IP Fragment Handling..................................................................................................................................................... 114
IP Fragments ACL Examples................................................................................................................................... 114
Layer 4 ACL Rules Examples................................................................................................................................... 114
Configure a Standard IP ACL........................................................................................................................................ 115
Configuring a Standard IP ACL Filter..................................................................................................................... 116
Configure an Extended IP ACL......................................................................................................................................117
Configuring Filters with a Sequence Number........................................................................................................117
Configuring Filters Without a Sequence Number................................................................................................. 118
Configure Layer 2 and Layer 3 ACLs............................................................................................................................119
Assign an IP ACL to an Interface................................................................................................................................. 120
Applying an IP ACL.........................................................................................................................................................120
Counting ACL Hits.................................................................................................................................................... 121
Configure Ingress ACLs..................................................................................................................................................121
Configure Egress ACLs.................................................................................................................................................. 121
Applying Egress Layer 3 ACLs (Control-Plane)....................................................................................................122
IP Prefix Lists.................................................................................................................................................................. 123
Implementation Information.................................................................................................................................... 123
Configuration Task List for Prefix Lists................................................................................................................. 123
ACL Resequencing......................................................................................................................................................... 127
Resequencing an ACL or Prefix List.......................................................................................................................127
Route Maps.....................................................................................................................................................................129
Implementation Information....................................................................................................................................129
Flow-Based Monitoring Support for ACLs..................................................................................................................129
Behavior of Flow-Based Monitoring...................................................................................................................... 129
Enabling Flow-Based Monitoring............................................................................................................................ 131
Configuring UDF ACL.................................................................................................................................................... 132
Configuring IP Mirror Access Group............................................................................................................................134
Sample Configuration.............................................................................................................................................. 135
Example of viewing IP mirror–access–group applied to an Interface...............................................................135
8 Bidirectional Forwarding Detection (BFD)..................................................................................................136
How BFD Works.............................................................................................................................................................136
BFD Packet Format..................................................................................................................................................137
BFD Sessions............................................................................................................................................................ 138
BFD Three-Way Handshake................................................................................................................................... 139
Session State Changes.............................................................................................................................................141
Important Points to Remember.....................................................................................................................................141
Configure BFD.................................................................................................................................................................141
Configure BFD for Physical Ports.......................................................................................................................... 142
Configure BFD for Static Routes........................................................................................................................... 143
Configure BFD for OSPF.........................................................................................................................................146
Configure BFD for OSPFv3.................................................................................................................................... 149
Configure BFD for IS-IS.......................................................................................................................................... 150
Configure BFD for BGP...........................................................................................................................................152
Configure BFD for VRRP........................................................................................................................................ 159
Configuring Protocol Liveness................................................................................................................................162
6
Contents