Users Guide

CAM Usage................................................................................................................................................................114
User-Congurable CAM Allocation......................................................................................................................... 115
Allocating CAM for Ingress ACLs on the Port Extender...................................................................................... 115
Allocating CAM for Egress ACLs on the Port Extender....................................................................................... 117
Implementing ACLs on Dell EMC Networking OS.................................................................................................118
ACL Optimization to Increase Number of Supported IPv4 ACLs..............................................................................119
Restrictions for ACL Optimization.......................................................................................................................... 119
Optimizing ACL for More Number of IPv4 ACL Rules.........................................................................................120
IP Fragment Handling.................................................................................................................................................... 120
IP Fragments ACL Examples...................................................................................................................................120
Layer 4 ACL Rules Examples................................................................................................................................... 121
Congure a Standard IP ACL........................................................................................................................................ 122
Conguring a Standard IP ACL Filter..................................................................................................................... 123
Congure an Extended IP ACL..................................................................................................................................... 124
Conguring Filters with a Sequence Number....................................................................................................... 124
Conguring Filters Without a Sequence Number.................................................................................................125
Congure Layer 2 and Layer 3 ACLs............................................................................................................................126
Using ACL VLAN Groups...............................................................................................................................................126
Guidelines for Conguring ACL VLAN Groups......................................................................................................126
Conguring an ACL VLAN Group........................................................................................................................... 127
Allocating ACL VLAN CAM..................................................................................................................................... 128
Applying an IP ACL to an Interface.............................................................................................................................. 128
Applying Ingress ACLs on the Port Extender........................................................................................................129
Applying Egress ACLs.............................................................................................................................................. 130
Applying Layer 3 Egress ACLs on Control-Plane Trac......................................................................................130
Counting ACL Hits.....................................................................................................................................................131
IP Prex Lists................................................................................................................................................................... 131
Implementation Information.................................................................................................................................... 132
Conguration Task List for Prex Lists.................................................................................................................. 132
ACL Resequencing......................................................................................................................................................... 135
Resequencing an ACL or Prex List.......................................................................................................................136
Route Maps..................................................................................................................................................................... 137
Implementation Information.....................................................................................................................................137
Important Points to Remember.....................................................................................................................................137
Conguration Task List for Route Maps................................................................................................................ 138
Conguring Match Routes......................................................................................................................................140
Conguring Set Conditions......................................................................................................................................141
Congure a Route Map for Route Redistribution.................................................................................................142
Congure a Route Map for Route Tagging............................................................................................................143
Continue Clause........................................................................................................................................................143
Conguring a UDF ACL................................................................................................................................................. 143
Hot-Lock Behavior......................................................................................................................................................... 145
7 Bidirectional Forwarding Detection (BFD).................................................................................................. 146
How BFD Works............................................................................................................................................................. 146
BFD Packet Format..................................................................................................................................................147
6
Contents