7210 SAS E OS Routing Protocols Guide. Software Version: 7210 SAS OS 2.0 Rev. 02 July 2010 Document Part Number: * *

Size: px
Start display at page:

Download "7210 SAS E OS Routing Protocols Guide. Software Version: 7210 SAS OS 2.0 Rev. 02 July 2010 Document Part Number: * *"

Transcription

1 7210 SAS E OS Routing Protocols Guide Software Version: 7210 SAS OS 2.0 Rev. 02 July 2010 Document Part Number: * *

2 This document is protected by copyright. Except as specifically permitted herein, no portion of the provided information can be reproduced in any form, or by any means, without prior written permission from Alcatel-Lucent. Alcatel, Lucent, Alcatel-Lucent and the Alcatel-Lucent logo are trademarks of Alcatel-Lucent. All other trademarks are the property of their respective owners. The information presented is subject to change without notice. Alcatel-Lucent assumes no responsibility for inaccuracies contained herein. Copyright Copyright 2010 Alcatel-Lucent All rights reserved.

3 TABLE OF CONTENTS Preface Route Policies Configuring Route Policies Policy Statements Default Action Behavior Denied IP Prefixes Configuration Notes General Configuring Route Policies with CLI Route Policy Configuration Overview When to Create Routing Policies Policy Evaluation Basic Configurations Configuring Route Policy Components Beginning the Policy Statement Creating a Route Policy Configuring a Default Action Configuring an Entry Route Policy Configuration Management Tasks Editing Policy Statements and Parameters Deleting an Entry Deleting a Policy Statement Route Policy Command Reference Route Policy Command Reference Generic Commands Route Policy Options Route Policy Prefix Commands Route Policy Entry Match Commands Route Policy Action Commands Show Commands Standards and Protocol Support Index SAS E OS Routing Protocols Guide Page 3

4 Table of Contents Page SAS E OS Routing Protocols Guide

5 LIST OF FIGURES Route Policies Figure 1: Route Policy Process Example SAS E OS Routing Protocols Guide Page 5

6 List of Figures Page SAS E OS Routing Protocols Guide

7 Preface About This Guide This guide describes route policies provided by the 7210-SAS E OS and presents configuration and implementation examples. This document is organized into functional chapters and provides concepts and descriptions of the implementation flow, as well as Command Line Interface (CLI) syntax and command usage. Audience This manual is intended for network administrators who are responsible for configuring the 7210 SAS E-Series routers. It is assumed that the network administrators have an understanding of networking principles and configurations. Protocols, standards, and services described in this manual include the following: Route policies 7210 SAS E OS Routing Protocols GuidePage 11

8 Preface List of Technical Publications The 7210-SAS E OS documentation set is composed of the following books: 7210-SAS E OS Basic System Configuration Guide This guide describes basic system configurations and operations SAS E OS System Management Guide This guide describes system security and access configurations as well as event logging and accounting logs SAS E OS Interface Configuration Guide This guide describes card, Media Dependent Adapter (MDA), and port provisioning SAS E OS Router Configuration Guide This guide describes logical IP routing interfaces and associated attributes such as an IP address, port, link aggregation group (LAG) as well as IP and MAC-based filtering SAS E OS Routing Protocols Guide This guide provides an overview configuration examples for route policies SAS E OS Services Guide This guide describes how to configure service parameters such as customer information and user services SAS E OS OAM and Diagnostic Guide This guide describes how to configure features such as service mirroring and Operations, Administration and Management (OAM) tools SAS E OS Quality of Service Guide This guide describes how to configure Quality of Service (QoS) policy management. Page SAS E OS Routing Protocols Guide

9 Preface Technical Support If you purchased a service agreement for your 7210 SAS router and related products from a distributor or authorized reseller, contact the technical support staff for that distributor or reseller for assistance. If you purchased an Alcatel-Lucent service agreement, contact your welcome center at: Web: SAS E OS Routing Protocols Guide Page 13

10 Preface Page SAS E OS Routing Protocols Guide

11 Route Policies In This Chapter This chapter provides information about configuring route policies. Topics in this chapter include: Configuring Route Policies on page 278 Policy Statements on page 279 Default Action Behavior on page 280 Configuration Notes on page SAS E OS Routing Protocols Guide Page 277

12 Configuring Route Policies Configuring Route Policies Alcatel-Lucent's 7210 SAS E supports route policies to allow users to enable IGMP group membership report filtering. IGMP group membership report filtering allows the user to configure rules which can be used to restrict the IGMP groups that subscribers/hosts can enrol to. This is achieved by using route policies that specify the set of hosts whose group membership reports are to be accepted (and further processed appropriately by the system) or rejected. There are no default route policies. Each policy must be created explicitly. Policy parameters are modifiable. Page SAS E OS Routing Protocols Guide

13 Route Policies Policy Statements Route policies contain policy statements containing ordered entries containing match conditions and actions you specify. The entries should be sequenced from the most explicit to least explicit. IGMP group membership report processing can be implemented according to your defined policies. Policy-based routing allows you to dictate whether to process or drop the traffic. Route policies can match a given route policy entry and continue searching for other matches within the same route policy. The process can stop when the first complete match is found and executes the action defined in the entry, either to accept or reject packets that match the criteria or proceed to the next entry. You can specify matching criteria based on sourceor destination. You can also provide more matching conditions by specifying criteria such as: Prefix list A named list of prefixes. From criteria source IP address and destination (for example, a destination IP multicast group address) SAS E OS Routing Protocols Guide Page 279

14 Configuring Route Policies Default Action Behavior The default action specifies how packets are to be processed when a policy related to the route is not explicitly configured. The following default actions are applied in the event that: A route policy does not specify a matching condition, all the routes being compared with the route policy are considered to be matches. A packet does not match any policy entries, then the next policy is evaluated. If a match does not occur then the last entry in the last policy is evaluated. If no default action is specified, the default behavior of the protocol controls whether the routes match or not. If a default action is defined for one or more of the configured route policies, then the default action is handled as follows: The default action can be set to all available action states including accept, reject, nextentry, and next-policy. If the action states accept or reject, then the policy evaluation terminates and the appropriate result is returned. If a default action is defined and no matches occurred with the entries in the policy, then the default action is used. If a default action is defined and one or more matches occurred with the entries of the policy, then the default action is not used. Denied IP Prefixes The following IP address prefixes are not allowed by the routing protocols and the Route Table Manager and are not be populated within the forwarding table: /8 or longer /8 or longer /4 or longer /4 or longer Any other prefixes that need to be filtered can be filtered explicitly using route policies. When you want unique behaviors to control route characteristics. For example, change the route preference. Page SAS E OS Routing Protocols Guide

15 Route Policies Configuration Notes This section describes route policy configuration caveats. General When configuring policy statements, the policy statement name must be unique SAS E OS Routing Protocols Guide Page 281

16 Configuration Notes Page SAS E OS Routing Protocols Guide

17 Route Policies Configuring Route Policies with CLI This section provides information to configure route policies using the command line interface. Topics in this section include: Route Policy Configuration Overview on page 296 When to Create Routing Policies on page 296 Policy Evaluation on page 298 Configuring Route Policy Components on page 304 Creating a Route Policy on page 306 Beginning the Policy Statement on page 305 Configuring an Entry on page 308 Route Policy Configuration Management Tasks on page SAS E OS Routing Protocols Guide Page 295

18 Route Policy Configuration Overview Route Policy Configuration Overview Route policies allow the configuration of IGMP group membership reports filtering rules. When to Create Routing Policies Route policies are created in the config>router context. There are no default route policies. Each route policy must be explicitly created and applied. A route policy impacts the flow of packets within and through the router. Route policies can be created to control: To filter IGMP membership reports from specific hosts and/or specific multicast groups. Before a route policy is applied, analyze the policy s purpose and be aware of the results (and consequences) when packets match the specified criteria and the associated actions and default actions, if specified, are executed. Membership reports can be filtered based on a specific source address. Page SAS E OS Routing Protocols Guide

19 Route Policies Policy Evaluation Routing policy statements can consist of as few as one or several entries. The entries specify the matching criteria. The packet fields are compared to the first entry in the policy statement. If it matches, the specified entry action is taken, either accepted or rejected. If the action is to accept or reject the route, that action is taken and the evaluation of the route ends. If the route does not match the first entry, the route is compared to the next entry (if more than one is configured) in the policy statement. If there is a match with the second entry, the specified action is taken. If the action is to accept or reject the route, that action is taken and the evaluation of the route ends, and so on. Each route policy statement can have a default-action clause defined. If a default-action is defined for one or more of the configured route policies, then the default actions should be handled in the following ways: The process stops when the first complete match is found and executes the action defined in the entry. If the packet does not match any of the entries, the system executes the default action specified in the policy statement. Figure 16 depicts an example of the route policy process. Route policies can also match a given route policy entry and continue to search for other entries within either the same route policy or the next route policy by specifying the next-entryoption in the entry s action command SAS E OS Routing Protocols Guide Page 297

