Administrator Guide

Enabling 802.1X..................................................................................................................................................................89
Configuring dot1x Profile ................................................................................................................................................90
Configuring MAC addresses for a do1x Profile.......................................................................................................... 90
Configuring the Static MAB and MAB Profile ........................................................................................................... 91
Configuring Critical VLAN .............................................................................................................................................. 92
Configuring Request Identity Re-Transmissions........................................................................................................92
Configuring a Quiet Period after a Failed Authentication..................................................................................93
Forcibly Authorizing or Unauthorizing a Port............................................................................................................. 94
Re-Authenticating a Port................................................................................................................................................ 94
Configuring Timeouts....................................................................................................................................................... 95
Configuring Dynamic VLAN Assignment with Port Authentication...................................................................... 96
Guest and Authentication-Fail VLANs..........................................................................................................................97
Configuring a Guest VLAN........................................................................................................................................ 98
Configuring an Authentication-Fail VLAN............................................................................................................. 98
Chapter 6: Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)...100
Optimizing CAM Utilization During the Attachment of ACLs to VLANs............................................................100
Guidelines for Configuring ACL VLAN Groups.......................................................................................................... 101
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters......................................... 101
Configuring ACL VLAN Groups............................................................................................................................... 101
Configuring FP Blocks for VLAN Parameters..................................................................................................... 102
Viewing CAM Usage........................................................................................................................................................103
Allocating FP Blocks for VLAN Processes.................................................................................................................104
Unified Forwarding Table (UFT) Modes.................................................................................................................... 104
Configuring UFT Modes........................................................................................................................................... 105
Chapter 7: Access Control Lists (ACLs)..................................................................................... 106
IP Access Control Lists (ACLs)....................................................................................................................................107
CAM Usage..................................................................................................................................................................107
Implementing ACLs on Dell EMC Networking OS..............................................................................................108
Important Points to Remember....................................................................................................................................109
Configuration Task List for Route Maps...............................................................................................................110
Configuring Match Routes....................................................................................................................................... 112
Configuring Set Conditions...................................................................................................................................... 113
Configure a Route Map for Route Redistribution............................................................................................... 113
Configure a Route Map for Route Tagging.......................................................................................................... 114
Continue Clause.......................................................................................................................................................... 114
IP Fragment Handling......................................................................................................................................................115
IP Fragments ACL Examples....................................................................................................................................115
Layer 4 ACL Rules Examples................................................................................................................................... 115
Configure a Standard IP ACL........................................................................................................................................ 116
Configuring a Standard IP ACL Filter.....................................................................................................................117
Configure an Extended IP ACL..................................................................................................................................... 118
Configuring Filters with a Sequence Number...................................................................................................... 118
Configuring Filters Without a Sequence Number............................................................................................... 119
Configure Layer 2 and Layer 3 ACLs...........................................................................................................................119
Assign an IP ACL to an Interface.................................................................................................................................120
Applying an IP ACL..........................................................................................................................................................120
Counting ACL Hits......................................................................................................................................................121
Contents
5