Install Guide

Table Of Contents
Enabling 802.1X................................................................................................................................................................. 86
Configuring dot1x Profile ................................................................................................................................................ 87
Configuring MAC addresses for a do1x Profile...........................................................................................................87
Configuring the Static MAB and MAB Profile ...........................................................................................................88
Configuring Critical VLAN .............................................................................................................................................. 89
Configuring Request Identity Re-Transmissions....................................................................................................... 89
Configuring a Quiet Period after a Failed Authentication..................................................................................90
Forcibly Authorizing or Unauthorizing a Port..............................................................................................................91
Re-Authenticating a Port................................................................................................................................................. 91
Configuring Timeouts....................................................................................................................................................... 92
Configuring Dynamic VLAN Assignment with Port Authentication...................................................................... 93
Guest and Authentication-Fail VLANs......................................................................................................................... 94
Configuring a Guest VLAN........................................................................................................................................95
Configuring an Authentication-Fail VLAN............................................................................................................. 95
Chapter 6: Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).... 97
Optimizing CAM Utilization During the Attachment of ACLs to VLANs..............................................................97
Guidelines for Configuring ACL VLAN Groups........................................................................................................... 98
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters.......................................... 98
Configuring ACL VLAN Groups................................................................................................................................98
Configuring FP Blocks for VLAN Parameters.......................................................................................................99
Viewing CAM Usage....................................................................................................................................................... 100
Allocating FP Blocks for VLAN Processes................................................................................................................. 101
Chapter 7: Access Control Lists (ACLs)..................................................................................... 103
IP Access Control Lists (ACLs)....................................................................................................................................104
CAM Usage................................................................................................................................................................. 104
Implementing ACLs on Dell EMC Networking OS..............................................................................................105
Important Points to Remember....................................................................................................................................106
Configuration Task List for Route Maps.............................................................................................................. 107
Configuring Match Routes...................................................................................................................................... 109
Configuring Set Conditions...................................................................................................................................... 110
Configure a Route Map for Route Redistribution...............................................................................................110
Configure a Route Map for Route Tagging...........................................................................................................111
Continue Clause...........................................................................................................................................................111
IP Fragment Handling...................................................................................................................................................... 112
IP Fragments ACL Examples....................................................................................................................................112
Layer 4 ACL Rules Examples....................................................................................................................................112
Configure a Standard IP ACL........................................................................................................................................ 113
Configuring a Standard IP ACL Filter.....................................................................................................................114
Configure an Extended IP ACL..................................................................................................................................... 115
Configuring Filters with a Sequence Number......................................................................................................115
Configuring Filters Without a Sequence Number............................................................................................... 117
Configure Layer 2 and Layer 3 ACLs...........................................................................................................................118
Assign an IP ACL to an Interface..................................................................................................................................118
Applying an IP ACL...........................................................................................................................................................119
Counting ACL Hits......................................................................................................................................................119
Configure Ingress ACLs..................................................................................................................................................120
Configure Egress ACLs.................................................................................................................................................. 120
Contents
5