Cisco WS-X6708-10G-3CXL= - 10 Gigabit Ethernet Module Manual de usuario Pagina 59

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 62
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 58
White Paper
© 2010 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Inf ormation. Page 59 of 62
For both microflow policing and UBRL, the NetFlow table on either the PFC or DFC is used to track the individual
flows as well as maintain the flow statistics andmost importantlytrack the rate of ingress traffic for each individual
flow by implementing a separate token bucket for each NetFlow entry. Cisco Virtual Switching System also has the
restriction that each forwarding engine is responsible for the calculation of each flow independently and cannot be
synchronized across multiple forwarding engines.
As a result, only flows that always arrive on the same forwarding engine are policed correctly; otherwise they are
under-policed. Generally, this situation allows only the following flow masks for use on multichassis Cisco
EtherChannel link interfaces:
Source and destination: Source and destination IP address
Interface, source, and destination: Input interface, source, and destination IP address
Full: Source, destination IP address, IP, and TCP/UDP source and destination ports if present
Interface, full: Input interface, source, destination IP address, IP, and TCP/UDP source and destination ports
if present
As a result, UBRL does not yield the desired behavior if applied to multichassis Cisco EtherChannel link interfaces or
other distributed Cisco EtherChannel interfaces because they are source-only or destination-only by nature.
Access Control Lists
This section examines the way access lists are modified in the Cisco Virtual Switching System environment.
Essentially three types of ACLs are supported in a Cisco Catalyst 6500 system as of Cisco IOS Software Release
12.2(33)SXH (Figure40):
Router ACLs (RACLs)
VLAN ACLs (VACLs)
Port-based ACLs (PACLs)
Figure 40. Access-List Processing
All of these ACLs are compiled by the system and programmed into hardware-based ternary content addressable
memory (TCAM) on the system PFCs or DFCs. Within a Cisco Virtual Switching System environment, these ACLs
Vista de pagina 58
1 2 ... 54 55 56 57 58 59 60 61 62

Comentarios a estos manuales

Sin comentarios