Setup Guide

Table Of Contents
Enabling 802.1X....................................................................................................................................................................79
Configuring dot1x Profile ................................................................................................................................................... 80
Configuring the Static MAB and MAB Profile .................................................................................................................81
Configuring Critical VLAN ................................................................................................................................................. 82
Configuring MAC addresses for a do1x Profile................................................................................................................82
Configuring Request Identity Re-Transmissions............................................................................................................. 83
Configuring a Quiet Period after a Failed Authentication.........................................................................................83
Forcibly Authorizing or Unauthorizing a Port...................................................................................................................84
Re-Authenticating a Port................................................................................................................................................... 84
Configuring Timeouts..........................................................................................................................................................85
Configuring Dynamic VLAN Assignment with Port Authentication..............................................................................86
Guest and Authentication-Fail VLANs.............................................................................................................................. 87
Configuring a Guest VLAN........................................................................................................................................... 88
Configuring an Authentication-Fail VLAN.................................................................................................................. 88
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)..........................90
Optimizing CAM Utilization During the Attachment of ACLs to VLANs......................................................................90
Guidelines for Configuring ACL VLAN Groups................................................................................................................ 90
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters....................................................91
Configuring ACL VLAN Groups.................................................................................................................................... 91
Configuring FP Blocks for VLAN Parameters............................................................................................................92
Viewing CAM Usage........................................................................................................................................................... 92
Allocating FP Blocks for VLAN Processes....................................................................................................................... 93
ACL Optimization to Increase Number of Supported IPv4 ACLs................................................................................. 94
Optimizing ACL for More Number of IPv4 ACL Rules..............................................................................................94
7 Access Control Lists (ACLs)........................................................................................................96
IP Access Control Lists (ACLs)......................................................................................................................................... 97
CAM Usage.................................................................................................................................................................... 97
Implementing ACLs on Dell EMC Networking OS.....................................................................................................98
Configure ACL Range Profiles...........................................................................................................................................99
Important Points to Remember....................................................................................................................................... 100
Configuration Task List for Route Maps...................................................................................................................100
Configuring Match Routes..........................................................................................................................................102
Configuring Set Conditions.........................................................................................................................................103
Configure a Route Map for Route Redistribution.................................................................................................... 104
Configure a Route Map for Route Tagging.............................................................................................................. 105
Continue Clause........................................................................................................................................................... 105
IP Fragment Handling........................................................................................................................................................105
IP Fragments ACL Examples...................................................................................................................................... 106
Layer 4 ACL Rules Examples...................................................................................................................................... 106
Configure a Standard IP ACL........................................................................................................................................... 107
Configuring a Standard IP ACL Filter........................................................................................................................ 108
Configure an Extended IP ACL........................................................................................................................................ 108
Configuring Filters with a Sequence Number...........................................................................................................108
Configuring Filters Without a Sequence Number......................................................................................................111
Configure Layer 2 and Layer 3 ACLs................................................................................................................................ 111
Assign an IP ACL to an Interface......................................................................................................................................112
Applying an IP ACL............................................................................................................................................................. 112
Contents
5