
Configure Layer 2 and Layer 3 ACLs
Both Layer 2 and Layer 3 ACLs may be configured on an interface in Layer 2 mode.
If both L2 and L3 ACLs are applied to an interface, the following rules apply:
•
When Dell Networking OS routes the packets, only the L3 ACL governs them because they are not filtered against an L2 ACL.
•
When Dell Networking OS switches the packets, first the L3 ACL filters them, then the L2 ACL filters them.
•
When Dell Networking OS switches the packets, the egress L3 ACL does not filter the packet.
For the following features, if you enable counters on rules that have already been configured and a new rule is either inserted or
prepended, all the existing counters are reset:
•
L2 ingress access list
•
L3 egress access list
•
L2 egress access list
If a rule is simply appended, existing counters are not affected.
Table 9. L2 and L3 Filtering on Switched Packets
L2 ACL Behavior
L3 ACL Behavior
Decision on Targeted Traffic
Deny
Deny
L3 ACL denies.
Deny
Permit
L3 ACL permits.
Permit
Deny
L3 ACL denies.
Permit
Permit
L3 ACL permits.
NOTE: If you configure an interface as a vlan-stack access port, only the L2 ACL filters the packets. The L3 ACL applied
to such a port does not affect traffic. That is, existing rules for other features (such as trace-list, policy-based routing
[PBR], and QoS) are applied to the permitted traffic.
For information about MAC ACLs, refer to
Assign an IP ACL to an Interface
To pass traffic through a configured IP ACL, assign that ACL to a physical interface, a port channel interface, or a VLAN.
The IP ACL is applied to all traffic entering a physical or port channel interface and the traffic is either forwarded or dropped
depending on the criteria and actions specified in the ACL.
The same ACL may be applied to different interfaces and that changes its functionality. For example, you can take ACL “ABCD” and
apply it using the
in
keyword and it becomes an ingress access list. If you apply the same ACL using the
out
keyword, it becomes
an egress access list. If you apply the same ACL to the Loopback interface, it becomes a Loopback access list.
This section describes the following:
•
•
For more information about Layer-3 interfaces, refer to
.
Applying an IP ACL
To apply an IP ACL (standard or extended) to a physical or port channel interface, use the following commands.
1.
Enter the interface number.
Access Control Lists (ACLs)
125
Содержание S4048-ON
Страница 1: ...Dell Configuration Guide for the S4048 ON System 9 9 0 0 ...
Страница 146: ...Figure 14 BFD Three Way Handshake State Changes 146 Bidirectional Forwarding Detection BFD ...
Страница 477: ...Figure 68 Inspecting Configuration of LAG 10 on ALPHA Link Aggregation Control Protocol LACP 477 ...
Страница 480: ...Figure 70 Inspecting a LAG Port on BRAVO Using the show interface Command 480 Link Aggregation Control Protocol LACP ...
Страница 481: ...Figure 71 Inspecting LAG 10 Using the show interfaces port channel Command Link Aggregation Control Protocol LACP 481 ...
Страница 522: ...Figure 87 Configuring Interfaces for MSDP 522 Multicast Source Discovery Protocol MSDP ...
Страница 523: ...Figure 88 Configuring OSPF and BGP for MSDP Multicast Source Discovery Protocol MSDP 523 ...
Страница 524: ...Figure 89 Configuring PIM in Multiple Routing Domains 524 Multicast Source Discovery Protocol MSDP ...
Страница 528: ...Figure 91 MSDP Default Peer Scenario 1 528 Multicast Source Discovery Protocol MSDP ...
Страница 529: ...Figure 92 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 529 ...
Страница 530: ...Figure 93 MSDP Default Peer Scenario 3 530 Multicast Source Discovery Protocol MSDP ...
Страница 633: ...Policy based Routing PBR 633 ...
Страница 777: ...Figure 119 Single and Double Tag TPID Match Service Provider Bridging 777 ...
Страница 778: ...Figure 120 Single and Double Tag First byte TPID Match 778 Service Provider Bridging ...