
24-19
Scenario 2:
The configuration requirement is stated as below: The switch should drop all the 802.3 datagram with
00-12-11-23-xx-xx as the source MAC address coming from interface 10.
Configuration description:
1
.
Create the corresponding access list.
2
.
Configure datagram filtering.
3
.
Bind the ACL to the related interface.
The configuration steps are listed as below.
Switch(config)#access-list 1100 deny 00-12-11-23-00-00 00-00-00-00-ff-ff any-destination-mac
untagged-802-3
Switch(config)#access-list 1100 deny 00-12-11-23-00-00 00-00-00-00-ff-ff any tagged-802
Switch(config)#firewall enable
Switch(config)#firewall default permit
Switch(config)#interface ethernet 1/10
Switch(Config-If-Ethernet1/10)#mac access-group 1100 in
Switch(Config-If-Ethernet1/10)#exit
Switch(config)#exit
Configuration result:
Switch#show firewall
Firewall Status: Enable.
Firewall Default Rule: Permit.
Switch #show access-lists
access-list 1100(used 1 time(s))
access-list 1100 deny 00-12-11-23-00-00 00-00-00-00-ff-ff
any-destination-mac
untagged-802-3
access-list 1100 deny 00-12-11-23-00-00 00-00-00-00-ff-ff
any-destination-mac
Switch #show access-group interface ethernet 1/10
interface name:Ethernet1/10
MAC Ingress access-list used is 1100,traffic-statistics Disable.
Scenario 3:
The configuration requirement is stated as below: The MAC address range of the network connected to the
interface 10 of the switch is 00-12-11-23-xx-xx, and IP network is 10.0.0.0/24. FTP should be disabled and
ping requests from outside network should be disabled.
Configuration description:
1
.
Create the corresponding access list.
2
.
Configure datagram filtering.
3
.
Bind the ACL to the related interface.
Summary of Contents for WGSW-50040
Page 236: ...31 7 server center of our company ...