Service Manual

Port-Authentication Process.......................................................................................................................................... 79
EAP over RADIUS......................................................................................................................................................80
Conguring 802.1X...........................................................................................................................................................80
Related Conguration Tasks..................................................................................................................................... 80
Important Points to Remember......................................................................................................................................80
Enabling 802.1X................................................................................................................................................................. 81
Conguring dot1x Prole ................................................................................................................................................82
Conguring MAC addresses for a do1x Prole.............................................................................................................83
Conguring the Static MAB and MAB Prole .............................................................................................................83
Conguring Critical VLAN ..............................................................................................................................................84
Conguring Request Identity Re-Transmissions...........................................................................................................85
Conguring a Quiet Period after a Failed Authentication..................................................................................... 85
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 86
Re-Authenticating a Port................................................................................................................................................ 87
Conguring Timeouts......................................................................................................................................................88
Conguring Dynamic VLAN Assignment with Port Authentication...........................................................................89
Guest and Authentication-Fail VLANs.......................................................................................................................... 90
Conguring a Guest VLAN....................................................................................................................................... 90
Conguring an Authentication-Fail VLAN...............................................................................................................90
6 Access Control Lists (ACLs)........................................................................................................................ 92
IP Access Control Lists (ACLs)...................................................................................................................................... 93
CAM Usage.................................................................................................................................................................93
Implementing ACLs on Dell Networking OS........................................................................................................... 94
Important Points to Remember......................................................................................................................................95
Conguration Task List for Route Maps..................................................................................................................96
Conguring Match Routes........................................................................................................................................98
Conguring Set Conditions.......................................................................................................................................99
Congure a Route Map for Route Redistribution.................................................................................................100
Congure a Route Map for Route Tagging............................................................................................................ 101
Continue Clause........................................................................................................................................................ 101
IP Fragment Handling..................................................................................................................................................... 101
IP Fragments ACL Examples...................................................................................................................................102
Layer 4 ACL Rules Examples...................................................................................................................................102
Congure a Standard IP ACL........................................................................................................................................103
Conguring a Standard IP ACL Filter.....................................................................................................................104
Congure an Extended IP ACL.....................................................................................................................................105
Conguring Filters with a Sequence Number.......................................................................................................105
Conguring Filters Without a Sequence Number................................................................................................ 106
Congure Layer 2 and Layer 3 ACLs............................................................................................................................107
Assign an IP ACL to an Interface.................................................................................................................................. 107
Applying an IP ACL.........................................................................................................................................................107
Counting ACL Hits....................................................................................................................................................108
Congure Ingress ACLs................................................................................................................................................. 108
Congure Egress ACLs..................................................................................................................................................109
Applying Egress Layer 3 ACLs (Control-Plane)..................................................................................................... 110
IP Prex Lists...................................................................................................................................................................110
Contents
5