20 Route Policy Configuration Overview ROUTE/ PACKET POLICY-STATEMENT 274 DEFAULT ACTION ENTRY 1 matches ENTRY ACTION: ACCEPT OR REJECT ENTRY 20 matches ACCEPT OR REJECT ENTRY 30 matches ACCEPT OR REJECT no match POLICY-STATEMENT 275 DEFAULT ACTION ENTRY 1 matches ENTRY ACTION: ACCEPT OR REJECT ENTRY 2 matches ACCEPT OR REJECT ENTRY 3 matches ACCEPT OR REJECT no match DEFAULT ACTION SPECIFIED? yes PERFORM DEFAULT ACTION no PERFORM ACTION SPECIFIED BY PROTOCOL Figure 16: Route Policy Process Example Page SAS E OS Routing Protocols Guide

21 Route Policies Basic Configurations This section provides information to configure route policies and configuration examples of common tasks. The minimal route policy parameters that need to be configured are: Policy statement with the following parameters specified: At least one entry Entry action Following is a sample route policy configuration: A:ALA-B>config>router>policy-options# info A:ALA-B>config>router>policy-options#info prefix-list "host" prefix /8 longer prefix-list "group" prefix /32 exact policy-statement "block-igmp" description "Reject-Reports-From-Specific-Group-And-Host" entry 1 from host-ip "host" action next-entry entry 2 from group-address "group" action reject default-action accept policy-statement "permit-igmp" description "Accept-Reports-From-Specific-Group-And-Host" entry 1 from host-ip "host3" group-address "group3" action accept default-action reject A:ALA-B>config>router>policy-options# 7210 SAS E OS Routing Protocols Guide Page 299

22 Configuring Route Policy Components Configuring Route Policy Components Use the CLI syntax displayed below to configure: Creating a Route Policy on page 306 Beginning the Policy Statement on page 305 Configuring an Entry on page 308 Page SAS E OS Routing Protocols Guide

23 Route Policies Beginning the Policy Statement Use the following CLI syntax to begin a policy statement configuration. In order for a policy statement to be complete an entry must be specified (see Configuring an Entry on page 308). CLI Syntax: config>router>policy-options begin policy-statement name description text The following error message displays when the you try to modify a policy options command without entering begin first. A:ALA-B>config>router>policy-options# policy-statement allow all MINOR: CLI The policy-options must be in edit mode by calling begin before any changes can be made. The following example displays policy statement configuration command usage. These commands are configured in the config>router context. Example: config>router# policy-options policy-options# begin There are no default policy statement options. All parameters must be explicitly configured SAS E OS Routing Protocols Guide Page 301

24 Configuring Route Policy Components Creating a Route Policy To enter the mode to create or edit route policies, you must enter the begin keyword at the config>router>policy-options prompt. Other editing commands include: The commit command saves changes made to route policies during a session. The abort command discards changes that have been made to route policies during a session. The following error message displays when the you try to modify a policy options command without entering begin first. A:ALA-B>config>router>policy-options# policy-statement allow all MINOR: CLI The policy-options must be in edit mode by calling begin before any changes can be made. A:ALA-B>config>router>policy-options# info # # Policy # policy-options begin policy-statement "allow all" description "General Policy" A:ALA-B>config>router>policy-options# Page SAS E OS Routing Protocols Guide

25 Route Policies Configuring a Default Action Specifying a default action is optional. The default action controls those packets not matching any policy statement entries. If no default action is specified for the policy, then the action associated with the protocol to which the routing policy was applied is performed. A policy statement must include at least one entry (see Configuring an Entry on page 308). To enter the mode to create or edit route policies, you must enter the begin keyword at the config>router>policy-options prompt. Other editing commands include: The commit command saves changes made to route policies during a session. The abort command discards changes that have been made to route policies during a session SAS E OS Routing Protocols Guide Page 303

26 Configuring Route Policy Components Configuring an Entry An entry action must be specified. The other parameters in the entry action context are optional. Refer to the Route Policy Command Reference on page 315 for the commands and syntax. The following example displays entry parameters and includes the default action parameters which were displayed in the previous section. A:ALA-B>config>router>policy-options# info prefix-list "host" prefix /8 longer prefix-list "group" prefix /32 exact policy-statement "block-igmp" description "Reject-Reports-From-Specific-Group-And-Host" entry 1 from host-ip "host" action next-entry entry 2 from group-address "group" action reject default-action accept A:ALA-B>config>router>policy-options# A:ALA-B>config>router>policy-options# info prefix-list "host" prefix /8 longer prefix-list "group" prefix /32 exact A:ALA-B>config>router>policy-options# Page SAS E OS Routing Protocols Guide

27 Route Policies Route Policy Configuration Management Tasks This section discusses the following route policy configuration management tasks: Editing Policy Statements and Parameters on page 313 Deleting an Entry on page 314 Deleting a Policy Statement on page 314 Editing Policy Statements and Parameters Route policy statements can be edited to modify, add, or delete parameters. To enter the mode to edit route policies, you must enter the begin keyword at the config>router> policyoptions prompt. Other editing commands include: The commit command saves changes made to route policies during a session. The abort command discards changes that have been made to route policies during a session. The following example displays a changed configuration: A:ALA-B>config>router>policy-options# info prefix-list "host" prefix /8 longer prefix-list "group1" prefix /32 exact policy-statement "block-igmp" description "Reject-Reports-From-Specific-Group-And-Host" entry 1 from host-ip "host" action next-entry entry 2 from group-address "group1" action reject default-action accept A:ALA-B>config>router>policy-options# 7210 SAS E OS Routing Protocols Guide Page 305

28 Route Policy Configuration Management Tasks Deleting an Entry Use the following CLI syntax to delete a policy statement entry: CLI Syntax: config>router>policy-options begin commit abort policy-statement name no entry entry-id The following example displays the commands required to delete a policy statement entry. Example: config>router>policy-options# begin policy-options# policy-statement "1" policy-options>policy-statement# no entry 4 policy-options>policy-statement# commit Deleting a Policy Statement Use the following CLI syntax to delete a policy statement: CLI Syntax: config>router>policy-options begin commit abort no policy-statement name The following example displays the commands required to delete a policy statement. Example: config>router>policy-options# begin policy-options# no policy-statement 1 policy-options# commit Page SAS E OS Routing Protocols Guide

29 Route Policies Route Policy Command Reference Command Hierarchies Route Policy Configuration Commands on page 315 Show Commands on page 318 Route Policy Configuration Commands config [no] router [no] policy-options begin commit abort [no] policy-statement name default-action {accept next-entry reject} no default-action description description-string no description [no] entry entry-id action {accept next-entry reject} no action description description-string no description [no] from host-ip prefix-list-name no host-ip host-ip prefix-list-name no host-ip prefix-list name [name...(up to 5 max)] no prefix-list source-address ip-address no source-address 7210 SAS E OS Routing Protocols Guide Page 315

30 Route Policy Command Reference config [no] router [no] policy-options [no] prefix-list name prefix ip-prefix/prefix-length [exact longer through length prefix-lengthrange length1-length2] no prefix [ipv-prefix/prefix-length] [exact longer through length prefixlength-range length1-length2] Show Commands show router policy [name prefix-list name admin] Page SAS E OS Routing Protocols Guide

31 Route Policies Route Policy Command Reference Generic Commands abort Syntax Context Default abort config>router>policy-options This command is required to discard changes made to a route policy. none begin Syntax Context Description Default begin config>router>policy-options This command is required in order to enter the mode to create or edit route policies. none commit Syntax Context Description Default commit config>router>policy-options This command is required to save changes made to a route policy. none 7210 SAS E OS Routing Protocols Guide Page 319

32 Route Policy Command Reference description Syntax Context Description Default Parameters description string no description config>router>policy-options>policy-statement config>router>policy-options>policy-statement>entry This command creates a text description which is stored in the configuration file to help identify the content of the entity. The no form of the command removes the string from the configuration. none string The description character string. Allowed values are any string up to 80 characters long composed of printable, 7-bit ASCII characters. If the string contains special characters (#, $, spaces, etc.), the entire string must be enclosed within double quotes. Page SAS E OS Routing Protocols Guide

