EasyManua.ls Logo

Foundry Networks Switch and Router - Page 13

Default Icon
1070 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
December 2000 xiii
CHAPTER 13
U
SING ACCESS CONTROL LISTS (ACLS)................................................... 13-1
OVERVIEW ................................................................................................................................................13-1
U
SAGE GUIDELINES FOR ACCESS CONTROL LISTS (ACLS) ........................................................................13-2
ACL S
UPPORT ON THE FOUNDRY PRODUCTS .....................................................................................13-2
ACL IDS AND ENTRIES .......................................................................................................................13-3
D
EFAULT ACL ACTION .......................................................................................................................13-3
C
ONTROLLING MANAGEMENT ACCESS TO THE DEVICE ........................................................................13-4
ACL LOGGING ...................................................................................................................................13-4
S
UPPORT FOR UP TO 4096 ACCESS CONTROL LISTS (ACLS) ..............................................................13-4
D
ISABLING OR RE-ENABLING ACCESS CONTROL LISTS (ACLS) ..................................................................13-5
ENABLING ACL MODE ........................................................................................................................13-5
D
ISABLING ACL MODE .......................................................................................................................13-6
C
ONFIGURING STANDARD ACLS ...............................................................................................................13-6
STANDARD ACL SYNTAX ....................................................................................................................13-7
C
ONFIGURING EXTENDED ACLS ..............................................................................................................13-10
F
ILTERING ON IP PRECEDENCE AND TOS VALUES ............................................................................13-11
E
XTENDED ACL SYNTAX ..................................................................................................................13-12
C
ONFIGURING NAMED ACLS ...................................................................................................................13-19
M
ODIFYING ACLS ...................................................................................................................................13-20
A
PPLYING AN ACL TO A SUBSET OF PORTS ON A VIRTUAL INTERFACE .....................................................13-22
E
NABLING STRICT TCP OR UDP MODE ..................................................................................................13-22
E
NABLING STRICT TCP MODE ..........................................................................................................13-23
E
NABLING STRICT UDP MODE .........................................................................................................13-23
D
ISPLAYING ACLS ..................................................................................................................................13-24
D
ISPLAYING THE LOG ENTRIES ................................................................................................................13-24
P
OLICY-BASED ROUTING (PBR) ..............................................................................................................13-25
C
ONFIGURING PBR ..........................................................................................................................13-26
E
NABLING PBR ................................................................................................................................13-28
C
ONFIGURATION EXAMPLES .............................................................................................................13-28
CHAPTER 14
I
RONCLAD RATE LIMITING......................................................................... 14-1
FIXED RATE LIMITING ................................................................................................................................14-2
H
OW FIXED RATE LIMITING WORKS ....................................................................................................14-2
C
ONFIGURING FIXED RATE LIMITING ...................................................................................................14-3
D
ISPLAYING FIXED RATE LIMITING INFORMATION .................................................................................14-3
A
DAPTIVE RATE LIMITING ..........................................................................................................................14-5
E
XAMPLES OF ADAPTIVE RATE LIMITING APPLICATIONS .......................................................................14-6
A
DAPTIVE RATE LIMITING PARAMETERS ..............................................................................................14-9
H
OW ADAPTIVE RATE LIMITING WORKS ............................................................................................14-11
C
ONFIGURING ADAPTIVE RATE LIMITING ...........................................................................................14-14
C
OMPLETE CLI EXAMPLES ...............................................................................................................14-19
D
ISABLING RATE LIMITING EXEMPTION FOR CONTROL PACKETS ........................................................14-21

Table of Contents

Related product manuals