EasyManua.ls Logo

Cisco NCS 4200 Series User Manual

Cisco NCS 4200 Series
86 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
Layer 2 Configuration Guide for Cisco NCS 4200 Series
First Published: 2016-07-29
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883

Table of Contents

Other manuals for Cisco NCS 4200 Series

Question and Answer IconNeed help?

Do you have a question about the Cisco NCS 4200 Series and is the answer not in the manual?

Cisco NCS 4200 Series Specifications

General IconGeneral
BrandCisco
ModelNCS 4200 Series
CategorySwitch
LanguageEnglish

Summary

Configuring Ethernet Dataplane Loopback

Prerequisites for Ethernet Data Plane Loopback

Lists requirements for configuring Ethernet loopback sessions.

Restrictions for Ethernet Data Plane Loopback

Details limitations and unsupported scenarios for Ethernet loopback.

Information on Ethernet Data Plane Loopback

Explains the purpose and types of Ethernet data plane loopback.

QoS Support for Ethernet Data Plane Loopback

Describes how QoS is handled with Ethernet data plane loopback.

How to Configure Ethernet Data Plane Loopback

Provides steps and commands for configuring Ethernet loopback.

Configuration Examples

Demonstrates practical examples for configuring loopback.

Verifying Ethernet Data Plane Loopback

Explains methods to verify the Ethernet loopback configuration.

Use Cases or Deployment Scenarios

Presents real-world scenarios for Ethernet loopback implementation.

Configuring Switched Port Analyzer

Prerequisites for Configuring Local Span and RSPAN

Lists requirements for setting up SPAN and RSPAN sessions.

Restrictions for Local Span and RSPAN

Details limitations and unsupported configurations for SPAN/RSPAN.

Understanding Local SPAN and RSPAN

Explains the concepts and functionalities of SPAN and RSPAN.

Configuring Local SPAN and RSPAN

Provides steps and commands for configuring SPAN and RSPAN.

Sample Configurations

Offers practical examples for SPAN and RSPAN configurations.

Verifying Local SPAN and RSPAN

Details methods to verify SPAN and RSPAN configurations.

Layer 2 Access Control Lists on EVCs

Prerequisites for Layer 2 Access Control Lists on EVCs

Lists knowledge required for configuring L2 ACLs on EVCs.

Restrictions for Layer 2 Access Control Lists on EVCs

Details limitations for Layer 2 ACLs on EVCs.

EVCS

Explains Ethernet Virtual Circuits (EVCs) in the context of L2 ACLs.

Relationship Between ACLs and Ethernet Infrastructure

Describes how ACLs interact with Ethernet infrastructure.

Information About Layer 2 Access Control Lists on EVCs

Provides general information on L2 ACLs on EVCs.

Creating a Layer 2 ACL

Details the process of creating a Layer 2 ACL.

Applying a Layer 2 ACL to a Service Instance

Explains how to apply an L2 ACL to a service instance.

Configuring a Layer 2 ACL with ACEs on a Service Instance

Shows how to configure an ACL with multiple Access Control Entries.

Verifying the Presence of a Layer 2 ACL on a Service Instance

Details how to verify an L2 ACL applied to a service instance.

Configuration Examples for Layer 2 Access Control Lists on EVCs

Provides practical examples for L2 ACLs on EVCs.

Configuring MAC Address Security on Service Instances and EVC Port Channels

Prerequisites for MAC Address Security on Service Instances and EVC Port Channels

Lists knowledge needed for MAC security on service instances.

Information About MAC Address Security on Service Instances and EVC Port Channels

Explains MAC security concepts for service instances and port channels.

MAC Security and MAC Addressing

Details MAC security features and MAC addressing.

MAC Address Permit List

Describes how to configure a list of permitted MAC addresses.

MAC Address Deny List

Details how to configure a list of denied MAC addresses.

Violation Response Configuration

Explains how to configure responses to MAC security violations.

MAC Address Aging Configuration

Describes how to configure aging for MAC addresses.

Sticky MAC Address Configurations

Explains how to make learned MAC addresses permanent.

Transitions

Describes behavior of MAC security elements under various triggers.

How to Configure MAC Address Limiting on Service Instances Bridge Domains and EVC Port Channels

Provides steps to configure MAC address limiting on service instances.

Enabling MAC Security on a Service Instance

Details how to enable MAC security on a service instance.

Enabling MAC Security on an EVC Port Channel

Explains how to enable MAC security on an EVC port channel.

