Dell FCX624-E Laptop User Manual


  Open as PDF
of 1494
 
PowerConnect B-Series FCX Configuration Guide xv
53-1002266-01
Configuration notes and feature limitations . . . . . . . . . . . . . . . . . .529
Configuration example. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .530
Configuring MAC-based VLANs. . . . . . . . . . . . . . . . . . . . . . . . . . . . .531
Using MAC-based VLANs and 802.1X security on the same port531
Configuring generic and Dell vendor-specific attributes on the
RADIUS server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .532
Aging for MAC-based VLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . .533
Disabling aging for MAC-based VLAN sessions . . . . . . . . . . . .534
Configuring the maximum MAC addresses per port . . . . . . . .535
Configuring a MAC-based VLAN for a static host . . . . . . . . . . .535
Configuring MAC-based VLAN for a dynamic host . . . . . . . . . .536
Configuring dynamic MAC-based VLAN . . . . . . . . . . . . . . . . . .536
Configuring MAC-based VLANs using SNMP . . . . . . . . . . . . . . . . . .537
Displaying Information about MAC-based VLANs . . . . . . . . . . . . . .537
Displaying the MAC-VLAN table. . . . . . . . . . . . . . . . . . . . . . . . .537
Displaying the MAC-VLAN table for a specific MAC address . .537
Displaying allowed MAC addresses . . . . . . . . . . . . . . . . . . . . .538
Displaying denied MAC addresses . . . . . . . . . . . . . . . . . . . . . .538
Displaying detailed MAC-VLAN data . . . . . . . . . . . . . . . . . . . . .539
Displaying MAC-VLAN information for a specific interface . . .541
Displaying MAC addresses in a MAC-based VLAN . . . . . . . . . .542
Displaying MAC-based VLAN logging . . . . . . . . . . . . . . . . . . . .543
Clearing MAC-VLAN information. . . . . . . . . . . . . . . . . . . . . . . . . . . .543
Sample application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .543
Chapter 16 Configuring Rule-Based IP Access Control Lists (ACLs)
ACL overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .548
Types of IP ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .548
ACL IDs and entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .548
Numbered and named ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . .549
Default ACL action . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .549
How hardware-based ACLs work . . . . . . . . . . . . . . . . . . . . . . . . . . .550
How fragmented packets are processed . . . . . . . . . . . . . . . . .550
Hardware aging of Layer 4 CAM entries . . . . . . . . . . . . . . . . . .550
Configuration considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .550
Configuring standard numbered ACLs. . . . . . . . . . . . . . . . . . . . . . .551
Standard numbered ACL syntax . . . . . . . . . . . . . . . . . . . . . . . .551
Configuration example for standard numbered ACLs . . . . . . .553
Configuring standard named ACLs . . . . . . . . . . . . . . . . . . . . . . . . .553
Standard named ACL syntax . . . . . . . . . . . . . . . . . . . . . . . . . . .554
Configuration example for standard named ACLs . . . . . . . . . .555
Configuring extended numbered ACLs . . . . . . . . . . . . . . . . . . . . . .556
Extended numbered ACL syntax . . . . . . . . . . . . . . . . . . . . . . . .556
Configuration examples for extended numbered ACLs . . . . . .560
Configuring extended named ACLs . . . . . . . . . . . . . . . . . . . . . . . . .562
Extended named ACL syntax. . . . . . . . . . . . . . . . . . . . . . . . . . .562
Configuration example for extended named ACLs. . . . . . . . . .566