14
18.2.5 PIM-SM Troubleshooting Help.................................................................... 713
18.3
MLD ............................................................................................................... 722
18.3.1 Introduction to MLD .................................................................................... 722
18.3.2 MLD Configuration Task List....................................................................... 723
18.3.3 Command for MLD ..................................................................................... 725
18.3.4 MLD Typical Application.............................................................................. 730
18.3.5 MLD Troubleshooting Help ......................................................................... 731
18.4
MLD
S
NOOPING
............................................................................................... 734
18.4.1 MLD Snooping Introduction ........................................................................ 734
18.4.2 MLD Snooping Configuration Task ............................................................. 734
18.4.3 Commands For MLD Snooping Configuration ............................................ 736
18.4.4 MLD Snooping Examples ........................................................................... 742
18.4.5 MLD Snooping Troubleshooting ................................................................. 745
CHAPTER 19 ACL CONFIGURATION......................................................................... 746
19.1
I
NTRODUCTION TO
ACL .................................................................................... 746
19.1.1 Access-list................................................................................................... 746
19.1.2 Access-group.............................................................................................. 746
19.1.3 Access-list Action and Global Default Action............................................... 747
19.2
ACL
C
ONFIGURATION
....................................................................................... 747
19.2.1 ACL Configuration Task Sequence ............................................................. 747
19.2.2 Commands for ACL .................................................................................... 760
19.3
ACL
E
XAMPLE
................................................................................................. 779
19.4
ACL
T
ROUBLESHOOTING
.................................................................................. 780
19.4.1 Monitor And Debug Command ................................................................... 780
19.5
W
EB
M
ANAGEMENT
.......................................................................................... 783
19.5.1 Numeric standard ACL configuration .......................................................... 784
19.5.2 Delete numeric IP ACL ............................................................................... 784
19.5.3 Configure the numeric extended ACL......................................................... 784
19.5.4 Configure and delete the standard ACL name............................................ 786
19.5.5 Configure extended ACL name configuration ............................................. 787
19.5.6 Firewall configuration.................................................................................. 787
19.5.7 ACL port binding ......................................................................................... 787
CHAPTER 20 802.1X CONFIGURATION .................................................................... 789
20.1
I
NTRODUCTION TO
802.1
X
................................................................................ 789
20.2
802.1
X
C
ONFIGURATION
................................................................................... 790
20.2.1 802.1x Configuration Task Sequence ......................................................... 790
20.2.2 Command for 802.1x .................................................................................. 794
20.3
802.1
X
A
PPLICATION
E
XAMPLE
......................................................................... 803