White Papers

Allocating FP Blocks for VLAN Processes................................................................................................................... 114
ACL Optimization to Increase Number of Supported IPv4 ACLs..............................................................................115
Restrictions for ACL Optimization.......................................................................................................................... 115
Optimizing ACL for More Number of IPv4 ACL Rules..........................................................................................115
7 Access Control Lists (ACLs)........................................................................................................................ 117
IP Access Control Lists (ACLs)......................................................................................................................................118
CAM Usage................................................................................................................................................................118
Implementing ACLs on Dell EMC Networking OS.................................................................................................119
Congure ACL Range Proles................................................................................................................................. 121
Important Points to Remember.....................................................................................................................................121
Conguration Task List for Route Maps................................................................................................................ 122
Conguring Match Routes...................................................................................................................................... 124
Conguring Set Conditions..................................................................................................................................... 125
Congure a Route Map for Route Redistribution.................................................................................................126
Congure a Route Map for Route Tagging............................................................................................................127
Continue Clause........................................................................................................................................................127
IP Fragment Handling.....................................................................................................................................................127
IP Fragments ACL Examples...................................................................................................................................128
Layer 4 ACL Rules Examples...................................................................................................................................128
Congure a Standard IP ACL........................................................................................................................................129
Conguring a Standard IP ACL Filter..................................................................................................................... 130
Congure an Extended IP ACL......................................................................................................................................131
Conguring Filters with a Sequence Number........................................................................................................131
Conguring Filters Without a Sequence Number.................................................................................................134
Congure Layer 2 and Layer 3 ACLs............................................................................................................................134
Assign an IP ACL to an Interface..................................................................................................................................135
Applying an IP ACL.........................................................................................................................................................135
Counting ACL Hits....................................................................................................................................................136
Congure Ingress ACLs................................................................................................................................................. 136
Congure Egress ACLs.................................................................................................................................................. 137
Applying Egress Layer 3 ACLs (Control-Plane).....................................................................................................137
IP Prex Lists.................................................................................................................................................................. 138
Implementation Information.................................................................................................................................... 138
Conguration Task List for Prex Lists.................................................................................................................. 139
ACL Resequencing......................................................................................................................................................... 142
Resequencing an ACL or Prex List.......................................................................................................................143
Route Maps.....................................................................................................................................................................144
Implementation Information.................................................................................................................................... 144
8 Bidirectional Forwarding Detection (BFD).................................................................................................. 145
How BFD Works............................................................................................................................................................. 145
BFD Packet Format..................................................................................................................................................146
BFD Sessions............................................................................................................................................................ 147
BFD Three-Way Handshake.................................................................................................................................... 148
Session State Changes............................................................................................................................................150
6
Contents