Administrator Guide

Enabling 802.1X....................................................................................................................................................................83
Configuring dot1x Profile ................................................................................................................................................... 84
Configuring MAC addresses for a do1x Profile................................................................................................................85
Configuring the Static MAB and MAB Profile ................................................................................................................ 85
Configuring Critical VLAN ................................................................................................................................................. 86
Configuring Request Identity Re-Transmissions............................................................................................................. 87
Configuring a Quiet Period after a Failed Authentication.........................................................................................87
Forcibly Authorizing or Unauthorizing a Port...................................................................................................................88
Re-Authenticating a Port................................................................................................................................................... 88
Configuring Timeouts..........................................................................................................................................................89
Configuring Dynamic VLAN Assignment with Port Authentication..............................................................................90
Guest and Authentication-Fail VLANs...............................................................................................................................91
Configuring a Guest VLAN........................................................................................................................................... 92
Configuring an Authentication-Fail VLAN.................................................................................................................. 92
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)..........................94
Optimizing CAM Utilization During the Attachment of ACLs to VLANs......................................................................94
Guidelines for Configuring ACL VLAN Groups................................................................................................................ 94
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters................................................... 95
Configuring ACL VLAN Groups................................................................................................................................... 95
Configuring FP Blocks for VLAN Parameters............................................................................................................96
Viewing CAM Usage........................................................................................................................................................... 96
Allocating FP Blocks for VLAN Processes....................................................................................................................... 98
7 Access Control Lists (ACLs)........................................................................................................99
IP Access Control Lists (ACLs)........................................................................................................................................100
CAM Usage...................................................................................................................................................................100
Implementing ACLs on Dell EMC Networking OS.................................................................................................... 101
Important Points to Remember....................................................................................................................................... 102
Configuration Task List for Route Maps...................................................................................................................102
Configuring Match Routes..........................................................................................................................................104
Configuring Set Conditions.........................................................................................................................................105
Configure a Route Map for Route Redistribution....................................................................................................106
Configure a Route Map for Route Tagging.............................................................................................................. 106
Continue Clause............................................................................................................................................................107
IP Fragment Handling........................................................................................................................................................ 107
IP Fragments ACL Examples...................................................................................................................................... 107
Layer 4 ACL Rules Examples...................................................................................................................................... 108
Configure a Standard IP ACL........................................................................................................................................... 108
Configuring a Standard IP ACL Filter........................................................................................................................ 109
Configure an Extended IP ACL......................................................................................................................................... 110
Configuring Filters with a Sequence Number........................................................................................................... 110
Configuring Filters Without a Sequence Number.....................................................................................................112
Configure Layer 2 and Layer 3 ACLs............................................................................................................................... 113
Assign an IP ACL to an Interface......................................................................................................................................114
Applying an IP ACL............................................................................................................................................................. 114
Counting ACL Hits........................................................................................................................................................ 114
Configure Ingress ACLs..................................................................................................................................................... 115
Configure Egress ACLs......................................................................................................................................................115
Contents
5