December 2000 xiii
CHAPTER 13
U
SING ACCESS CONTROL LISTS (ACLS)................................................... 13-1
OVERVIEW ................................................................................................................................................13-1
U
SAGE GUIDELINES FOR ACCESS CONTROL LISTS (ACLS) ........................................................................13-2
ACL S
UPPORT ON THE FOUNDRY PRODUCTS .....................................................................................13-2
ACL IDS AND ENTRIES .......................................................................................................................13-3
D
EFAULT ACL ACTION .......................................................................................................................13-3
C
ONTROLLING MANAGEMENT ACCESS TO THE DEVICE ........................................................................13-4
ACL LOGGING ...................................................................................................................................13-4
S
UPPORT FOR UP TO 4096 ACCESS CONTROL LISTS (ACLS) ..............................................................13-4
D
ISABLING OR RE-ENABLING ACCESS CONTROL LISTS (ACLS) ..................................................................13-5
ENABLING ACL MODE ........................................................................................................................13-5
D
ISABLING ACL MODE .......................................................................................................................13-6
C
ONFIGURING STANDARD ACLS ...............................................................................................................13-6
STANDARD ACL SYNTAX ....................................................................................................................13-7
C
ONFIGURING EXTENDED ACLS ..............................................................................................................13-10
F
ILTERING ON IP PRECEDENCE AND TOS VALUES ............................................................................13-11
E
XTENDED ACL SYNTAX ..................................................................................................................13-12
C
ONFIGURING NAMED ACLS ...................................................................................................................13-19
M
ODIFYING ACLS ...................................................................................................................................13-20
A
PPLYING AN ACL TO A SUBSET OF PORTS ON A VIRTUAL INTERFACE .....................................................13-22
E
NABLING STRICT TCP OR UDP MODE ..................................................................................................13-22
E
NABLING STRICT TCP MODE ..........................................................................................................13-23
E
NABLING STRICT UDP MODE .........................................................................................................13-23
D
ISPLAYING ACLS ..................................................................................................................................13-24
D
ISPLAYING THE LOG ENTRIES ................................................................................................................13-24
P
OLICY-BASED ROUTING (PBR) ..............................................................................................................13-25
C
ONFIGURING PBR ..........................................................................................................................13-26
E
NABLING PBR ................................................................................................................................13-28
C
ONFIGURATION EXAMPLES .............................................................................................................13-28
CHAPTER 14
I
RONCLAD RATE LIMITING......................................................................... 14-1
FIXED RATE LIMITING ................................................................................................................................14-2
H
OW FIXED RATE LIMITING WORKS ....................................................................................................14-2
C
ONFIGURING FIXED RATE LIMITING ...................................................................................................14-3
D
ISPLAYING FIXED RATE LIMITING INFORMATION .................................................................................14-3
A
DAPTIVE RATE LIMITING ..........................................................................................................................14-5
E
XAMPLES OF ADAPTIVE RATE LIMITING APPLICATIONS .......................................................................14-6
A
DAPTIVE RATE LIMITING PARAMETERS ..............................................................................................14-9
H
OW ADAPTIVE RATE LIMITING WORKS ............................................................................................14-11
C
ONFIGURING ADAPTIVE RATE LIMITING ...........................................................................................14-14
C
OMPLETE CLI EXAMPLES ...............................................................................................................14-19
D
ISABLING RATE LIMITING EXEMPTION FOR CONTROL PACKETS ........................................................14-21