Enterasys C5G124-24 Configuration Manual page 18

Fixed switch platforms
Hide thumbs Also See for C5G124-24:
Table of Contents

Advertisement

Configuring Area Virtual-Link Authentication .................................................................................. 22-14
Configuring Area Virtual-Link Timers.............................................................................................. 22-14
Configuring Route Redistribution ......................................................................................................... 22-14
Configuring Passive Interfaces ............................................................................................................ 22-14
Configuring OSPF Interfaces ...................................................................................................................... 22-15
Configuring Interface Cost ................................................................................................................... 22-15
Configuring Interface Priority ................................................................................................................ 22-15
Configuring Authentication ................................................................................................................... 22-15
Configuring OSPF Interface Timers ..................................................................................................... 22-16
Default Settings .......................................................................................................................................... 22-16
Configuration Procedures ........................................................................................................................... 22-17
Basic OSPF Router Configuration ....................................................................................................... 22-17
OSPF Interface Configuration .............................................................................................................. 22-18
OSPF Area Configuration .................................................................................................................... 22-18
Managing and Displaying OSPF Configuration and Statistics ............................................................. 22-19
VRRP Overview ............................................................................................................................................ 23-1
VRRP Virtual Router Creation ................................................................................................................ 23-2
VRRP Master Election ........................................................................................................................... 23-2
Enabling Master Preemption .................................................................................................................. 23-3
Enabling ICMP Replies .......................................................................................................................... 23-3
Configuring VRRP Authentication .......................................................................................................... 23-3
Enabling the VRRP Virtual Router ......................................................................................................... 23-3
Configuring VRRP ........................................................................................................................................ 23-3
Configuration Examples ......................................................................................................................... 23-4
Basic VRRP Configuration ............................................................................................................... 23-4
Multiple Backup VRRP Configuration ............................................................................................... 23-6
Terms and Definitions ................................................................................................................................... 23-8
Chapter 24: Configuring Access Control Lists
Using Access Control Lists (ACLs) in Your Network .................................................................................... 24-1
Implementing ACLs ...................................................................................................................................... 24-1
ACL Configuration Overview ........................................................................................................................ 24-2
Creating IPv4 ACLs ................................................................................................................................ 24-2
Creating IPv6 and MAC ACLs ................................................................................................................ 24-2
Creating ACL Rules ............................................................................................................................... 24-3
IPv4 Rules ........................................................................................................................................ 24-3
IPv6 Rules ........................................................................................................................................ 24-4
MAC Rules ....................................................................................................................................... 24-4
Managing ACLs ...................................................................................................................................... 24-4
Deleting ACLs and Rules ................................................................................................................. 24-4
Moving ACL Rules............................................................................................................................ 24-5
Replacing ACL Rules ....................................................................................................................... 24-5
Inserting ACL Rules.......................................................................................................................... 24-6
Applying ACLs ........................................................................................................................................ 24-6
Configuring ACLs ......................................................................................................................................... 24-7
Configuring IPv4 ACLs ........................................................................................................................... 24-7
Example............................................................................................................................................ 24-8
Configuring IPv6 ACLs ........................................................................................................................... 24-8
Example............................................................................................................................................ 24-9
Configuring MAC ACLs ........................................................................................................................ 24-10
Example.......................................................................................................................................... 24-10
Access Control Lists on the A4 ................................................................................................................... 24-11
Configuring A4 ACLs ............................................................................................................................ 24-12
xvi

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents