vii
v1.1, May 2006
Proxy Address Resolution Protocol (ARP) ...................................................................5-21
Overview ................................................................................................................5-21
CLI Examples .........................................................................................................5-22
Example #1: show ip interface .........................................................................5-22
Example #2: ip proxy-arp .................................................................................5-22
Chapter 6
Virtual Router Redundancy Protocol
CLI Examples .................................................................................................................6-2
Chapter 7
Access Control Lists (ACLs)
Overview .........................................................................................................................7-1
Limitations ................................................................................................................7-1
MAC ACLs ......................................................................................................................7-1
Configuring IP ACLs .......................................................................................................7-2
Process ...........................................................................................................................7-3
IP ACL CLI Example .......................................................................................................7-3
MAC ACL CLI Examples ................................................................................................7-4
Example #1: mac access list ...................................................................................7-5
Example #2: permit any ..........................................................................................7-6
Example #3 Configure mac access-group ...............................................................7-7
Example #4 permit ...................................................................................................7-8
Example #5: show mac access-lists ........................................................................7-9
Chapter 8
Class of Service (CoS) Queuing
Overview .........................................................................................................................8-1
CoS Queue Mapping ......................................................................................................8-1
Trusted Ports ............................................................................................................8-1
Untrusted Ports ........................................................................................................8-2
CoS Queue Configuration ..............................................................................................8-2
Port Egress Queue Configuration ............................................................................8-2
Drop Precedence Configuration (per Queue) ..........................................................8-3
Per Interface Basis ...................................................................................................8-3
CLI Examples .................................................................................................................8-3
Example #1: show classofservice trust ....................................................................8-4