Reference Guide
Configuring Request Identity Re-Transmissions................................................................................77
Configuring a Quiet Period after a Failed Authentication........................................................... 78
Forcibly Authorizing or Unauthorizing a Port.................................................................................... 79
Re-Authenticating a Port....................................................................................................................80
Configuring Timeouts......................................................................................................................... 81
Configuring Dynamic VLAN Assignment with Port Authentication..................................................82
Guest and Authentication-Fail VLANs................................................................................................83
Configuring a Guest VLAN............................................................................................................84
Configuring an Authentication-Fail VLAN....................................................................................84
6 Access Control Lists (ACLs)..................................................................................87
IP Access Control Lists (ACLs)............................................................................................................88
CAM Usage....................................................................................................................................88
Implementing ACLs on Dell Networking OS............................................................................... 90
Important Points to Remember..........................................................................................................91
Configuration Task List for Route Maps....................................................................................... 91
Configuring Match Routes............................................................................................................94
Configuring Set Conditions.......................................................................................................... 95
Configure a Route Map for Route Redistribution........................................................................ 96
Configure a Route Map for Route Tagging..................................................................................97
Continue Clause............................................................................................................................97
IP Fragment Handling......................................................................................................................... 98
IP Fragments ACL Examples......................................................................................................... 98
Layer 4 ACL Rules Examples.........................................................................................................99
Configure a Standard IP ACL............................................................................................................100
Configuring a Standard IP ACL Filter.......................................................................................... 101
Configure an Extended IP ACL......................................................................................................... 102
Configuring Filters with a Sequence Number............................................................................102
Configuring Filters Without a Sequence Number......................................................................103
Configure Layer 2 and Layer 3 ACLs................................................................................................104
Assign an IP ACL to an Interface...................................................................................................... 105
Applying an IP ACL............................................................................................................................105
Counting ACL Hits.......................................................................................................................106
Configure Ingress ACLs.................................................................................................................... 106
Configure Egress ACLs......................................................................................................................107
Applying Egress Layer 3 ACLs (Control-Plane).......................................................................... 108
IP Prefix Lists..................................................................................................................................... 108
Implementation Information...................................................................................................... 109
Configuration Task List for Prefix Lists....................................................................................... 109
ACL Resequencing.............................................................................................................................113
Resequencing an ACL or Prefix List............................................................................................ 114
Route Maps........................................................................................................................................ 115










