White Papers

Table Of Contents
Configuring MAC addresses for a do1x Profile.......................................................................................................... 83
Configuring the Static MAB and MAB Profile ...........................................................................................................84
Configuring Critical VLAN .............................................................................................................................................. 85
Enabling 802.1X................................................................................................................................................................. 86
Configuring Request Identity Re-Transmissions........................................................................................................87
Configuring a Quiet Period after a Failed Authentication..................................................................................88
Forcibly Authorizing or Unauthorizing a Port............................................................................................................. 88
Re-Authenticating a Port................................................................................................................................................ 89
Configuring Timeouts....................................................................................................................................................... 90
Configuring Dynamic VLAN Assignment with Port Authentication....................................................................... 91
Guest and Authentication-Fail VLANs......................................................................................................................... 92
Configuring a Guest VLAN........................................................................................................................................ 92
Configuring an Authentication-Fail VLAN............................................................................................................. 92
Chapter 6: Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).... 94
Optimizing CAM Utilization During the Attachment of ACLs to VLANs..............................................................94
Guidelines for Configuring ACL VLAN Groups...........................................................................................................95
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters.......................................... 95
Configuring ACL VLAN Groups................................................................................................................................95
Configuring FP Blocks for VLAN Parameters.......................................................................................................96
Viewing CAM Usage......................................................................................................................................................... 97
Allocating FP Blocks for VLAN Processes.................................................................................................................. 98
Chapter 7: Access Control Lists (ACLs).......................................................................................99
IP Access Control Lists (ACLs)....................................................................................................................................100
CAM Usage................................................................................................................................................................. 100
Implementing ACLs on Dell EMC Networking OS.............................................................................................. 101
Important Points to Remember....................................................................................................................................102
Configuration Task List for Route Maps.............................................................................................................. 103
Configuring Match Routes...................................................................................................................................... 105
Configuring Set Conditions..................................................................................................................................... 106
Configure a Route Map for Route Redistribution.............................................................................................. 106
Configure a Route Map for Route Tagging......................................................................................................... 107
Continue Clause......................................................................................................................................................... 107
IP Fragment Handling..................................................................................................................................................... 108
IP Fragments ACL Examples...................................................................................................................................108
Layer 4 ACL Rules Examples...................................................................................................................................108
Configure a Standard IP ACL....................................................................................................................................... 109
Configuring a Standard IP ACL Filter.................................................................................................................... 110
Configure an Extended IP ACL...................................................................................................................................... 111
Configuring Filters with a Sequence Number.......................................................................................................111
Configuring Filters Without a Sequence Number............................................................................................... 112
Configure Layer 2 and Layer 3 ACLs........................................................................................................................... 112
Assign an IP ACL to an Interface..................................................................................................................................113
Applying an IP ACL...........................................................................................................................................................113
Counting ACL Hits......................................................................................................................................................114
Configure Ingress ACLs.................................................................................................................................................. 114
Configure Egress ACLs................................................................................................................................................... 115
Applying Egress Layer 3 ACLs (Control-Plane).................................................................................................. 115
Contents
5