A
CCESS
C
ONTROL
L
ISTS
3-99
Web
– Configure the mask to match the required rules in the MAC ingress
or egress ACLs. Set the mask to check for any source or destination
address, a host address, or an address range. Use a bitmask to search for
specific VLAN ID(s) or Ethernet type(s). Or check for rules where a
packet format was specified. Then click Add.
Figure 3-47 Configuring a MAC based ACL
Summary of Contents for 8700S-130
Page 2: ......
Page 3: ......
Page 8: ...LIMITED WARRANTY iv ...
Page 56: ...INITIAL CONFIGURATION 2 18 ...
Page 189: ...PORT CONFIGURATION 3 133 Figure 3 61 Port Statistics continued ...
Page 566: ...COMMAND LINE INTERFACE 4 294 ...
Page 571: ...SOFTWARE SPECIFICATIONS A 5 Trap RFC 1215 UDP MIB RFC 2012 ...
Page 572: ...SOFTWARE SPECIFICATIONS A 6 ...
Page 576: ...TROUBLESHOOTING B 4 ...
Page 589: ......
Page 591: ...38 Tesla Irvine CA 92618 Phone 949 679 8000 ...
Page 592: ... 8 ...