Users Guide
Port-Authentication Process..................................................................................................................................79
EAP over RADIUS................................................................................................................................................80
Configuring 802.1X...................................................................................................................................................81
Related Configuration Tasks.............................................................................................................................81
Important Points to Remember.............................................................................................................................81
Enabling 802.1X........................................................................................................................................................ 82
Configuring dot1x Profile .......................................................................................................................................83
Configuring MAC addresses for a do1x Profile.................................................................................................. 84
Configuring the Static MAB and MAB Profile .................................................................................................... 84
Configuring Critical VLAN ..................................................................................................................................... 85
Configuring Request Identity Re-Transmissions...............................................................................................86
Configuring a Quiet Period after a Failed Authentication......................................................................... 86
Forcibly Authorizing or Unauthorizing a Port.....................................................................................................87
Re-Authenticating a Port........................................................................................................................................88
Configuring Timeouts............................................................................................................................................. 89
Configuring Dynamic VLAN Assignment with Port Authentication.............................................................. 90
Guest and Authentication-Fail VLANs.................................................................................................................. 91
Configuring a Guest VLAN................................................................................................................................ 91
Configuring an Authentication-Fail VLAN..................................................................................................... 91
6 Access Control Lists (ACLs)................................................................................................................................. 93
IP Access Control Lists (ACLs)............................................................................................................................... 94
CAM Usage.......................................................................................................................................................... 94
Implementing ACLs on Dell Networking OS................................................................................................ 95
Important Points to Remember.............................................................................................................................97
Configuration Task List for Route Maps.........................................................................................................97
Configuring Match Routes............................................................................................................................... 99
Configuring Set Conditions............................................................................................................................100
Configure a Route Map for Route Redistribution...................................................................................... 101
Configure a Route Map for Route Tagging.................................................................................................102
Continue Clause............................................................................................................................................... 102
IP Fragment Handling............................................................................................................................................102
IP Fragments ACL Examples...........................................................................................................................103
Layer 4 ACL Rules Examples.......................................................................................................................... 103
Configure a Standard IP ACL............................................................................................................................... 104
Configuring a Standard IP ACL Filter............................................................................................................105
Configure an Extended IP ACL............................................................................................................................106
Configuring Filters with a Sequence Number............................................................................................ 106
Configuring Filters Without a Sequence Number......................................................................................107
Configure Layer 2 and Layer 3 ACLs..................................................................................................................108
Assign an IP ACL to an Interface.........................................................................................................................108
Applying an IP ACL.................................................................................................................................................108
Counting ACL Hits............................................................................................................................................109
Configure Ingress ACLs.........................................................................................................................................109
Configure Egress ACLs.......................................................................................................................................... 110
Applying Egress Layer 3 ACLs (Control-Plane)........................................................................................... 111
IP Prefix Lists.............................................................................................................................................................111
Contents
5










