
Chapter 10
| Access Control Lists
MAC ACLs
– 375 –
no
{
permit
|
deny
}
tagged-802.3
{
any
|
host
source
|
source address-bitmask
}
{
any
|
host
destination
|
destination address-bitmask
}
[
vid
vid vid-bitmask
]
{
permit
|
deny
}
untagged-802.3
{
any
|
host
source
|
source address-bitmask
}
{
any
|
host
destination
|
destination address-bitmask
}
[
time-range
time-range-name
]
no
{
permit
|
deny
}
untagged-802.3
{
any
|
host
source
|
source address-bitmask
}
{
any
|
host
destination
|
destination address-bitmask
}
tagged-eth2
– Tagged Ethernet II packets.
untagged-eth2
– Untagged Ethernet II packets.
tagged-802.3
– Tagged Ethernet 802.3 packets.
untagged-802.3
– Untagged Ethernet 802.3 packets.
any
– Any MAC source or destination address.
host
– A specific MAC address.
source
– Source MAC address.
destination
– Destination MAC address range with bitmask.
address-bitmask
5
– Bitmask for MAC address (in hexadecimal format).
vid
– VLAN ID. (Range: 1-4094)
vid-bitmask
–
VLAN bitmask. (Range: 1-4095)
protocol
– A specific Ethernet protocol number. (Range: 0-ffff hex.)
protocol
-
bitmask
– Protocol bitmask. (Range: 0-ffff hex.)
time-range-name
- Name of the time range. (Range: 1-32 characters)
Default Setting
None
Command Mode
MAC ACL
Command Usage
◆
New rules are added to the end of the list.
◆
The
ethertype
option can only be used to filter Ethernet II formatted packets.
◆
A detailed listing of Ethernet protocol types can be found in RFC 1060. A few of
the more common types include the following:
■
0800 - IP
■
0806 - ARP
5. For all bitmasks, “1” means care and “0” means ignore.
Summary of Contents for ECS4120-28F
Page 36: ...Contents 36...
Page 38: ...Figures 38...
Page 46: ...Section I Getting Started 46...
Page 70: ...Chapter 1 Initial Switch Configuration Setting the System Clock 70...
Page 86: ...Chapter 2 Using the Command Line Interface CLI Command Groups 86...
Page 202: ...Chapter 5 SNMP Commands Additional Trap Commands 202...
Page 210: ...Chapter 6 Remote Monitoring Commands 210...
Page 216: ...Chapter 7 Flow Sampling Commands 216...
Page 278: ...Chapter 8 Authentication Commands PPPoE Intermediate Agent 278...
Page 360: ...Chapter 9 General Security Measures Port based Traffic Segmentation 360...
Page 384: ...Chapter 10 Access Control Lists ACL Information 384...
Page 424: ...Chapter 11 Interface Commands Power Savings 424...
Page 446: ...Chapter 13 Power over Ethernet Commands 446...
Page 456: ...Chapter 14 Port Mirroring Commands RSPAN Mirroring Commands 456...
Page 488: ...Chapter 17 UniDirectional Link Detection Commands 488...
Page 494: ...Chapter 18 Address Table Commands 494...
Page 554: ...Chapter 20 ERPS Commands 554...
Page 620: ...Chapter 22 Class of Service Commands Priority Commands Layer 3 and 4 620...
Page 638: ...Chapter 23 Quality of Service Commands 638...
Page 772: ...Chapter 25 LLDP Commands 772...
Page 814: ...Chapter 26 CFM Commands Delay Measure Operations 814...
Page 836: ...Chapter 28 Domain Name Service Commands 836...
Page 848: ...Chapter 29 DHCP Commands DHCP Relay Option 82 848...
Page 902: ...Section III Appendices 902...
Page 916: ...Glossary 916...
Page 926: ...CLI Commands 926...
Page 937: ......
Page 938: ...E092017 CS R02...