Users Guide

24 Contents
Configuring a Port in Trunk Mode . . . . . . . . . 676
Configuring a Port in General Mode
. . . . . . . . 679
19 Port and System Security . . . . . . . . . . . 681
Port Security . . . . . . . . . . . . . . . . . . . . . . . 681
Denial of Service
. . . . . . . . . . . . . . . . . . . . . 688
20 Access Control Lists . . . . . . . . . . . . . . . 689
ACL Overview . . . . . . . . . . . . . . . . . . . . . . 689
ACL Counters
. . . . . . . . . . . . . . . . . . . . 691
What Are MAC ACLs?
. . . . . . . . . . . . . . . 691
What Are IP ACLs?
. . . . . . . . . . . . . . . . . 692
ACL Actions
. . . . . . . . . . . . . . . . . . . . . 692
What Is the ACL Redirect Function?
. . . . . . . . 693
What Is the ACL Mirror Function?
. . . . . . . . . 694
What Is ACL Logging
. . . . . . . . . . . . . . . . 694
What Are Time-Based ACLs?
. . . . . . . . . . . . 694
ACL Limitations
. . . . . . . . . . . . . . . . . . . 695
ACL Configuration Details
. . . . . . . . . . . . . . . . 701
How Are ACLs Configured?
. . . . . . . . . . . . . 701
Editing Access Lists
. . . . . . . . . . . . . . . . . 701
Preventing False ACL Matches
. . . . . . . . . . . 701
Using IP and MAC Address Masks
. . . . . . . . . 703
Policy-Based Routing
. . . . . . . . . . . . . . . . . . 704
Packet Classification
. . . . . . . . . . . . . . . . 704
Route-Map Processing
. . . . . . . . . . . . . . . 705
Route-Map Actions
. . . . . . . . . . . . . . . . . 706
ACLs and Policy Interaction
. . . . . . . . . . . . 708
Limitations
. . . . . . . . . . . . . . . . . . . . . . 709