Deployment Guide

Table Of Contents
Configuring dot1x Profile ................................................................................................................................................ 87
Configuring MAC addresses for a do1x Profile...........................................................................................................87
Configuring the Static MAB and MAB Profile ...........................................................................................................88
Configuring Critical VLAN .............................................................................................................................................. 89
Configuring Request Identity Re-Transmissions....................................................................................................... 89
Configuring a Quiet Period after a Failed Authentication..................................................................................90
Configuring a Quiet Period after a Failed Authentication........................................................................................ 91
Forcibly Authorizing or Unauthorizing a Port..............................................................................................................91
Re-Authenticating a Port................................................................................................................................................ 92
Configuring Dynamic VLAN Assignment with Port Authentication...................................................................... 93
Guest and Authentication-Fail VLANs......................................................................................................................... 94
Configuring a Guest VLAN........................................................................................................................................95
Configuring an Authentication-Fail VLAN............................................................................................................. 95
Configuring Timeouts................................................................................................................................................. 96
Multi-Host Authentication...............................................................................................................................................97
Multi-Supplicant Authentication....................................................................................................................................99
MAC Authentication Bypass.......................................................................................................................................... 101
MAB in Single-host and Multi-Host Mode............................................................................................................101
MAB in Multi-Supplicant Authentication Mode...................................................................................................101
Configuring MAC Authentication Bypass............................................................................................................. 101
Dynamic CoS with 802.1X............................................................................................................................................. 102
Chapter 6: Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)...104
Optimizing CAM Utilization During the Attachment of ACLs to VLANs............................................................104
Guidelines for Configuring ACL VLAN Groups......................................................................................................... 105
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters........................................ 105
Configuring ACL VLAN Groups.............................................................................................................................. 105
Configuring FP Blocks for VLAN Parameters.....................................................................................................106
Viewing CAM Usage........................................................................................................................................................107
Allocating FP Blocks for VLAN Processes.................................................................................................................108
ACL Optimization to Increase Number of Supported IPv4 ACLs........................................................................ 109
Optimizing ACL for More Number of IPv4 ACL Rules......................................................................................109
Chapter 7: Access Control Lists (ACLs)......................................................................................110
IP Access Control Lists (ACLs)..................................................................................................................................... 111
CAM Usage................................................................................................................................................................... 111
Implementing ACLs on Dell EMC Networking OS...............................................................................................112
Configure ACL Range Profiles.................................................................................................................................113
Important Points to Remember.....................................................................................................................................114
Configuration Task List for Route Maps...............................................................................................................114
Configuring Match Routes....................................................................................................................................... 116
Configuring Set Conditions...................................................................................................................................... 117
Configure a Route Map for Route Redistribution...............................................................................................118
Configure a Route Map for Route Tagging..........................................................................................................119
Continue Clause.......................................................................................................................................................... 119
IP Fragment Handling...................................................................................................................................................... 119
IP Fragments ACL Examples...................................................................................................................................120
Layer 4 ACL Rules Examples...................................................................................................................................120
Configure a Standard IP ACL........................................................................................................................................ 121
Contents
5