33 Route Policies Route Policy Options policy-options Syntax Context Description Default [no] policy-options config>router This command enables the context to configure route policies. Route policies are used for IGMP group membership report filtering. The no form of the command deletes the route policy configuration. none 7210 SAS E OS Routing Protocols Guide Page 321

34 Route Policy Command Reference Route Policy Prefix Commands prefix-list Syntax Context Description Default Parameters [no] prefix-list name config>router>policy-options This command creates a context to configure a prefix list to use in route policy entries. The no form of the command deletes the named prefix list. none name The prefix list name. Allowed values are any string up to 32 characters long composed of printable, 7-bit ASCII characters. If the string contains special characters (#, $, spaces, etc.), the entire string must be enclosed within double quotes. prefix Syntax Context Description Parameters [no] prefix ip-prefix/prefix-length { [exact longer through length ] [prefix-length-range length1-length2 ] } no prefix [ipv-prefix/prefix-length] [exact longer through length prefix-length-range length1- length2] config>router>policy-options>prefix-list This command creates a prefix entry in the route policy prefix list. The no form of the command deletes the prefix entry from the prefix list. ip-prefix The IP prefix for prefix list entry in dotted decimal notation. Values ipv4-prefix: a.b.c.d (host bits must be 0) ipv4-prefix-length: 0 32 exact Specifies the prefix list entry only matches the route with the specified ip-prefix and prefix mask (length) values. longer Specifies the prefix list entry matches any route that matches the specified ip-prefix and prefix mask length values greater than the specified mask. through length Specifies the prefix list entry matches any route that matches the specified ip-prefix and has a prefix length between the specified length values inclusive. Values 0 32 prefix-length-range length1 - length2 Specifies a route must match the most significant bits and have a prefix length with the given range. The range is inclusive of start and end values. Values 0 32, length2 > length1 Page SAS E OS Routing Protocols Guide

35 Route Policies Route Policy Entry Match Commands entry Syntax Context Description Default Parameters entry entry-id no entry config>router>policy-options>policy-statement This command creates the context to edit route policy entries within the route policy statement. Multiple entries can be created using unique entries. The 7210 SAS OS s the filter when the first match is found and executes the action specified. For this reason, entries must be sequenced correctly from most to least explicit. An entry does not require matching criteria defined (in which case, everything matches) but must have at least define an action in order to be considered complete. Entries without an action are considered incomplete and will be rendered inactive. The no form of the command removes the specified entry from the route policy statement. none entry-id The entry ID expressed as a decimal integer. An entry-id uniquely identifies match criteria and the corresponding action. It is recommended that multiple entries be given entry-ids in staggered increments. This allows users to insert a new entry in an existing policy without requiring renumbering of all the existing entries. Values from Syntax Context Description [no] from config>router>policy-options>policy-statement>entry This command creates the context to configure policy match criteria based on the packet's source IP address or the destination multicast group address. If no condition is specified, all route sources are considered to match. The no form of the command deletes the source match criteria for the route policy statement entry SAS E OS Routing Protocols Guide Page 323

36 Route Policy Command Reference group-address Syntax Context Description Default Parameters group-address prefix-list-name no group-address config>router>policy-options>policy-statement>entry>from This command specifies the multicast group-address prefix list containing multicast group-addresses that are imbedded in the join or prune packet as a filter criterion. The prefix list must be configured prior to entering this command. Prefix lists are configured in the config>router>policy-options>prefix-list context. The no form of the command removes the criterion from the configuration. no group-address prefix-list-name The prefix-list name. Allowed values are any string up to 32 characters long composed of printable, 7-bit ASCII characters. If the string contains special characters (#, $, spaces, etc.), the entire string must be enclosed within double quotes. The prefix-list-name is defined in the config>router>policy-options>prefix-list context. host-ip Syntax Context Description Default Parameters host-ip prefix-list-name config>router>policy-options>policy-statement>entry>from This command specifies a prefix list host IP address as a match criterion for the route policy-statement entry. no host-ip prefix-list-name The prefix-list name. Allowed values are any string up to 32 characters long composed of printable, 7-bit ASCII characters. If the string contains special characters (#, $, spaces, etc.), the entire string must be enclosed within double quotes. The prefix-list-name is defined in the config>router>policy-options>prefix-list context. policy-statement Syntax Context Description [no] policy-statement name config>router>policy-options This command creates the context to configure a route policy statement. Route policy statements enable appropriate processing of IGMP group membership reports received from hosts. The processing action taken is determined by the action associated with the entries configured in the policy statement. The policy-statement is a logical grouping of match and action criteria. The no form of the command deletes the policy statement. Page SAS E OS Routing Protocols Guide

37 Route Policies Default Parameters no policy-statement No route policy statements are defined. name The route policy statement name. Allowed values are any string up to 32 characters long composed of printable, 7-bit ASCII characters. If the string contains special characters (#, $, spaces, etc.), the entire string must be enclosed within double quotes. prefix-list Syntax Context Description Default Parameters prefix-list name [name...up to 5 max] no prefix-list config>router>policy-options>policy-statement>entry>from This command configures a prefix list as a match criterion for a route policy statement entry. If no prefix list is specified, any network prefix is considered a match. The prefix lists specify the network prefix (this includes the prefix and length) a specific policy entry applies. A maximum of five prefix names can be specified. The no form of the command removes the prefix list match criterion. no prefix-list Matches any network prefix. name The prefix list name. Allowed values are any string up to 32 characters long composed of printable, 7-bit ASCII characters. If the string contains special characters (#, $, spaces, etc.), the entire string must be enclosed within double quotes. source-address Syntax Context Description Default Description Parameters source-address ip-address no source-address config>router>policy-options>policy-statement>entry>from This command specifies the source address that is embedded in the join or prune packet as a filter criterion. The no form of the command removes the criterion from the configuration. none This command specifies a multicast data source address as a match criterion for this entry. ip-address The IP prefix for the IP match criterion in dotted decimal notation SAS E OS Routing Protocols Guide Page 325

38 Route Policy Command Reference Route Policy Action Commands action Syntax Context Description Default Parameters action {accept next-entry reject} no action config>router>policy-options>policy-statement>entry This command creates the context to configure actions to take for routes matching a route policy statement entry. This command is required and must be entered for the entry to be active. Any route policy entry without the action command will be considered incomplete and will be inactive. The no form of the command deletes the action context from the entry. no action No action is defined. accept Specifies packets matching the entry match criteria will be accepted and processed appropriately. next-entry Specifies that the actions specified would be taken and then policy evaluation would continue with next policy entry (if any others are specified). reject Specifies packets matching the entry match criteria would be rejected. default-action Syntax Context Description Default default-action {accept next-entry reject} no default-action config>router>policy-options>policy-statement This command enables the context to configure actions for packets that do not match any route policy statement entries when the accept parameter is specified. The default action clause can be set to all available action states including: accept, reject, next-entry and next-policy. If the action states accept or reject then the policy evaluation terminates and the appropriate result is returned. If a default action is defined and no match(es) occurred with the entries in the policy then the default action clause is used. If a default action is defined and one or more matches occurred with the entries of the policy then the default action is not used. The no form of the command deletes the default-action context for the policy statement. no default-action No default action is specified. Page SAS E OS Routing Protocols Guide

39 Route Policies Parameters accept Specifies packets matching the entry match criteria will be accepted and processed appropriately. next-entry Specifies that the actions specified would be taken and then policy evaluation would continue with next policy entry (if any others are specified). reject Specifies packets matching the entry match criteria would be rejected.a 7210 SAS E OS Routing Protocols Guide Page 327

40 Route Policy Command Reference Page SAS E OS Routing Protocols Guide

41 Route Policies Show Commands policy Syntax Context Description Parameters Output policy [name prefix-list [name] admin] show>router This command displays configured policy statement information. policy name Displays information similar to the info command for a specific policy-statement. If a name is provided, the matching policy-statement displays. If no statement name is specified, a list of all policies statements and descriptions display. prefix-list name Displays the prefix lists configured in the route policy. admin If the keyword admin is included, the entire policy option configuration displays, including any un-committed configuration changes. This command is similar to the info command. Route Policy Output The following table describes route policy output fields. Label Description Policy Description Policies Displays a list of route policy names. Displays the description of each route policy. The total number of policies configured. The following route policy commands are displayed with different command parameter options: show router policy on page 344 show router policy admin on page 344 Sample Output The show router policy command displays all configured route policies. *A:7210-2# show router policy =============================================================================== Route Policies =============================================================================== Policy Description block-igmp Reject-Reports-From-Specific-Group-And-Host permit-igmp Accept-Reports-From-Specific-Group-And-Host Policies : 2 =============================================================================== *A:7210-2# show router policy 7210 SAS E OS Routing Protocols Guide Page 343

