Connectivity Guide

Table Of Contents
Enabling 802.1X..................................................................................................................................................................82
Configuring dot1x Profile ................................................................................................................................................83
Configuring MAC addresses for a do1x Profile.......................................................................................................... 83
Configuring the Static MAB and MAB Profile ...........................................................................................................84
Configuring Critical VLAN .............................................................................................................................................. 85
Configuring Request Identity Re-Transmissions....................................................................................................... 85
Configuring a Quiet Period after a Failed Authentication..................................................................................86
Forcibly Authorizing or Unauthorizing a Port............................................................................................................. 87
Re-Authenticating a Port................................................................................................................................................ 87
Configuring Timeouts....................................................................................................................................................... 88
Configuring Dynamic VLAN Assignment with Port Authentication...................................................................... 89
Guest and Authentication-Fail VLANs......................................................................................................................... 90
Configuring a Guest VLAN.........................................................................................................................................91
Configuring an Authentication-Fail VLAN.............................................................................................................. 91
Chapter 6: Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).... 93
Optimizing CAM Utilization During the Attachment of ACLs to VLANs..............................................................93
Guidelines for Configuring ACL VLAN Groups........................................................................................................... 94
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters.......................................... 94
Configuring ACL VLAN Groups................................................................................................................................ 94
Configuring FP Blocks for VLAN Parameters.......................................................................................................95
Viewing CAM Usage......................................................................................................................................................... 96
Allocating FP Blocks for VLAN Processes.................................................................................................................. 97
Chapter 7: Access Control Lists (ACLs).......................................................................................99
IP Access Control Lists (ACLs)....................................................................................................................................100
CAM Usage................................................................................................................................................................. 100
Implementing ACLs on Dell EMC Networking OS.............................................................................................. 101
Important Points to Remember....................................................................................................................................102
Configuration Task List for Route Maps.............................................................................................................. 103
Configuring Match Routes...................................................................................................................................... 105
Configuring Set Conditions..................................................................................................................................... 106
Configure a Route Map for Route Redistribution.............................................................................................. 106
Configure a Route Map for Route Tagging......................................................................................................... 107
Continue Clause......................................................................................................................................................... 107
IP Fragment Handling..................................................................................................................................................... 108
IP Fragments ACL Examples...................................................................................................................................108
Layer 4 ACL Rules Examples...................................................................................................................................108
Configure a Standard IP ACL....................................................................................................................................... 109
Configuring a Standard IP ACL Filter.................................................................................................................... 110
Configure an Extended IP ACL...................................................................................................................................... 111
Configuring Filters with a Sequence Number.......................................................................................................111
Configuring Filters Without a Sequence Number............................................................................................... 113
Configure Layer 2 and Layer 3 ACLs........................................................................................................................... 114
Assign an IP ACL to an Interface..................................................................................................................................114
Applying an IP ACL...........................................................................................................................................................115
Counting ACL Hits......................................................................................................................................................115
Configure Ingress ACLs.................................................................................................................................................. 116
Configure Egress ACLs................................................................................................................................................... 116
Contents
5