Users Guide

5 802.1X..........................................................................................................................................................79
Port-Authentication Process...........................................................................................................................................81
EAP over RADIUS......................................................................................................................................................82
Conguring 802.1X...........................................................................................................................................................82
Related Conguration Tasks..................................................................................................................................... 82
Important Points to Remember......................................................................................................................................82
Enabling 802.1X................................................................................................................................................................ 83
Conguring dot1x Prole ................................................................................................................................................84
Conguring MAC addresses for a do1x Prole.............................................................................................................85
Conguring the Static MAB and MAB Prole .............................................................................................................85
Conguring Critical VLAN ..............................................................................................................................................86
Conguring Request Identity Re-Transmissions........................................................................................................... 87
Conguring a Quiet Period after a Failed Authentication......................................................................................87
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 88
Re-Authenticating a Port................................................................................................................................................89
Conguring Timeouts......................................................................................................................................................90
Conguring Dynamic VLAN Assignment with Port Authentication........................................................................... 91
Guest and Authentication-Fail VLANs.......................................................................................................................... 92
Conguring a Guest VLAN....................................................................................................................................... 92
Conguring an Authentication-Fail VLAN...............................................................................................................92
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)....................................94
Optimizing CAM Utilization During the Attachment of ACLs to VLANs...................................................................94
Guidelines for Conguring ACL VLAN Groups.............................................................................................................95
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters................................................ 95
Conguring ACL VLAN Groups................................................................................................................................95
Conguring FP Blocks for VLAN Parameters........................................................................................................ 96
Viewing CAM Usage........................................................................................................................................................ 97
Allocating FP Blocks for VLAN Processes....................................................................................................................98
7 Access Control Lists (ACLs)........................................................................................................................ 99
IP Access Control Lists (ACLs).....................................................................................................................................100
CAM Usage...............................................................................................................................................................100
Implementing ACLs on Dell Networking OS.......................................................................................................... 101
Important Points to Remember.................................................................................................................................... 102
Conguration Task List for Route Maps................................................................................................................ 103
Conguring Match Routes...................................................................................................................................... 105
Conguring Set Conditions.....................................................................................................................................106
Congure a Route Map for Route Redistribution.................................................................................................107
Congure a Route Map for Route Tagging........................................................................................................... 108
Continue Clause........................................................................................................................................................108
IP Fragment Handling.................................................................................................................................................... 108
IP Fragments ACL Examples...................................................................................................................................109
Layer 4 ACL Rules Examples...................................................................................................................................109
Congure a Standard IP ACL.........................................................................................................................................110
Conguring a Standard IP ACL Filter.......................................................................................................................111
Contents
5