
BigIron RX Series Configuration Guide
519
53-1002253-01
Configuring Layer 2 ACLs
20
The
<src-mac> <mask>
| any parameter specifies the source MAC address. You can enter a
specific address and a comparison mask or the keyword any to filter on all MAC addresses. Specify
the mask using F’s and zeros. For example, to match on the first two bytes of the address
aabb.ccdd.eeff, use the mask ffff.0000.0000. In this case, the clause matches all source MAC
addresses that contain “aabb” as the first two bytes and any values in the remaining bytes of the
MAC address. If you specify any, you do not need to specify a mask and the clause matches on all
MAC addresses.
The
<dest-mac> <mask>
| any parameter specifies the destination MAC address. The syntax rules
are the same as those for the
<src-mac> <mask>
| any parameter.
The optional
<vlan-id>
| any parameter specifies the vlan-id to be matched against the vlan-id of
the incoming packet. You can specify any to ignore the vlan-id match.
The optional etype
<etype-str>
argument specifies the Ethernet type field of the incoming packet
in order for a match to occur.
The
<etype-str>
can be one of the following keywords:
•
IPv4-Len-5 (Etype=0x0800, IPv4, HeaderLen 20 bytes)
•
ARP (Etype=0x0806, IP ARP)
•
IPv6 (Etype=0x86dd, IP version 6)
The optional
<log-enable>
parameter enables the logging mechanism. The device accepts this
command only when a deny clause is configured. When you enable logging for a Layer 2 ACL, all
traffic matching the clause is sent to the CPU for processing and traffic is denied by the CPU. The
CPU creates a log entry for the first packet that is denied and once every 10 seconds thereafter.
The logging mechanism includes sending SNMP traps and log messages to the Syslog servers and
writing the log entry to the log buffer on the device.
In addition, if specified with a ‘permit’ action, the log-enable keyword is ignored and the user is
warned that he cannot log permit traffic.
NOTE
Traffic denied by the implicit deny mechanism is not subject to logging. The implicit deny mechanism
kicks in when the traffic does not match any of the clauses specified and there is no permit any any
clause specified at the end.
Use the [no] parameter to delete the Layer 2 ACL clause from the table. When all clauses are
deleted from a table, the table is automatically deleted from the system.
Example Layer 2 ACL clauses
The following shows some examples of valid Layer 2 ACL clauses.
BigIron RX(config)# access-list 400 permit any any
BigIron RX(config)# access-list 400 permit any any log-enable
BigIron RX(config)# access-list 400 permit any any 100
BigIron RX(config)# access-list 400 permit any any 100 log-enable
BigIron RX(config)# access-list 400 permit any any any
BigIron RX(config)# access-list 400 permit any any any log-enable
BigIron RX(config)# access-list 400 permit any any 100 etype ipv4
BigIron RX(config)# access-list 400 permit any any 100 etype ipv4 log-enable
The following shows an example of a valid Layer 2 ACL clause.
BigIron RX(config)# access-list 400 permit any any 100 etype ipv4
Summary of Contents for BigIron RX Series
Page 228: ...152 BigIron RX Series Configuration Guide 53 1002253 01 Enabling WAN PHY mode support 6 ...
Page 312: ...236 BigIron RX Series Configuration Guide 53 1002253 01 Displaying IP information 7 ...
Page 356: ...280 BigIron RX Series Configuration Guide 53 1002253 01 Resetting LLDP statistics 9 ...
Page 402: ...326 BigIron RX Series Configuration Guide 53 1002253 01 Transparent firewall mode 11 ...
Page 432: ...356 BigIron RX Series Configuration Guide 53 1002253 01 SuperSpan 12 ...
Page 500: ...424 BigIron RX Series Configuration Guide 53 1002253 01 MRP CLI example 14 ...
Page 591: ...BigIron RX Series Configuration Guide 515 53 1002253 01 Displaying traffic reduction 19 ...
Page 592: ...516 BigIron RX Series Configuration Guide 53 1002253 01 Displaying traffic reduction 19 ...
Page 598: ...522 BigIron RX Series Configuration Guide 53 1002253 01 Viewing Layer 2 ACLs 20 ...
Page 656: ...580 BigIron RX Series Configuration Guide 53 1002253 01 Trunk formation 22 ...
Page 754: ...678 BigIron RX Series Configuration Guide 53 1002253 01 Displaying RIP filters 24 ...
Page 814: ...738 BigIron RX Series Configuration Guide 53 1002253 01 Displaying OSPF information 25 ...
Page 980: ...904 BigIron RX Series Configuration Guide 53 1002253 01 Clearing IS IS information 28 ...
Page 1000: ...924 BigIron RX Series Configuration Guide 53 1002253 01 Using secure copy 30 ...
Page 1088: ...1012 BigIron RX Series Configuration Guide 53 1002253 01 IP source guard 35 ...
Page 1108: ...1032 BigIron RX Series Configuration Guide 53 1002253 01 Reading CDP packets 37 ...
Page 1126: ...1050 BigIron RX Series Configuration Guide 53 1002253 01 Clearing sFlow statistics 39 ...
Page 1324: ...1248 BigIron RX Series Configuration Guide 53 1002253 01 Displaying OSPFv3 information 48 ...
Page 1363: ...BigIron RX Series Configuration Guide 1287 53 1002253 01 Continuous System Monitor 51 ...
Page 1364: ...1288 BigIron RX Series Configuration Guide 53 1002253 01 Continuous System Monitor 51 ...
Page 1404: ...1328 BigIron RX Series Configuration Guide 53 1002253 01 Commands That Require a Reload D ...
Page 1458: ...1382 BigIron RX Series Configuration Guide 53 1002253 01 VSRP E ...