Switch Protection
ExtremeWare XOS 10.1 Concepts Guide
119
After the ACL has been checked, it can be applied to an interface. To apply an ACL, use the following
command:
configure access-list <aclname> [any | ports <portlist>] {ingress}
If you use the
any
keyword, the ACL is applied to all the interfaces, and is referred to as the wildcard
ACL. This ACL is evaluated for ports without a specific ACL applied to it, and is also applied to
packets that do not match the ACL applied to the interface.
If an ACL is already configured on an interface, the command will be rejected and an error message
displayed.
To remove an ACL from an interface, use the following command:
unconfigure access-list {any | ports <portlist>} {ingress}
To display which interfaces have ACLs configured, and which ACL is on which interface, use the
following command:
show access-list {<aclname>}
Displaying and Clearing ACL Counters
To display the access list counters, use the following command:
show access-list counter {<countername>} [any | ports <portlist>] {ingress}
To clear the access list counters, use the following command:
clear access-list counter {<countername>} [any | ports <portlist>] {ingress}
Switch Protection
Switch protection features enhance the robustness of switch performance. In this category are the
following features:
•
Routing Access Profiles
•
Route Maps
•
Policies
In ExtremeWare XOS, all of these features are supported by the concept of a policy. If you have used
any of these features in the past, you will now use policies to achieve the same results.
Routing access profiles are used to control the advertisement or recognition of routing protocols, such as
RIP, OSPF, IS-IS, or BGP. Routing access profiles can be used to ‘hide’ entire networks, or to trust only
specific sources for routes or ranges of routes. The capabilities of routing access profiles are specific to
the type of routing protocol involved, but are sometimes more efficient and easier to implement than
access lists.
Route maps are used to modify or filter routes. They are also used to modify or filter routing
information.
Summary of Contents for ExtremeWare XOS 10.1
Page 12: ...12 ExtremeWare XOS 10 1 Concepts Guide Contents...
Page 15: ...Part 1 Using ExtremeWare XOS...
Page 16: ......
Page 20: ...20 ExtremeWare XOS 10 1 Concepts Guide ExtremeWare XOS Overview...
Page 32: ...32 ExtremeWare XOS 10 1 Concepts Guide Accessing the Switch...
Page 74: ...74 ExtremeWare XOS 10 1 Concepts Guide Virtual LANs VLANs...
Page 80: ...80 ExtremeWare XOS 10 1 Concepts Guide Forwarding Database FDB...
Page 112: ...112 ExtremeWare XOS 10 1 Concepts Guide Status Monitoring and Statistics...
Page 133: ...Part 2 Using Switching and Routing Protocols...
Page 134: ......
Page 174: ...174 ExtremeWare XOS 10 1 Concepts Guide Virtual Router Redundancy Protocol...
Page 184: ...184 ExtremeWare XOS 10 1 Concepts Guide IP Unicast Routing...
Page 202: ...202 ExtremeWare XOS 10 1 Concepts Guide Interior Gateway Protocols...
Page 216: ...216 ExtremeWare XOS 10 1 Concepts Guide Exterior Gateway Routing Protocols...
Page 224: ...224 ExtremeWare XOS 10 1 Concepts Guide IP Multicast Routing...
Page 225: ...Part 3 Appendixes...
Page 226: ......
Page 234: ...234 ExtremeWare XOS 10 1 Concepts Guide Software Upgrade and Boot Options...
Page 242: ...242 ExtremeWare XOS 10 1 Concepts Guide Troubleshooting...
Page 256: ...4 ExtremeWare XOS 10 1 Concepts Guide Index of Commands...