42 Show Commands The show router policy admin command is similar to the info command which displays information about the route policies and parameters. *A:7210-2# show router policy admin prefix-list "host" prefix /8 longer prefix-list "group" prefix /32 exact policy-statement "block-igmp" description "Reject-Reports-From-Specific-Group-And-Host" entry 1 from host-ip "host" action next-entry entry 2 from group-address "group" action reject default-action accept policy-statement "permit-igmp" description "Accept-Reports-From-Specific-Group-And-Host" entry 1 from host-ip "host1" group-address "group1" action accept default-action reject *A:7210-2#... A:ALA-1# show router policy admin Page SAS E OS Routing Protocols Guide

43 Route Policies The show router policy name command displays information about a specific route policy. *A:7210-2# show router policy permit-igmp description "Accept-Reports-From-Specific-Group-And-Host" entry 1 from host-ip "host1" group-address "group1" action accept default-action reject *A:7210-2# The show router policy prefix-list command, lists the prefix-lists configured in the route policy. *A:7210-2# show router policy prefix-list ================================== Prefix Lists ================================== Prefix List Name host group Num Prefix Lists: 2 ================================== *A:7210-2# 7210 SAS E OS Routing Protocols Guide Page 345

44 Show Commands Page SAS E OS Routing Protocols Guide

45 Standards and Protocol Support Standards Compliance IEEE 802.1d Bridging IEEE 802.1p/Q VLAN Tagging IEEE 802.1w Rapid Spanning Tree Protocol IEEE 802.1x Port Based Network Access Control IEEE 802.1ad Provider Bridges IEEE 802.1ag Service Layer OAM IEEE 802.3ah Ethernet in the First Mile IEEE BaseT IEEE 802.3ad Link Aggregation IEEE 802.3ah Ethernet OAM IEEE 802.3u 100BaseTX IEEE 802.3z 1000BaseSX/LX Protocol Support DIFFERENTIATED SERVICES RFC 2474 Definition of the DS Field the IPv4 and IPv6 Headers (Rev) RFC 2597 Assured Forwarding PHB Group (rev3260) RFC 2598 An Expedited Forwarding PHB RFC 3140 Per-Hop Behavior Identification Codes TCP/IP RFC 768 UDP RFC 1350 The TFTP Protocol (Rev. RFC 791 IP RFC 792 ICMP RFC 793 TCP RFC 826 ARP RFC 854 Telnet RFC 1519 CIDR RFC 1812 Requirements for IPv4 Routers RFC 2347 TFTP option Extension RFC 2328 TFTP Blocksize Option RFC 2349 TFTP Timeout Interval and Transfer Size option RADIUS RFC 2865 Remote Authentication Dial In User Service RFC 2866 RADIUS Accounting SSH draft-ietf-secsh-architecture.txt SSH Protocol Architecture draft-ietf-secsh-userauth.txt SSH Authentication Protocol draft-ietf-secsh-transport.txt SSH Transport Layer Protocol draft-ietf-secsh-connection.txt SSH Connection Protocol draft-ietf-secsh- newmodes.txt SSH Transport Layer Encryption Modes TACACS+ draft-grant-tacacs-02.txt NETWORK MANAGEMENT ITU-T X.721: Information technology- OSI-Structure of Management Information ITU-T X.734: Information technology- OSI-Systems Management: Event Report Management Function M.3100/3120 Equipment and Connection Models TMF 509/613 Network Connectivity Model RFC 1157 SNMPv1 RFC 1215 A Convention for Defining Traps for use with the SNMP RFC 1907 SNMPv2-MIB RFC 2011 IP-MIB RFC 2012 TCP-MIB RFC 2013 UDP-MIB RFC 2096 IP-FORWARD-MIB RFC 2138 RADIUS RFC 2571 SNMP-FRAMEWORKMIB RFC 2572 SNMP-MPD-MIB RFC 2573 SNMP-TARGET-&- NOTIFICATION-MIB RFC 2574 SNMP-USER-BASED- SMMIB RFC 2575 SNMP-VIEW-BASEDACM- MIB RFC 2576 SNMP-COMMUNITY-MIB RFC 2665 EtherLike-MIB RFC 2819 RMON-MIB RFC 2863 IF-MIB RFC 2864 INVERTED-STACK-MIB RFC 3014 NOTIFICATION-LOGMIB RFC 3164 Syslog RFC 3273 HCRMON-MIB RFC 3411 An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks RFC Message Processing and Dispatching for the Simple Network Management Protocol (SNMP) RFC Simple Network Management Protocol (SNMP) Applications RFC User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3) RFC SNMP MIB draft-ietf-disman-alarm-mib-04.txt IANA-IFType-MIB IEEE8023-LAG-MIB Proprietary MIBs TIMETRA-CHASSIS-MIB.mib TIMETRA-CLEAR-MIB.mib TIMETRA-DOT3-OAM-MIB.mib TIMETRA-FILTER-MIB.mib TIMETRA-GLOBAL-MIB.mib TIMETRA-IEEE8021-CFM-MIB.mib TIMETRA-LAG-MIB.mib TIMETRA-LOG-MIB.mib TIMETRA-MIRROR-MIB.mib TIMETRA-NTP-MIB.mib TIMETRA-OAM-TEST-MIB.mib TIMETRA-PORT-MIB.mib TIMETRA-QOS-MIB.mib TIMETRA-SAS-GLOBAL-MIB.mib TIMETRA-SAS-PORT-MIB.mib TIMETRA-SAS-QOS-MIB.mib TIMETRA-SAS-SYSTEM-MIB.mib TIMETRA-SCHEDULER-MIB.mib TIMETRA-SECURITY-MIB.mib TIMETRA-SERV-MIB.mib TIMETRA-SUBSCRIBER-MGMT- MIB.mib TIMETRA-SYSTEM-MIB.mib TIMETRA-TC-MIB.mib TIMETRA-VRTR-MIB.mib Standards and Protocols Page 45

46 Standards and Protocols Page 46 Standards and Protocols

47 INDEX R Route policies overview 12 policy evaluation 19 policy statements 13 configuring beginning 23 command reference 29 creating a route policy 24 default action 25 entry 26 management tasks 27 overview SAS E OS Routing Protocols Guide Page 47

48 Index Page SAS E OS Routing Protocols Guide

7210 SAS D, E OS OAM and Diagnostics Guide

7210 SAS D, E OS OAM and Diagnostics Guide 7210 SAS D, E OS OAM and Diagnostics Guide Software Version: 7210 SAS OS 4.0 Rev. 04 January 2012 Document Part Number: 93-0373-01-04 93-0373-01-04 This document is protected by copyright. Except as specifically

More information

7210 SAS D, E OS OAM and Diagnostics Guide. Software Version: 7210 SAS OS 3.0 Rev. 04 April 2011 Document Part Number:

7210 SAS D, E OS OAM and Diagnostics Guide. Software Version: 7210 SAS OS 3.0 Rev. 04 April 2011 Document Part Number: 7210 SAS D, E OS OAM and Diagnostics Guide Software Version: 7210 SAS OS 3.0 Rev. 04 April 2011 Document Part Number: 93-0226-04-04 93-0226-04-04 This document is protected by copyright. Except as specifically

More information

7210 SAS E OS OAM and Diagnostics Guide. Software Version: 7210 SAS OS 2.0 Rev. 01 June 2010 Document Part Number: * *

7210 SAS E OS OAM and Diagnostics Guide. Software Version: 7210 SAS OS 2.0 Rev. 01 June 2010 Document Part Number: * * 7210 SAS E OS OAM and Diagnostics Guide Software Version: 7210 SAS OS 2.0 Rev. 01 June 2010 Document Part Number: 93-0226-03-01 *93-0226-03-01* This document is protected by copyright. Except as specifically

More information

Configuring Route Policies with CLI

Configuring Route Policies with CLI Configuring Route Policies with CLI This section provides information to configure route policies using the command line interface. Topics in this section include: Route Policy Configuration Overview on

More information

Configuring RIP with CLI

Configuring RIP with CLI RIP Configuring RIP with CLI This section provides information to configure Routing Information Protocol (RIP) using the command line interface. Topics in this section include: RIP & RIPng Configuration

More information

Appendix C Software Specifications

Appendix C Software Specifications Appendix C Software Specifications This appendix lists the following information: IEEE compliance RFC support ISO/IEC specification support Internet draft support NOTE: For a list of features supported

More information

Chapter 6 Global CONFIG Commands

Chapter 6 Global CONFIG Commands Chapter 6 Global CONFIG Commands aaa accounting Configures RADIUS or TACACS+ accounting for recording information about user activity and system events. When you configure accounting on an HP device, information

More information

Configuring Security with CLI

Configuring Security with CLI Security Configuring Security with CLI This section provides information to configure security using the command line interface. Topics in this section include: Setting Up Security Attributes on page 62

More information

Aruba 8320 Configuring ACLs and Classifier Policies Guide for ArubaOS- CX 10.00

Aruba 8320 Configuring ACLs and Classifier Policies Guide for ArubaOS- CX 10.00 Aruba 8320 Configuring ACLs and Classifier Policies Guide for ArubaOS- CX 10.00 Part Number: 5200-4710a Published: April 2018 Edition: 2 Copyright 2018 Hewlett Packard Enterprise Development LP Notices

More information

ACL Rule Configuration on the WAP371

ACL Rule Configuration on the WAP371 Article ID: 5089 ACL Rule Configuration on the WAP371 Objective A network access control list (ACL) is an optional layer of security that acts as a firewall for controlling traffic in and out of a subnet.

More information

Configuring Triple Play Multicast Services with CLI

Configuring Triple Play Multicast Services with CLI Triple Play Service Delivery Architecture Configuring Triple Play Multicast Services with CLI VPLS This section provides information to configure multicast parameters in a Triple Play network using the

More information

Configure SNMP. Understand SNMP. This chapter explains Simple Network Management Protocol (SNMP) as implemented by Cisco NCS 4000 series.

Configure SNMP. Understand SNMP. This chapter explains Simple Network Management Protocol (SNMP) as implemented by Cisco NCS 4000 series. This chapter explains Simple Network Management Protocol (SNMP) as implemented by Cisco NCS 4000 series. Understand SNMP, page 1 Basic SNMP Components, page 2 SNMPv3 Support, page 3 SNMP Traps, page 4

More information

Configuration Commands Generic Commands Syntax description no description Context Description Default Parameters

Configuration Commands Generic Commands Syntax description no description Context Description Default Parameters Configuration Commands Generic Commands description Syntax description description-string no description Context config>qos>sap-egress config>qos>sap-egress>ip-criteria>entry config>qos>sap-ingress config>qos>sap-ingress>ip-criteria>entry

More information

Configuring TACACS+ About TACACS+

Configuring TACACS+ About TACACS+ This chapter describes how to configure the Terminal Access Controller Access Control System Plus (TACACS+) protocol on Cisco NX-OS devices. This chapter includes the following sections: About TACACS+,

More information

7210 SAS E OS Interface Configuration Guide

7210 SAS E OS Interface Configuration Guide 7210 SAS E OS Interface Configuration Guide Software Version: 7210 SAS OS 1.1 Rev. 6 January 2010 Document Part Number: 93-0221-02-02 *93-0221-02-02* This document is protected by copyright. Except as

More information

Alcatel-Lucent 7705 SERVICE AGGREGATION ROUTER OS RELEASE 5.0 SYSTEM MANAGEMENT GUIDE SYSTEM MANAGEMENT GUIDE

Alcatel-Lucent 7705 SERVICE AGGREGATION ROUTER OS RELEASE 5.0 SYSTEM MANAGEMENT GUIDE SYSTEM MANAGEMENT GUIDE SYSTEM MANAGEMENT GUIDE Alcatel-Lucent 7705 SERVICE AGGREGATION ROUTER OS RELEASE 5.0 SYSTEM MANAGEMENT GUIDE Alcatel-Lucent Proprietary This document contains proprietary information of Alcatel-Lucent

More information

The Security feature available on the ME 1200 Web GUI allows you to set the security configurations for

The Security feature available on the ME 1200 Web GUI allows you to set the security configurations for The Security feature available on the ME 1200 Web GUI allows you to set the security configurations for the ME 1200. Switch, page 1 Network, page 16 Switch Users Configuration This option provides an overview

More information

Configuring SNMP. Understanding SNMP CHAPTER

Configuring SNMP. Understanding SNMP CHAPTER 22 CHAPTER This chapter describes how to configure the Simple Network Management Protocol (SNMP) on the Catalyst 3750 switch. Unless otherwise noted, the term switch refers to a standalone switch and a

More information

Implementing Traffic Filters for IPv6 Security

Implementing Traffic Filters for IPv6 Security Implementing Traffic Filters for IPv6 Security Last Updated: November 14, 2011 This module describes how to configure Cisco IOS XE IPv6 traffic filter and firewall features for your Cisco networking devices.

More information

Appendix B Policies and Filters

Appendix B Policies and Filters Appendix B Policies and Filters NOTE: This appendix does not describe Access Control Lists (ACLs) or IPX SAP ACLs, which are additional methods for filtering packets. See Software-Based IP Access Control

More information

7210-SAS E OS 1.0_R1 SOFTWARE RELEASE NOTES

7210-SAS E OS 1.0_R1 SOFTWARE RELEASE NOTES 7210-SAS E OS 1.0_R1 JAN-19-2009 7210-SAS E OS 1.0_R1 SOFTWARE RELEASE NOTES These release notes are for Release 1.0_R1 of the 7210 SAS-E OS software for 7210 SAS E devices. RELEASE NOTE ORGANIZATION The

More information

AT-GS950/8. AT-GS950/8 Web Interface User Guide AT-S113 Version [ ] Gigabit Ethernet Switch Rev A

AT-GS950/8. AT-GS950/8 Web Interface User Guide AT-S113 Version [ ] Gigabit Ethernet Switch Rev A AT-GS950/8 Gigabit Ethernet Switch AT-GS950/8 Web Interface User Guide AT-S113 Version 1.1.0 [1.00.021] 613-001856 Rev A Copyright 2013 Allied Telesis, Inc. All rights reserved. No part of this publication

More information

Using the Management Ethernet Interface

Using the Management Ethernet Interface This chapter covers the following topics: Gigabit Ethernet Management Interface Overview, page 1 Gigabit Ethernet Port Numbering, page 1 IP Address Handling in ROMmon and the Management Ethernet Port,

More information

Configuring LDP with CLI

Configuring LDP with CLI Label Distribution Protocol Configuring LDP with CLI This section provides information to configure LDP using the command line interface. Topics in this section include: LDP Configuration Overview on page

More information

Management Software AT-S101. User s Guide. For use with the AT-GS950/8POE Gigabit Ethernet WebSmart Switch. Version Rev.

Management Software AT-S101. User s Guide. For use with the AT-GS950/8POE Gigabit Ethernet WebSmart Switch. Version Rev. Management Software AT-S101 User s Guide For use with the AT-GS950/8POE Gigabit Ethernet WebSmart Switch Version 1.0.0 613-000985 Rev. A Copyright 2008 Allied Telesis, Inc. All rights reserved. No part

More information

Configuration Commands. Generic Commands. description. shutdown SR OS System Management Guide Page 399. Event and Accounting Logs

Configuration Commands. Generic Commands. description. shutdown SR OS System Management Guide Page 399. Event and Accounting Logs Event and Accounting Logs Configuration Commands Generic Commands description description string no description config>log>filter config>log>filte>entry config>log>log-id config>log>accounting-policy config>log>file-id

More information

Chapter 4 Software-Based IP Access Control Lists (ACLs)

Chapter 4 Software-Based IP Access Control Lists (ACLs) Chapter 4 Software-Based IP Access Control Lists (ACLs) This chapter describes software-based ACLs, which are ACLs that processed traffic in software or CPU. (This type of ACL was also referred to as flow-based

More information

Getting Started. Contents

Getting Started. Contents Contents 1 Contents Introduction................................................... 1-2 Conventions................................................... 1-2 Feature Descriptions by Model................................

