Configuring
a Guest VLAN
.......................................................................................................................................
92
Configuring
an Authentication-Fail VLAN
...............................................................................................................
92
Configuring
dot1x
Profile
................................................................................................................................................
93
Configuring
the Static MAB and MAB
Profile
.............................................................................................................
94
Configuring
Critical VLAN
..............................................................................................................................................
94
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)
....................................
96
Optimizing CAM Utilization During the Attachment of ACLs to VLANs
...................................................................
96
Guidelines for
Configuring
ACL VLAN Groups
.............................................................................................................
97
Configuring
ACL VLAN Groups and
Configuring
FP Blocks for VLAN Parameters
................................................
97
Configuring
ACL VLAN Groups
................................................................................................................................
97
Configuring
FP Blocks for VLAN Parameters
........................................................................................................
98
Viewing CAM Usage
........................................................................................................................................................
99
Allocating FP Blocks for VLAN Processes
..................................................................................................................
100
7 Access Control Lists (ACLs)
........................................................................................................................
101
IP Access Control Lists (ACLs)
.....................................................................................................................................
102
CAM Usage
...............................................................................................................................................................
102
Implementing ACLs on Dell Networking OS
..........................................................................................................
103
IP Fragment Handling
....................................................................................................................................................
105
IP Fragments ACL Examples
...................................................................................................................................
105
Layer 4 ACL Rules Examples
..................................................................................................................................
105
Configure
a Standard IP ACL
........................................................................................................................................
106
Configuring
a Standard IP ACL Filter
.....................................................................................................................
107
Configure
an Extended IP ACL
.....................................................................................................................................
108
Configuring
Filters with a Sequence Number
.......................................................................................................
108
Contents
5