C
HAPTER
26
| Access Control Lists
MAC ACLs
– 691 –
◆
To remove a rule, use the
no permit
or
no deny
command followed by
the exact text of a previously configured rule.
◆
An ACL can contain up to 128 rules.
E
XAMPLE
Console(config)#access-list mac jerry
Console(config-mac-acl)#
R
ELATED
C
OMMANDS
permit, deny (691)
mac access-group (693)
show mac access-list (694)
permit
,
deny
(MAC ACL)
This command adds a rule to a MAC ACL. The rule filters packets matching
a specified MAC source or destination address (i.e., physical layer address),
or Ethernet protocol type. Use the
no
form to remove a rule.
S
YNTAX
{
permit
|
deny
}
{
any
|
host
source
|
source address-bitmask
}
{
any
|
host
destination
|
destination address-bitmask
}
[
vid
vid vid-bitmask
] [
ethertype
protocol
[
protocol
-
bitmask
]]
[
time-range
time-range-name
]
no
{
permit
|
deny
}
{
any
|
host
source
|
source address-bitmask
}
{
any
|
host
destination
|
destination address-bitmask
}
[
vid
vid vid-bitmask
] [
ethertype
protocol
[
protocol
-
bitmask
]]
N
OTE
:
The default is for Ethernet II packets.
{
permit
|
deny
}
tagged-eth2
{
any
|
host
source
|
source address-bitmask
}
{
any
|
host
destination
|
destination address-bitmask
}
[
vid
vid vid-bitmask
] [
ethertype
protocol
[
protocol
-
bitmask
]]
[
time-range
time-range-name
]
no
{
permit
|
deny
}
tagged-eth2
{
any
|
host
source
|
source address-bitmask
}
{
any
|
host
destination
|
destination address-bitmask
}
[
vid
vid vid-bitmask
] [
ethertype
protocol
[
protocol
-
bitmask
]]
{
permit
|
deny
}
untagged-eth2
{
any
|
host
source
|
source address-bitmask
}
{
any
|
host
destination
|
destination address-bitmask
}
[
ethertype
protocol
[
protocol
-
bitmask
]]
[
time-range
time-range-name
]
Содержание ES3510MA
Страница 1: ...Management Guide www edge core com 8 Port Layer 2 Fast Ethernet Switch...
Страница 4: ...ABOUT THIS GUIDE 4...
Страница 30: ...CONTENTS 30...
Страница 40: ...FIGURES 40...
Страница 46: ...TABLES 46...
Страница 48: ...SECTION I Getting Started 48...
Страница 72: ...SECTION II Web Configuration 72...
Страница 88: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 88...
Страница 115: ...CHAPTER 4 Basic Management Tasks Resetting the System 115 Figure 23 Restarting the Switch Regularly...
Страница 116: ...CHAPTER 4 Basic Management Tasks Resetting the System 116...
Страница 154: ...CHAPTER 5 Interface Configuration VLAN Trunking 154...
Страница 216: ...CHAPTER 8 Spanning Tree Algorithm Configuring Interface Settings for MSTP 216...
Страница 350: ...CHAPTER 14 Security Measures DHCP Snooping 350...
Страница 440: ...CHAPTER 17 IP Services Displaying the DNS Cache 440...
Страница 484: ...CHAPTER 19 Using the Command Line Interface CLI Command Groups 484...
Страница 554: ...CHAPTER 21 System Management Commands Switch Clustering 554...
Страница 574: ...CHAPTER 22 SNMP Commands 574...
Страница 582: ...CHAPTER 23 Remote Monitoring Commands 582...
Страница 636: ...CHAPTER 24 Authentication Commands Management IP Filter 636...
Страница 736: ...CHAPTER 29 Port Mirroring Commands RSPAN Mirroring Commands 736...
Страница 816: ...CHAPTER 34 VLAN Commands Configuring Voice VLANs 816...
Страница 830: ...CHAPTER 35 Class of Service Commands Priority Commands Layer 3 and 4 830...
Страница 848: ...CHAPTER 36 Quality of Service Commands 848...
Страница 900: ...CHAPTER 38 LLDP Commands 900...
Страница 910: ...CHAPTER 39 Domain Name Service Commands 910...
Страница 916: ...CHAPTER 40 DHCP Commands DHCP Client 916...
Страница 948: ...CHAPTER 41 IP Interface Commands IPv6 Interface 948...
Страница 950: ...SECTION IV Appendices 950...
Страница 982: ...INDEX 982...
Страница 983: ......
Страница 984: ...ES3510MA E032010 ST R01 149100000046A...