More information

SERVICE AGGREGATION ROUTER RELEASE 1.1

SERVICE AGGREGATION ROUTER RELEASE 1.1 Alcatel-Lucent 7705 SAR SERVICE AGGREGATION ROUTER RELEASE 1.1 The Alcatel-Lucent 7705 Service Aggregation Router (SAR) delivers industry-leading IP/MPLS and pseudowire capabilities in compact platforms

More information

Configuring SNMP. Understanding SNMP CHAPTER

Configuring SNMP. Understanding SNMP CHAPTER 22 CHAPTER Configuring SNMP This chapter describes how to configure the ML-Series card for operating with Simple Network Management Protocol (SNMP). Note For complete syntax and usage information for the

More information

Configuring Layer 3 Virtualization

Configuring Layer 3 Virtualization CHAPTER 14 This chapter describes how to configure Layer 3 virtualization. This chapter includes the following sections: Layer 3 Virtualization, page 14-1 Licensing Requirements for VRFs, page 14-5 Prerequisites

More information

Cisco Virtual Networking Solution for OpenStack

Cisco Virtual Networking Solution for OpenStack Data Sheet Cisco Virtual Networking Solution for OpenStack Product Overview Extend enterprise-class networking features to OpenStack cloud environments. A reliable virtual network infrastructure that provides

More information

Cisco Small Business SF200E Series Advanced Smart Switches

Cisco Small Business SF200E Series Advanced Smart Switches ADMINISTRATION GUIDE Cisco Small Business SF200E Series Advanced Smart Switches Contents Chapter 1: Getting Started 9 Starting the Web-Based Switch Configuration Utility 9 Launching the Utility 10 Logging

More information

Index. Numerics. Index 1

Index. Numerics. Index 1 Index Numerics 802.1p priority (QoS) definition 8-6 802.1q VLAN in mesh 7-23 802.1Q VLAN standard 6-6 802.1w as a region 6-54 802.1x, mesh, not supported 7-5 A ABC enabled on edge switch 7-26 in mesh domain

More information

Configuring IP SLAs TCP Connect Operations

Configuring IP SLAs TCP Connect Operations This module describes how to configure an IP Service Level Agreements (SLAs) TCP Connect operation to measure the response time taken to perform a TCP Connect operation between a Cisco router and devices

More information

TCP/IP and the OSI Model

TCP/IP and the OSI Model TCP/IP BASICS TCP/IP and the OSI Model TCP/IP BASICS The network protocol of the Internet Composed of six main protocols IP Internet Protocol UDP User Datagram Protocol TCP Transmission Control Protocol

More information

For complete syntax and usage information for the commands used in this chapter, see the Cisco IOS Configuration Fundamentals Command Reference

For complete syntax and usage information for the commands used in this chapter, see the Cisco IOS Configuration Fundamentals Command Reference CHAPTER 51 This chapter describes how to configure the Simple Network Management Protocol (SNMP) on the Catalyst 4500 series switch. Note For complete syntax and usage information for the commands used

More information

Supported Standards. Class of Service Tagging for Ethernet frames. Multiple Spanning Tree Protocol. Rapid Spanning Tree Protocol

Supported Standards. Class of Service Tagging for Ethernet frames. Multiple Spanning Tree Protocol. Rapid Spanning Tree Protocol , page 1 This table lists the IEEE compliance standards. Table 1: IEEE Compliance s 802.1D MAC Bridges 802.1p Class of Service Tagging for Ethernet frames 802.1Q VLAN Tagging 802.1s Multiple Spanning Tree

More information

Bridging Traffic CHAPTER3

Bridging Traffic CHAPTER3 CHAPTER3 This chapter describes how clients and servers communicate through the ACE using either Layer 2 (L2) or Layer 3 (L3) in a VLAN configuration. When the client-side and server-side VLANs are on

More information

Configuring RADIUS and TACACS+

Configuring RADIUS and TACACS+ 28 CHAPTER The authentication, authorization, and accounting (AAA) mechanism verifies the identity of, grants access to, and tracks the actions of users managing a switch. All Cisco MDS 9000 Family switches

More information

Chapter 3 Command List

Chapter 3 Command List Chapter 3 Command List This chapter lists all the commands in the CLI. The commands are listed in two ways: All commands are listed together in a single alphabetic list. See Complete Command List on page

More information

Configuring TACACS+ Information About TACACS+ Send document comments to CHAPTER

Configuring TACACS+ Information About TACACS+ Send document comments to CHAPTER 4 CHAPTER This chapter describes how to configure the Terminal Access Controller Access Control System Plus (TACACS+) protocol on NX-OS devices. This chapter includes the following sections: Information

More information

Router 6000 R17 Training Programs. Catalog of Course Descriptions

Router 6000 R17 Training Programs. Catalog of Course Descriptions Router 6000 R7 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION... 3 IP NETWORKING... 4 IP OVERVIEW & FUNDAMENTALS... 8 IP ROUTING OVERVIEW & FUNDAMENTALS...0

More information

Configuring SNMP. Understanding SNMP CHAPTER

Configuring SNMP. Understanding SNMP CHAPTER 24 CHAPTER This chapter describes how to configure the the ML1000-2, ML100T-12, ML100X-8, and ML-MR-10 cards for operating with Simple Network Management Protocol (SNMP). Note For complete syntax and usage

More information

Configuration Network Management Avaya Advanced Gateway 2330 AG NN , 01.01

Configuration Network Management Avaya Advanced Gateway 2330 AG NN , 01.01 Configuration Network Management Avaya Advanced Gateway 2330 AG10.2.2 NN47264-602, 01.01 August 2010 2010 Avaya Inc. All Rights Reserved. Notice While reasonable efforts have been made to ensure that the

More information

Using the Management Ethernet Interface

Using the Management Ethernet Interface The Cisco ASR 920 Series Router has one Gigabit Ethernet Management Ethernet interface on each Route Switch Processor. The purpose of this interface is to allow users to perform management tasks on the

More information

Network Address Translation Configuration Commands

Network Address Translation Configuration Commands NAT Commands Network Address Translation Configuration Commands Generic Commands description Syntax description description-string no description Context config>srevice>vprn>nat>outside>pool>address-range

More information

Configuring Cisco Performance Monitor

Configuring Cisco Performance Monitor This document contains information about and instructions for configuring Cisco Performance Monitor. Finding Feature Information, page 1 Information About Cisco Performance Monitor, page 1 Restrictions

More information

Gigabit Managed Ethernet Switch

Gigabit Managed Ethernet Switch LGB1110A LGB1126A-R2 Product Data Sheet Gigabit Managed Ethernet Switch Features Overview LGB1110A The Gigabit Managed Ethernet Switches offer L2 features plus advanced L3 features such as Static Route

More information

Datasheet. 10G 16-Port Managed Aggregation Switch. Model: ES-16-XG. Non-Blocking Throughput Switching. Maximum Performance and Low Latency

Datasheet. 10G 16-Port Managed Aggregation Switch. Model: ES-16-XG. Non-Blocking Throughput Switching. Maximum Performance and Low Latency 10G 16-Port Managed Aggregation Switch Model: ES-16-XG Non-Blocking Throughput Switching Maximum Performance and Low Latency 10G Ethernet SFP+ and RJ45 Ports Deployment Example Advanced Switching Technology

More information

Vanguard Managed Solutions

Vanguard Managed Solutions Vanguard Managed Solutions Vanguard Applications Ware IP and LAN Feature Protocols Traffic Monitor Notice 2004 Vanguard Managed Solutions, LLC 575 West Street Mansfield, Massachusetts 02048 (508) 261-4000

More information

IPv6 Access Control Lists

IPv6 Access Control Lists Access lists determine what traffic is blocked and what traffic is forwarded at device interfaces and allow filtering of traffic based on source and destination addresses, and inbound and outbound traffic

More information

Configuring Firewall Filters (J-Web Procedure)

Configuring Firewall Filters (J-Web Procedure) Configuring Firewall Filters (J-Web Procedure) You configure firewall filters on EX Series switches to control traffic that enters ports on the switch or enters and exits VLANs on the network and Layer

More information

Configuring SNMP CHAPTER. This chapter describes how to configure the Simple Network Management Protocol (SNMP) on your access point.

Configuring SNMP CHAPTER. This chapter describes how to configure the Simple Network Management Protocol (SNMP) on your access point. CHAPTER 18 This chapter describes how to configure the Simple Network Management Protocol (SNMP) on your access point. Note For complete syntax and usage information for the commands used in this chapter,

More information

This chapter explains Simple Network Management Protocol (SNMP) as implemented by CPT.

