Configuring Critical VLAN ................................................................................................................................................. 83
Configuring Request Identity Re-Transmissions............................................................................................................. 84
Configuring a Quiet Period after a Failed Authentication.........................................................................................84
Forcibly Authorizing or Unauthorizing a Port...................................................................................................................85
Re-Authenticating a Port................................................................................................................................................... 85
Configuring Timeouts..........................................................................................................................................................86
Configuring Dynamic VLAN Assignment with Port Authentication.............................................................................. 87
Guest and Authentication-Fail VLANs..............................................................................................................................88
Configuring a Guest VLAN........................................................................................................................................... 89
Configuring an Authentication-Fail VLAN.................................................................................................................. 89
6 Access Control Lists (ACLs)........................................................................................................ 91
IP Access Control Lists (ACLs)......................................................................................................................................... 92
CAM Usage.................................................................................................................................................................... 92
Implementing ACLs on Dell EMC Networking OS.....................................................................................................93
Configure ACL Range Profiles..................................................................................................................................... 94
Important Points to Remember.........................................................................................................................................95
Configuration Task List for Route Maps.................................................................................................................... 95
Configuring Match Routes........................................................................................................................................... 97
Configuring Set Conditions.......................................................................................................................................... 98
Configure a Route Map for Route Redistribution..................................................................................................... 99
Configure a Route Map for Route Tagging................................................................................................................99
Continue Clause........................................................................................................................................................... 100
IP Fragment Handling........................................................................................................................................................100
IP Fragments ACL Examples...................................................................................................................................... 100
Layer 4 ACL Rules Examples.......................................................................................................................................101
Configure a Standard IP ACL............................................................................................................................................101
Configuring a Standard IP ACL Filter........................................................................................................................ 102
Configure an Extended IP ACL........................................................................................................................................ 103
Configuring Filters with a Sequence Number...........................................................................................................103
Configuring Filters Without a Sequence Number....................................................................................................105
Configure Layer 2 and Layer 3 ACLs...............................................................................................................................106
Assign an IP ACL to an Interface..................................................................................................................................... 107
Applying an IP ACL.............................................................................................................................................................107
Counting ACL Hits....................................................................................................................................................... 107
Configure Ingress ACLs.................................................................................................................................................... 108
Configure Egress ACLs..................................................................................................................................................... 108
Applying Egress Layer 3 ACLs (Control-Plane)....................................................................................................... 109
IP Prefix Lists......................................................................................................................................................................109
Configuration Task List for Prefix Lists......................................................................................................................110
ACL Remarks.......................................................................................................................................................................113
Configuring a Remark...................................................................................................................................................113
Deleting a Remark.........................................................................................................................................................113
ACL Resequencing............................................................................................................................................................. 114
Resequencing an ACL or Prefix List........................................................................................................................... 114
Route Maps......................................................................................................................................................................... 115
Flow-Based Monitoring......................................................................................................................................................116
Enabling Flow-Based Monitoring................................................................................................................................ 117
Configuring IP Mirror Access Group................................................................................................................................ 118
Sample Configuration................................................................................................................................................... 119
Contents
5