Users Guide
5 802.1X..........................................................................................................................................................76
Port-Authentication Process.......................................................................................................................................... 78
EAP over RADIUS......................................................................................................................................................79
Conguring 802.1X...........................................................................................................................................................79
Related Conguration Tasks..................................................................................................................................... 79
Important Points to Remember......................................................................................................................................79
Enabling 802.1X................................................................................................................................................................ 80
Conguring dot1x Prole .................................................................................................................................................81
Conguring the Static MAB and MAB Prole .............................................................................................................82
Conguring Critical VLAN ..............................................................................................................................................82
Conguring MAC addresses for a do1x Prole.............................................................................................................83
Conguring Request Identity Re-Transmissions...........................................................................................................84
Conguring a Quiet Period after a Failed Authentication..................................................................................... 84
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 85
Re-Authenticating a Port................................................................................................................................................86
Conguring Timeouts...................................................................................................................................................... 87
Conguring Dynamic VLAN Assignment with Port Authentication...........................................................................88
Guest and Authentication-Fail VLANs.......................................................................................................................... 89
Conguring a Guest VLAN....................................................................................................................................... 89
Conguring an Authentication-Fail VLAN...............................................................................................................89
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).................................... 91
Optimizing CAM Utilization During the Attachment of ACLs to VLANs................................................................... 91
Guidelines for Conguring ACL VLAN Groups.............................................................................................................92
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters................................................ 92
Conguring ACL VLAN Groups................................................................................................................................92
Conguring FP Blocks for VLAN Parameters........................................................................................................ 93
Viewing CAM Usage........................................................................................................................................................94
Allocating FP Blocks for VLAN Processes....................................................................................................................95
7 Access Control Lists (ACLs)........................................................................................................................ 96
IP Access Control Lists (ACLs).......................................................................................................................................97
CAM Usage.................................................................................................................................................................97
Implementing ACLs on Dell Networking OS...........................................................................................................99
Important Points to Remember.................................................................................................................................... 100
Conguration Task List for Route Maps................................................................................................................100
Conguring Match Routes...................................................................................................................................... 102
Conguring Set Conditions.....................................................................................................................................104
Congure a Route Map for Route Redistribution.................................................................................................105
Congure a Route Map for Route Tagging........................................................................................................... 105
Continue Clause....................................................................................................................................................... 105
IP Fragment Handling.................................................................................................................................................... 106
IP Fragments ACL Examples...................................................................................................................................106
Layer 4 ACL Rules Examples...................................................................................................................................106
Congure a Standard IP ACL........................................................................................................................................ 107
Conguring a Standard IP ACL Filter.....................................................................................................................108
Contents
5