This chapter explains Simple Network Management Protocol (SNMP) as implemented by CPT. This chapter explains Simple Network Management Protocol () as implemented by CPT. Understanding, page 1 Understanding Components, page 2 Understanding MIB, page 4 Understanding Traps, page 7 Understanding

More information

Configuring the Management Interface and Security

Configuring the Management Interface and Security CHAPTER 5 Configuring the Management Interface and Security Revised: February 15, 2011, Introduction This module describes how to configure the physical management interfaces (ports) as well as the various

More information

6GK6096-8AS Automation Technology > Industrial Communication > Industrial Ethernet > RUGGEDCOM Ethernet Switches > RUGGEDCOM RS900 managed

6GK6096-8AS Automation Technology > Industrial Communication > Industrial Ethernet > RUGGEDCOM Ethernet Switches > RUGGEDCOM RS900 managed Automation Technology > Industrial Communication > Industrial Ethernet > RUGGEDCOM Ethernet Switches > RUGGEDCOM RS900 managed 6GK6096-8AS2.-... RUGGEDCOM RS969 Technical Data Product-type designation

More information

Syntax instance instance [interface interface-name [vrid virtual-router-id] instance interface interface-name vrid virtual-router-id ipv6

Syntax instance instance [interface interface-name [vrid virtual-router-id] instance interface interface-name vrid virtual-router-id ipv6 VRRP Show Commands instance Syntax instance instance [interface interface-name [vrid virtual-router-id] instance interface interface-name vrid virtual-router-id ipv6 Context show>vrrp Description This

More information

Chapter 6 Global CONFIG Commands

Chapter 6 Global CONFIG Commands Chapter 6 Global CONFIG Commands aaa Defines an authentication-method list for access to a switch or routing switch. To configure an access method list, enter a command such as the following: HP9300(config)#

More information

Configuring Ethernet Virtual Connections on the Cisco ASR 1000 Series Router

Configuring Ethernet Virtual Connections on the Cisco ASR 1000 Series Router Configuring Ethernet Virtual Connections on the Cisco ASR 1000 Series Router Ethernet virtual circuit (EVC) infrastructure is a Layer 2 platform-independent bridging architecture that supports Ethernet

More information

Cisco SRW Port Gigabit Switch: WebView Cisco Small Business Managed Switches

Cisco SRW Port Gigabit Switch: WebView Cisco Small Business Managed Switches Cisco SRW2016 16-Port Gigabit Switch: WebView Cisco Small Business Managed Switches Secure, Reliable, Intelligent Switching for Small Businesses Highlights 16 high-speed ports optimized for the network

More information

Configuring IPv6 ACLs

Configuring IPv6 ACLs CHAPTER 37 When the Cisco ME 3400 Ethernet Access switch is running the metro IP access image, you can filter IP Version 6 (IPv6) traffic by creating IPv6 access control lists (ACLs) and applying them

More information

Overview of the NAM Traffic Analyzer

Overview of the NAM Traffic Analyzer CHAPTER 1 These topics provide information about using the various components of the NAM Traffic Analyzer: Introducing the NAM Traffic Analyzer, page 1-1 Using the NAM Graphical User Interface A Closer

More information

Automation Technology > Industrial Communication > Industrial Ethernet > RUGGEDCOM Ethernet Switches > RUGGEDCOM RS900 managed

Automation Technology > Industrial Communication > Industrial Ethernet > RUGGEDCOM Ethernet Switches > RUGGEDCOM RS900 managed Automation Technology > Industrial Communication > Industrial Ethernet > RUGGEDCOM Ethernet Switches > RUGGEDCOM RS900 managed 6GK6090-0GS2.-... RUGGEDCOM RS900G Technical Data Product-type designation

More information

Protocol-Independent MAC ACL Filtering on the Cisco Series Internet Router

Protocol-Independent MAC ACL Filtering on the Cisco Series Internet Router Protocol-Independent MAC ACL Filtering on the Cisco 12000 Series Internet Router Part Number OL-142368-01 (Rev A0), January 19, 2006 The Protocol-Independent MAC ACL Filtering feature allows you to create

More information

Date: June 4 th a t 1 4:00 1 7:00

Date: June 4 th a t 1 4:00 1 7:00 Kommunika tionssyste m FK, Examina tion G 5 0 7 Date: June 4 th 0 0 3 a t 4:00 7:00 KTH/IMIT/LCN No help material is allowed. You may answer questions in English or Swedish. Please answer each question

More information

6GK6023-0AS Automation Technology > Industrial Communication > Industrial Ethernet > RUGGEDCOM Ethernet Switches > RUGGEDCOM RSG2000 managed

6GK6023-0AS Automation Technology > Industrial Communication > Industrial Ethernet > RUGGEDCOM Ethernet Switches > RUGGEDCOM RSG2000 managed Automation Technology > Industrial Communication > Industrial Ethernet > RUGGEDCOM Ethernet Switches > RUGGEDCOM RSG2000 managed 6GK6023-0AS1.-... RUGGEDCOM RSG2300NC Technical Data Product-type designation

More information

Configuration IP Routing and Multicast Avaya Ethernet Routing Switch 4500 Series

Configuration IP Routing and Multicast Avaya Ethernet Routing Switch 4500 Series Configuration IP Routing and Multicast Avaya Ethernet Routing Switch 4500 Series 5.5 NN47205-506, 03.01 April 2011 2011 Avaya Inc. All Rights Reserved. Notice While reasonable efforts have been made to

More information

AT-GS950/10PS Switch Web Interface User s Guide AT-S110 [ ]

AT-GS950/10PS Switch Web Interface User s Guide AT-S110 [ ] AT-GS950/10PS Gigabit Ethernet PoE+ Switch AT-GS950/10PS Switch Web Interface User s Guide AT-S110 [1.00.013] 613-001770 Rev A Copyright 2013 Allied Telesis, Inc. All rights reserved. No part of this publication

More information

IPv4 ACLs, identified by ACL numbers, fall into four categories, as shown in Table 1. Table 1 IPv4 ACL categories

IPv4 ACLs, identified by ACL numbers, fall into four categories, as shown in Table 1. Table 1 IPv4 ACL categories Table of Contents ACL Configuration 1 ACL Overview 1 IPv4 ACL Classification 1 IPv4 ACL Rule Order 1 Rule Numbering Step with IPv4 ACLs 3 Effective Time Period of an IPv4 ACL 3 IP Fragments Filtering with

More information

7210 SAS M OS Interface Configuration Guide

7210 SAS M OS Interface Configuration Guide 7210 SAS M OS Interface Configuration Guide Software Version: 7210 SAS OS 1.1 Rev. 07 April 2010 Document Part Number: 93-0229-01-03 *93-0229-01-03* This document is protected by copyright. Except as specifically

More information

Datasheet. Managed Gigabit Fiber Switch. Model: ES-12F. Non-Blocking Throughput Switching. High Performance and Low Latency

Datasheet. Managed Gigabit Fiber Switch. Model: ES-12F. Non-Blocking Throughput Switching. High Performance and Low Latency Managed Gigabit Fiber Switch Model: ES-12F Non-Blocking Throughput Switching High Performance and Low Latency Gigabit Ethernet SFP and RJ45 Ports Deployment Examples Advanced Switching Technology for the

More information

Yamaha L2 Switch. Intelligent L2 PoE SWR2311P-10G Command Reference Rev

Yamaha L2 Switch. Intelligent L2 PoE SWR2311P-10G Command Reference Rev Yamaha L2 Switch Intelligent L2 PoE SWR2311P-10G Command Reference Rev.2.02.11 2 Command Reference TOC Contents Preface: Introduction...12 Chapter 1: How to read the command reference...13 1.1 Applicable

More information

Enabling Remote Access to the ACE

Enabling Remote Access to the ACE CHAPTER 3 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. All features described in this chapter are supported with IPv6 unless otherwise

More information

Automation Technology > Industrial Communication > Industrial Ethernet > RUGGEDCOM Ethernet Switches > RUGGEDCOM RS8000 managed

Automation Technology > Industrial Communication > Industrial Ethernet > RUGGEDCOM Ethernet Switches > RUGGEDCOM RS8000 managed Automation Technology > Industrial Communication > Industrial Ethernet > RUGGEOM Ethernet Switches > RUGGEOM RS8000 managed 6GK6080-0TS2.-... RUGGEOM RS8000T Technical Data Product-type designation RUGGEOM

More information

Datasheet. Managed PoE+ Gigabit Switches with SFP. Tel: (0) Fax: +44 (0)

Datasheet. Managed PoE+ Gigabit Switches with SFP.  Tel: (0) Fax: +44 (0) Managed PoE+ Gigabit Switches with SFP Models: ES-8-150W, ES-16-150W, ES-24-250W, ES-24-500W, ES-48-500W, ES-48-750W Non-Blocking Throughput Switching Performance Gigabit Ethernet RJ45 and SFP+/SFP Ports

