
T1/E1 WAN Configuration Guide Cross-Connecting Physical and Virtual Interfaces
61200860L1-29.6A Copyright © 2005 ADTRAN, Inc. 9
Cross-Connecting Physical and Virtual Interfaces
Virtual interfaces must be cross-connected to physical interfaces to create a WAN interface where L2
signaling occurs. Use the cross-connect command to connect the physical and virtual interfaces. A single
virtual interface is assigned to a single physical interface, except in the case of multilink operation, where
one virtual interface is connected with multiple physical interfaces. Each created cross-connect has a
unique label identifier and specifies a virtual and a physical interface.
The following command listing depicts three cross-connects to a multilink frame relay interface and a
single cross-connect to a PPP interface. Each cross-connect has a unique label identifier (1 through 4):
>enable
#config terminal
(config)#cross-connect 1 t1 3/1 1 fr 1
(config)#cross-connect 2 t1 3/2 2 fr 1
(config)#cross-connect 3 t1 3/3 3 fr 1
(config)#cross-connect 4 t1 3/8 4 ppp 1
Creating Access Lists and Policies
Access lists (ACLs) and access policies (ACPs) are used to regulate traffic through your routed network.
ACLs and ACPs can block, filter, and manipulate traffic to make your network more secure.
ACLs are traffic selectors that include a “matching” parameter (to select the traffic) and an action
statement (to either permit or deny the matched traffic). Standard ACLs (using the ip access-list standard
command) provide pattern matching for source IP addresses only. Use extended ACLs (using the ip
access-list extended command) for more flexible pattern matching (including destination IP addresses).
ACPs use configured ACLs to permit, deny, or manipulate (using NAT) data on each interface where the
ACP is applied. When packets are received on an interface, the configured ACPs are applied to determine
whether the data will be processed or discarded. Creating access policies is a five-step process:
1. Determine what traffic needs to be regulated.
2. Enable the security features (using the ip firewall command).
3. Create an ACL to act as a traffic selector.
4. Create an ACP to either permit, deny, or manipulate (using NAT) the traffic selected using an access list.
5. Apply the ACP to an interface (or multiple interfaces).
Access List Traffic Selectors
ACLs include a matching parameter (to select traffic) and an action statement (to either permit or deny the
matched traffic). Standard ACLs provide pattern matching for source IP addresses only. To create a
standard ACL (labeled MYLIST), use the following command:
(config)#ip access-list standard MYLIST
(config-std-nacl)#
The following outlines the syntax for creating a standard ACL entry:
permit | deny <source address>
Comentarios a estos manuales