vii
v1.1, May 2006
Proxy Address Resolution Protocol (ARP) ...... .............................................................5-21
Overview ................................................................................................................ 5-21
CLI Examples ................................................................................................... ......5-22
Example #1: show ip interface .........................................................................5-22
Example #2: ip proxy-arp ................................................................................. 5-22
Chapter 6
Virtual Router Redundancy Protocol
CLI Examples ........................ .........................................................................................6-2
Chapter 7
Access Control Lists (ACLs)
Overview ......................................................................................................................... 7-1
Limitations ................................................................................................................ 7-1
MAC ACLs .................................................................................... ..................................7-1
Configuring IP ACLs ........................................................ ...............................................7-2
Process ........................................................................................................................... 7-3
IP ACL CLI Example ....................................................................................................... 7-3
MAC ACL CLI Examples ................. ...............................................................................7-4
Example #1: mac access list ................................................................................... 7-5
Example #2: permit any . .........................................................................................7-6
Example #3 Configure mac access-group ................................ ...............................7-7
Example #4 permit ....................................... ............................................................7-8
Example #5: show mac access-lists ........................................................................7-9
Chapter 8
Class of Service (CoS) Queuing
Overview ......................................................................................................................... 8-1
CoS Queue Mapping .......................................................... ............................................8-1
Trusted Ports ............................................................................................................ 8-1
Untrusted Ports ...................................... ..................................................................8-2
CoS Queue Configuration ..............................................................................................8-2
Port Egress Queue Configuration ................................... .... ... ... ... .... ... ... ... ...............8-2
Drop Precedence Configuration (per Queue) ..........................................................8-3
Per Interface Basis ................................................................................................. ..8-3
CLI Examples ........................ .........................................................................................8-3
Example #1: show classofservice trust ............................... .....................................8-4