White Papers

Table Of Contents
Enabling User Lockout for Failed Login Attempts...............................................................................................85
Chapter 5: 802.1X....................................................................................................................... 86
Port-Authentication Process..........................................................................................................................................87
EAP over RADIUS........................................................................................................................................................88
Configuring 802.1X............................................................................................................................................................89
Important Points to Remember..................................................................................................................................... 89
Enabling 802.1X................................................................................................................................................................. 90
Configuring MAC addresses for a do1x Profile........................................................................................................... 91
Configuring Request Identity Re-Transmissions........................................................................................................92
Configuring a Quiet Period after a Failed Authentication..................................................................................92
Forcibly Authorizing or Unauthorizing a Port............................................................................................................. 93
Re-Authenticating a Port................................................................................................................................................ 93
Configuring Timeouts....................................................................................................................................................... 94
Configuring Dynamic VLAN Assignment with Port Authentication...................................................................... 95
Guest and Authentication-Fail VLANs......................................................................................................................... 96
Configuring a Guest VLAN........................................................................................................................................ 97
Configuring an Authentication-Fail VLAN..............................................................................................................97
Configuring dot1x Profile ................................................................................................................................................98
Configuring the Static MAB and MAB Profile ...........................................................................................................98
Configuring Critical VLAN .............................................................................................................................................. 99
Chapter 6: Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)... 101
Optimizing CAM Utilization During the Attachment of ACLs to VLANs.............................................................101
Guidelines for Configuring ACL VLAN Groups......................................................................................................... 102
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters........................................ 102
Configuring ACL VLAN Groups.............................................................................................................................. 102
Configuring FP Blocks for VLAN Parameters..................................................................................................... 103
Viewing CAM Usage....................................................................................................................................................... 104
Allocating FP Blocks for VLAN Processes.................................................................................................................105
Chapter 7: Access Control Lists (ACLs)..................................................................................... 107
IP Access Control Lists (ACLs)....................................................................................................................................108
CAM Usage................................................................................................................................................................. 108
Implementing ACLs on Dell EMC Networking OS..............................................................................................109
Important Points to Remember.................................................................................................................................... 110
Configuration Task List for Route Maps................................................................................................................111
Configuring Match Routes....................................................................................................................................... 113
Configuring Set Conditions...................................................................................................................................... 114
Configure a Route Map for Route Redistribution............................................................................................... 114
Configure a Route Map for Route Tagging..........................................................................................................115
Continue Clause.......................................................................................................................................................... 115
IP Fragment Handling...................................................................................................................................................... 116
IP Fragments ACL Examples....................................................................................................................................116
Layer 4 ACL Rules Examples................................................................................................................................... 116
Configure a Standard IP ACL.........................................................................................................................................117
Configuring a Standard IP ACL Filter.....................................................................................................................118
Configure an Extended IP ACL..................................................................................................................................... 119
Configuring Filters with a Sequence Number......................................................................................................119
Contents
5