IP Access Control Lists (ACLs)......................................................................................................................................115
CAM Usage................................................................................................................................................................116
Implementing ACLs on Dell EMC Networking OS.................................................................................................116
IP Fragment Handling..................................................................................................................................................... 118
IP Fragments ACL Examples................................................................................................................................... 118
Layer 4 ACL Rules Examples................................................................................................................................... 119
Congure a Standard IP ACL.........................................................................................................................................119
Conguring a Standard IP ACL Filter..................................................................................................................... 120
Congure an Extended IP ACL......................................................................................................................................121
Conguring Filters with a Sequence Number........................................................................................................121
Conguring Filters Without a Sequence Number.................................................................................................123
Congure Layer 2 and Layer 3 ACLs............................................................................................................................123
Assign an IP ACL to an Interface..................................................................................................................................124
Applying an IP ACL.........................................................................................................................................................124
Counting ACL Hits....................................................................................................................................................125
Congure Ingress ACLs................................................................................................................................................. 125
Congure Egress ACLs.................................................................................................................................................. 126
Applying Egress Layer 3 ACLs (Control-Plane).....................................................................................................127
IP Prex Lists...................................................................................................................................................................127
Implementation Information.................................................................................................................................... 128
Conguration Task List for Prex Lists.................................................................................................................. 128
ACL Remarks................................................................................................................................................................... 131
Conguring a Remark............................................................................................................................................... 131
Deleting a Remark.................................................................................................................................................... 132
ACL Resequencing......................................................................................................................................................... 133
Resequencing an ACL or Prex List.......................................................................................................................133
Route Maps.....................................................................................................................................................................134
Implementation Information.................................................................................................................................... 134
Important Points to Remember.................................................................................................................................... 135
Conguration Task List for Route Maps................................................................................................................ 135
Conguring Match Routes...................................................................................................................................... 137
Conguring Set Conditions..................................................................................................................................... 138
Congure a Route Map for Route Redistribution.................................................................................................139
Congure a Route Map for Route Tagging........................................................................................................... 140
Continue Clause........................................................................................................................................................140
Logging of ACL Processes............................................................................................................................................. 141
Guidelines for Conguring ACL Logging.................................................................................................................141
Conguring ACL Logging.........................................................................................................................................142
Flow-Based Monitoring..................................................................................................................................................142
Behavior of Flow-Based Monitoring.......................................................................................................................143
Enabling Flow-Based Monitoring............................................................................................................................144
8 Bidirectional Forwarding Detection (BFD).................................................................................................. 146
How BFD Works............................................................................................................................................................. 146
BFD Packet Format..................................................................................................................................................147
BFD Sessions............................................................................................................................................................ 148
6
Contents