Configuring 802.1X.................................................................................................................118
Related Configuration Tasks...........................................................................................118
Important Points to Remember...........................................................................................119
Enabling 802.1X...................................................................................................................... 120
Configuring Request Identity Re-Transmissions............................................................. 122
Configuring a Quiet Period after a Failed Authentication........................................122
Forcibly Authorizing or Unauthorizing a Port...................................................................123
Re-Authenticating a Port...................................................................................................... 124
Configuring Timeouts............................................................................................................125
Configuring Dynamic VLAN Assignment with Port Authentication.............................126
Guest and Authentication-Fail VLANs................................................................................127
Configuring a Guest VLAN..............................................................................................128
Configuring an Authentication-Fail VLAN...................................................................128
7 Access Control List (ACL) VLAN Groups and Content Addressable Memory
(CAM)..........................................................................................................................................130
Optimizing CAM Utilization During the Attachment of ACLs to VLANs.....................130
Guidelines for Configuring ACL VLAN Groups................................................................. 131
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters.. 132
Configuring ACL VLAN Groups......................................................................................132
Configuring FP Blocks for VLAN Parameters..............................................................133
Viewing CAM Usage...............................................................................................................134
Allocating FP Blocks for VLAN Processes..........................................................................135
8 Access Control Lists (ACLs).................................................................................................137
IP Access Control Lists (ACLs)............................................................................................. 138
CAM Usage.........................................................................................................................139
Implementing ACLs on Dell Networking OS..............................................................140
Important Points to Remember...........................................................................................141
Configuration Task List for Route Maps...................................................................... 142
Configuring Match Routes............................................................................................. 144
Configuring Set Conditions............................................................................................146
Configure a Route Map for Route Redistribution...................................................... 147
Configure a Route Map for Route Tagging.................................................................147
Continue Clause............................................................................................................... 148
IP Fragment Handling............................................................................................................148
IP Fragments ACL Examples...........................................................................................149
Layer 4 ACL Rules Examples.......................................................................................... 149
Configure a Standard IP ACL............................................................................................... 150
Configuring a Standard IP ACL Filter.............................................................................151
Configure an Extended IP ACL............................................................................................ 152
Configuring Filters with a Sequence Number............................................................ 152
9.10(0.1)
6