(Optional) Specifies that the rule matches only packets
with an IEEE 802.1Q header that contains the VLAN
ID given. The
VLAN-ID
argument can be an integer
from 1 to 4094.
vlan VLAN-ID
(Optional) Specifies the time range that applies to this
rule. You can configure a time range by using the
time-range
command.
time-range time-range-name
Command Default
A newly created MAC ACL contains no rules.
If you do not specify a sequence number, the device assigns the rule a sequence number that is 10 greater than
the last rule in the ACL.
Command Modes
MAC ACL configuration
Command History
Modification
Release
This command was introduced.
4.0(1)
Usage Guidelines
When the device applies a MAC ACL to a packet, it evaluates the packet with every rule in the ACL. The
device enforces the first rule that has conditions that are satisfied by the packet. When the conditions of more
than one rule are satisfied, the device enforces the rule with the lowest sequence number.
This command does not require a license.
Source and Destination
You can specify the
source
and
destination
arguments in one of two ways. In each rule, the method that you
use to specify one of these arguments does not affect how you specify the other argument. When you configure
a rule, use the following methods to specify the
source
and
destination
arguments:
•
Address and mask
—
You can use a MAC address followed by a mask to specify a single address or a
group of addresses. The syntax is as follows:
MAC-address MAC-mask
The following example specifies the
source
argument with the MAC address 00c0.4f03.0a72:
switch(config-acl)#
deny 00c0.4f03.0a72 0000.0000.0000 any
The following example specifies the
destination
argument with a MAC address for all hosts with a MAC
vendor code of 00603e:
switch(config-acl)#
deny any 0060.3e00.0000 0000.0000.0000
•
Any address
—
You can use the
any
keyword to specify that a source or destination is any MAC address.
For examples of the use of the
any
keyword, see the examples in this section. Each of the examples
shows how to specify a source or destination by using the
any
keyword.
Cisco Nexus 7000 Series Security Command Reference
260
D Commands
deny (MAC)
Summary of Contents for Nexus 7000 Series
Page 2: ... Cisco Systems Inc All rights reserved ...
Page 20: ...Cisco Nexus 7000 Series Security Command Reference xx Contents ...
Page 62: ...Cisco Nexus 7000 Series Security Command Reference 36 A Commands aaa authentication rejected ...
Page 78: ...Cisco Nexus 7000 Series Security Command Reference 52 A Commands aaa user default role ...
Page 157: ...Cisco Nexus 7000 Series Security Command Reference 131 C Commands crypto ca import ...
Page 172: ...Cisco Nexus 7000 Series Security Command Reference 146 C Commands cts role based sgt map ...
Page 186: ...Cisco Nexus 7000 Series Security Command Reference 160 C Commands cts role based access list ...
Page 256: ...dscp dscp Cisco Nexus 7000 Series Security Command Reference 230 D Commands deny IPv4 ...
Page 271: ...protocol Cisco Nexus 7000 Series Security Command Reference 245 D Commands deny IPv6 ...
Page 274: ...dscp dscp Cisco Nexus 7000 Series Security Command Reference 248 D Commands deny IPv6 ...
Page 291: ...Cisco Nexus 7000 Series Security Command Reference 265 D Commands description identity policy ...
Page 293: ...Cisco Nexus 7000 Series Security Command Reference 267 D Commands description user role ...
Page 299: ...Cisco Nexus 7000 Series Security Command Reference 273 D Commands device role ...
Page 313: ...Cisco Nexus 7000 Series Security Command Reference 287 E Commands enable Cert DN match ...
Page 340: ...Cisco Nexus 7000 Series Security Command Reference 314 E Commands eq ...
Page 344: ...Cisco Nexus 7000 Series Security Command Reference 318 F Commands feature cts ...
Page 350: ...Cisco Nexus 7000 Series Security Command Reference 324 F Commands feature ldap ...
Page 369: ...G Commands gt page 344 Cisco Nexus 7000 Series Security Command Reference 343 ...
Page 372: ...Cisco Nexus 7000 Series Security Command Reference 346 G Commands gt ...
Page 398: ...Cisco Nexus 7000 Series Security Command Reference 372 I Commands interface policy deny ...
Page 497: ...Cisco Nexus 7000 Series Security Command Reference 471 K Commands key config key ...
Page 504: ...Cisco Nexus 7000 Series Security Command Reference 478 K Commands key string ...
Page 518: ...Cisco Nexus 7000 Series Security Command Reference 492 L Commands It ...
Page 536: ...Cisco Nexus 7000 Series Security Command Reference 510 M Commands monitor session ...
Page 552: ...Cisco Nexus 7000 Series Security Command Reference 526 O Commands other config flag ...
Page 569: ...dscp dscp Cisco Nexus 7000 Series Security Command Reference 543 P Commands permit IPv4 ...
Page 584: ...protocol Cisco Nexus 7000 Series Security Command Reference 558 P Commands permit IPv6 ...
Page 587: ...dscp dscp Cisco Nexus 7000 Series Security Command Reference 561 P Commands permit IPv6 ...
Page 622: ...Cisco Nexus 7000 Series Security Command Reference 596 P Commands propagate sgt ...
Page 664: ...Cisco Nexus 7000 Series Security Command Reference 638 R Commands rule ...
Page 737: ...Cisco Nexus 7000 Series Security Command Reference 711 Show Commands show arp access lists ...
Page 841: ...Cisco Nexus 7000 Series Security Command Reference 815 Show Commands show ipv6 dhcp ldra ...
Page 992: ...Cisco Nexus 7000 Series Security Command Reference 966 T Commands trustedCert ...
Page 1015: ...Cisco Nexus 7000 Series Security Command Reference 989 V Commands vlan policy deny ...
Page 1017: ...Cisco Nexus 7000 Series Security Command Reference 991 V Commands vrf policy deny ...
Page 1018: ...Cisco Nexus 7000 Series Security Command Reference 992 V Commands vrf policy deny ...