Advanced Configuration and Management Guide
USAGE GUIDELINES FOR ACCESS CONTROL LISTS (ACLS) ..........................................................................
3-2
ACL SUPPORT ON THE HP PRODUCTS .................................................................................................
ACL IDS AND ENTRIES .........................................................................................................................
DEFAULT ACL ACTION .........................................................................................................................
3-3
CONTROLLING MANAGEMENT ACCESS TO THE DEVICE ..........................................................................
ACL LOGGING .....................................................................................................................................
DISABLING OR RE-ENABLINGACCESS CONTROL LISTS (ACLS) ....................................................................
3-4
ENABLING ACL MODE ..........................................................................................................................
DISABLING ACL MODE .........................................................................................................................
3-5
CONFIGURING STANDARD ACLS .................................................................................................................
STANDARD ACL SYNTAX ......................................................................................................................
3-6
CONFIGURING EXTENDED ACLS ..................................................................................................................
3-9
FILTERING ON IP PRECEDENCE AND TOS VALUES ..............................................................................
3-10
EXTENDED ACL SYNTAX ....................................................................................................................
3-11
CONFIGURING NAMED ACLS .....................................................................................................................
3-18
MODIFYING ACLS .....................................................................................................................................
3-19
APPLYING AN ACL TO A SUBSET OF PORTS ON A VIRTUAL INTERFACE .......................................................
3-21
ENABLING STRICT TCP OR UDP MODE ....................................................................................................
ENABLING STRICT TCP MODE ............................................................................................................
3-22
ENABLING STRICT UDP MODE ...........................................................................................................
DISPLAYING ACLS ....................................................................................................................................
3-23
DISPLAYING THE LOG ENTRIES ..................................................................................................................
POLICY-BASEDROUTING (PBR) ................................................................................................................
3-24
CONFIGURING PBR ............................................................................................................................
3-25
ENABLING PBR ..................................................................................................................................
3-27
CONFIGURATION EXAMPLES ...............................................................................................................
RATE LIMITING............................................................................................
4-1
FIXED RATE LIMITING ..................................................................................................................................
HOW FIXED RATE LIMITING WORKS ......................................................................................................
CONFIGURING FIXED RATE LIMITING .....................................................................................................
4-2
DISPLAYING FIXED RATE LIMITING INFORMATION ...................................................................................
4-3
ADAPTIVE RATE LIMITING ............................................................................................................................
4-4
EXAMPLES OF ADAPTIVE RATE LIMITING APPLICATIONS .........................................................................
4-5
ADAPTIVE RATE LIMITING PARAMETERS ................................................................................................
4-8
HOW ADAPTIVE RATE LIMITING WORKS ..............................................................................................
4-10
CONFIGURING ADAPTIVE RATE LIMITING .............................................................................................
4-13
COMPLETE CLI EXAMPLES .................................................................................................................
4-18
DISABLING RATE LIMITING EXEMPTION FOR CONTROL PACKETS ..........................................................
4-20
CONFIGURING SPANNING TREE PROTOCOL (STP) .......................................
5-1
CONFIGURING STANDARD STP PARAMETERS ..............................................................................................
STP PARAMETERS AND DEFAULTS .......................................................................................................
5-2
ENABLING OR DISABLING THE SPANNING TREE PROTOCOL (STP) .........................................................
5-3
CHANGING STP BRIDGE AND PORT PARAMETERS .................................................................................
5-4
DISPLAYING STP INFORMATION ............................................................................................................
5-7
vi