EasyManua.ls Logo

Foundry Networks FESX - Page 9

Foundry Networks FESX
820 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Contents
December 2005 © Foundry Networks, Inc. ix
CONFIGURING A VIRTUAL ROUTING INTERFACE GROUP .....................................................................11-41
D
ISPLAYING THE VLAN GROUP AND VIRTUAL ROUTING INTERFACE GROUP INFORMATION ..................11-42
A
LLOCATING MEMORY FOR MORE VLANS OR VIRTUAL ROUTING INTERFACES ...................................11-42
C
ONFIGURING SUPER AGGREGATED VLANS ...........................................................................................11-43
C
ONFIGURING AGGREGATED VLANS ................................................................................................11-45
V
ERIFYING THE CONFIGURATION .......................................................................................................11-47
C
OMPLETE CLI EXAMPLES ...............................................................................................................11-47
C
ONFIGURING 802.1Q-IN-Q TAGGING .....................................................................................................11-49
C
ONFIGURATION RULES ...................................................................................................................11-51
E
NABLING 802.1Q-IN-Q TAGGING ....................................................................................................11-51
E
XAMPLE CONFIGURATION ...............................................................................................................11-52
C
ONFIGURING PRIVATE VLANS ..............................................................................................................11-52
I
MPLEMENTATION NOTES ..................................................................................................................11-54
C
OMMAND SYNTAX ..........................................................................................................................11-54
E
NABLING BROADCAST OR UNKNOWN UNICAST TRAFFIC TO THE PRIVATE VLAN ...............................11-55
CLI E
XAMPLE FOR FIGURE 11.21 .....................................................................................................11-56
D
UAL-MODE VLAN PORTS .....................................................................................................................11-56
D
ISPLAYING VLAN INFORMATION ............................................................................................................11-59
D
ISPLAYING SYSTEM-WIDE VLAN INFORMATION ...............................................................................11-59
D
ISPLAYING VLAN INFORMATION FOR SPECIFIC PORTS ....................................................................11-60
CHAPTER 12
R
ULE-BASED IP ACCESS CONTROL LISTS (ACLS).................................... 12-1
ACL OVERVIEW ........................................................................................................................................12-2
T
YPES OF IP ACLS ............................................................................................................................12-2
ACL ID
S AND ENTRIES .......................................................................................................................12-2
N
UMBERED AND NAMED ACLS ...........................................................................................................12-3
D
EFAULT ACL ACTION .......................................................................................................................12-3
H
OW HARDWARE-BASED ACLS WORK ......................................................................................................12-3
H
OW FRAGMENTED PACKETS ARE PROCESSED ...................................................................................12-3
H
ARDWARE AGING OF LAYER 4 CAM ENTRIES ...................................................................................12-4
C
ONFIGURATION CONSIDERATIONS ............................................................................................................12-4
C
ONFIGURING STANDARD NUMBERED ACLS .............................................................................................12-4
S
TANDARD NUMBERED ACL SYNTAX ..................................................................................................12-5
C
ONFIGURATION EXAMPLE FOR STANDARD NUMBERED ACLS .............................................................12-6
C
ONFIGURING STANDARD NAMED ACLS ...................................................................................................12-6
S
TANDARD NAMED ACL SYNTAX ........................................................................................................12-6
C
ONFIGURATION EXAMPLE FOR STANDARD NAMED ACLS ...................................................................12-8
C
ONFIGURING EXTENDED NUMBERED ACLS ..............................................................................................12-8
E
XTENDED NUMBERED ACL SYNTAX ..................................................................................................12-8
C
ONFIGURATION EXAMPLES FOR EXTENDED NUMBERED ACLS .........................................................12-12
C
ONFIGURING EXTENDED NAMED ACLS ..................................................................................................12-13
E
XTENDED NAMED ACL SYNTAX ......................................................................................................12-15
C
ONFIGURATION EXAMPLE FOR EXTENDED NAMED ACLS .................................................................12-18
A
DDING A COMMENT TO AN ACL ENTRY .................................................................................................12-18
E
NABLING STRICT CONTROL OF ACL FILTERING OF FRAGMENTED PACKETS ............................................12-20

Table of Contents

Related product manuals