Concept Guide

Table Of Contents
7 Access Control Lists (ACLs)........................................................................................................................113
IP Access Control Lists (ACLs)......................................................................................................................................114
CAM Usage................................................................................................................................................................115
Implementing ACLs on Dell EMC Networking OS................................................................................................ 115
Important Points to Remember..................................................................................................................................... 117
Conguration Task List for Route Maps................................................................................................................. 117
Conguring Match Routes.......................................................................................................................................119
Conguring Set Conditions......................................................................................................................................121
Congure a Route Map for Route Redistribution.................................................................................................122
Congure a Route Map for Route Tagging............................................................................................................122
Continue Clause........................................................................................................................................................123
IP Fragment Handling.....................................................................................................................................................123
IP Fragments ACL Examples...................................................................................................................................123
Layer 4 ACL Rules Examples...................................................................................................................................124
Congure a Standard IP ACL........................................................................................................................................ 124
Conguring a Standard IP ACL Filter.....................................................................................................................125
Congure an Extended IP ACL..................................................................................................................................... 126
Conguring Filters with a Sequence Number....................................................................................................... 126
Conguring Filters Without a Sequence Number.................................................................................................128
Congure Layer 2 and Layer 3 ACLs............................................................................................................................128
Assign an IP ACL to an Interface..................................................................................................................................129
Applying an IP ACL.........................................................................................................................................................129
Counting ACL Hits....................................................................................................................................................130
Congure Ingress ACLs................................................................................................................................................. 130
Congure Egress ACLs...................................................................................................................................................131
Applying Egress Layer 3 ACLs (Control-Plane).................................................................................................... 132
IP Prex Lists.................................................................................................................................................................. 132
Implementation Information.................................................................................................................................... 133
Conguration Task List for Prex Lists.................................................................................................................. 133
ACL Remarks.................................................................................................................................................................. 136
Conguring a Remark.............................................................................................................................................. 136
Deleting a Remark.....................................................................................................................................................137
ACL Resequencing......................................................................................................................................................... 138
Resequencing an ACL or Prex List.......................................................................................................................138
Route Maps.....................................................................................................................................................................139
Implementation Information.................................................................................................................................... 139
Logging of ACL Processes............................................................................................................................................ 140
Guidelines for Conguring ACL Logging.................................................................................................................141
Conguring ACL Logging......................................................................................................................................... 141
Flow-Based Monitoring..................................................................................................................................................142
Behavior of Flow-Based Monitoring.......................................................................................................................142
Enabling Flow-Based Monitoring............................................................................................................................143
8 Bidirectional Forwarding Detection (BFD).................................................................................................. 145
How BFD Works............................................................................................................................................................. 145
6
Contents