A
CCESS
C
ONTROL
L
ISTS
3-99
Web
– Configure the mask to match the required rules in the MAC ingress
or egress ACLs. Set the mask to check for any source or destination
address, a host address, or an address range. Use a bitmask to search for
specific VLAN ID(s) or Ethernet type(s). Or check for rules where a
packet format was specified. Then click Add.
Figure 3-47 Configuring a MAC based ACL
Содержание 8700S-130
Страница 2: ......
Страница 3: ......
Страница 8: ...LIMITED WARRANTY iv ...
Страница 56: ...INITIAL CONFIGURATION 2 18 ...
Страница 189: ...PORT CONFIGURATION 3 133 Figure 3 61 Port Statistics continued ...
Страница 566: ...COMMAND LINE INTERFACE 4 294 ...
Страница 571: ...SOFTWARE SPECIFICATIONS A 5 Trap RFC 1215 UDP MIB RFC 2012 ...
Страница 572: ...SOFTWARE SPECIFICATIONS A 6 ...
Страница 576: ...TROUBLESHOOTING B 4 ...
Страница 589: ......
Страница 591: ...38 Tesla Irvine CA 92618 Phone 949 679 8000 ...
Страница 592: ... 8 ...