IP Access Control Lists (ACLs)......................................................................................................................................113
CAM Usage................................................................................................................................................................114
Implementing ACLs on Dell EMC Networking OS.................................................................................................114
IP Fragment Handling..................................................................................................................................................... 116
IP Fragments ACL Examples................................................................................................................................... 116
Layer 4 ACL Rules Examples....................................................................................................................................117
Congure a Standard IP ACL.........................................................................................................................................117
Conguring a Standard IP ACL Filter......................................................................................................................118
Congure an Extended IP ACL......................................................................................................................................119
Conguring Filters with a Sequence Number........................................................................................................119
Conguring Filters Without a Sequence Number................................................................................................. 121
Congure Layer 2 and Layer 3 ACLs............................................................................................................................ 121
Assign an IP ACL to an Interface..................................................................................................................................122
Applying an IP ACL.........................................................................................................................................................122
Counting ACL Hits....................................................................................................................................................123
Congure Ingress ACLs................................................................................................................................................. 123
Congure Egress ACLs.................................................................................................................................................. 124
Applying Egress Layer 3 ACLs (Control-Plane).................................................................................................... 125
IP Prex Lists.................................................................................................................................................................. 125
Implementation Information.................................................................................................................................... 126
Conguration Task List for Prex Lists.................................................................................................................. 126
ACL Remarks.................................................................................................................................................................. 129
Conguring a Remark.............................................................................................................................................. 129
Deleting a Remark.................................................................................................................................................... 130
ACL Resequencing..........................................................................................................................................................131
Resequencing an ACL or Prex List........................................................................................................................131
Route Maps.....................................................................................................................................................................132
Implementation Information.................................................................................................................................... 132
Important Points to Remember.................................................................................................................................... 133
Conguration Task List for Route Maps................................................................................................................ 133
Conguring Match Routes...................................................................................................................................... 135
Conguring Set Conditions..................................................................................................................................... 136
Congure a Route Map for Route Redistribution................................................................................................. 137
Congure a Route Map for Route Tagging........................................................................................................... 138
Continue Clause........................................................................................................................................................138
Logging of ACL Processes............................................................................................................................................ 139
Guidelines for Conguring ACL Logging................................................................................................................139
Conguring ACL Logging........................................................................................................................................ 140
Flow-Based Monitoring..................................................................................................................................................140
Behavior of Flow-Based Monitoring....................................................................................................................... 141
Enabling Flow-Based Monitoring............................................................................................................................142
8 Bidirectional Forwarding Detection (BFD).................................................................................................. 144
How BFD Works............................................................................................................................................................. 144
BFD Packet Format..................................................................................................................................................145
BFD Sessions............................................................................................................................................................ 146
6
Contents