Using Telnet to get to Another Network Device............................................................................... 78
Lock CONFIGURATION Mode............................................................................................................78
Viewing the Configuration Lock Status........................................................................................ 79
Restoring the Factory Default Settings...............................................................................................79
Important Points to Remember....................................................................................................79
Restoring Factory Default Environment Variables.......................................................................80
5 802.1X................................................................................................................... 82
Port-Authentication Process.............................................................................................................. 83
EAP over RADIUS...........................................................................................................................85
Configuring 802.1X............................................................................................................................. 85
Related Configuration Tasks.........................................................................................................85
Important Points to Remember......................................................................................................... 86
Enabling 802.1X...................................................................................................................................86
Configuring Request Identity Re-Transmissions...............................................................................88
Configuring a Quiet Period after a Failed Authentication........................................................... 88
Forcibly Authorizing or Unauthorizing a Port....................................................................................89
Re-Authenticating a Port....................................................................................................................90
Configuring Timeouts......................................................................................................................... 91
Configuring Dynamic VLAN Assignment with Port Authentication..................................................92
Guest and Authentication-Fail VLANs................................................................................................93
Configuring a Guest VLAN............................................................................................................94
Configuring an Authentication-Fail VLAN....................................................................................94
6 Access Control Lists (ACLs).............................................................................. 96
IP Access Control Lists (ACLs)............................................................................................................ 96
CAM Usage.................................................................................................................................... 97
Implementing ACLs on Dell Networking OS............................................................................... 98
Important Points to Remember......................................................................................................... 99
Configuration Task List for Route Maps.....................................................................................100
Configuring Match Routes..........................................................................................................102
Configuring Set Conditions........................................................................................................ 103
Configure a Route Map for Route Redistribution...................................................................... 104
Configure a Route Map for Route Tagging................................................................................105
Continue Clause..........................................................................................................................105
IP Fragment Handling....................................................................................................................... 106
IP Fragments ACL Examples....................................................................................................... 106
Layer 4 ACL Rules Examples....................................................................................................... 107
Configure a Standard IP ACL............................................................................................................108
Configuring a Standard IP ACL Filter..........................................................................................109
Configure an Extended IP ACL......................................................................................................... 110
Configuring Filters with a Sequence Number............................................................................ 110
5