Netgear GS716Tv2 GS716Tv2/GS724Tv3 Software Admin Manual - Page 231

MAC ACL Example Configuration, Source MAC Mask: FF:FF:FF:FF:00:00

Page 231 highlights

GS716Tv2 and GS724Tv3 Software Administration Manual 1. Create an access list definition. The access list definition includes rules that specify whether traffic matching the criteria is forwarded normally or discarded. Additionally, you can assign traffic that matches the criteria to a particular queue or redirect the traffic to a particular port. A default deny all rule is the last rule of every list. 2. Apply the access list to an interface in the inbound direction. GS716T/GS724T switches allow ACLs to be bound to VLANs, physical ports, and LAGs. Binding an ACL to a VLAN is efficient because you can bind an ACL to a single VLAN that has multiple ports as members instead of binding an ACL to each port. MAC ACL Example Configuration The following example shows how to create a MAC-based ACL that permits Ethernet traffic from the Sales department on specified ports and denies all other traffic on those ports. 1. From the MAC ACL screen, create an ACL with the name Sales_ACL for the Sales department of your network (See "MAC ACL" on page 5-40). By default, this ACL will be bound on the inbound direction, which means the switch will examine traffic as it enters the port. 2. From the MAC Rules screen, create a rule for the Sales_ACL with the following settings: • ID: 1 • Action: Permit • Assign Queue: 0 • Match Every: False • CoS: 0 • Destination MAC: 01:02:1A:BC:DE:EF • Destination MAC Mask: FF:FF:FF:FF:00:00 • Source MAC: 02:02:1A:BC:DE:EF • Source MAC Mask: FF:FF:FF:FF:00:00 • VLAN ID: 2 For more information about MAC ACL rules, see "MAC Rules" on page 5-42. Configuration Examples B-5 v1.0, July 2009

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246

GS716Tv2 and GS724Tv3 Software Administration Manual
Configuration Examples
B-5
v1.0, July 2009
1.
Create an access list definition.
The access list definition includes rules that specify whether traffic matching the criteria is
forwarded normally or discarded. Additionally, you can assign traffic that matches the criteria
to a particular queue or redirect the traffic to a particular port. A default
deny all
rule is the last
rule of every list.
2.
Apply the access list to an interface in the inbound direction.
GS716T/GS724T switches allow ACLs to be bound to VLANs, physical ports, and LAGs.
Binding an ACL to a VLAN is efficient because you can bind an ACL to a single VLAN that has
multiple ports as members instead of binding an ACL to each port.
MAC ACL Example Configuration
The following example shows how to create a MAC-based ACL that permits Ethernet traffic from
the Sales department on specified ports and denies all other traffic on those ports.
1.
From the MAC ACL screen, create an ACL with the name Sales_ACL for the Sales
department of your network (See
“MAC ACL” on page
5-40
).
By default, this ACL will be bound on the inbound direction, which means the switch will
examine traffic as it enters the port.
2.
From the MAC Rules screen, create a rule for the Sales_ACL with the following settings:
ID: 1
Action: Permit
Assign Queue: 0
Match Every: False
CoS: 0
Destination MAC: 01:02:1A:BC:DE:EF
Destination MAC Mask: FF:FF:FF:FF:00:00
Source MAC: 02:02:1A:BC:DE:EF
Source MAC Mask: FF:FF:FF:FF:00:00
VLAN ID: 2
For more information about MAC ACL rules, see
“MAC Rules” on page
5-42
.