Contents
xviii
Software Configuration Guide—Release 12.2(25)EW
OL-6696-01
Configuration Guidelines for Layer 4 Operations 35-8
How ACL Processing Impacts CPU 35-9
Configuring Unicast MAC Address Filtering 35-11
Configuring Named MAC Extended ACLs 35-11
Configuring VLAN Maps 35-12
VLAN Map Configuration Guidelines 35-13
Creating and Deleting VLAN Maps 35-13
Applying a VLAN Map to a VLAN 35-16
Using VLAN Maps in Your Network 35-16
Displaying VLAN Access Map Information 35-19
Using VLAN Maps with Router ACLs 35-19
Guidelines for Using Router ACLs and VLAN Maps 35-20
Examples of Router ACLs and VLAN Maps Applied to VLANs 35-20
Configuring PACLs 35-22
Creating a PACL 35-22
PACL Configuration Guidelines 35-23
Configuring IP and MAC ACLs on a Layer 2 Interface 35-23
Using PACL with Access-Group Mode 35-24
Configuring Access-group Mode on Layer 2 Interface 35-24
Applying ACLs to a Layer 2 Interface 35-25
Displaying an ACL Configuration on a Layer 2 Interface 35-25
Using PACL with VLAN Maps and Router ACLs 35-26
CHAPTER
36 Configuring Private VLANs 36-1
Overview of PVLANs 36-1
PVLAN Trunks 36-2
PVLANs and VLAN ACL/QoS 36-2
How to Configure PVLANs 36-3
PVLAN Configuration Guidelines and Restrictions 36-3
Configuring a VLAN as a PVLAN 36-5
Associating a Secondary VLAN with a Primary VLAN 36-6
Configuring a Layer 2 Interface as a PVLAN Promiscuous Port 36-7
Configuring a Layer 2 Interface as a PVLAN Host Port 36-8
Configuring a Layer 2 Interface as a PVLAN Trunk Port 36-9
Permitting Routing of Secondary VLAN Ingress Traffic 36-11
CHAPTER
37 Port Unicast and Multicast Flood Blocking 37-1
Overview of Flood Blocking 37-1