15
Layer 2 access control list management
4. Enter a name for the ACL in the Name field.
5. Enter a sequence number for the ACL in the Sequence field.
6. Select Permit or Deny from the Action list.
7.
8. In the Destination Address list, select one of the following options:
9. Select the Count check box to enable counting.
10. Select the Ether Type check box to specify the Ethernet protocol.
11. In the Ether Type list, select one of the following to specify the Ethernet type being transferred
12. Click the right arrow button.
13. Click OK on the Add - L2 ACL Configuration dialog box.
14. Click OK on the Device_Name - L2 ACL Configuration dialog box.
392
In the Source list, select one of the following options:
•
Any
•
Host
•
MAC
Selecting MAC or Host enables the Source field. Enter the source address on which the
configuration filters traffic in the Source field.
•
Any
•
Host
•
MAC
Selecting MAC or Host enables the Destination field. Enter the destination address on
which the configuration filters traffic in the Destination field.
Count specifies the number of packets filtered (allowed or denied) for the ACL rule.
in the Ethernet frame:
•
ARP—Address Resolution Protocol
•
FCoE—Fibre Channel over Ethernet
•
IPV4-—Internet Protocol, version 4
•
Custom—enter a custom protocol. Valid values are 1536 through 65535.
The new ACL entry displays in the ACL Entries table. To create additional ACL entries, repeat
step 5
through
step
12.
The new ACL displays in the ACL Entries table. To create additional ACL entries, repeat
through
step
13.
The Deploy to Products - L2 ACL dialog box displays. To save the configuration, refer to
a security configuration deployment"
on page 402
Brocade Network Advisor SAN User Manual
step 2
"Saving
53-1002167-01