More information

Configuring Cache Services Using the Web Cache Communication Protocol

Configuring Cache Services Using the Web Cache Communication Protocol Configuring Cache Services Using the Web Cache Communication Protocol Finding Feature Information, page 1 Prerequisites for WCCP, page 1 Restrictions for WCCP, page 2 Information About WCCP, page 3 How

More information

6GK6021-0MS Automation Technology > Industrial Communication > Industrial Ethernet > RUGGEDCOM Ethernet Switches > RUGGEDCOM RSG2000 managed

6GK6021-0MS Automation Technology > Industrial Communication > Industrial Ethernet > RUGGEDCOM Ethernet Switches > RUGGEDCOM RSG2000 managed Automation Technology > Industrial Communication > Industrial Ethernet > RUGGEDCOM Ethernet Switches > RUGGEDCOM RSG2000 managed 6GK6021-0MS2.-... RUGGEDCOM M2100 Technical Data Product-type designation

More information

Extended ACL Configuration Mode Commands

Extended ACL Configuration Mode Commands Extended ACL Configuration Mode Commands To create and modify extended access lists on a WAAS device for controlling access to interfaces or applications, use the ip access-list extended global configuration

More information

Datasheet. Managed PoE+ Gigabit Switches with SFP. Models: ES W, ES W, ES W, ES W

Datasheet. Managed PoE+ Gigabit Switches with SFP. Models: ES W, ES W, ES W, ES W Managed PoE+ Gigabit Switches with SFP Models: ES-24-250W, ES-24-500W, ES-48-500W, ES-48-750W Non-Blocking Throughput Switching Performance Gigabit Ethernet RJ45 and SFP+/SFP Ports Auto-Sensing IEEE 802.3af/at

More information

Gigabit Managed Ethernet Switch

Gigabit Managed Ethernet Switch LGB1110A LGB1152A Product Data Sheet Gigabit Managed Ethernet Switch LGB1110A OVERVIEW The Gigabit Managed Ethernet Switches offer L2 features plus advanced L3 features such as Static Route for Enterprise

More information

Gigabit Managed Ethernet Switch

Gigabit Managed Ethernet Switch LGB1110A LGB1126A-R2 LGB1152A Product Data Sheet Gigabit Managed Ethernet Switch FEATURES L2+ features make the switch easy to manage, provide robust security, and QoS. Offers a built-in device management

More information

GS-2610G L2+ Managed GbE Switch

GS-2610G L2+ Managed GbE Switch GS-2610G L2+ Managed GbE Switch Overview GS-2610G L2+ Managed Switch is a next-generation Ethernet Switch offering full suite of L2 features, including advanced L3 features such as Static Route that delivers

More information

CCNA Course Access Control Lists

CCNA Course Access Control Lists CCNA Course Access Control Lists Access Control Lists (ACL) Traffic Filtering Permit or deny packets moving through router Permit or deny (VTY) access to or from a router Traffic Identifying for special

More information

Configuring SNMP. Understanding SNMP CHAPTER

Configuring SNMP. Understanding SNMP CHAPTER CHAPTER 28 This chapter describes how to configure the Simple Network Management Protocol (SNMP) on the Catalyst 2960 switch. For complete syntax and usage information for the commands used in this chapter,

More information

Datasheet. Managed Gigabit Switches with SFP. Models: ES-24-Lite, ES-48-Lite. Non-Blocking Throughput Switching Performance

Datasheet. Managed Gigabit Switches with SFP. Models: ES-24-Lite, ES-48-Lite. Non-Blocking Throughput Switching Performance Managed Gigabit Switches with SFP Models: ES-24-Lite, ES-48-Lite Non-Blocking Throughput Switching Performance Gigabit Ethernet RJ45 Ports SFP+/SFP Fiber Connectivity Options Deployment Examples VLAN 80

More information

Configuring IP Multicast Routing

Configuring IP Multicast Routing 34 CHAPTER This chapter describes how to configure IP multicast routing on the Cisco ME 3400 Ethernet Access switch. IP multicasting is a more efficient way to use network resources, especially for bandwidth-intensive

More information

Information about Network Security with ACLs

Information about Network Security with ACLs This chapter describes how to configure network security on the switch by using access control lists (ACLs), which in commands and tables are also referred to as access lists. Finding Feature Information,

More information

6GK6021-0PS Automation Technology > Industrial Communication > Industrial Ethernet > RUGGEDCOM Ethernet Switches > RUGGEDCOM RSG2000 managed

6GK6021-0PS Automation Technology > Industrial Communication > Industrial Ethernet > RUGGEDCOM Ethernet Switches > RUGGEDCOM RSG2000 managed Automation Technology > Industrial Communication > Industrial Ethernet > RUGGEDCOM Ethernet Switches > RUGGEDCOM RSG2000 managed 6GK6021-0PS2.-... RUGGEDCOM RSG2100P Technical Data Product-type designation

More information

VLAN Access Control Lists

VLAN Access Control Lists VLAN access control lists (ACLs) or VLAN maps access-control all packets (bridged and routed). You can use VLAN maps to filter traffic between devices in the same VLAN. VLAN maps are configured to provide

More information

Access Rules. Controlling Network Access

Access Rules. Controlling Network Access This chapter describes how to control network access through or to the ASA using access rules. You use access rules to control network access in both routed and transparent firewall modes. In transparent

More information

TP-LINK. 24-Port Gigabit L2 Managed Switch with 4 Combo SFP Slots. Overview. Datasheet TL-SG3424.

TP-LINK. 24-Port Gigabit L2 Managed Switch with 4 Combo SFP Slots. Overview. Datasheet TL-SG3424. TP-LINK 24-Port Gigabit L2 Managed Switch with 4 Combo SFP Slots Overview TP-LINK 24-Port Gigabit L2 Managed Switch with 4 Combo SFP Slots is equipped with 24 gigabit RJ45 ports and 4 combo SFP slots.

More information

Configuring Port-Based Traffic Control

Configuring Port-Based Traffic Control Overview of Port-Based Traffic Control, page 2 Finding Feature Information, page 2 Information About Storm Control, page 2 How to Configure Storm Control, page 4 Finding Feature Information, page 9 Information

More information

K2289: Using advanced tcpdump filters

K2289: Using advanced tcpdump filters K2289: Using advanced tcpdump filters Non-Diagnostic Original Publication Date: May 17, 2007 Update Date: Sep 21, 2017 Topic Introduction Filtering for packets using specific TCP flags headers Filtering

More information

ETHERNET ROUTING SWITCH

ETHERNET ROUTING SWITCH Table of Contents ETHERNET ROUTING SWITCH 1600...2 SOFTWARE RELEASE 2.1.3.0...2 1. Release Summary...2 2. Important Notes before Upgrading to This Release...2 3. Platforms Supported...2 4. Notes for Upgrade...2

More information

CL-SW10G Port GbE (100M/1G)SFP + 4 TP/(100/1G) SFP Combo + 4-Port 1G/10G SFP+ L2 Plus Carrier Ethernet Switch

CL-SW10G Port GbE (100M/1G)SFP + 4 TP/(100/1G) SFP Combo + 4-Port 1G/10G SFP+ L2 Plus Carrier Ethernet Switch Key Features L2+ features provide better manageability, security, QoS, and performance IEEE 802.3ah MAC Layer OAM and IEEE802.1ag Ethernet CFM ITU-T Y.1731 Ethernet OAM Performance monitoring 802.3az Energy

More information

Chapter 1 Getting Started

Chapter 1 Getting Started Chapter 1 Getting Started Introduction This guide describes how to install, configure, and monit the following devices: HP ProCurve Routing Switch 9308M HP ProCurve Routing Switch 9304M HP ProCurve Routing

More information

Configuring Routes on the ACE

Configuring Routes on the ACE CHAPTER2 This chapter describes how the ACE is considered a router hop in the network when it is in routed mode. In the Admin or user contexts, the ACE supports static routes only. The ACE supports up

More information

Switches running the LAN Base feature set support only static routing on SVIs.

Switches running the LAN Base feature set support only static routing on SVIs. Finding Feature Information, on page 1 Prerequisites for VLANs, on page 1 Restrictions for VLANs, on page 2 Information About VLANs, on page 2 How to Configure VLANs, on page 6 Monitoring VLANs, on page

More information

Configuring VLANs. Finding Feature Information. Prerequisites for VLANs

Configuring VLANs. Finding Feature Information. Prerequisites for VLANs Finding Feature Information, page 1 Prerequisites for VLANs, page 1 Restrictions for VLANs, page 2 Information About VLANs, page 2 How to Configure VLANs, page 7 Monitoring VLANs, page 19 Where to Go Next,

More information