Displaying And Clearing Acl Counters; Switch Protection - Extreme Networks ExtremeWare XOS Guide Manual

Concepts guide
Hide thumbs Also See for ExtremeWare XOS Guide:
Table of Contents

Advertisement

Switch Protection

After the ACL has been checked, it can be applied to an interface. To apply an ACL, use the following
command:
configure access-list <aclname> [any | ports <portlist>] {ingress}
If you use the
keyword, the ACL is applied to all the interfaces, and is referred to as the wildcard
any
ACL. This ACL is evaluated for ports without a specific ACL applied to it, and is also applied to
packets that do not match the ACL applied to the interface.
If an ACL is already configured on an interface, the command will be rejected and an error message
displayed.
To remove an ACL from an interface, use the following command:
unconfigure access-list {any | ports <portlist>} {ingress}
To display which interfaces have ACLs configured, and which ACL is on which interface, use the
following command:
show access-list {<aclname>}

Displaying and Clearing ACL Counters

To display the access list counters, use the following command:
show access-list counter {<countername>} [any | ports <portlist>] {ingress}
To clear the access list counters, use the following command:
clear access-list counter {<countername>} [any | ports <portlist>] {ingress}
Switch Protection
Switch protection features enhance the robustness of switch performance. In this category are the
following features:
• Routing Access Profiles
• Route Maps
• Policies
In ExtremeWare XOS, all of these features are supported by the concept of a policy. If you have used
any of these features in the past, you will now use policies to achieve the same results.
Routing access profiles are used to control the advertisement or recognition of routing protocols, such as
RIP, OSPF, IS-IS, or BGP. Routing access profiles can be used to 'hide' entire networks, or to trust only
specific sources for routes or ranges of routes. The capabilities of routing access profiles are specific to
the type of routing protocol involved, but are sometimes more efficient and easier to implement than
access lists.
Route maps are used to modify or filter routes. They are also used to modify or filter routing
information.
ExtremeWare XOS 10.1 Concepts Guide
119

Advertisement

Table of Contents
loading

This manual is also suitable for:

Extremeware xos 10.1

Table of Contents