•
Use the
no deny {any | host
mac-address
|
mac-source-address
mac-source-address-mask
} {any |
host mac-address
|
mac-
destination-address mac-destination-address-mask
}
command.
Parameters
any
Enter the keyword
any
to drop all packets.
host
mac-
address
Enter the keyword
host
and then enter a MAC address to drop
packets with that host address.
mac-source-
address
Enter a MAC address in nn:nn:nn:nn:nn:nn format.
mac-source-
address-mask
Specify which bits in the MAC address must match.
The MAC ACL supports an inverse mask; therefore, a mask of
ff:ff:ff:ff:ff:ff allows entries that do not match and a mask of
00:00:00:00:00:00 only allows entries that match exactly.
mac-destination-
address
Enter the destination MAC address and mask in nn:nn:nn:nn:nn:nn
format.
mac-destination-
address-mask
Specify which bits in the MAC address must match.
The MAC ACL supports an inverse mask; therefore, a mask of
ff:ff:ff:ff:ff:ff allows entries that do not match and a mask of
00:00:00:00:00:00 only allows entries that match exactly.
ethertype
operator
(OPTIONAL) To filter based on protocol type, enter one of the
following Ethertypes:
•
ev2
- is the Ethernet II frame format
•
llc
- is the IEEE 802.3 frame format
•
snap
- is the IEEE 802.3 SNAP frame format
count
(OPTIONAL) Enter the keyword
count
to count packets processed
by the filter.
byte
(OPTIONAL) Enter the keyword
byte
to count bytes processed by
the filter.
log
(OPTIONAL, E-Series only) Enter the keyword
log
to log the packets.
monitor
(OPTIONAL) Enter the keyword
monitor
when the rule is describing
the traffic that you want to monitor and the ACL in which you are
creating the rule is applied to the monitored interface. For more
information, refer to the “Flow-based Monitoring” section in the Port
Monitoring chapter of the
FTOS Configuration Guide
.
Defaults
Not configured.
Command Modes
CONFIGURATION-MAC ACCESS LIST-EXTENDED
Command History
Version 8.3.11.1
Introduced on the Z9000.
Version 8.1.1.0
Introduced on the E-Series ExaScale.
Version 7.6.1.0
Introduced on the S-Series.
293
Содержание Force10 S4810P
Страница 1: ...FTOS Command Line Reference Guide for the S4810 System FTOS 9 1 0 0 ...
Страница 48: ...48 ...
Страница 62: ...62 ...
Страница 92: ...92 ...
Страница 102: ...102 ...
Страница 202: ...202 ...
Страница 216: ...216 ...
Страница 334: ...334 ...
Страница 564: ...564 ...
Страница 570: ...570 ...
Страница 594: ...594 ...
Страница 632: ...632 ...
Страница 642: ...642 ...
Страница 662: ...662 ...
Страница 670: ...Related Commands clear ip dhcp snooping clears the contents of the DHCP binding table 670 ...
Страница 688: ...688 ...
Страница 702: ...702 ...
Страница 712: ...712 ...
Страница 723: ...Related Commands show gvrp displays the GVRP configuration 723 ...
Страница 724: ...724 ...
Страница 736: ...736 ...
Страница 900: ...900 ...
Страница 934: ...934 ...
Страница 958: ...958 ...
Страница 966: ...966 ...
Страница 1018: ...1018 ...
Страница 1026: ...1026 ...
Страница 1086: ...1086 ...
Страница 1100: ...1100 ...
Страница 1116: ...1116 ...
Страница 1164: ...1164 ...
Страница 1268: ...1268 ...
Страница 1276: ...1276 ...
Страница 1286: ...1286 ...
Страница 1300: ...1300 ...
Страница 1376: ...1376 ...
Страница 1390: ...1390 ...
Страница 1460: ...1460 ...
Страница 1512: ...1512 ...
Страница 1518: ...1518 ...
Страница 1528: ...1528 ...
Страница 1538: ...1538 ...
Страница 1551: ...To display the type of STP guard Portfast BPDU root or loop guard enabled on a port enter the show spanning tree 0 command 1551 ...
Страница 1552: ...1552 ...
Страница 1572: ...1572 ...
Страница 1586: ... uplink state group creates an uplink state group and enables the tracking of upstream links 1586 ...
Страница 1598: ...FTOS config interface vlan 40 FTOS conf if vlan tagged TenGi 8 0 FTOS conf if vlan exit FTOS config 1598 ...
Страница 1612: ...1612 ...