Cisco Systems IC-23 LAN Extender Enablement Interface Example, MAC Address Filtering Example

Page 44

Configuring LAN Interfaces

LAN Interface Configuration Examples

SNMP Illegal Address Trap Enablement for Hub Port Example

The following example specifies the gateway IP address and enables an SNMP trap to be issued to the host 172.69.40.51 when a MAC address violation is detected on hub ports 2, 3, or 4. It specifies that interface Ethernet 0 is the source for all traps on the router. The community string is defined as the string public and the read/write parameter is set.

ip route 0.0.0.0 0.0.0.0 172.22.10.1 snmp-server community public rw snmp-server trap-source ethernet 0 snmp-server host 172.69.40.51 public hub ethernet 0 2 4

snmp trap illegal-address

LAN Extender Enablement Interface Example

The following simple example configures and creates a LAN Extender interface. In this example, the MAC address of the LAN Extender is 0000.0c00.0001.

interface serial 4 encapsulation ppp

interface lex 0

lex burned-in-address 0000.0c00.0001

ip address 131.108.172.21 255.255.255.0

LAN Extender Interface Access List Examples

This section provides these examples of LAN extender interface configuration:

MAC Address Filtering Example

Ethernet Type Code Filtering Example

MAC Address Filtering Example

The following is an example that controls which traffic from Macintosh computers on the remote Ethernet LAN reaches the core router:

access-list 710 permit 0800.0298.0000 0000.0000.FFFF access-list 710 deny 0800.0276.2917 0000.0000.0000 access-list 710 permit 0800.0000.0000 0000.FFFF.FFFF interface lex 0

lex input-address-list 710

The first line of this access list permits traffic from any Macintosh whose MAC address starts with 0800.0298. The remaining two octets in the MAC address can be any value because the mask for these octets is FFFF (“don’t care” bits).

The second line specifically rejects all traffic originating from a Macintosh with the MAC address of 0800.0276.2917. Note that none of the mask bits are “don’t care” bits.

The third line specifically permits all traffic from other Macintoshes whose MAC addresses start with 0800. Note that in the mask, the “don’t care” bits are the rest of the address.

At the end of the list is an implicit “deny everything” entry, meaning that any address that does not match an address or address group on the list is rejected.

