Configuration Task List for Route Maps................................................................................................................. 114Configuring Match Routes.......................................................................................................................................116Configuring Set Conditions...................................................................................................................................... 117Configure a Route Map for Route Redistribution..................................................................................................118Configure a Route Map for Route Tagging............................................................................................................ 119Continue Clause........................................................................................................................................................ 119IP Fragment Handling.................................................................................................................................................... 120IP Fragments ACL Examples...................................................................................................................................120Layer 4 ACL Rules Examples...................................................................................................................................120Configure a Standard IP ACL.........................................................................................................................................121Configuring a Standard IP ACL Filter..................................................................................................................... 122Configure an Extended IP ACL..................................................................................................................................... 123Configuring Filters with a Sequence Number....................................................................................................... 123Configuring Filters Without a Sequence Number.................................................................................................124Configure Layer 2 and Layer 3 ACLs............................................................................................................................125Assign an IP ACL to an Interface..................................................................................................................................126Applying an IP ACL......................................................................................................................................................... 126Counting ACL Hits.................................................................................................................................................... 127Configure Ingress ACLs..................................................................................................................................................127Configure Egress ACLs.................................................................................................................................................. 127Applying Egress Layer 3 ACLs (Control-Plane).................................................................................................... 128IP Prefix Lists.................................................................................................................................................................. 129Implementation Information.................................................................................................................................... 129Configuration Task List for Prefix Lists.................................................................................................................. 129ACL Resequencing......................................................................................................................................................... 133Resequencing an ACL or Prefix List.......................................................................................................................133Route Maps.....................................................................................................................................................................135Implementation Information.................................................................................................................................... 135Logging of ACL Processes............................................................................................................................................ 135Guidelines for Configuring ACL Logging................................................................................................................136Configuring ACL Logging.........................................................................................................................................136Flow-Based Monitoring Support for ACLs.................................................................................................................. 137Behavior of Flow-Based Monitoring.......................................................................................................................137Enabling Flow-Based Monitoring............................................................................................................................138Configuring UDF ACL.................................................................................................................................................... 139Configuring IP Mirror Access Group............................................................................................................................ 142Sample Configuration...............................................................................................................................................143Example of viewing IP mirror–access–group applied to an Interface................................................................1438 Bidirectional Forwarding Detection (BFD).................................................................................................. 144How BFD Works............................................................................................................................................................. 144BFD Packet Format..................................................................................................................................................145BFD Sessions............................................................................................................................................................ 146BFD Three-Way Handshake.................................................................................................................................... 147Session State Changes............................................................................................................................................149Important Points to Remember.................................................................................................................................... 1496 Contents