Advanced Configuration and Management Guide

USAGE GUIDELINES FOR ACCESS CONTROL LISTS (ACLS) ..........................................................................

3-2

ACL SUPPORT ON THE HP PRODUCTS .................................................................................................

3-2

ACL IDS AND ENTRIES .........................................................................................................................

3-2

DEFAULT ACL ACTION .........................................................................................................................

3-3

CONTROLLING MANAGEMENT ACCESS TO THE DEVICE ..........................................................................

3-3

ACL LOGGING .....................................................................................................................................

3-3

DISABLING OR RE-ENABLINGACCESS CONTROL LISTS (ACLS) ....................................................................

3-4

ENABLING ACL MODE ..........................................................................................................................

3-4

DISABLING ACL MODE .........................................................................................................................

3-5

CONFIGURING STANDARD ACLS .................................................................................................................

3-5

STANDARD ACL SYNTAX ......................................................................................................................

3-6

CONFIGURING EXTENDED ACLS ..................................................................................................................

3-9

FILTERING ON IP PRECEDENCE AND TOS VALUES ..............................................................................

3-10

EXTENDED ACL SYNTAX ....................................................................................................................

3-11

CONFIGURING NAMED ACLS .....................................................................................................................

3-18

MODIFYING ACLS .....................................................................................................................................

3-19

APPLYING AN ACL TO A SUBSET OF PORTS ON A VIRTUAL INTERFACE .......................................................

3-21

ENABLING STRICT TCP OR UDP MODE ....................................................................................................

3-21

ENABLING STRICT TCP MODE ............................................................................................................

3-22

ENABLING STRICT UDP MODE ...........................................................................................................

3-22

DISPLAYING ACLS ....................................................................................................................................

3-23

DISPLAYING THE LOG ENTRIES ..................................................................................................................

3-23

POLICY-BASEDROUTING (PBR) ................................................................................................................

3-24

CONFIGURING PBR ............................................................................................................................

3-25

ENABLING PBR ..................................................................................................................................

3-27

CONFIGURATION EXAMPLES ...............................................................................................................

3-27

RATE LIMITING............................................................................................

4-1

FIXED RATE LIMITING ..................................................................................................................................

4-1

HOW FIXED RATE LIMITING WORKS ......................................................................................................

4-1

CONFIGURING FIXED RATE LIMITING .....................................................................................................

4-2

DISPLAYING FIXED RATE LIMITING INFORMATION ...................................................................................

4-3

ADAPTIVE RATE LIMITING ............................................................................................................................

4-4

EXAMPLES OF ADAPTIVE RATE LIMITING APPLICATIONS .........................................................................

4-5

ADAPTIVE RATE LIMITING PARAMETERS ................................................................................................

4-8

HOW ADAPTIVE RATE LIMITING WORKS ..............................................................................................

4-10

CONFIGURING ADAPTIVE RATE LIMITING .............................................................................................

4-13

COMPLETE CLI EXAMPLES .................................................................................................................

4-18

DISABLING RATE LIMITING EXEMPTION FOR CONTROL PACKETS ..........................................................

4-20

CONFIGURING SPANNING TREE PROTOCOL (STP) .......................................

5-1

CONFIGURING STANDARD STP PARAMETERS ..............................................................................................

5-1

STP PARAMETERS AND DEFAULTS .......................................................................................................

5-2

ENABLING OR DISABLING THE SPANNING TREE PROTOCOL (STP) .........................................................

5-3

CHANGING STP BRIDGE AND PORT PARAMETERS .................................................................................

5-4

DISPLAYING STP INFORMATION ............................................................................................................

5-7

vi