Configuring Concurrent Session Limit.........................................................................................81
Enabling the System to Clear Existing Sessions...........................................................................82
Track Login Activity.............................................................................................................................83
Restrictions for Tracking Login Activity........................................................................................83
Configuring Login Activity Tracking.............................................................................................83
Display Login Statistics..................................................................................................................84
Recovering from a Forgotten Password............................................................................................85
Recovering from a Forgotten Enable Password................................................................................86
Recovering from a Failed Start...........................................................................................................86
5 802.1X...................................................................................................................88The Port-Authentication Process.......................................................................................................90
EAP over RADIUS...........................................................................................................................92
Configuring 802.1X.............................................................................................................................92
Related Configuration Tasks.........................................................................................................92
Important Points to Remember..........................................................................................................93
Enabling 802.1X...................................................................................................................................93
Configuring Request Identity Re-Transmissions.........................................................................95
Configuring a Quiet Period after a Failed Authentication...........................................................95
Forcibly Authorizing or Unauthorizing a Port....................................................................................96
Re-Authenticating a Port....................................................................................................................97
Configuring Timeouts.........................................................................................................................98
Configuring Dynamic VLAN Assignment with Port Authentication..................................................99
Guest and Authentication-Fail VLANs........................................................................................100
Configuring a Guest VLAN..........................................................................................................101
Configuring an Authentication-Fail VLAN..................................................................................101
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)......................................................................................................103Optimizing CAM Utilization During the Attachment of ACLs to VLANs.........................................103
Guidelines for Configuring ACL VLAN groups.................................................................................104
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters........................105
Configuring ACL VLAN Groups...................................................................................................105
Configuring FP Blocks for VLAN Parameters.............................................................................106
Viewing CAM Usage..........................................................................................................................107
Allocating FP Blocks for VLAN Processes........................................................................................108
7 Access Control Lists (ACLs).............................................................................110IP Access Control Lists (ACLs)...........................................................................................................110
Implementing ACL on the Dell Networking OS................................................................................111
ACLs and VLANs.................................................................................................................................111
ACL Optimization...............................................................................................................................111
5