Configuring 802.1X............................................................................................................................112
Related Configuration Tasks....................................................................................................... 112
Important Points to Remember........................................................................................................ 113
Enabling 802.1X................................................................................................................................. 114
Configuring Request Identity Re-Transmissions..............................................................................115
Configuring a Quiet Period after a Failed Authentication..........................................................116
Forcibly Authorizing or Unauthorizing a Port...................................................................................117
Re-Authenticating a Port...................................................................................................................118
Configuring Timeouts....................................................................................................................... 119
Configuring Dynamic VLAN Assignment with Port Authentication................................................120
Guest and Authentication-Fail VLANs...............................................................................................121
Configuring a Guest VLAN.......................................................................................................... 122
Configuring an Authentication-Fail VLAN.................................................................................. 122
7 Access Control List (ACL) VLAN Groups and Content Addressable
Memory (CAM)......................................................................................................124
Optimizing CAM Utilization During the Attachment of ACLs to VLANs......................................... 124
Guidelines for Configuring ACL VLAN Groups.................................................................................125
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters........................ 126
Configuring ACL VLAN Groups...................................................................................................126
Configuring FP Blocks for VLAN Parameters..............................................................................127
Viewing CAM Usage..........................................................................................................................128
Allocating FP Blocks for VLAN Processes.........................................................................................129
8 Access Control Lists (ACLs)............................................................................ 130
IP Access Control Lists (ACLs)...........................................................................................................131
CAM Usage.................................................................................................................................. 132
Implementing ACLs on Dell Networking OS..............................................................................133
IP Fragment Handling....................................................................................................................... 134
IP Fragments ACL Examples....................................................................................................... 134
Layer 4 ACL Rules Examples....................................................................................................... 135
Configure a Standard IP ACL............................................................................................................ 136
Configuring a Standard IP ACL Filter.......................................................................................... 137
Configure an Extended IP ACL......................................................................................................... 138
Configuring Filters with a Sequence Number............................................................................138
Configuring Filters Without a Sequence Number......................................................................140
Configure Layer 2 and Layer 3 ACLs.................................................................................................141
Assign an IP ACL to an Interface.......................................................................................................141
Applying an IP ACL............................................................................................................................142
Counting ACL Hits.......................................................................................................................143
Configure Ingress ACLs.....................................................................................................................143
Configure Egress ACLs..................................................................................................................... 144
6