Protocol Independent Features
Except on the first page, right running head:
Heading1 or Heading1NewPage text (automatic)
505
Alcatel-Lucent
Beta Beta
OmniAccess 5740 Unified Services Gateway CLI Configuration Guide
EXAMPLE
Configuring a Serial interface to be an unnumbered interface. The IP address
configured on the GigabitEthernet 3/0 interface is also assigned to the interface
Serial 0/0:0, and both interfaces involved function normally.
ALU(config)# interface Serial 0/0:0
ALU(config-if Serial0/0:0)# ip unnumbered GigabitEthernet3/0
Configuring Ethernet as an unnumbered interface throws up an error:
ALU(config)# interface GigabitEthernet 3/0
ALU((config-if GigabitEthernet3/0)# ip unnumbered Loopback 0
Error - Point-to-point (non-broadcast) interfaces only
C
ONFIGURE ACCESS-LIST
Access-lists are an ordered sequence of individual statements, each having a
permit or deny result. Evaluation of ACL consists of a list scan, in a predetermined
order, and an evaluation of the criteria of each statement that matches. A list scan
is aborted once the first statement match is found and an action associated with
the statement match is performed.
The main result from the evaluation of an access-list is permit or deny. When
applied to redistribution, an ACL determines if a particular route can or cannot be
redistributed.
Each ACL ends with an implicit deny statement, by design convention; there is no
similar convention for route-maps. If the end of a route-map is reached during
matching attempts, the result depends on the specific application of the route-
map. Access-lists are used in route map as a matching parameter.
Note: In OmniAccess 5740 USG, access lists are only used for control plane filtering. BGP
uses access-lists for filtering update packets from/to neighbor. BGP also uses
community-lists and as-path lists.
For filter functionality, refer “Filter and Firewall” chapter.
There are 2 types of access-lists:
• Standard access-list
• Extended access-list
Standard access lists uses only source IP addresses configured in the ACL.
Extended access-list uses both source IP addresses as well as destination IP
address. Extended access lists are more convenient to use when some networks
must be allowed and some disallowed, within the same major network.