Filter Configuration

Whenever a network is configured, that configuration must be tested, and the changes must be documented. Called maintaining the baseline, this enables you to maintain a clear knowledge of the network functionality.

The commands to verify the filter configuration for either IP or IPX filters are most easily accomplished through the show commands:

show access list show ip interface

Verifying

Figure 2-6 illustrates the process logic used for access lists. Figure 2-6 Processing of an IP Access List—Incoming and Outgoing Packets

Figure 2-6 illustrates the process logic used for access lists. Figure 2-6 Processing of an IP Access List—Incoming and Outgoing Packets

Access lists are extremely powerful when you are configuring the router to tune the data flow through the device. Because access lists take both CPU and memory, however, you must consider alternatives. The following section discusses these alternatives.

NOTE Depending on the type of access list, the version of IOS, and the hardware configuration, some access lists are processed more quickly than others. This is because some access lists can be cached. For more information, refer to the configuration guides on the Cisco web page.

Was this article helpful?

0 0

Post a comment