Users Guide

Table Of Contents
SSH Server...............................................................................................................................................................355
Security commands.................................................................................................................................................355
Simple network management protocol....................................................................................................................... 363
SNMP commands....................................................................................................................................................363
OS10 image upgrade..................................................................................................................................................... 365
Boot system partition..............................................................................................................................................366
Upgrade commands................................................................................................................................................ 366
6 Access Control Lists.................................................................................................................................. 372
IP ACLs............................................................................................................................................................................372
MAC ACLs...................................................................................................................................................................... 373
IP fragment handling..................................................................................................................................................... 373
IP fragments ACL.....................................................................................................................................................373
L3 ACL rules....................................................................................................................................................................374
Permit ACL with L3 information only.....................................................................................................................374
Deny ACL with L3 information only....................................................................................................................... 374
Permit all packets from host...................................................................................................................................374
Permit only rst fragments and non-fragmented packets from host................................................................374
Assign sequence number to lter................................................................................................................................ 375
User-provided sequence number...........................................................................................................................375
Auto-generated sequence number........................................................................................................................375
L2 and L3 ACLs..............................................................................................................................................................375
Assign and apply ACL lters......................................................................................................................................... 376
Ingress ACL lters.......................................................................................................................................................... 377
Egress ACL lters...........................................................................................................................................................377
Clear access-list counters.............................................................................................................................................378
IP prex-lists................................................................................................................................................................... 378
Route-maps.................................................................................................................................................................... 379
Match routes..................................................................................................................................................................380
Set conditions................................................................................................................................................................ 380
continue Clause.............................................................................................................................................................. 381
ACL ow-based monitoring...........................................................................................................................................381
Flow-based mirroring............................................................................................................................................... 381
Enable ow-based monitoring......................................................................................................................................382
ACL commands..............................................................................................................................................................383
clear ip access-list counters................................................................................................................................... 383
clear ipv6 access-list counters...............................................................................................................................383
clear mac access-list counters...............................................................................................................................384
deny...........................................................................................................................................................................384
deny (IPv6)...............................................................................................................................................................385
deny (MAC)..............................................................................................................................................................385
deny icmp................................................................................................................................................................. 386
deny icmp (IPv6)..................................................................................................................................................... 386
deny ip....................................................................................................................................................................... 387
deny ipv6...................................................................................................................................................................387
deny tcp.................................................................................................................................................................... 388
10
Contents