Deployment Guide

Table Of Contents
Configuring Timeouts....................................................................................................................................................... 88
Configuring Dynamic VLAN Assignment with Port Authentication...................................................................... 89
Guest and Authentication-Fail VLANs......................................................................................................................... 90
Configuring a Guest VLAN........................................................................................................................................90
Configuring an Authentication-Fail VLAN............................................................................................................. 90
Chapter 6: Access Control Lists (ACLs)...................................................................................... 92
IP Access Control Lists (ACLs)..................................................................................................................................... 93
CAM Usage................................................................................................................................................................... 93
Implementing ACLs on Dell EMC Networking OS............................................................................................... 94
Important Points to Remember..................................................................................................................................... 95
Configuration Task List for Route Maps................................................................................................................96
Configuring Match Routes........................................................................................................................................ 98
Configuring Set Conditions.......................................................................................................................................99
Configure a Route Map for Route Redistribution................................................................................................99
Configure a Route Map for Route Tagging......................................................................................................... 100
Continue Clause......................................................................................................................................................... 100
IP Fragment Handling......................................................................................................................................................101
IP Fragments ACL Examples....................................................................................................................................101
Layer 4 ACL Rules Examples................................................................................................................................... 101
Configure a Standard IP ACL........................................................................................................................................102
Configuring a Standard IP ACL Filter....................................................................................................................103
Configure an Extended IP ACL.....................................................................................................................................104
Configuring Filters with a Sequence Number..................................................................................................... 104
Configuring Filters Without a Sequence Number.............................................................................................. 105
Configure Layer 2 and Layer 3 ACLs.......................................................................................................................... 106
Assign an IP ACL to an Interface.................................................................................................................................106
Applying an IP ACL..........................................................................................................................................................106
Counting ACL Hits..................................................................................................................................................... 107
Configure Ingress ACLs..................................................................................................................................................107
Configure Egress ACLs.................................................................................................................................................. 108
Applying Egress Layer 3 ACLs (Control-Plane)................................................................................................. 109
IP Prefix Lists................................................................................................................................................................... 109
Configuration Task List for Prefix Lists................................................................................................................ 110
ACL Remarks..................................................................................................................................................................... 113
Configuring a Remark................................................................................................................................................ 113
Deleting a Remark...................................................................................................................................................... 113
ACL Resequencing........................................................................................................................................................... 114
Resequencing an ACL or Prefix List.......................................................................................................................114
Route Maps........................................................................................................................................................................115
Flow-Based Monitoring...................................................................................................................................................116
Enabling Flow-Based Monitoring............................................................................................................................ 117
Configuring IP Mirror Access Group............................................................................................................................118
Sample Configuration................................................................................................................................................ 119
Example of viewing IP mirroraccessgroup applied to an Interface........................................................... 119
Chapter 7: Bidirectional Forwarding Detection (BFD).................................................................120
How BFD Works...............................................................................................................................................................120
BFD Packet Format....................................................................................................................................................121
Contents
5