Concept Guide

Conguring Set Conditions..................................................................................................................................... 120
Congure a Route Map for Route Redistribution..................................................................................................121
Congure a Route Map for Route Tagging............................................................................................................ 121
Continue Clause........................................................................................................................................................122
IP Fragment Handling.................................................................................................................................................... 122
IP Fragments ACL Examples...................................................................................................................................122
Layer 4 ACL Rules Examples...................................................................................................................................123
Congure a Standard IP ACL........................................................................................................................................ 123
Conguring a Standard IP ACL Filter..................................................................................................................... 124
Congure an Extended IP ACL.....................................................................................................................................125
Conguring Filters with a Sequence Number.......................................................................................................125
Conguring Filters Without a Sequence Number.................................................................................................127
Congure Layer 2 and Layer 3 ACLs............................................................................................................................127
Assign an IP ACL to an Interface..................................................................................................................................128
Applying an IP ACL.........................................................................................................................................................128
Counting ACL Hits....................................................................................................................................................129
Congure Ingress ACLs................................................................................................................................................. 129
Congure Egress ACLs..................................................................................................................................................130
Applying Egress Layer 3 ACLs (Control-Plane)..................................................................................................... 131
IP Prex Lists................................................................................................................................................................... 131
Implementation Information.................................................................................................................................... 132
Conguration Task List for Prex Lists.................................................................................................................. 132
ACL Remarks.................................................................................................................................................................. 135
Conguring a Remark.............................................................................................................................................. 135
Deleting a Remark.................................................................................................................................................... 136
ACL Resequencing......................................................................................................................................................... 137
Resequencing an ACL or Prex List.......................................................................................................................137
Route Maps.....................................................................................................................................................................138
Implementation Information.................................................................................................................................... 138
Logging of ACL Processes............................................................................................................................................ 139
Guidelines for Conguring ACL Logging................................................................................................................140
Conguring ACL Logging........................................................................................................................................ 140
Flow-Based Monitoring.................................................................................................................................................. 141
Behavior of Flow-Based Monitoring....................................................................................................................... 141
Enabling Flow-Based Monitoring............................................................................................................................142
Conguring UDF ACL.....................................................................................................................................................143
Conguring IP Mirror Access Group............................................................................................................................ 146
Sample Conguration...............................................................................................................................................147
Example of viewing IP mirror–access–group applied to an Interface................................................................147
8 Bidirectional Forwarding Detection (BFD).................................................................................................. 148
How BFD Works............................................................................................................................................................. 148
BFD Packet Format..................................................................................................................................................149
BFD Sessions............................................................................................................................................................ 150
BFD Three-Way Handshake.....................................................................................................................................151
Session State Changes............................................................................................................................................153
6
Contents