Filtering On Source Mac Address - Brocade Communications Systems 5600 vRouter Configuration Manual

Hide thumbs Also See for 5600 vRouter:
Table of Contents

Advertisement

TABLE 4 Defining a network-to-network filter (continued)
Step

Filtering on source MAC address

The following example shows how to define a firewall instance that contains one rule, which filters packets only on source medium
access control (MAC) address. This rule allows packets coming from a specific computer, identified by its MAC address rather than its IP
address. The instance is applied to packets inbound on the dp0p1p1 interface.
To create an instance that filters on source MAC address, perform the following steps in configuration mode.
TABLE 5 Filtering on source MAC address
Step
Create the configuration node for the FWTEST-5 firewall instance and its
rule 1. This rule accepts traffic matching the specified criteria.
Define a rule that filters traffic with the 00:13:ce:29:be:e7 source MAC
address.
Apply FWTEST-5 to inbound packets on dp0p1p1.
Commit the configuration.
Show the configuration.
Brocade 5600 vRouter Firewall Configuration Guide
53-1004253-01
Command
rule 1 {
action accept
destination {
address 172.16.0.0/24
}
source {
address 10.10.40.0/24
}
}
vyatta@R1# show interfaces dataplane dp0p1p2
vif 40 {
firewall {
in FWTEST-4
}
}
Command
vyatta@R1# set security firewall name FWTEST-5
rule 1 action accept
vyatta@R1# set security firewall name FWTEST-5
rule 1 source mac-address 00:13:ce:29:be:e7
vyatta@R1# set interfaces dataplane dp0p1p1
firewall in FWTEST-5
vyatta@R1# commit
vyatta@R1# show security firewall name FWTEST-5
rule 1 {
action accept
source {
mac-address 0:13:ce:29:be:e7
}
}
vyatta@R1# show interfaces dataplane dp0p1p1
address 172.16.1.1/24
firewall {
in FWTEST-5
}
Configuration Examples
25

Advertisement

Table of Contents
loading

Table of Contents