Defining Mac Address Filters - Foundry Networks Switch and Router Installation And Configuration Manual

Switch and router
Table of Contents

Advertisement

The following example shows IGMP report information listed by the show ip multicast command, followed by
removal of the information by the clear ip multicast all command.
FastIronII# show ip multicast
IP multicast is enabled - Active
VLAN ID 1
Active 192.168.2.30 Router Ports
Multicast Group: 239.255.162.5, Port: 4/4 4/13
Multicast Group: 239.255.162.4, Port: 4/10 4/13
FastIronII# clear ip multicast all
FastIronII# show ip multicast
IP multicast is enabled - Active
VLAN ID 1
Active 192.168.2.30 Router Ports
To clear the learned IGMP reports for a specific IP multicast group, enter a command such as the following:
FastIronII# clear ip multicast group 239.255.162.5
The following example shows how to clear the IGMP reports for a specific group and retain reports for other
groups.
FastIronII# show ip multicast
IP multicast is enabled - Active
VLAN ID 1
Active 192.168.2.30 Router Ports
Multicast Group: 239.255.162.5, Port: 4/4 4/13
Multicast Group: 239.255.162.4, Port: 4/10 4/13
FastIronII# clear ip multicast group 239.255.162.5
FastIronII# show ip multicast
IP multicast is enabled - Active
VLAN ID 1
Active 192.168.2.30 Router Ports
Multicast Group: 239.255.162.4, Port: 4/10 4/13
Syntax: clear ip multicast all | group <group-id>
The all parameter clears the learned reports for all groups.
The group <group-id> parameter clears the reports for the specified group but does not clear the reports for other
groups.

Defining MAC Address Filters

MAC layer filtering enables you to build access lists based on MAC layer headers in the Ethernet/IEEE 802.3
frame. You can filter on the source and destination MAC addresses as well as other information such as the
EtherType, LLC1 DSAP or SSAP numbers, and a SNAP EtherType. The filters apply to incoming traffic only.
NOTE: You cannot use Layer 2 filters to filter Layer 4 information. To filter Layer 4 information, use IP access
policies. See "Policies and Filters" on page C-1 and the Foundry ServerIron Installation and Configuration Guide.
You configure MAC filters globally, then apply them to individual interfaces. To apply MAC filters to an interface,
you add the filters to that interface's MAC filter group.
The device takes the action associated with the first matching filter. If the packet does not match any of the filters
in the access list, the default action is to drop the packet. If you want the system to permit traffic by default, you
must specifically indicate this by making the last entry in the access list a permit filter. Here is an example:
mac filter <last-index-number> permit any any
December 2000
4/13
4/13
4/13
4/13
Configuring Basic Features
10 - 61

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents