Cisco Catalyst 2960-XR Security Configuration Manual page 156

Ios release 15.0 2 ex1
Hide thumbs Also See for Catalyst 2960-XR:
Table of Contents

Advertisement

Applying a MAC ACL to a Layer 2 Interface
DETAILED STEPS
Command or Action
Step 1
configure terminal
Example:
Switch# configure terminal
Step 2
interface interface-id
Example:
Switch(config)# interface gigabitethernet1/0/2
Step 3
mac access-group {name} {in | out }
Example:
Switch(config-if)# mac access-group mac1 in
Step 4
end
Example:
Switch(config-if)# end
Step 5
show mac access-group [interface interface-id]
Example:
Switch# show mac access-group interface
gigabitethernet1/0/2
Step 6
copy running-config startup-config
Example:
Switch# copy running-config startup-config
After receiving a packet, the switch checks it against the inbound ACL. If the ACL permits it, the switch
continues to process the packet. If the ACL rejects the packet, the switch discards it. When you apply an
undefined ACL to an interface, the switch acts as if the ACL has not been applied and permits all packets.
Remember this behavior if you use undefined ACLs for network security.
Related Topics
Restrictions for Configuring Network Security with ACLs, on page 105
Catalyst 2960-XR Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX1
134
Purpose
Enters the global configuration mode.
Identifies a specific interface, and enter interface
configuration mode. The interface must be a physical Layer
2 interface (port ACL).
Controls access to the specified interface by using the MAC
access list.
Port ACLs are supported in the outbound and inbound
directions.
Returns to privileged EXEC mode.
Displays the MAC access list applied to the interface or
all Layer 2 interfaces.
(Optional) Saves your entries in the configuration file.
Configuring IPv4 ACLs
OL-29434-01

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents