Administrator Guide
Configuring Request Identity Re-Transmissions........................................................ 111
Configuring a Quiet Period after a Failed Authentication.........................................111
Forcibly Authorizing or Unauthorizing a Port...................................................................112
Re-Authenticating a Port.......................................................................................................113
Configuring Timeouts............................................................................................................114
Configuring Dynamic VLAN Assignment with Port Authentication............................. 115
Guest and Authentication-Fail VLANs.......................................................................... 116
Configuring a Guest VLAN.............................................................................................. 117
Configuring an Authentication-Fail VLAN....................................................................117
7 Access Control List (ACL) VLAN Groups and Content Addressable Memory
(CAM)..........................................................................................................................................119
Optimizing CAM Utilization During the Attachment of ACLs to VLANs..................... 119
Guidelines for Configuring ACL VLAN groups................................................................. 120
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters...121
Configuring ACL VLAN Groups......................................................................................121
Configuring FP Blocks for VLAN Parameters..............................................................122
Viewing CAM Usage...............................................................................................................123
Allocating FP Blocks for VLAN Processes..........................................................................125
8 Access Control Lists (ACLs)................................................................................................ 126
IP Access Control Lists (ACLs)..............................................................................................127
Implementing ACL on the Dell Networking OS...............................................................128
ACLs and VLANs......................................................................................................................128
ACL Optimization................................................................................................................... 128
Determine the Order in which ACLs are Used to Classify Traffic................................ 129
Example of the order Keyword to Determine ACL Sequence................................ 129
IP Fragment Handling............................................................................................................130
IP Fragments ACL Examples................................................................................................ 130
Layer 4 ACL Rules Examples.................................................................................................131
Configure a Standard IP ACL................................................................................................131
Configuring a Standard IP ACL Filter..................................................................................133
Configure an Extended IP ACL............................................................................................ 134
Configuring Filters with a Sequence Number.................................................................. 134
Configuring Filters Without a Sequence Number........................................................... 135
Established Flag.......................................................................................................................135
Configure Layer 2 and Layer 3 ACLs.................................................................................. 136
Assign an IP ACL to an Interface......................................................................................... 136
Applying an IP ACL................................................................................................................. 137
Counting ACL Hits..................................................................................................................138
Configure Ingress ACLs.........................................................................................................138
Configure Egress ACLs..........................................................................................................139
Configuration Guide
6