White Papers

Table Of Contents
Enabling 802.1X..................................................................................................................................................................88
Configuring dot1x Profile ................................................................................................................................................89
Configuring MAC addresses for a do1x Profile.......................................................................................................... 89
Configuring the Static MAB and MAB Profile ...........................................................................................................90
Configuring Critical VLAN ...............................................................................................................................................91
Configuring Request Identity Re-Transmissions........................................................................................................ 91
Configuring a Quiet Period after a Failed Authentication..................................................................................92
Forcibly Authorizing or Unauthorizing a Port............................................................................................................. 93
Re-Authenticating a Port................................................................................................................................................ 93
Configuring Timeouts....................................................................................................................................................... 94
Configuring Dynamic VLAN Assignment with Port Authentication...................................................................... 95
Guest and Authentication-Fail VLANs......................................................................................................................... 96
Configuring a Guest VLAN........................................................................................................................................ 97
Configuring an Authentication-Fail VLAN..............................................................................................................97
Chapter 6: Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).... 99
Optimizing CAM Utilization During the Attachment of ACLs to VLANs............................................................. 99
Guidelines for Configuring ACL VLAN Groups......................................................................................................... 100
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters........................................ 100
Configuring ACL VLAN Groups.............................................................................................................................. 100
Configuring FP Blocks for VLAN Parameters......................................................................................................101
Viewing CAM Usage....................................................................................................................................................... 102
Allocating FP Blocks for VLAN Processes.................................................................................................................103
Unified Forwarding Table (UFT) Modes.................................................................................................................... 104
Configuring UFT Modes........................................................................................................................................... 104
Chapter 7: Access Control Lists (ACLs)..................................................................................... 105
IP Access Control Lists (ACLs)....................................................................................................................................106
CAM Usage................................................................................................................................................................. 106
Implementing ACLs on Dell EMC Networking OS..............................................................................................107
Important Points to Remember....................................................................................................................................108
Configuration Task List for Route Maps..............................................................................................................109
Configuring Match Routes........................................................................................................................................ 111
Configuring Set Conditions...................................................................................................................................... 112
Configure a Route Map for Route Redistribution............................................................................................... 112
Configure a Route Map for Route Tagging.......................................................................................................... 113
Continue Clause.......................................................................................................................................................... 113
IP Fragment Handling...................................................................................................................................................... 114
IP Fragments ACL Examples....................................................................................................................................114
Layer 4 ACL Rules Examples....................................................................................................................................114
Configure a Standard IP ACL........................................................................................................................................ 115
Configuring a Standard IP ACL Filter.................................................................................................................... 116
Configure an Extended IP ACL......................................................................................................................................117
Configuring Filters with a Sequence Number...................................................................................................... 117
Configuring Filters Without a Sequence Number............................................................................................... 118
Configure Layer 2 and Layer 3 ACLs...........................................................................................................................118
Assign an IP ACL to an Interface..................................................................................................................................119
Applying an IP ACL...........................................................................................................................................................119
Counting ACL Hits.....................................................................................................................................................120
Contents
5