Users Guide
Viewing the Configuration Lock Status..........................................................................................................78
5 802.1X...................................................................................................................................................................... 79
Port-Authentication Process..................................................................................................................................81
EAP over RADIUS................................................................................................................................................ 82
Configuring 802.1X.................................................................................................................................................. 83
Related Configuration Tasks............................................................................................................................ 83
Important Points to Remember............................................................................................................................ 83
Enabling 802.1X........................................................................................................................................................ 84
Configuring dot1x Profile .......................................................................................................................................85
Configuring MAC addresses for a do1x Profile.................................................................................................. 86
Configuring the Static MAB and MAB Profile .................................................................................................... 86
Configuring Critical VLAN ......................................................................................................................................87
Configuring Request Identity Re-Transmissions...............................................................................................88
Configuring a Quiet Period after a Failed Authentication......................................................................... 88
Forcibly Authorizing or Unauthorizing a Port.................................................................................................... 89
Re-Authenticating a Port........................................................................................................................................90
Configuring Timeouts..............................................................................................................................................91
Configuring Dynamic VLAN Assignment with Port Authentication...............................................................92
Guest and Authentication-Fail VLANs..................................................................................................................93
Configuring a Guest VLAN................................................................................................................................93
Configuring an Authentication-Fail VLAN.....................................................................................................93
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).................................95
Optimizing CAM Utilization During the Attachment of ACLs to VLANs....................................................... 95
Guidelines for Configuring ACL VLAN Groups.................................................................................................. 96
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters....................................96
Configuring ACL VLAN Groups....................................................................................................................... 96
Configuring FP Blocks for VLAN Parameters................................................................................................97
Viewing CAM Usage.................................................................................................................................................98
Allocating FP Blocks for VLAN Processes........................................................................................................... 99
7 Access Control Lists (ACLs)............................................................................................................................... 100
IP Access Control Lists (ACLs)..............................................................................................................................101
CAM Usage.........................................................................................................................................................102
Implementing ACLs on Dell Networking OS.............................................................................................. 102
Important Points to Remember.......................................................................................................................... 104
Configuration Task List for Route Maps...................................................................................................... 104
Configuring Match Routes............................................................................................................................. 106
Configuring Set Conditions............................................................................................................................107
Configure a Route Map for Route Redistribution......................................................................................108
Configure a Route Map for Route Tagging.................................................................................................109
Continue Clause............................................................................................................................................... 109
IP Fragment Handling............................................................................................................................................109
IP Fragments ACL Examples...........................................................................................................................110
Layer 4 ACL Rules Examples...........................................................................................................................110
Configure a Standard IP ACL................................................................................................................................ 111
Contents
5