Users Guide

Forcibly Authorizing or Unauthorizing a Port...................................................................................................................80
Re-Authenticating a Port.................................................................................................................................................... 81
Configuring Timeouts..........................................................................................................................................................82
Configuring Dynamic VLAN Assignment with Port Authentication.............................................................................. 83
Guest and Authentication-Fail VLANs..............................................................................................................................84
Configuring a Guest VLAN........................................................................................................................................... 84
Configuring an Authentication-Fail VLAN.................................................................................................................. 84
Chapter 6: Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)............ 86
Optimizing CAM Utilization During the Attachment of ACLs to VLANs......................................................................86
Guidelines for Configuring ACL VLAN Groups.................................................................................................................87
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters................................................... 87
Configuring ACL VLAN Groups....................................................................................................................................87
Configuring FP Blocks for VLAN Parameters............................................................................................................88
Viewing CAM Usage........................................................................................................................................................... 88
Allocating FP Blocks for VLAN Processes....................................................................................................................... 90
Chapter 7: Access Control Lists (ACLs)...........................................................................................91
IP Access Control Lists (ACLs)......................................................................................................................................... 92
CAM Usage.................................................................................................................................................................... 92
Implementing ACLs on Dell Networking OS...............................................................................................................93
Important Points to Remember.........................................................................................................................................94
Configuration Task List for Route Maps.....................................................................................................................94
Configuring Match Routes........................................................................................................................................... 96
Configuring Set Conditions...........................................................................................................................................97
Configure a Route Map for Route Redistribution......................................................................................................98
Configure a Route Map for Route Tagging................................................................................................................98
Continue Clause.............................................................................................................................................................99
IP Fragment Handling......................................................................................................................................................... 99
IP Fragments ACL Examples........................................................................................................................................99
Layer 4 ACL Rules Examples......................................................................................................................................100
Configure a Standard IP ACL........................................................................................................................................... 100
Configuring a Standard IP ACL Filter......................................................................................................................... 101
Configure an Extended IP ACL........................................................................................................................................ 102
Configuring Filters with a Sequence Number...........................................................................................................102
Configuring Filters Without a Sequence Number.................................................................................................... 103
Configure Layer 2 and Layer 3 ACLs...............................................................................................................................104
Assign an IP ACL to an Interface..................................................................................................................................... 104
Applying an IP ACL............................................................................................................................................................ 104
Counting ACL Hits....................................................................................................................................................... 105
Configure Ingress ACLs.................................................................................................................................................... 105
Configure Egress ACLs..................................................................................................................................................... 106
Applying Egress Layer 3 ACLs (Control-Plane)....................................................................................................... 107
IP Prefix Lists......................................................................................................................................................................107
Configuration Task List for Prefix Lists.....................................................................................................................108
ACL Resequencing............................................................................................................................................................. 110
Resequencing an ACL or Prefix List............................................................................................................................111
Route Maps......................................................................................................................................................................... 112
Logging of ACL Processes................................................................................................................................................ 112
Contents
5