Deployment Guide

Table Of Contents
The Port-Authentication Process................................................................................................................................. 83
EAP over RADIUS........................................................................................................................................................84
Configuring 802.1X............................................................................................................................................................84
Important Points to Remember..................................................................................................................................... 84
Enabling 802.1X................................................................................................................................................................. 85
Configuring dot1x Profile ................................................................................................................................................ 87
Configuring MAC addresses for a do1x Profile...........................................................................................................87
Configuring the Static MAB and MAB Profile ...........................................................................................................88
Configuring Critical VLAN .............................................................................................................................................. 89
Configuring Request Identity Re-Transmissions....................................................................................................... 89
Configuring a Quiet Period after a Failed Authentication....................................................................................... 90
Forcibly Authorizing or Unauthorizing a Port..............................................................................................................91
Re-Authenticating a Port................................................................................................................................................. 91
Configuring Dynamic VLAN Assignment with Port Authentication...................................................................... 92
Guest and Authentication-Fail VLANs......................................................................................................................... 93
Configuring a Guest VLAN........................................................................................................................................ 94
Configuring an Authentication-Fail VLAN............................................................................................................. 94
Configuring Timeouts................................................................................................................................................. 96
Multi-Host Authentication.............................................................................................................................................. 96
Multi-Supplicant Authentication....................................................................................................................................99
MAC Authentication Bypass......................................................................................................................................... 100
MAB in Single-host and Multi-Host Mode...........................................................................................................100
MAB in Multi-Supplicant Authentication Mode...................................................................................................101
Configuring MAC Authentication Bypass............................................................................................................. 101
Dynamic CoS with 802.1X............................................................................................................................................. 102
Chapter 6: Access Control Lists (ACLs)..................................................................................... 104
IP Access Control Lists (ACLs)....................................................................................................................................104
CAM Usage................................................................................................................................................................. 105
User-Configurable CAM Allocation........................................................................................................................106
Allocating CAM for Ingress ACLs on the Port Extender.................................................................................. 106
Allocating CAM for Egress ACLs on the Port Extender................................................................................... 107
Implementing ACLs on Dell EMC Networking OS..............................................................................................108
ACL Optimization to Increase Number of Supported IPv4 ACLs........................................................................ 109
Optimizing ACL for More Number of IPv4 ACL Rules.......................................................................................110
IP Fragment Handling......................................................................................................................................................110
IP Fragments ACL Examples.................................................................................................................................... 111
Layer 4 ACL Rules Examples.................................................................................................................................... 111
Configure a Standard IP ACL........................................................................................................................................ 112
Configuring a Standard IP ACL Filter.....................................................................................................................113
Configure an Extended IP ACL..................................................................................................................................... 113
Configuring Filters with a Sequence Number...................................................................................................... 114
Configuring Filters Without a Sequence Number............................................................................................... 115
Configure Layer 2 and Layer 3 ACLs...........................................................................................................................115
Using ACL VLAN Groups................................................................................................................................................ 116
Guidelines for Configuring ACL VLAN Groups.................................................................................................... 116
Configuring an ACL VLAN Group............................................................................................................................117
Allocating ACL VLAN CAM.......................................................................................................................................117
Applying an IP ACL...........................................................................................................................................................118
Applying Ingress ACLs on the Port Extender...................................................................................................... 118
Contents
5