Reference Guide

Table Of Contents
EAP over RADIUS.............................................................................................................................. 104
RADIUS Attributes for 802.1 Support..........................................................................................104
Configuring 802.1X........................................................................................................................... 104
Related Configuration Tasks.......................................................................................................104
Important Points to Remember..................................................................................................105
Enabling 802.1X.................................................................................................................................105
Configuring Request Identity Re-Transmissions............................................................................. 107
Configuring a Quiet Period after a Failed Authentication............................................................... 107
Forcibly Authorizing or Unauthorizing a Port..................................................................................108
Re-Authenticating a Port..................................................................................................................109
Configuring Timeouts....................................................................................................................... 110
Configuring Dynamic VLAN Assignment with Port Authentication.................................................111
Guest and Authentication-Fail VLANs...............................................................................................112
Configuring a Guest VLAN...........................................................................................................113
Configuring an Authentication-Fail VLAN.................................................................................. 113
7 Access Control List (ACL) VLAN Groups and Content Addressable
Memory (CAM)...................................................................................................... 115
Optimizing CAM Utilization During the Attachment of ACLs to VLANs..........................................115
Guidelines for Configuring ACL VLAN groups................................................................................. 116
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters.........................117
Configuring ACL VLAN Groups................................................................................................... 117
Configuring FP Blocks for VLAN Parameters..............................................................................118
Viewing CAM Usage.......................................................................................................................... 119
Allocating FP Blocks for VLAN Processes........................................................................................ 120
8 Access Control Lists (ACLs).............................................................................122
IP Access Control Lists (ACLs).......................................................................................................... 122
CAM Allocation and CAM Optimization...........................................................................................123
User Configurable CAM Allocation.............................................................................................123
CAM Optimization.......................................................................................................................124
Test CAM Usage.......................................................................................................................... 124
View CAM-ACL Settings..............................................................................................................124
View CAM Usage......................................................................................................................... 126
QoS CAM Region Limitation....................................................................................................... 126
Implementing ACLs on Dell Networking OS....................................................................................127
ACLs and VLANs...........................................................................................................................127
ACL Optimization........................................................................................................................ 127
Determine the Order in which ACLs are Used to Classify Traffic..............................................127
IP Fragment Handling....................................................................................................................... 128
IP Fragments ACL Examples....................................................................................................... 129
Layer 4 ACL Rules Examples.......................................................................................................129