Connectivity Guide

Table Of Contents
Enabling 802.1X..................................................................................................................................................................84
Configuring Request Identity Re-Transmissions....................................................................................................... 85
Configuring a Quiet Period after a Failed Authentication..................................................................................86
Forcibly Authorizing or Unauthorizing a Port............................................................................................................. 86
Re-Authenticating a Port................................................................................................................................................ 87
Configuring Timeouts....................................................................................................................................................... 88
Configuring Dynamic VLAN Assignment with Port Authentication...................................................................... 89
Guest and Authentication-Fail VLANs......................................................................................................................... 90
Configuring a Guest VLAN........................................................................................................................................90
Configuring an Authentication-Fail VLAN............................................................................................................. 90
Chapter 6: Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).... 92
Optimizing CAM Utilization During the Attachment of ACLs to VLANs..............................................................92
Guidelines for Configuring ACL VLAN Groups........................................................................................................... 93
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters.......................................... 93
Configuring ACL VLAN Groups................................................................................................................................ 93
Configuring FP Blocks for VLAN Parameters.......................................................................................................94
Viewing CAM Usage......................................................................................................................................................... 95
Allocating FP Blocks for VLAN Processes.................................................................................................................. 96
Unified Forwarding Table (UFT) Modes...................................................................................................................... 97
Configuring UFT Modes.............................................................................................................................................97
Chapter 7: Access Control Lists (ACLs).......................................................................................98
IP Access Control Lists (ACLs)..................................................................................................................................... 99
CAM Usage................................................................................................................................................................... 99
Implementing ACLs on Dell EMC Networking OS..............................................................................................100
Important Points to Remember.................................................................................................................................... 101
Configuration Task List for Route Maps.............................................................................................................. 102
Configuring Match Routes...................................................................................................................................... 104
Configuring Set Conditions..................................................................................................................................... 105
Configure a Route Map for Route Redistribution.............................................................................................. 105
Configure a Route Map for Route Tagging......................................................................................................... 106
Continue Clause......................................................................................................................................................... 106
IP Fragment Handling..................................................................................................................................................... 107
IP Fragments ACL Examples................................................................................................................................... 107
Layer 4 ACL Rules Examples...................................................................................................................................107
Configure a Standard IP ACL........................................................................................................................................108
Configuring a Standard IP ACL Filter....................................................................................................................109
Configure an Extended IP ACL..................................................................................................................................... 110
Configuring Filters with a Sequence Number......................................................................................................110
Configuring Filters Without a Sequence Number................................................................................................111
Configure Layer 2 and Layer 3 ACLs............................................................................................................................111
Assign an IP ACL to an Interface..................................................................................................................................112
Applying an IP ACL...........................................................................................................................................................112
Counting ACL Hits......................................................................................................................................................113
Configure Ingress ACLs.................................................................................................................................................. 113
Configure Egress ACLs................................................................................................................................................... 114
Applying Egress Layer 3 ACLs (Control-Plane).................................................................................................. 114
IP Prefix Lists.................................................................................................................................................................... 115
Contents
5