Cisco IOS Interface Configuration Guide

IC-66

Image 44
Contents Configuring an Ethernet or Fast Ethernet Interface IC-23Ethernet and Fast Ethernet Interface Configuration Task List IC-24IC-25 Specifying an Ethernet or Fast Ethernet InterfaceSpecifying an Ethernet Encapsulation Method IC-26 Specifying the Media and Connector TypeSpecifying Full-Duplex Operation IC-27 Configuring Fast Ethernet 100BASE-TExtending the 10BASE-T Capability Configuring PA-12E/2FE Port Adapter IC-28Configuring the PA-12E/2FE Port Adapter IC-29IC-30 Monitoring and Maintaining the PA-12E/2FE Port Adapter IC-31IC-32 IC-33 Configuring Fast EtherChannelConfiguring the 100VG-AnyLAN Port Adapter Fast EtherChannel Configuration Task List IC-34Configuring the Port-Channel Interface IC-35Configuring the Fast Ethernet Interfaces IC-36Configuring a Fiber Distributed Data Interface IC-37Using Connection Management Information IC-38IC-39 Fddi Configuration Task ListSpecifying a Fddi IC-40 Enabling Full-Duplex Mode on the FddiEnabling Fddi Bridging Encapsulation Setting the Token Rotation Time Setting the Transmission Valid TimerControlling the Transmission Timer Modifying the C-Min TimerModifying the TB-Min Timer Modifying the Fddi Timeout TimerSetting the Bit Control Controlling SMT Frame ProcessingSetting Fddi Frames Per Token Limit Controlling the CMT MicrocodeStarting and Stopping Fddi IC-43Configuring a Hub Interface Controlling the Fddi SMT Message Queue SizePreallocating Buffers for Bursty Fddi Traffic IC-44Enabling a Hub Port Disabling or Enabling Automatic Receiver Polarity ReversalDisabling or Enabling the Link Test Function IC-45IC-46 Enabling Source Address ControlEnabling Snmp Illegal Address Trap Configuring a LAN Extender Interface Connecting a LAN Extender to a Core RouterExpanded View of the Connection to a Core Router IC-47Installing a LAN Extender at a Remote Site Discovering the MAC AddressUpgrading Software for the LAN Extender Management of the LAN Extender InterfaceConfiguring the LAN Extender IC-49IC-50 LAN Extender Interface Configuration Task ListConfiguring and Creating a LAN Extender Interface Defining Packet Filters IC-51Filtering by MAC Address and Vendor Code IC-52Controlling Priority Queueing IC-53Controlling the Sending of Commands to the LAN Extender IC-54IC-55 Restarting the LAN ExtenderDownloading a Software Image to the LAN Extender Troubleshooting the LAN Extender IC-56System OK IC-57Configuring a Token Ring Interface IC-58Token Ring Interface Configuration Task List Dedicated Token Ring Port AdapterSpecifying a Token Ring Interface Enabling Early Token ReleaseLAN Interface Configuration Examples Configuring PCbus Token Ring Interface ManagementEnabling Token Ring Concentrator Port Monitoring and Maintaining the PortEthernet Encapsulation Enablement Example Full Duplex Enablement Operation ExamplePA-12E/2FE Port Configuration Examples IC-61PA-VG100 Port Adapter Configuration Example IC-62Fast EtherChannel Configuration Examples IC-63Fddi Frames Configuration Example IC-64Hub Configuration Examples Hub Port Startup ExamplesHub Port Shutdown Examples IC-65LAN Extender Enablement Interface Example LAN Extender Interface Access List ExamplesSnmp Illegal Address Trap Enablement for Hub Port Example MAC Address Filtering ExampleEthernet Type Code Filtering Example IC-67IC-68

IC-23 specifications

Cisco Systems IC-23 is a robust networking device designed to address the ever-evolving demands of modern enterprises. As part of Cisco's extensive portfolio, the IC-23 serves as an ideal solution for organizations seeking to enhance their network performance, reliability, and scalability.

One of the standout features of the Cisco IC-23 is its high-speed connectivity options. With support for both wired and wireless communications, this device can seamlessly integrate into a wide range of network architectures. It offers multiple Gigabit Ethernet ports, enabling rapid data transfer and facilitating the connection of numerous devices without compromising performance.

Another key characteristic of the IC-23 is its advanced security protocols. Data breaches and cyber threats are persistent concerns in today's digital landscape, and Cisco addresses these challenges head-on with robust security measures. The IC-23 incorporates features such as firewall capabilities, intrusion detection systems, and secure VPN support, ensuring that sensitive information remains protected while traversing the network.

The IC-23 also leverages Cisco's renowned software-defined networking (SDN) capabilities. This technology allows businesses to manage their network resources dynamically, ensuring optimal performance based on real-time demands. As a result, organizations can easily adjust their network configurations to meet fluctuating workloads, enhancing both efficiency and cost-effectiveness.

Scalability is another critical feature of the IC-23, making it an excellent choice for growing companies. Cisco has designed this device to accommodate increasing data traffic without necessitating a complete overhaul of existing infrastructure. This adaptability ensures that organizations can expand their networks smoothly as their operations evolve.

Moreover, the IC-23 supports a variety of network management tools, providing IT teams with the insights needed to monitor performance and troubleshoot issues proactively. Cisco's user-friendly interface simplifies the process of network management, allowing administrators to optimize resources and maintain continuous uptime.

In conclusion, Cisco Systems IC-23 stands out as a highly capable networking solution tailored for modern enterprises. With its high-speed connectivity, comprehensive security features, SDN capabilities, scalability, and intuitive management tools, the IC-23 is well-equipped to meet the demands of today’s digital environments. As organizations continue to navigate the complexities of the digital age, the IC-23 prepares them to thrive in an increasingly interconnected world.