A
CCESS
C
ONTROL
L
ISTS
3-75
Web
– Configure the mask to match the required rules in the MAC ingress
or egress ACLs. Set the mask to check for any source or destination
address, a host address, or an address range. Use a bitmask to search for
specific VLAN ID(s) or Ethernet type(s). Or check for rules where a
packet format was specified. Then click Add.
Figure 3-33. Configuring a MAC based ACL
Summary of Contents for 8648T - annexe 1
Page 2: ......
Page 34: ...INTRODUCTION 1 10 ...
Page 48: ...INITIAL CONFIGURATION 2 14 ...
Page 159: ...PORT CONFIGURATION 3 111 Figure 3 48 Displaying Etherlike and RMON Statistics ...
Page 411: ...DNS COMMANDS 4 167 ...
Page 536: ...COMMAND LINE INTERFACE 4 291 ...
Page 542: ...TROUBLESHOOTING B 2 ...
Page 555: ......