7 Access Control Lists (ACLs)...................................................................................................................... 106
IP Access Control Lists (ACLs)....................................................................................................................................106
CAM Allocation and CAM Optimization.......................................................................................................................107
User Configurable CAM Allocation.........................................................................................................................107
CAM Optimization....................................................................................................................................................108
Test CAM Usage......................................................................................................................................................108
View CAM-ACL Settings.........................................................................................................................................108
View CAM Usage......................................................................................................................................................110
QoS CAM Region Limitation....................................................................................................................................110
Implementing ACLs on Dell Networking OS.................................................................................................................111
ACLs and VLANs........................................................................................................................................................111
ACL Optimization.......................................................................................................................................................111
Determine the Order in which ACLs are Used to Classify Traffic.......................................................................111
IP Fragment Handling..................................................................................................................................................... 112
IP Fragments ACL Examples................................................................................................................................... 112
Layer 4 ACL Rules Examples................................................................................................................................... 113
Configure a Standard IP ACL........................................................................................................................................ 114
Configuring a Standard IP ACL Filter..................................................................................................................... 115
Configure an Extended IP ACL..................................................................................................................................... 115
Configuring Filters with a Sequence Number........................................................................................................116
Configuring Filters Without a Sequence Number................................................................................................. 116
Established Flag...............................................................................................................................................................117
Configure Layer 2 and Layer 3 ACLs............................................................................................................................117
Assign an IP ACL to an Interface.................................................................................................................................. 118
Applying an IP ACL....................................................................................................................................................118
Counting ACL Hits.................................................................................................................................................... 119
Configure Ingress ACLs..................................................................................................................................................119
Configure Egress ACLs.................................................................................................................................................. 119
Applying Egress Layer 3 ACLs (Control-Plane)................................................................................................... 120
Configure ACLs to Loopback........................................................................................................................................ 121
Applying an ACL on Loopback Interfaces.................................................................................................................... 121
IP Prefix Lists.................................................................................................................................................................. 122
Implementation Information.................................................................................................................................... 122
Configuration Task List for Prefix Lists................................................................................................................. 122
Creating a Prefix List..................................................................................................................................................... 123
Creating a Prefix List Without a Sequence Number............................................................................................123
Viewing Prefix Lists..................................................................................................................................................124
Applying a Prefix List for Route Redistribution.................................................................................................... 125
Applying a Filter to a Prefix List (OSPF)...............................................................................................................125
ACL Resequencing.........................................................................................................................................................126
Resequencing an ACL or Prefix List...................................................................................................................... 126
Route Maps.....................................................................................................................................................................128
Implementation Information.................................................................................................................................... 128
Important Points to Remember..............................................................................................................................128
Configuration Task List for Route Maps............................................................................................................... 128
6
Contents