
82
ACL Commands
www
.dell.com | support.dell.com
User Guidelines
When an access control entry (ACE) is added to an access control list, an implied
deny-any-
any
condition exists at the end of the list. If there are no matches, the packets are denied.
However, before the first ACE is added, the list permits all packets.
If
vlan id
is used as a classifier element then it cannot connect a policy map to a VLAN
interface.
Example
The following example configures a MAC ACE to allow traffic from MAC address
66:66:66:66:66:66 with any destination on VLAN 4.
deny (MAC)
The
deny
mac-acl configuration mode command denies
traffic if the conditions defined in the
permit statement are matched.
Syntax
deny [disable-port]
{
any |
{
source
source- wildcard
}
any |
{
destination
destination-
wildcard
}}[
vlan
vlan-id
]
•
disable-port
—If the statement is deny, then the port is disabled.
•
Source MAC address can be one of the following:
–
any
—Packets received from any MAC address.
–
source
source-wildcard
—MAC address and wildcard for host from which the packet is
sent. Specify the MAC address and wildcard using hexadecimal format
(HH:HH:HH:HH:HH:HH).
•
Destination MAC address can be one of the following:
–
any
—Packets sent to any MAC address.
–
destination
destination-wildcard
—MAC address and wildcard for host to which the
packet is sent. Specify the MAC address and wildcard using hexadecimal format
(HH:HH:HH:HH:HH:HH).
•
vlan
vlan-id
—The packet VLAN.
Default Configuration
This command has no default configuration.
Command Mode
Mac-ACL Configuration mode
Console (config-mac-al)#
permit
66:66:66:66:66:66
00:00:00:00:00:00 any vlan 4
Summary of Contents for PowerConnect 6024
Page 24: ...24 Contents ...
Page 86: ...86 ACL Commands w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 128: ...128 Configuration and Image Files w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 182: ...182 IGMP Snooping Commands w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 206: ...206 Line Commands w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 280: ...280 Port Channel Commands w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 284: ...284 Port Monitor Commands w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 316: ...316 QoS Commands w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 368: ...368 w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 410: ...410 SSH Commands w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 443: ...TACACS Commands 443 Global values TimeOut 3 Source IP 172 16 8 1 OOB Source IP 172 16 8 1 ...
Page 444: ...444 TACACS Commands w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 452: ...452 User Interface w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 476: ...476 VRRP Commands w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 486: ...486 Web Server w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 504: ...504 802 1x Commands w w w d e l l c o m s u p p o r t d e l l c o m ...