Using Telnet to get to Another Network Device............................................................................... 78Lock CONFIGURATION Mode............................................................................................................78Viewing the Configuration Lock Status........................................................................................ 79Restoring the Factory Default Settings...............................................................................................79Important Points to Remember.................................................................................................... 79Restoring Factory Default Environment Variables.......................................................................805 802.1X................................................................................................................... 82Port-Authentication Process.............................................................................................................. 83EAP over RADIUS...........................................................................................................................85Configuring 802.1X............................................................................................................................. 85Related Configuration Tasks.........................................................................................................85Important Points to Remember......................................................................................................... 86Enabling 802.1X...................................................................................................................................86Configuring Request Identity Re-Transmissions............................................................................... 88Configuring a Quiet Period after a Failed Authentication........................................................... 88Forcibly Authorizing or Unauthorizing a Port....................................................................................89Re-Authenticating a Port....................................................................................................................90Configuring Timeouts......................................................................................................................... 91Configuring Dynamic VLAN Assignment with Port Authentication..................................................92Guest and Authentication-Fail VLANs................................................................................................ 93Configuring a Guest VLAN............................................................................................................94Configuring an Authentication-Fail VLAN....................................................................................946 Access Control Lists (ACLs).............................................................................. 96IP Access Control Lists (ACLs)............................................................................................................ 96CAM Usage.................................................................................................................................... 97Implementing ACLs on Dell Networking OS............................................................................... 98Important Points to Remember......................................................................................................... 99Configuration Task List for Route Maps.....................................................................................100Configuring Match Routes..........................................................................................................102Configuring Set Conditions........................................................................................................ 103Configure a Route Map for Route Redistribution...................................................................... 104Configure a Route Map for Route Tagging................................................................................105Continue Clause..........................................................................................................................105IP Fragment Handling....................................................................................................................... 106IP Fragments ACL Examples....................................................................................................... 106Layer 4 ACL Rules Examples....................................................................................................... 107Configure a Standard IP ACL............................................................................................................ 108Configuring a Standard IP ACL Filter..........................................................................................109Configure an Extended IP ACL......................................................................................................... 110Configuring Filters with a Sequence Number............................................................................ 1105