Users Guide

Important Points to Remember.................................................................................................................................. 98
Enabling 802.1X................................................................................................................................................................ 99
Conguring Request Identity Re-Transmissions.............................................................................................................. 100
Conguring a Quiet Period after a Failed Authentication................................................................................................. 101
Forcibly Authorizing or Unauthorizing a Port...................................................................................................................102
Re-Authenticating a Port................................................................................................................................................102
Conguring Timeouts......................................................................................................................................................103
Conguring Dynamic VLAN Assignment with Port Authentication..................................................................................104
Guest and Authentication-Fail VLANs............................................................................................................................ 105
Conguring a Guest VLAN....................................................................................................................................... 106
Conguring an Authentication-Fail VLAN................................................................................................................. 106
7 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).... 108
Optimizing CAM Utilization During the Attachment of ACLs to VLANs.......................................................................... 108
Guidelines for Conguring ACL VLAN Groups................................................................................................................ 109
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters..........................................................109
Conguring ACL VLAN Groups.................................................................................................................................109
Conguring FP Blocks for VLAN Parameters.............................................................................................................110
Viewing CAM Usage.........................................................................................................................................................111
Allocating FP Blocks for VLAN Processes........................................................................................................................112
8 Access Control Lists (ACLs)......................................................................................... 113
IP Access Control Lists (ACLs)........................................................................................................................................ 113
CAM Allocation and CAM Optimization........................................................................................................................... 114
User Congurable CAM Allocation.............................................................................................................................114
CAM Optimization..................................................................................................................................................... 114
Test CAM Usage........................................................................................................................................................114
View CAM-ACL Settings........................................................................................................................................... 115
View CAM Usage.......................................................................................................................................................117
QoS CAM Region Limitation...................................................................................................................................... 117
Implementing ACLs on Dell Networking OS..................................................................................................................... 117
ACLs and VLANs....................................................................................................................................................... 118
ACL Optimization.......................................................................................................................................................118
Determine the Order in which ACLs are Used to Classify Trac................................................................................118
IP Fragment Handling...................................................................................................................................................... 118
IP Fragments ACL Examples......................................................................................................................................119
Layer 4 ACL Rules Examples......................................................................................................................................119
Congure a Standard IP ACL.......................................................................................................................................... 120
Conguring a Standard IP ACL Filter......................................................................................................................... 121
Congure an Extended IP ACL........................................................................................................................................122
Conguring Filters with a Sequence Number............................................................................................................122
Conguring Filters Without a Sequence Number...................................................................................................... 123
Established Flag.............................................................................................................................................................. 123
Congure Layer 2 and Layer 3 ACLs............................................................................................................................... 123
Assign an IP ACL to an Interface.....................................................................................................................................124
Applying an IP ACL....................................................................................................................................................124
6