Usage Guidelines
Though visible in the command-line help strings,
appletalk
is not supported as a matching condition.
You enter MAC access-list configuration mode by using the
mac access-list extended
global configuration
command.
If you use the
host
keyword, you cannot enter an address mask; if you do not use the
any
or
host
keywords,
you must enter an address mask.
After an access control entry (ACE) is added to an access control list, an implied
deny-any-any
condition
exists at the end of the list. That is, if there are no matches, the packets are denied. However, before the first
ACE is added, the list permits all packets.
To filter IPX traffic, you use the
type mask
or
lsap lsap mask
keywords, depending on the type of IPX
encapsulation being used. Filter criteria for IPX encapsulation types as specified in Novell terminology and
Cisco IOS terminology are listed in the following table.
Table 37: IPX Filtering Criteria
Filter Criterion
IPX Encapsulation Type
Novell Name
Cisco IOS Name
EtherType 0x8137
Ethernet II
arpa
EtherType 0x8137
Ethernet-snap
snap
LSAP 0xE0E0
Ethernet 802.2
sap
LSAP 0xFFFF
Ethernet 802.3
novell-ether
Examples
This example shows how to define the MAC-named extended access list to allow NetBIOS traffic from any
source to MAC address 00c0.00a0.03fa. Traffic matching this list is allowed.
Device(config-ext-macl)#
permit any host 00c0.00a0.03fa netbios
This example shows how to remove the permit condition from the MAC-named extended access list:
Device(config-ext-macl)#
no permit any 00c0.00a0.03fa 0000.0000.0000 netbios
This example permits all packets with EtherType 0x4321:
Device(config-ext-macl)#
permit any any 0x4321 0
You can verify your settings by entering the
show access-lists
privileged EXEC command.
Related Commands
Description
Command
Denies from the MAC access-list
configuration. Denies non-IP traffic to
be forwarded if conditions are matched.
deny
Command Reference, Cisco IOS XE Everest 16.5.1a (Catalyst 3650 Switches)
791
permit (MAC access-list configuration)
Summary of Contents for Catalyst 3650 Series
Page 2: ... 2017 Cisco Systems Inc All rights reserved ...
Page 37: ...P A R T I Campus Fabric Campus Fabric page 13 ...
Page 38: ......
Page 51: ...P A R T II Interface and Hardware Components Interface and Hardware Commands page 27 ...
Page 52: ......
Page 165: ...P A R T III IP IP page 141 ...
Page 166: ......
Page 235: ...P A R T IV IP Multicast Routing IP Multicast Routing page 211 ...
Page 236: ......
Page 303: ...P A R T V IPv6 IPv6 page 279 ...
Page 304: ......
Page 307: ...P A R T VI Layer 2 3 Layer 2 3 page 283 ...
Page 308: ......
Page 399: ...P A R T VII Multiprotocol Label Switching MPLS MPLS page 375 Multicast VPN page 385 ...
Page 400: ......
Page 429: ...P A R T VIII Network Management Flexible NetFlow page 405 Network Management page 479 ...
Page 430: ......
Page 595: ...P A R T IX Programmability Programmability page 571 ...
Page 596: ......
Page 624: ...Command Reference Cisco IOS XE Everest 16 5 1a Catalyst 3650 Switches 598 ping6 ...
Page 625: ...P A R T X QoS Auto QoS page 601 QoS page 641 ...
Page 626: ......
Page 666: ...Command Reference Cisco IOS XE Everest 16 5 1a Catalyst 3650 Switches 640 show auto qos ...
Page 706: ...Command Reference Cisco IOS XE Everest 16 5 1a Catalyst 3650 Switches 680 trust device ...
Page 707: ...P A R T XI Routing Bidirectional Forwarding Detection page 683 ...
Page 708: ......
Page 725: ...P A R T XII Security Security page 701 ...
Page 726: ......
Page 875: ...P A R T XIII Stack Manager and High Availability Stack Manager and High Availability page 851 ...
Page 876: ......
Page 912: ......
Page 1027: ...P A R T XV VLAN VLAN page 1003 ...
Page 1028: ......
Page 1100: ...Command Reference Cisco IOS XE Everest 16 5 1a Catalyst 3650 Switches 1074 vtp primary ...
Page 1102: ...Command Reference Cisco IOS XE Everest 16 5 1a Catalyst 3650 Switches 1076 Notices ...
Page 1108: ...Command Reference Cisco IOS XE Everest 16 5 1a Catalyst 3650 Switches IN 6 Index ...