EasyManua.ls Logo

Enterasys C5G124-24 - Page 18

Enterasys C5G124-24
452 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
xvi
Configuring Area Virtual-Link Authentication..................................................................................22-14
Configuring Area Virtual-Link Timers..............................................................................................22-14
Configuring Route Redistribution ......................................................................................................... 22-14
Configuring Passive Interfaces ............................................................................................................ 22-14
Configuring OSPF Interfaces ...................................................................................................................... 22-15
Configuring Interface Cost ................................................................................................................... 22-15
Configuring Interface Priority ................................................................................................................ 22-15
Configuring Authentication ................................................................................................................... 22-15
Configuring OSPF Interface Timers ..................................................................................................... 22-16
Default Settings .......................................................................................................................................... 22-16
Configuration Procedures ........................................................................................................................... 22-17
Basic OSPF Router Configuration ....................................................................................................... 22-17
OSPF Interface Configuration .............................................................................................................. 22-18
OSPF Area Configuration .................................................................................................................... 22-18
Managing and Displaying OSPF Configuration and Statistics ............................................................. 22-19
Chapter 23: Configuring VRRP
VRRP Overview ............................................................................................................................................ 23-1
VRRP Virtual Router Creation ................................................................................................................ 23-2
VRRP Master Election ........................................................................................................................... 23-2
Enabling Master Preemption .................................................................................................................. 23-3
Enabling ICMP Replies .......................................................................................................................... 23-3
Configuring VRRP Authentication .......................................................................................................... 23-3
Enabling the VRRP Virtual Router ......................................................................................................... 23-3
Configuring VRRP ........................................................................................................................................ 23-3
Configuration Examples ......................................................................................................................... 23-4
Basic VRRP Configuration ...............................................................................................................23-4
Multiple Backup VRRP Configuration...............................................................................................23-6
Terms and Definitions ................................................................................................................................... 23-8
Chapter 24: Configuring Access Control Lists
Using Access Control Lists (ACLs) in Your Network .................................................................................... 24-1
Implementing ACLs ...................................................................................................................................... 24-1
ACL Configuration Overview ........................................................................................................................ 24-2
Creating IPv4 ACLs ................................................................................................................................ 24-2
Creating IPv6 and MAC ACLs ................................................................................................................ 24-2
Creating ACL Rules ............................................................................................................................... 24-3
IPv4 Rules ........................................................................................................................................24-3
IPv6 Rules ........................................................................................................................................24-4
MAC Rules .......................................................................................................................................24-4
Managing ACLs ...................................................................................................................................... 24-4
Deleting ACLs and Rules .................................................................................................................24-4
Moving ACL Rules............................................................................................................................24-5
Replacing ACL Rules .......................................................................................................................24-5
Inserting ACL Rules..........................................................................................................................24-6
Applying ACLs ........................................................................................................................................ 24-6
Configuring ACLs ......................................................................................................................................... 24-7
Configuring IPv4 ACLs ........................................................................................................................... 24-7
Example............................................................................................................................................24-8
Configuring IPv6 ACLs ........................................................................................................................... 24-8
Example............................................................................................................................................24-9
Configuring MAC ACLs ........................................................................................................................ 24-10
Example..........................................................................................................................................24-10
Access Control Lists on the A4 ................................................................................................................... 24-11
Configuring A4 ACLs ............................................................................................................................ 24-12

Table of Contents

Other manuals for Enterasys C5G124-24

Related product manuals