Contents
December 2005 © Foundry Networks, Inc. ix
CONFIGURING A VIRTUAL ROUTING INTERFACE GROUP .....................................................................11-41
D
ISPLAYING THE VLAN GROUP AND VIRTUAL ROUTING INTERFACE GROUP INFORMATION ..................11-42
A
LLOCATING MEMORY FOR MORE VLANS OR VIRTUAL ROUTING INTERFACES ...................................11-42
C
ONFIGURING SUPER AGGREGATED VLANS ...........................................................................................11-43
C
ONFIGURING AGGREGATED VLANS ................................................................................................11-45
V
ERIFYING THE CONFIGURATION .......................................................................................................11-47
C
OMPLETE CLI EXAMPLES ...............................................................................................................11-47
C
ONFIGURING 802.1Q-IN-Q TAGGING .....................................................................................................11-49
C
ONFIGURATION RULES ...................................................................................................................11-51
E
NABLING 802.1Q-IN-Q TAGGING ....................................................................................................11-51
E
XAMPLE CONFIGURATION ...............................................................................................................11-52
C
ONFIGURING PRIVATE VLANS ..............................................................................................................11-52
I
MPLEMENTATION NOTES ..................................................................................................................11-54
C
OMMAND SYNTAX ..........................................................................................................................11-54
E
NABLING BROADCAST OR UNKNOWN UNICAST TRAFFIC TO THE PRIVATE VLAN ...............................11-55
CLI E
XAMPLE FOR FIGURE 11.21 .....................................................................................................11-56
D
UAL-MODE VLAN PORTS .....................................................................................................................11-56
D
ISPLAYING VLAN INFORMATION ............................................................................................................11-59
D
ISPLAYING SYSTEM-WIDE VLAN INFORMATION ...............................................................................11-59
D
ISPLAYING VLAN INFORMATION FOR SPECIFIC PORTS ....................................................................11-60
CHAPTER 12
R
ULE-BASED IP ACCESS CONTROL LISTS (ACLS).................................... 12-1
ACL OVERVIEW ........................................................................................................................................12-2
T
YPES OF IP ACLS ............................................................................................................................12-2
ACL ID
S AND ENTRIES .......................................................................................................................12-2
N
UMBERED AND NAMED ACLS ...........................................................................................................12-3
D
EFAULT ACL ACTION .......................................................................................................................12-3
H
OW HARDWARE-BASED ACLS WORK ......................................................................................................12-3
H
OW FRAGMENTED PACKETS ARE PROCESSED ...................................................................................12-3
H
ARDWARE AGING OF LAYER 4 CAM ENTRIES ...................................................................................12-4
C
ONFIGURATION CONSIDERATIONS ............................................................................................................12-4
C
ONFIGURING STANDARD NUMBERED ACLS .............................................................................................12-4
S
TANDARD NUMBERED ACL SYNTAX ..................................................................................................12-5
C
ONFIGURATION EXAMPLE FOR STANDARD NUMBERED ACLS .............................................................12-6
C
ONFIGURING STANDARD NAMED ACLS ...................................................................................................12-6
S
TANDARD NAMED ACL SYNTAX ........................................................................................................12-6
C
ONFIGURATION EXAMPLE FOR STANDARD NAMED ACLS ...................................................................12-8
C
ONFIGURING EXTENDED NUMBERED ACLS ..............................................................................................12-8
E
XTENDED NUMBERED ACL SYNTAX ..................................................................................................12-8
C
ONFIGURATION EXAMPLES FOR EXTENDED NUMBERED ACLS .........................................................12-12
C
ONFIGURING EXTENDED NAMED ACLS ..................................................................................................12-13
E
XTENDED NAMED ACL SYNTAX ......................................................................................................12-15
C
ONFIGURATION EXAMPLE FOR EXTENDED NAMED ACLS .................................................................12-18
A
DDING A COMMENT TO AN ACL ENTRY .................................................................................................12-18
E
NABLING STRICT CONTROL OF ACL FILTERING OF FRAGMENTED PACKETS ............................................12-20