Brocade Communications Systems Brocade 8/12c User Manual page 433

Brocade network advisor san user manual v11.1x (53-1002167-01, may 2011)
Hide thumbs Also See for Brocade 8/12c:
Table of Contents

Advertisement

11. Click OK on the Device_Name - L2 ACL Configuration dialog box.
Editing a standard L2 ACL configuration
To create a standard L2 ACL configuration on a Fabric OS device, complete the following steps.
1. Select the device and select Configure > Security > L2 ACL > Product.
2. Select the ACL you want to edit in the ACLs table and click Edit.
3. To edit an existing ACL rule, complete the following steps.
4. To delete an existing ACL rule, select the rule you want to edit in the ACL Entries table and click
5. To add a new ACL rule, complete the following steps.
Brocade Network Advisor SAN User Manual
53-1002167-01
The new ACL configuration displays in the ACLs table. To create additional ACLs, repeat
through
step
10.
The Deploy to Products - L2 ACL dialog box displays. To save the configuration, refer to
a security configuration deployment"
The Device_Name - L2 ACL Configuration dialog box displays.
The Configuration_Name Edit Standard L2 ACL Configuration dialog box displays.
a. Select the rule you want to edit in the ACL Entries table and click the left arrow button.
b. Change the sequence number for the ACL in the Sequence field.
c.
Select Permit or Deny from the Action list.
d. In the Source list, select one of the following options:
Any
MAC
Selecting MAC enables the Source field. Enter the source MAC address on which the
configuration filters traffic in the Source field.
e. Select the Count check box to enable counting.
Count specifies the number of packets filtered (allowed or denied) for the ACL rule.
f.
Click the right arrow button.
The updated ACL entry displays in the ACL Entries table. To edit additional ACL entries,
repeat
step
3.
the left arrow button.
a. Enter the sequence number for the ACL in the Sequence field.
b. Select Permit or Deny from the Action list.
c.
In the Source list, select one of the following options:
Any
MAC
Selecting MAC enables the Source field. Enter the source MAC address on which the
configuration filters traffic in the Source field.
Layer 2 access control list management
on page 402
15
step 2
"Saving
389

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network advisor 11.1.xBrocade bladesystem 4/24

Table of Contents