LBQA (LPC Bus Quality Analyzer) Failure Detection mode..................................................................................80Restoring the Factory Default Settings........................................................................................................................ 80Important Points to Remember................................................................................................................................80Restoring Factory Default Environment Variables.................................................................................................. 81Reloading the system...................................................................................................................................................... 825 802.1X..........................................................................................................................................................84Port-Authentication Process.......................................................................................................................................... 86EAP over RADIUS...................................................................................................................................................... 87Configuring 802.1X........................................................................................................................................................... 87Related Configuration Tasks..................................................................................................................................... 87Important Points to Remember......................................................................................................................................88Enabling 802.1X................................................................................................................................................................ 88Configuring dot1x Profile ................................................................................................................................................89Configuring MAC addresses for a do1x Profile.............................................................................................................90Configuring the Static MAB and MAB Profile .............................................................................................................90Configuring Critical VLAN .............................................................................................................................................. 91Configuring Request Identity Re-Transmissions...........................................................................................................92Configuring a Quiet Period after a Failed Authentication..................................................................................... 92Configuring a Quiet Period after a Failed Authentication........................................................................................... 93Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 94Re-Authenticating a Port................................................................................................................................................95Configuring Dynamic VLAN Assignment with Port Authentication.......................................................................... 96Guest and Authentication-Fail VLANs...........................................................................................................................97Configuring a Guest VLAN........................................................................................................................................97Configuring an Authentication-Fail VLAN............................................................................................................... 97Configuring Timeouts................................................................................................................................................ 98Multi-Host Authentication.............................................................................................................................................. 99Configuring Multi-Host AuthenticationConfiguring Single-Host Authentication.............................................. 101Multi-Supplicant Authentication...................................................................................................................................102Configuring Multi-Supplicant AuthenticationRestricting Multi-Supplicant Authentication.............................102MAC Authentication Bypass......................................................................................................................................... 103MAB in Single-host and Multi-Host Mode............................................................................................................104MAB in Multi-Supplicant Authentication Mode....................................................................................................104Configuring MAC Authentication Bypass..............................................................................................................104Dynamic CoS with 802.1X............................................................................................................................................. 1056 Access Control Lists (ACLs)....................................................................................................................... 107IP Access Control Lists (ACLs).....................................................................................................................................108CAM Usage............................................................................................................................................................... 109Implementing ACLs on Dell Networking OS..........................................................................................................109Configure ACL Range Profiles..................................................................................................................................111Important Points to Remember......................................................................................................................................111Configuration Task List for Route Maps................................................................................................................. 112Configuring Match Routes....................................................................................................................................... 114Configuring Set Conditions......................................................................................................................................115Contents 5