Networking Requirements As shown in Figure 1, Device A and Device B are connected through GE interfaces. To check the connectivity between the two interfaces, configure global unicast IPv6 addresses 2001:db8::1/32 and 2001:db8::2/32 for the GE interfaces. Figure 1 Configuring IPv6 addresses for interfaces Device Name Interface IP Address DeviceA GE0/1/0 2001:db8::1/32 DeviceB GE0/1/0 2001:db8::2/32 Precautions None Configuration Roadmap The configuration …
Continue reading Example for Configuring IPv6 Addresses for InterfacesIPv6 supports the following features: Hierarchical address structure The IPv6 hierarchical address structure facilitates route search, reduces the IPv6 routing table size using route aggregation, and improves the forwarding efficiency of CX devices. Automatic address configuration IPv6 supports stateful and stateless address autoconfiguration to simplify the host configuration process. In stateful address autoconfiguration, the host obtains …
Continue reading IPv6 FeaturesIPv6 Address Format A 128-bit IPv6 address has two formats: X:X:X:X:X:X:X:X IPv6 addresses in this format are written as eight groups of four hexadecimal digits (0 to 9, A to F), each group separated by a colon (:). Every “X” represents a group of hexadecimal digits. For example, 2031:0000:130F:0000:0000:09C0:876A:130B is a valid IPv6 address. For …
Continue reading IPv6 AddressesNetworking Requirements On the network shown in Figure 1, the PE is a device in the HR department and two VPN instances VPN-A and VPN-B are created on the PE. CE1 is a device in Department A and belongs to VPN-A that uses 111:1 as the VPN-target. CE2 is a device in Department B and belongs …
Continue reading Configuring a Basic ACL to Manage Device Access RightsNetworking Requirements As shown in Figure 1, Device A, Device B, and Device C are access devices, whereas Device D, Device E, and Device F are core devices. The access devices connect to the core devices through 10 Gbit/s interfaces. Voice and 3G services run on the network. To control user access and ensure network and device security, security policies need to be configured on the access routers …
Continue reading Configuring an Advanced ACL to Defend Against AttacksThis section provides an example of how to configure traffic policing and traffic shaping on interfaces. Networking Requirements GE 0/3/0 of Device A is connected to GE 0/1/0 of Device B. Server, PC1, and PC2 can access the Internet through Devices A and B. Server, PC1, and GE 0/1/0 of Device A are on the same network segment. PC2 and GE 0/2/0 of Device A are on the same network segment. The …
Continue reading Example for Configuring Traffic Policing and Traffic ShapingTraffic policing, traffic shaping are key factors in implementing QoS. Traffic policing controls the rate of incoming packets to ensure that network resources are properly allocated. Traffic shaping controls the rate of outgoing packets to allow the traffic rate to match that on the downstream device. These factors work together to provide QoS guarantees on …
Continue reading Introduction to Traffic Policing, Traffic Shaping