ACL Example 3
1. Configure an Access Control List.
2. Add ACL 2 to port 2.
ACL Example 4
1. Configure an Access Control List.
2. Add ACL 2 to port EXT2.
ACL Example 5
1. Configure Access Control Lists.
2. Add ACLs to a port.
134
G8264 Application Guide for ENOS 8.4
Use this configuration to block traffic from a specific IPv6 source address. All
traffic that ingresses in port 2 with source IP from class 2001:0:0:5:0:0:0:2/128 is
denied.
RS G8264(config)# accesscontrol list6 3 ipv6 sourceaddress
2001:0:0:5:0:0:0:2 128
RS G8264(config)# accesscontrol list6 3 action deny
RS G8264(config)# interface port 2
RS G8264(configif)# accesscontrol list6 3
RS G8264(configif)# exit
Use this configuration to deny all ARP packets that ingress a port.
RS G8264(config)# accesscontrol list 2 ethernet ethernettype arp
RS G8264(config)# accesscontrol list 2 action deny
RS G8264(config)# interface port 2
RS G8264(configif)# accesscontrol list 2
RS G8264(configif)# exit
Use the following configuration to permit access to hosts with destination MAC
address that matches 11:05:00:10:00:00 FF:F5:FF:FF:FF:FF and deny access to all
other hosts.
RS G8264(config)# accesscontrol list 30 ethernet destinationmacaddress
11:05:00:10:00:00 FF:F5:FF:FF:FF:FF
RS G8264(config)# accesscontrol list 30 action permit
RS G8264(config)# accesscontrol list 100 ethernet
destinationmacaddress 00:00:00:00:00:00 00:00:00:00:00:00
RS G8264(config)# accesscontrol list 100 action deny
RS G8264(config)# interface port 2
RS G8264(configif)# accesscontrol list 30
RS G8264(configif)# accesscontrol list 100
RS G8264(configif)# exit