Configuring a MAC Address Permit List

Provides steps to configure a list of permitted MAC addresses.

Configuring a MAC Address Deny List

Details steps for configuring a list of denied MAC addresses.

Configuring MAC Address Security on a Service Instance

Shows how to configure the maximum number of MAC addresses.

Configuring a MAC Address Violation

Explains how to specify behavior for MAC security violations.

Configuring MAC Address Aging

Details how to configure MAC address aging.

Configuring a Sticky MAC Address

Provides steps to configure sticky MAC addresses.

Displaying the MAC Security Status of a Specific Service Instance

Shows how to display MAC security status for a service instance.

Displaying the Service Instances with MAC Security Enabled

Details how to show service instances with MAC security enabled.

Displaying the Service Instances with MAC Security Enabled on a Specific Bridge Domain

Shows service instances with MAC security enabled on a bridge domain.

Showing the MAC Addresses of All Secured Service Instances

Displays MAC addresses of all secured service instances.

Showing the MAC Addresses of a Specific Service Instance

Shows MAC addresses for a specific service instance.

Showing the MAC Addresses of All Service Instances on a Specific Bridge Domain

Displays MAC addresses of service instances on a bridge domain.

Showing the MAC Security Statistics of a Specific Service Instance

Displays MAC security statistics for a specific service instance.

Showing the MAC Security Statistics of All Service Instances on a Specific Bridge Domain

Shows MAC security stats for all instances on a bridge domain.

Showing the Last Violation Recorded on Each Service Instance on a Specific Bridge Domain

Displays last violations for service instances on a bridge domain.

Clearing All Dynamically Learned Secure MAC Addresses on a Service Instance

Details how to clear dynamically learned secure MAC addresses.

Clearing All Dynamically Learned MAC Addresses on a Bridge Domain

Explains how to clear dynamically learned MAC addresses on a bridge domain.

Example Enabling MAC Security on a Service Instance

Provides an example of enabling MAC security on a service instance.

Example Enabling MAC Security on an EVC Port Channel

Shows an example of enabling MAC security on an EVC port channel.

Example Configuring a MAC Address Permit List

Demonstrates configuring a MAC address permit list.

Example Configuring a MAC Address Deny List

Shows an example of configuring a MAC address deny list.

Example Configuring a MAC Address Security on a Service Instance

Demonstrates configuring MAC security on a service instance.

Example Configuring a MAC Address Violation Response

Shows an example of configuring MAC address violation response.

Example Configuring MAC Address Aging

Demonstrates configuring MAC address aging.

Example Configuring a Sticky MAC Address

Shows an example of configuring a sticky MAC address.

Example Displaying the MAC Addresses on a Specific Secure Service Instance

Displays MAC addresses of a specific secure service instance.

Example Displaying the Last Violation on a Specific Service Instance

Shows the last violation on a specific service instance.

Example Displaying the MAC Security Status of a Specific Service Instance

Displays the MAC security status of a service instance.

Example Displaying the MAC Addresses of All Secured Service Instances

Shows MAC addresses of all secured service instances.

Example Displaying the MAC Security Statistics of All Service Instances

Displays MAC security statistics for all service instances.

Example: Displaying the MAC Addresses on All Service Instances for a Bridge Domain

Shows MAC addresses for all instances in a bridge domain.

Example Displaying the Secured Service Instances for a Specific Bridge Domain

Displays secured service instances for a specific bridge domain.

Static MAC Address Support on Service Instances

Prerequisites for Static MAC Address Support on Service Instances

Lists knowledge needed for static MAC address support.

Restrictions for Static MAC Address Support on Service Instances

Details limitations for static MAC address support.

Information about Static MAC Address Support on Service Instances

Provides information on static MAC address support.

Benefits of Static MAC Address Support on Service Instances

Outlines the advantages of static MAC address support.

Configuring a Static MAC Address on a Service Instance

Details how to configure a static MAC address on a service instance.

Example for Configuring a Static MAC Address on a Service Instance

Shows an example of configuring a static MAC address.

Verifying Configured Static MAC Addresses on a Service Instance

Explains how to verify configured static MAC addresses.

MAC Limiting

Restrictions and Usage Guidelines

Lists restrictions and guidelines for MAC limiting.

Configuring MAC Limiting

Details how to configure MAC limiting on bridge-domains.

Example of Enabling Per-Bridge-Domain MAC Limiting

Shows an example of enabling per-bridge-domain MAC limiting.

Related product manuals