Configuring Critical VLAN .............................................................................................................................................. 87
Configuring Request Identity Re-Transmissions........................................................................................................87
Configuring a Quiet Period after a Failed Authentication..................................................................................88
Forcibly Authorizing or Unauthorizing a Port............................................................................................................. 89
Re-Authenticating a Port................................................................................................................................................ 89
Configuring Timeouts....................................................................................................................................................... 90
Configuring Dynamic VLAN Assignment with Port Authentication....................................................................... 91
Guest and Authentication-Fail VLANs......................................................................................................................... 92
Configuring a Guest VLAN........................................................................................................................................ 93
Configuring an Authentication-Fail VLAN............................................................................................................. 93
Chapter 6: Access Control Lists (ACLs)...................................................................................... 95
IP Access Control Lists (ACLs)..................................................................................................................................... 96
CAM Usage................................................................................................................................................................... 96
Implementing ACLs on Dell EMC Networking OS............................................................................................... 97
Configure ACL Range Profiles..................................................................................................................................98
Important Points to Remember..................................................................................................................................... 99
Configuration Task List for Route Maps................................................................................................................99
Configuring Match Routes....................................................................................................................................... 101
Configuring Set Conditions..................................................................................................................................... 102
Configure a Route Map for Route Redistribution.............................................................................................. 103
Configure a Route Map for Route Tagging......................................................................................................... 104
Continue Clause......................................................................................................................................................... 104
IP Fragment Handling..................................................................................................................................................... 104
IP Fragments ACL Examples...................................................................................................................................105
Layer 4 ACL Rules Examples...................................................................................................................................105
Configure a Standard IP ACL....................................................................................................................................... 106
Configuring a Standard IP ACL Filter....................................................................................................................107
Configure an Extended IP ACL.....................................................................................................................................107
Configuring Filters with a Sequence Number..................................................................................................... 108
Configuring Filters Without a Sequence Number............................................................................................... 110
Configure Layer 2 and Layer 3 ACLs............................................................................................................................111
Assign an IP ACL to an Interface.................................................................................................................................. 111
Applying an IP ACL............................................................................................................................................................111
Counting ACL Hits......................................................................................................................................................112
Configure Ingress ACLs.................................................................................................................................................. 112
Configure Egress ACLs................................................................................................................................................... 113
Applying Egress Layer 3 ACLs (Control-Plane).................................................................................................. 114
IP Prefix Lists.................................................................................................................................................................... 114
Configuration Task List for Prefix Lists................................................................................................................ 115
ACL Remarks..................................................................................................................................................................... 118
Configuring a Remark................................................................................................................................................ 118
Deleting a Remark...................................................................................................................................................... 118
ACL Resequencing........................................................................................................................................................... 119
Resequencing an ACL or Prefix List...................................................................................................................... 119
Route Maps.......................................................................................................................................................................120
Flow-Based Monitoring................................................................................................................................................... 121
Enabling Flow-Based Monitoring............................................................................................................................122
Configuring IP Mirror Access Group........................................................................................................................... 123
Sample Configuration................................................................................................................................................124
Contents
5