Chapter 5 Viewing MPLS Logical Inventory

Viewing Access List Information

The Traffic Engineering LSPs Label Switching sub-branch displays the TE tunnel LSP information. Devices that have LSPs running TE tunnels (either as a head end, mid-point, or a tail end), display the following information:

LSP Type—The type of LSP:

Head—A tunnel starting at this device.

Midpoint—A tunnel passing through this device.

Tail—A tunnel terminating at this device.

Source Address—IP address of the device where the tunnel begins, that is, the tunnel head.

In Interface and Label—Occupied only for midpoint or tail LSPs, this label is advertised to the previous device on this interface as the LSP’s next label.

Out Interface and Label—Occupied only for head or midpoint LSPs, this label is appended to tunnel packets going out through this interface to the next hop along the tunnel’s path.

Destination Address—The IP address of the device at the end of the tunnel.

LSP name—A name identifying the tunnel.

LSP ID—LSP identification number.

Average Bandwidth—Average bandwidth for this tunnel (in Kb/s).

Burst—Burst flow specification for this tunnel (in Kb/s).

Peak—Peak flow specification for this tunnel (in Kb/s).

Sending Alarms—This option is currently unavailable.

Viewing Access List Information

The Access List branch allows you to classify and filter IP packets on inbound and outbound interfaces. The access list displays a set of entries that define the traffic that is permitted or denied access according to such parameters as IP subnet, protocol, port, and others.

Note Access list information is relevant only for Cisco IOS devices.

Each row in the Access List table represents an access list. The following information is displayed:

Name—The name of the access list.

Type—The type of access list:

Standard—Tests the source address (does not check for protocols).

Extended—Tests the source and destination addresses as well as the TCP/IP protocols and source or destination ports.

Named—The same as the standard and extended types with a string identifier.

Access List Entries—Whether the access list has entries (checked) or not (unchecked).

Sending Alarms—This option is currently unavailable.

Double-clicking a row in the Access List table displays the entries of the list. The entries define what happens (permit or deny the action) when the rules are met. The following information is displayed in the Access List Properties dialog box:

Id—The identifier (name) of the access list entry.

 

Cisco Active Network Abstraction 3.6.6 MPLS User Guide

5-14

OL-19192-01

Page 56
Image 56
Cisco Systems 3.6.6 manual Viewing Access List Information

3.6.6 specifications

Cisco Systems has continually evolved its networking solutions to address the demands of modern enterprises, with the introduction of the Cisco Systems 3.6.6 version being no exception. This version integrates cutting-edge technologies designed to enhance network performance, security, and management efficiency, catering to the increasingly complex needs of businesses across various sectors.

One of the standout features of Cisco Systems 3.6.6 is its enhanced support for automation and orchestration. This version incorporates advanced automation tools, allowing IT teams to deploy and configure network resources more rapidly and efficiently. With features such as Cisco DNA Center’s intent-based networking, organizations can streamline operations and reduce manual intervention, leading to quicker service delivery and reduced operational costs.

Security remains a top priority, and Cisco Systems 3.6.6 includes improved security protocols that help protect sensitive data and critical infrastructure. The integration of Cisco SecureX provides a unified view of security across the network, enabling organizations to respond to threats in real-time, manage vulnerabilities proactively, and maintain compliance with regulatory standards. The incorporation of machine learning and AI-driven analytics ensures that potential threats are identified and mitigated before they can escalate.

Interoperability is another key characteristic of version 3.6.6, allowing existing Cisco hardware and software to work seamlessly together. This flexibility ensures that enterprises can leverage their current investments while adopting newer technologies without the need for a complete overhaul of their existing network architecture.

Additionally, Cisco Systems 3.6.6 has enhanced support for IoT devices, integrating robust frameworks that enable organizations to manage and secure an increasing number of connected devices. With the proliferation of IoT in various industries, this feature is vital for maintaining efficiency and security, as it allows for better monitoring and control over the connected ecosystem.

In conclusion, Cisco Systems 3.6.6 embodies a comprehensive approach to modern networking challenges. Its emphasis on automation, advanced security features, interoperability, and IoT support positions it as a pivotal solution for businesses looking to enhance their operational capabilities and embrace digital transformation. As organizations worldwide adapt to an ever-evolving technological landscape, Cisco Systems 3.6.6 stands out as a reliable partner in navigating these complexities.