Internet address is 1.1.49.1/24Broadcast address is 1.1.49.255Address determined by config fileMTU is 1554 bytesInbound access list is not setProxy ARP is enabledSplit Horizon is enabledPoison Reverse is disabledICMP redirects are not sentICMP unreachables are not sentEgress Interface Selection (EIS)EIS allows you to isolate the management and front-end port domains by preventing switch-initiatedtraffic routing between the two domains. This feature provides additional security by preventing floodingattacks on front-end ports. The following protocols support EIS: DNS, FTP, NTP, RADIUS, sFlow, SNMP,SSH, Syslog, TACACS, Telnet, and TFTP. This feature does not support sFlow on stacked units.When you enable this feature, all management routes (connected, static, and default) are copied to themanagement EIS routing table. Use the management route command to add new management routesto the default and EIS routing tables. Use the show ip management-eis-route command to view theEIS routes.Important Points to Remember• Deleting a management route removes the route from both the EIS routing table and the defaultrouting table.• If the management port is down or route lookup fails in the management EIS routing table, theoutgoing interface is selected based on route lookup from the default routing table.• If a route in the EIS table conflicts with a front-end port route, the front-end port route hasprecedence.• Due to protocol, ARP packets received through the management port create two ARP entries (one forthe lookup in the EIS table and one for the default routing table).Configuring EISEIS is compatible with the following protocols: DNS, FTP, NTP, RADIUS, sFlow, SNMP, SSH, Syslog,TACACS, Telnet, and TFTP.To enable and configure EIS, use the following commands:1. Enter EIS mode.CONFIGURATION modemanagement egress-interface-selection2. Configure which applications uses EIS.EIS modeapplication {all | application-type}NOTE: If you configure SNMP as the management application for EIS and you add a defaultmanagement route, when you perform an SNMP walk and check the debugging logs for thesource and destination IPs, the SNMP agent uses the destination address of incoming SNMPpackets as the source address for outgoing SNMP responses for security.Interfaces 383