White Papers

Table Of Contents
Configuring Critical VLAN .............................................................................................................................................. 86
Configuring MAC addresses for a do1x Profile...........................................................................................................87
Configuring Request Identity Re-Transmissions........................................................................................................87
Configuring a Quiet Period after a Failed Authentication..................................................................................88
Forcibly Authorizing or Unauthorizing a Port............................................................................................................. 89
Re-Authenticating a Port................................................................................................................................................ 89
Configuring Timeouts....................................................................................................................................................... 90
Configuring Dynamic VLAN Assignment with Port Authentication....................................................................... 91
Guest and Authentication-Fail VLANs......................................................................................................................... 92
Configuring a Guest VLAN........................................................................................................................................ 93
Configuring an Authentication-Fail VLAN............................................................................................................. 93
Chapter 6: Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).... 95
Optimizing CAM Utilization During the Attachment of ACLs to VLANs............................................................. 95
Guidelines for Configuring ACL VLAN Groups...........................................................................................................96
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters.......................................... 96
Configuring ACL VLAN Groups................................................................................................................................96
Configuring FP Blocks for VLAN Parameters.......................................................................................................97
Viewing CAM Usage......................................................................................................................................................... 98
Allocating FP Blocks for VLAN Processes.................................................................................................................100
ACL Optimization to Increase Number of Supported IPv4 ACLs......................................................................... 101
Optimizing ACL for More Number of IPv4 ACL Rules.......................................................................................101
Chapter 7: Access Control Lists (ACLs)..................................................................................... 102
IP Access Control Lists (ACLs)....................................................................................................................................103
CAM Usage................................................................................................................................................................. 103
Implementing ACLs on Dell EMC Networking OS..............................................................................................104
Configure ACL Range Profiles......................................................................................................................................106
Important Points to Remember....................................................................................................................................106
Configuration Task List for Route Maps.............................................................................................................. 107
Configuring Match Routes...................................................................................................................................... 109
Configuring Set Conditions...................................................................................................................................... 110
Configure a Route Map for Route Redistribution................................................................................................111
Configure a Route Map for Route Tagging...........................................................................................................111
Continue Clause...........................................................................................................................................................111
IP Fragment Handling...................................................................................................................................................... 112
IP Fragments ACL Examples....................................................................................................................................112
Layer 4 ACL Rules Examples....................................................................................................................................112
Configure a Standard IP ACL........................................................................................................................................ 113
Configuring a Standard IP ACL Filter.....................................................................................................................114
Configure an Extended IP ACL..................................................................................................................................... 115
Configuring Filters with a Sequence Number......................................................................................................115
Configuring Filters Without a Sequence Number............................................................................................... 118
Configure Layer 2 and Layer 3 ACLs...........................................................................................................................119
Assign an IP ACL to an Interface..................................................................................................................................119
Applying an IP ACL..........................................................................................................................................................120
Counting ACL Hits.....................................................................................................................................................120
Configure Ingress ACLs.................................................................................................................................................. 121
Configure Egress ACLs................................................................................................................................................... 121
Contents
5