IP Fragment Handling..................................................................................................................................................... 114
IP Fragments ACL Examples................................................................................................................................... 114
Layer 4 ACL Rules Examples................................................................................................................................... 114
Configure a Standard IP ACL........................................................................................................................................ 115
Configuring a Standard IP ACL Filter..................................................................................................................... 116
Configure an Extended IP ACL......................................................................................................................................117
Configuring Filters with a Sequence Number........................................................................................................117
Configuring Filters Without a Sequence Number................................................................................................. 118
Configure Layer 2 and Layer 3 ACLs............................................................................................................................119
Assign an IP ACL to an Interface................................................................................................................................. 120
Applying an IP ACL.........................................................................................................................................................120
Counting ACL Hits.................................................................................................................................................... 121
Configure Ingress ACLs..................................................................................................................................................121
Configure Egress ACLs.................................................................................................................................................. 121
Applying Egress Layer 3 ACLs (Control-Plane)....................................................................................................122
IP Prefix Lists.................................................................................................................................................................. 123
Implementation Information.................................................................................................................................... 123
Configuration Task List for Prefix Lists................................................................................................................. 123
ACL Resequencing......................................................................................................................................................... 127
Resequencing an ACL or Prefix List.......................................................................................................................127
Route Maps.....................................................................................................................................................................129
Implementation Information....................................................................................................................................129
Logging of ACL Processes............................................................................................................................................129
Guidelines for Configuring ACL Logging............................................................................................................... 130
Configuring ACL Logging........................................................................................................................................ 130
Flow-Based Monitoring Support for ACLs.................................................................................................................. 131
Behavior of Flow-Based Monitoring.......................................................................................................................131
Enabling Flow-Based Monitoring............................................................................................................................133
8 Bidirectional Forwarding Detection (BFD)..................................................................................................135
How BFD Works.............................................................................................................................................................135
BFD Packet Format................................................................................................................................................. 136
BFD Sessions............................................................................................................................................................ 137
BFD Three-Way Handshake................................................................................................................................... 138
Session State Changes............................................................................................................................................140
Important Points to Remember....................................................................................................................................140
Configure BFD................................................................................................................................................................ 140
Configure BFD for Physical Ports...........................................................................................................................141
Configure BFD for Static Routes........................................................................................................................... 142
Configure BFD for OSPF.........................................................................................................................................145
Configure BFD for OSPFv3.................................................................................................................................... 148
Configure BFD for IS-IS...........................................................................................................................................149
Configure BFD for BGP............................................................................................................................................151
Configure BFD for VRRP........................................................................................................................................ 158
Configuring Protocol Liveness.................................................................................................................................161
Troubleshooting BFD................................................................................................................................................161
6
Contents