Users Guide
Create Maintenance Points................................................................................................................................................73
Creating a Maintenance End Point..............................................................................................................................74
Creating a Maintenance Intermediate Point...............................................................................................................74
Displaying the MP Databases.......................................................................................................................................75
Continuity Check Messages...............................................................................................................................................75
Enabling CCM.................................................................................................................................................................76
Enabling Cross-Checking..............................................................................................................................................76
Sending Loopback Messages and Responses................................................................................................................. 77
Sending Linktrace Messages and Responses.................................................................................................................. 77
Caching Link Trace........................................................................................................................................................ 77
Enabling CFM SNMP Traps............................................................................................................................................... 78
Displaying Ethernet CFM Statistics.................................................................................................................................. 79
Chapter 6: 802.1X..........................................................................................................................81
Port-Authentication Process............................................................................................................................................. 82
EAP over RADIUS..........................................................................................................................................................83
Configuring 802.1X..............................................................................................................................................................84
Important Points to Remember.........................................................................................................................................84
Enabling 802.1X................................................................................................................................................................... 85
Configuring Request Identity Re-Transmissions............................................................................................................. 86
Configuring a Quiet Period after a Failed Authentication.........................................................................................87
Forcibly Authorizing or Unauthorizing a Port...................................................................................................................87
Re-Authenticating a Port................................................................................................................................................... 88
Configuring Timeouts..........................................................................................................................................................89
Configuring Dynamic VLAN Assignment with Port Authentication..............................................................................90
Guest and Authentication-Fail VLANs...............................................................................................................................91
Configuring a Guest VLAN............................................................................................................................................91
Configuring an Authentication-Fail VLAN................................................................................................................... 91
Chapter 7: Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)............ 93
Optimizing CAM Utilization During the Attachment of ACLs to VLANs......................................................................93
Guidelines for Configuring ACL VLAN Groups................................................................................................................ 94
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters................................................... 94
Configuring ACL VLAN Groups................................................................................................................................... 94
Configuring FP Blocks for VLAN Parameters............................................................................................................95
Viewing CAM Usage........................................................................................................................................................... 95
Allocating FP Blocks for VLAN Processes....................................................................................................................... 97
Chapter 8: Access Control Lists (ACLs).......................................................................................... 98
IP Access Control Lists (ACLs)......................................................................................................................................... 98
CAM Usage.................................................................................................................................................................... 99
Implementing ACLs on Dell Networking OS............................................................................................................. 100
Important Points to Remember........................................................................................................................................ 101
Configuration Task List for Route Maps....................................................................................................................101
Configuring Match Routes..........................................................................................................................................103
Configuring Set Conditions.........................................................................................................................................104
Configure a Route Map for Route Redistribution....................................................................................................105
Configure a Route Map for Route Tagging.............................................................................................................. 105
Continue Clause........................................................................................................................................................... 105
Contents
5