Setup Guide

Table Of Contents
Configuring MAC addresses for a do1x Profile.......................................................................................................... 80
Configuring the Static MAB and MAB Profile ........................................................................................................... 81
Configuring Critical VLAN .............................................................................................................................................. 82
Enabling 802.1X..................................................................................................................................................................83
Configuring Request Identity Re-Transmissions........................................................................................................84
Configuring a Quiet Period after a Failed Authentication..................................................................................85
Forcibly Authorizing or Unauthorizing a Port............................................................................................................. 85
Re-Authenticating a Port................................................................................................................................................ 86
Configuring Timeouts....................................................................................................................................................... 87
Configuring Dynamic VLAN Assignment with Port Authentication...................................................................... 88
Guest and Authentication-Fail VLANs......................................................................................................................... 89
Configuring a Guest VLAN........................................................................................................................................ 89
Configuring an Authentication-Fail VLAN............................................................................................................. 89
Chapter 6: Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).... 91
Optimizing CAM Utilization During the Attachment of ACLs to VLANs.............................................................. 91
Guidelines for Configuring ACL VLAN Groups........................................................................................................... 92
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters.......................................... 92
Configuring ACL VLAN Groups................................................................................................................................ 92
Configuring FP Blocks for VLAN Parameters.......................................................................................................93
Viewing CAM Usage......................................................................................................................................................... 94
Allocating FP Blocks for VLAN Processes.................................................................................................................. 95
Chapter 7: Access Control Lists (ACLs).......................................................................................96
IP Access Control Lists (ACLs)......................................................................................................................................97
CAM Usage................................................................................................................................................................... 97
Implementing ACLs on Dell EMC Networking OS............................................................................................... 98
Important Points to Remember..................................................................................................................................... 99
Configuration Task List for Route Maps..............................................................................................................100
Configuring Match Routes...................................................................................................................................... 102
Configuring Set Conditions..................................................................................................................................... 103
Configure a Route Map for Route Redistribution.............................................................................................. 103
Configure a Route Map for Route Tagging......................................................................................................... 104
Continue Clause......................................................................................................................................................... 104
IP Fragment Handling..................................................................................................................................................... 105
IP Fragments ACL Examples...................................................................................................................................105
Layer 4 ACL Rules Examples...................................................................................................................................105
Configure a Standard IP ACL....................................................................................................................................... 106
Configuring a Standard IP ACL Filter....................................................................................................................107
Configure an Extended IP ACL.....................................................................................................................................108
Configuring Filters with a Sequence Number..................................................................................................... 108
Configuring Filters Without a Sequence Number.............................................................................................. 109
Configure Layer 2 and Layer 3 ACLs.......................................................................................................................... 109
Assign an IP ACL to an Interface..................................................................................................................................110
Applying an IP ACL...........................................................................................................................................................110
Counting ACL Hits.......................................................................................................................................................111
Configure Ingress ACLs................................................................................................................................................... 111
Configure Egress ACLs................................................................................................................................................... 112
Applying Egress Layer 3 ACLs (Control-Plane).................................................................................................. 112
Contents
5