Install Guide

Table Of Contents
Configuring Timeouts....................................................................................................................................................... 78
Configuring Dynamic VLAN Assignment with Port Authentication.......................................................................79
Guest and Authentication-Fail VLANs......................................................................................................................... 80
Configuring a Guest VLAN........................................................................................................................................80
Configuring an Authentication-Fail VLAN............................................................................................................. 80
Chapter 6: Access Control Lists (ACLs)....................................................................................... 81
IP Access Control Lists (ACLs)..................................................................................................................................... 82
CAM Usage................................................................................................................................................................... 82
Implementing ACLs on Dell EMC Networking OS............................................................................................... 83
Important Points to Remember..................................................................................................................................... 84
Configuration Task List for Route Maps................................................................................................................84
Configuring Match Routes........................................................................................................................................ 86
Configuring Set Conditions....................................................................................................................................... 87
Configure a Route Map for Route Redistribution................................................................................................88
Configure a Route Map for Route Tagging...........................................................................................................88
Continue Clause...........................................................................................................................................................88
IP Fragment Handling.......................................................................................................................................................89
IP Fragments ACL Examples.................................................................................................................................... 89
Layer 4 ACL Rules Examples.................................................................................................................................... 89
Configure a Standard IP ACL......................................................................................................................................... 90
Configuring a Standard IP ACL Filter...................................................................................................................... 91
Configure an Extended IP ACL...................................................................................................................................... 92
Configuring Filters with a Sequence Number.......................................................................................................92
Configuring Filters Without a Sequence Number................................................................................................93
Configure Layer 2 and Layer 3 ACLs............................................................................................................................93
Assign an IP ACL to an Interface.................................................................................................................................. 94
Applying an IP ACL............................................................................................................................................................94
Counting ACL Hits...................................................................................................................................................... 95
Configure Ingress ACLs................................................................................................................................................... 95
Configure Egress ACLs....................................................................................................................................................95
Applying Egress Layer 3 ACLs (Control-Plane)................................................................................................... 95
IP Prefix Lists..................................................................................................................................................................... 96
Configuration Task List for Prefix Lists................................................................................................................. 96
ACL Remarks......................................................................................................................................................................99
Configuring a Remark............................................................................................................................................... 100
Deleting a Remark..................................................................................................................................................... 100
ACL Resequencing........................................................................................................................................................... 101
Resequencing an ACL or Prefix List...................................................................................................................... 101
Route Maps.......................................................................................................................................................................102
Flow-Based Monitoring.................................................................................................................................................. 102
Enabling Flow-Based Monitoring........................................................................................................................... 104
Configuring IP Mirror Access Group........................................................................................................................... 104
Sample Configuration............................................................................................................................................... 105
Example of viewing IP mirroraccessgroup applied to an Interface.......................................................... 105
Chapter 7: Bidirectional Forwarding Detection (BFD)................................................................ 106
How BFD Works...............................................................................................................................................................106
BFD Packet Format................................................................................................................................................... 107
Contents
5