White Papers

Table Of Contents
Recovering from a Failed Start...................................................................................................................................... 78
Viewing the Reason for Last System Reboot.............................................................................................................79
Chapter 5: 802.1X....................................................................................................................... 80
The Port-Authentication Process.................................................................................................................................. 81
EAP over RADIUS..............................................................................................................................................................82
Configuring 802.1X............................................................................................................................................................83
Important Points to Remember................................................................................................................................83
Enabling 802.1X..................................................................................................................................................................84
Configuring MAC addresses for a do1x Profile.......................................................................................................... 85
Configuring Request Identity Re-Transmissions....................................................................................................... 86
Configuring a Quiet Period after a Failed Authentication....................................................................................... 86
Forcibly Authorizing or Unauthorizing a Port............................................................................................................. 87
Re-Authenticating a Port................................................................................................................................................ 88
Configuring Timeouts....................................................................................................................................................... 88
Configuring Dynamic VLAN Assignment with Port Authentication...................................................................... 89
Guest and Authentication-Fail VLANs......................................................................................................................... 90
Configuring a Guest VLAN.........................................................................................................................................91
Configuring an Authentication-Fail VLAN.............................................................................................................. 91
Configuring dot1x Profile ................................................................................................................................................92
Configuring the Static MAB and MAB Profile ...........................................................................................................92
Configuring Critical VLAN .............................................................................................................................................. 93
Chapter 6: Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).... 95
Optimizing CAM Utilization During the Attachment of ACLs to VLANs............................................................. 95
Guidelines for Configuring ACL VLAN Groups...........................................................................................................96
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters.......................................... 96
Configuring ACL VLAN Groups................................................................................................................................96
Configuring FP Blocks for VLAN Parameters.......................................................................................................97
Viewing CAM Usage......................................................................................................................................................... 98
Allocating FP Blocks for VLAN Processes.................................................................................................................. 99
Chapter 7: Access Control Lists (ACLs)......................................................................................101
IP Access Control Lists (ACLs).................................................................................................................................... 101
CAM Allocation and CAM Optimization..................................................................................................................... 102
User Configurable CAM Allocation........................................................................................................................ 102
CAM Optimization..................................................................................................................................................... 102
Test CAM Usage........................................................................................................................................................103
View CAM-ACL Settings..........................................................................................................................................103
View CAM Usage....................................................................................................................................................... 105
QoS CAM Region Limitation................................................................................................................................... 105
Implementing ACLs on Dell Networking OS..............................................................................................................105
ACLs and VLANs........................................................................................................................................................106
ACL Optimization.......................................................................................................................................................106
Determine the Order in which ACLs are Used to Classify Traffic................................................................. 106
IP Fragment Handling..................................................................................................................................................... 107
IP Fragments ACL Examples................................................................................................................................... 107
Layer 4 ACL Rules Examples...................................................................................................................................107
Configure a Standard IP ACL........................................................................................................................................108
Contents
5