142
ExtremeWare 7.2e Installation and User Guide
Security
MAC-Based VLANs
MAC-Based VLANs allow physical ports to be mapped to a VLAN based on the source MAC address
learned in the FDB. This feature allows you to designate a set of ports that have their VLAN
membership dynamically determined by the MAC address of the end station that plugs into the
physical port. You can configure the source MAC address-to-VLAN mapping either offline or
dynamically on the switch. For example, you could use this application for a roaming user who wants
to connect to a network from a conference room. In each room, the user plugs into one of the designated
ports on the switch and is mapped to the appropriate VLAN. Connectivity is maintained to the network
with all of the benefits of the configured VLAN in terms of QoS, routing, and protocol support.
Detailed information about configuring and using MAC-based VLANs can be found in Chapter 5.
IP Access Lists (ACLs)
Each access control list (ACL) consists of an access mask that selects which fields of each incoming
packet to examine, and a list of values to compare with the values found in the packet. Access masks
can be shared multiple access control lists, using different lists of values to examine packets. The
following sections describe how to use access control lists.
Access Masks
There are sixteen access masks available in the Summit 400-48t, depending on which features are
enabled on the switch. Each access mask is created with a unique name and defines a list of fields that
will be examined by any access control list that uses that mask (and by any rate limit that uses the
mask).
To create an access mask, use the following command:
create access-mask <access-mask name> {dest-mac} {source-mac} {vlan} {tos
|code-point} {ethertype} {ipprotocol} {dest-ip/<mask length>} {source-L4port |
{icmp-type} {icmp-code}} {permit-established} {egresport} {ports} {precedence
<number>}
You can also display or delete an access mask. To display information about an access mask, use the
following command:
show access-mask {<name>}
To delete an access mask, use the following command:
delete access-mask <name>
Access Lists
Access control lists are used to perform packet filtering and forwarding decisions on incoming traffic.
Each packet arriving on an ingress port is compared to the access list in sequential order and is either
forwarded to a specified QoS profile or dropped. These forwarded packets can also be modified by
changing the 802.1p value and/or the DiffServ code point. Using access lists has no impact on switch
performance.
The Summit 400-48t supports up to 16 access lists. Each entry that makes up an access list contains a
unique name and specifies a previously created access mask. The access list also includes a list of values
Summary of Contents for ExtremeWare 7.2e
Page 14: ...14 ExtremeWare 7 2 0 Software User Guide Contents...
Page 18: ...18 ExtremeWare 7 2e Installation and User Guide Preface...
Page 80: ...80 ExtremeWare 7 2e Installation and User Guide Accessing the Switch...
Page 102: ...102 ExtremeWare 7 2e Installation and User Guide Virtual LANs VLANs...
Page 108: ...108 ExtremeWare 7 2e Installation and User Guide Forwarding Database FDB...
Page 180: ...180 ExtremeWare 7 2e Installation and User Guide Security...
Page 194: ...194 ExtremeWare 7 2e Installation and User Guide Ethernet Automatic Protection Switching...
Page 218: ...218 ExtremeWare 7 2e Installation and User Guide Spanning Tree Protocol STP...
Page 248: ...248 ExtremeWare 7 2e Installation and User Guide Interior Gateway Protocols...
Page 256: ...256 ExtremeWare 7 2e Installation and User Guide IP Multicast Routing...
Page 308: ...308 ExtremeWare 7 2e Installation and User Guide Using ExtremeWare Vista on the Summit 400...
Page 316: ...316 ExtremeWare 7 2e Installation and User Guide Technical Specifications...
Page 324: ...324 ExtremeWare 7 2e Installation and User Guide Software Upgrade and Boot Options...