Dell Networking S6000 Uživatelský manuál Strana 117

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 986
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 116
seq 15 permit ip any host 1.1.1.3
seq 20 permit ip any host 1.1.1.4
Dell# end
Dell# resequence access-list ipv4 test 2 2
Dell# show running-config acl
!
ip access-list extended test
remark 2 XYZ
remark 4 this remark corresponds to permit any host 1.1.1.1
seq 4 permit ip any host 1.1.1.1
remark 6 this remark has no corresponding rule
remark 8 this remark corresponds to permit ip any host 1.1.1.2
seq 8 permit ip any host 1.1.1.2
seq 10 permit ip any host 1.1.1.3
seq 12 permit ip any host 1.1.1.4
Route Maps
Route maps are supported on S6000 platform.
Similar to ACLs and prefix lists, route maps are composed of a series of commands that contain a
matching criterion and an action; however, route maps can change the packets meeting the criterion.
ACLs and prefix lists can only drop or forward the packet or traffic. Route maps process routes for route
redistribution. For example, a route map can be called to filter only specific routes and to add a metric.
Route maps also have an “implicit deny.” Unlike ACLs and prefix lists; however, where the packet or traffic
is dropped, in route maps, if a route does not match any of the route map conditions, the route is not
redistributed.
Implementation Information
The Dell Networking OS implementation of route maps allows route maps with the no match or no set
commands. When there is no match command, all traffic matches the route map and the set command
applies.
Flow-Based Monitoring Support for ACLs
Flow-based monitoring is supported on the S6000 platform.
Flow-based monitoring conserves bandwidth by monitoring only the specified traffic instead of all traffic
on the interface. It is available for Layer 2 and Layer 3 ingress traffic. You can specify traffic using standard
or extended access-lists. This mechanism copies incoming packets that matches the ACL rules applied
on the ingress port and forwards (mirrors) them to another port. The source port is the monitored port
(MD) and the destination port is the monitoring port (MG).
The port mirroring application maintains and performs all the monitoring operations on the chassis. ACL
information is sent to the ACL manager, which in turn notifies the ACL agent to add entries in the CAM
area. Duplicate entries in the ACL are not saved.
When a packet arrives at a port that is being monitored, the packet is validated against the configured
ACL rules. If the packet matches an ACL rule, the system examines the corresponding flow processor to
perform the action specified for that port. If the mirroring action is set in the flow processor entry, the
destination port details, to which the mirrored information must be sent, are sent to the destination port.
Access Control Lists (ACLs)
117
Zobrazit stránku 116
1 2 ... 112 113 114 115 116 117 118 119 120 121 122 ... 985 986

Komentáře k této Příručce

Žádné komentáře