Administrator Guide

Table Of Contents
Configuring dot1x Profile ................................................................................................................................................... 84
Configuring MAC addresses for a do1x Profile................................................................................................................85
Configuring the Static MAB and MAB Profile ................................................................................................................ 85
Configuring Critical VLAN ................................................................................................................................................. 86
Configuring Request Identity Re-Transmissions............................................................................................................. 87
Configuring a Quiet Period after a Failed Authentication.........................................................................................87
Configuring a Quiet Period after a Failed Authentication...............................................................................................88
Forcibly Authorizing or Unauthorizing a Port...................................................................................................................88
Re-Authenticating a Port................................................................................................................................................... 89
Configuring Dynamic VLAN Assignment with Port Authentication..............................................................................90
Guest and Authentication-Fail VLANs...............................................................................................................................91
Configuring a Guest VLAN........................................................................................................................................... 92
Configuring an Authentication-Fail VLAN.................................................................................................................. 92
Configuring Timeouts....................................................................................................................................................93
Multi-Host Authentication..................................................................................................................................................94
Multi-Supplicant Authentication........................................................................................................................................96
MAC Authentication Bypass..............................................................................................................................................98
MAB in Single-host and Multi-Host Mode................................................................................................................. 98
MAB in Multi-Supplicant Authentication Mode.........................................................................................................98
Configuring MAC Authentication Bypass...................................................................................................................98
Dynamic CoS with 802.1X..................................................................................................................................................99
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).........................101
Optimizing CAM Utilization During the Attachment of ACLs to VLANs.....................................................................101
Guidelines for Configuring ACL VLAN Groups................................................................................................................101
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters..................................................102
Configuring ACL VLAN Groups..................................................................................................................................102
Configuring FP Blocks for VLAN Parameters.......................................................................................................... 103
Viewing CAM Usage..........................................................................................................................................................103
Allocating FP Blocks for VLAN Processes......................................................................................................................105
ACL Optimization to Increase Number of Supported IPv4 ACLs................................................................................105
Optimizing ACL for More Number of IPv4 ACL Rules............................................................................................105
7 Access Control Lists (ACLs).......................................................................................................107
IP Access Control Lists (ACLs)........................................................................................................................................108
CAM Usage...................................................................................................................................................................108
Implementing ACLs on Dell EMC Networking OS................................................................................................... 109
Configure ACL Range Profiles.................................................................................................................................... 110
Important Points to Remember......................................................................................................................................... 111
Configuration Task List for Route Maps.....................................................................................................................111
Configuring Match Routes...........................................................................................................................................113
Configuring Set Conditions..........................................................................................................................................114
Configure a Route Map for Route Redistribution.....................................................................................................115
Configure a Route Map for Route Tagging...............................................................................................................115
Continue Clause............................................................................................................................................................ 116
IP Fragment Handling.........................................................................................................................................................116
IP Fragments ACL Examples.......................................................................................................................................116
Layer 4 ACL Rules Examples....................................................................................................................................... 117
Configure a Standard IP ACL............................................................................................................................................ 117
Contents
5