IP Fragment Handling......................................................................................................................................................111
IP Fragments ACL Examples....................................................................................................................................111
Layer 4 ACL Rules Examples................................................................................................................................... 112
Configure a Standard IP ACL........................................................................................................................................ 113
Configuring a Standard IP ACL Filter..................................................................................................................... 114
Configure an Extended IP ACL......................................................................................................................................114
Configuring Filters with a Sequence Number........................................................................................................115
Configuring Filters Without a Sequence Number................................................................................................. 116
Configure Layer 2 and Layer 3 ACLs............................................................................................................................117
Assign an IP ACL to an Interface.................................................................................................................................. 117
Applying an IP ACL..........................................................................................................................................................118
Counting ACL Hits.................................................................................................................................................... 118
Configure Ingress ACLs..................................................................................................................................................118
Configure Egress ACLs.................................................................................................................................................. 119
Applying Egress Layer 3 ACLs (Control-Plane)................................................................................................... 120
Configuring UDF ACL.................................................................................................................................................... 120
IP Prefix Lists.................................................................................................................................................................. 123
Implementation Information.................................................................................................................................... 123
Configuration Task List for Prefix Lists................................................................................................................. 123
ACL Resequencing......................................................................................................................................................... 127
Resequencing an ACL or Prefix List.......................................................................................................................127
Route Maps.....................................................................................................................................................................129
Implementation Information....................................................................................................................................129
Flow-Based Monitoring Support for ACLs..................................................................................................................129
Behavior of Flow-Based Monitoring...................................................................................................................... 129
Enabling Flow-Based Monitoring............................................................................................................................ 131
Configuring IP Mirror Access Group.............................................................................................................................131
Sample Configuration...............................................................................................................................................132
Example of viewing IP mirror–access–group applied to an Interface...............................................................132
8 Bidirectional Forwarding Detection (BFD)..................................................................................................133
How BFD Works.............................................................................................................................................................133
BFD Packet Format................................................................................................................................................. 134
BFD Sessions............................................................................................................................................................ 135
BFD Three-Way Handshake................................................................................................................................... 136
Session State Changes............................................................................................................................................138
Important Points to Remember....................................................................................................................................138
Configure BFD................................................................................................................................................................ 138
Configure BFD for Physical Ports.......................................................................................................................... 139
Configure BFD for Static Routes........................................................................................................................... 140
Configure BFD for OSPF.........................................................................................................................................143
Configure BFD for OSPFv3.................................................................................................................................... 146
Configure BFD for IS-IS...........................................................................................................................................147
Configure BFD for BGP...........................................................................................................................................149
Configure BFD for VRRP........................................................................................................................................ 156
Configuring Protocol Liveness................................................................................................................................159
6
Contents