Configuring Critical VLAN .............................................................................................................................................. 88
Configuring Request Identity Re-Transmissions........................................................................................................88
Configuring a Quiet Period after a Failed Authentication..................................................................................89
Forcibly Authorizing or Unauthorizing a Port.............................................................................................................90
Re-Authenticating a Port................................................................................................................................................ 90
Configuring Timeouts........................................................................................................................................................91
Configuring Dynamic VLAN Assignment with Port Authentication...................................................................... 92
Guest and Authentication-Fail VLANs..........................................................................................................................93
Configuring a Guest VLAN........................................................................................................................................ 94
Configuring an Authentication-Fail VLAN............................................................................................................. 94
Chapter 6: Access Control Lists (ACLs)...................................................................................... 96
IP Access Control Lists (ACLs)......................................................................................................................................97
CAM Usage................................................................................................................................................................... 97
Implementing ACLs on Dell EMC Networking OS............................................................................................... 98
Configure ACL Range Profiles..................................................................................................................................99
Important Points to Remember....................................................................................................................................100
Configuration Task List for Route Maps..............................................................................................................100
Configuring Match Routes...................................................................................................................................... 102
Configuring Set Conditions..................................................................................................................................... 103
Configure a Route Map for Route Redistribution.............................................................................................. 104
Configure a Route Map for Route Tagging......................................................................................................... 105
Continue Clause......................................................................................................................................................... 105
IP Fragment Handling..................................................................................................................................................... 105
IP Fragments ACL Examples...................................................................................................................................106
Layer 4 ACL Rules Examples...................................................................................................................................106
Configure a Standard IP ACL........................................................................................................................................107
Configuring a Standard IP ACL Filter....................................................................................................................108
Configure an Extended IP ACL.....................................................................................................................................108
Configuring Filters with a Sequence Number..................................................................................................... 109
Configuring Filters Without a Sequence Number................................................................................................111
Configure Layer 2 and Layer 3 ACLs........................................................................................................................... 112
Assign an IP ACL to an Interface..................................................................................................................................112
Applying an IP ACL...........................................................................................................................................................112
Counting ACL Hits......................................................................................................................................................113
Configure Ingress ACLs.................................................................................................................................................. 113
Configure Egress ACLs................................................................................................................................................... 114
Applying Egress Layer 3 ACLs (Control-Plane).................................................................................................. 115
IP Prefix Lists.................................................................................................................................................................... 115
Configuration Task List for Prefix Lists................................................................................................................ 116
ACL Remarks..................................................................................................................................................................... 119
Configuring a Remark................................................................................................................................................ 119
Deleting a Remark...................................................................................................................................................... 119
ACL Resequencing.......................................................................................................................................................... 120
Resequencing an ACL or Prefix List......................................................................................................................120
Route Maps.......................................................................................................................................................................122
Flow-Based Monitoring.................................................................................................................................................. 122
Enabling Flow-Based Monitoring............................................................................................................................123
Configuring IP Mirror Access Group........................................................................................................................... 124
Sample Configuration................................................................................................................................................125
Contents
5