Users Guide

MAB in Single-host and Multi-Host Mode..................................................................................114
MAB in Multi-Supplicant Authentication Mode..........................................................................114
Configuring MAC Authentication Bypass....................................................................................115
Dynamic CoS with 802.1X.................................................................................................................116
6 Access Control Lists (ACLs).............................................................................118
IP Access Control Lists (ACLs)...........................................................................................................118
CAM Usage...................................................................................................................................119
User-Configurable CAM Allocation............................................................................................120
Allocating CAM for Ingress ACLs on the Port Extender.............................................................120
Allocating CAM for Egress ACLs on the Port Extender..............................................................122
Implementing ACLs .................................................................................................................... 123
IP Fragment Handling....................................................................................................................... 124
IP Fragments ACL Examples....................................................................................................... 125
Layer 4 ACL Rules Examples....................................................................................................... 125
Configure a Standard IP ACL............................................................................................................ 126
Configuring a Standard IP ACL Filter.......................................................................................... 127
Configure an Extended IP ACL......................................................................................................... 128
Configuring Filters with a Sequence Number............................................................................128
Configuring Filters Without a Sequence Number......................................................................130
Configure Layer 2 and Layer 3 ACLs.................................................................................................131
Using ACL VLAN Groups................................................................................................................... 131
Guidelines for Configuring ACL VLAN Groups...........................................................................132
Configuring an ACL VLAN Group............................................................................................... 132
Allocating ACL VLAN CAM.......................................................................................................... 133
Applying an IP ACL to an Interface...................................................................................................134
Applying Ingress ACLs on the Port Extender..............................................................................135
Applying Egress ACLs.................................................................................................................. 135
Applying Layer 3 Egress ACLs on Control-Plane Traffic............................................................136
Counting ACL Hits....................................................................................................................... 137
IP Prefix Lists...................................................................................................................................... 137
Implementation Information.......................................................................................................137
Configuration Task List for Prefix Lists....................................................................................... 138
ACL Resequencing............................................................................................................................ 141
Resequencing an ACL or Prefix List............................................................................................142
Route Maps........................................................................................................................................143
Implementation Information...................................................................................................... 144
Important Points to Remember........................................................................................................144
Configuration Task List for Route Maps.....................................................................................144
Configuring Match Routes..........................................................................................................146
Configuring Set Conditions........................................................................................................ 148
Configure a Route Map for Route Redistribution...................................................................... 149
6