White Papers

Table Of Contents
Chapter 5: 802.1X........................................................................................................................84
Port-Authentication Process..........................................................................................................................................85
EAP over RADIUS........................................................................................................................................................86
Configuring 802.1X............................................................................................................................................................87
Important Points to Remember......................................................................................................................................87
Enabling 802.1X..................................................................................................................................................................88
Configuring MAC addresses for a do1x Profile.......................................................................................................... 89
Configuring Request Identity Re-Transmissions....................................................................................................... 90
Configuring a Quiet Period after a Failed Authentication..................................................................................90
Forcibly Authorizing or Unauthorizing a Port..............................................................................................................91
Re-Authenticating a Port................................................................................................................................................. 91
Configuring Timeouts....................................................................................................................................................... 92
Configuring Dynamic VLAN Assignment with Port Authentication...................................................................... 93
Guest and Authentication-Fail VLANs......................................................................................................................... 94
Configuring a Guest VLAN........................................................................................................................................95
Configuring an Authentication-Fail VLAN............................................................................................................. 95
Configuring dot1x Profile ................................................................................................................................................96
Configuring the Static MAB and MAB Profile ...........................................................................................................96
Configuring Critical VLAN .............................................................................................................................................. 97
Chapter 6: Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).... 99
Optimizing CAM Utilization During the Attachment of ACLs to VLANs............................................................. 99
Guidelines for Configuring ACL VLAN Groups......................................................................................................... 100
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters........................................ 100
Configuring ACL VLAN Groups.............................................................................................................................. 100
Configuring FP Blocks for VLAN Parameters......................................................................................................101
Viewing CAM Usage....................................................................................................................................................... 102
Allocating FP Blocks for VLAN Processes.................................................................................................................103
Chapter 7: Access Control Lists (ACLs)..................................................................................... 105
IP Access Control Lists (ACLs)....................................................................................................................................106
CAM Usage................................................................................................................................................................. 106
Implementing ACLs on Dell EMC Networking OS..............................................................................................107
IP Fragment Handling..................................................................................................................................................... 108
IP Fragments ACL Examples...................................................................................................................................109
Layer 4 ACL Rules Examples...................................................................................................................................109
Configure a Standard IP ACL........................................................................................................................................ 110
Configuring a Standard IP ACL Filter..................................................................................................................... 111
Configure an Extended IP ACL...................................................................................................................................... 111
Configuring Filters with a Sequence Number.......................................................................................................111
Configuring Filters Without a Sequence Number............................................................................................... 112
Configure Layer 2 and Layer 3 ACLs........................................................................................................................... 113
Assign an IP ACL to an Interface..................................................................................................................................114
Applying an IP ACL...........................................................................................................................................................114
Counting ACL Hits......................................................................................................................................................114
Configure Ingress ACLs.................................................................................................................................................. 115
Configure Egress ACLs................................................................................................................................................... 115
Applying Egress Layer 3 ACLs (Control-Plane).................................................................................................. 116
Contents
5