Administrator Guide
Enabling 802.1X................................................................................................................................................................... 85
Configuring dot1x Profile ................................................................................................................................................... 86
Configuring MAC addresses for a do1x Profile................................................................................................................ 87
Configuring the Static MAB and MAB Profile ................................................................................................................ 87
Configuring Critical VLAN ................................................................................................................................................. 88
Configuring Request Identity Re-Transmissions............................................................................................................. 89
Configuring a Quiet Period after a Failed Authentication.........................................................................................89
Forcibly Authorizing or Unauthorizing a Port...................................................................................................................90
Re-Authenticating a Port................................................................................................................................................... 90
Configuring Timeouts.......................................................................................................................................................... 91
Configuring Dynamic VLAN Assignment with Port Authentication..............................................................................92
Guest and Authentication-Fail VLANs..............................................................................................................................93
Configuring a Guest VLAN........................................................................................................................................... 94
Configuring an Authentication-Fail VLAN.................................................................................................................. 94
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)..........................96
Optimizing CAM Utilization During the Attachment of ACLs to VLANs......................................................................96
Guidelines for Configuring ACL VLAN Groups................................................................................................................ 96
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters................................................... 97
Configuring ACL VLAN Groups....................................................................................................................................97
Configuring FP Blocks for VLAN Parameters............................................................................................................98
Viewing CAM Usage........................................................................................................................................................... 98
Allocating FP Blocks for VLAN Processes......................................................................................................................100
Unified Forwarding Table (UFT) Modes.........................................................................................................................100
Configuring UFT Modes..............................................................................................................................................100
7 Access Control Lists (ACLs)....................................................................................................... 101
IP Access Control Lists (ACLs)........................................................................................................................................102
CAM Usage...................................................................................................................................................................102
Implementing ACLs on Dell EMC Networking OS................................................................................................... 103
Important Points to Remember....................................................................................................................................... 104
Configuration Task List for Route Maps...................................................................................................................104
Configuring Match Routes..........................................................................................................................................106
Configuring Set Conditions......................................................................................................................................... 107
Configure a Route Map for Route Redistribution....................................................................................................108
Configure a Route Map for Route Tagging.............................................................................................................. 109
Continue Clause........................................................................................................................................................... 109
IP Fragment Handling........................................................................................................................................................109
IP Fragments ACL Examples...................................................................................................................................... 109
Layer 4 ACL Rules Examples.......................................................................................................................................110
Configure a Standard IP ACL.............................................................................................................................................111
Configuring a Standard IP ACL Filter.......................................................................................................................... 111
Configure an Extended IP ACL......................................................................................................................................... 112
Configuring Filters with a Sequence Number........................................................................................................... 112
Configuring Filters Without a Sequence Number.....................................................................................................113
Configure Layer 2 and Layer 3 ACLs............................................................................................................................... 114
Assign an IP ACL to an Interface......................................................................................................................................114
Applying an IP ACL............................................................................................................................................................. 115
Counting ACL Hits........................................................................................................................................................ 115
Contents
5