HP StorageWorks 1606 Brocade Converged Enhanced Ethernet Command Reference v6. - Page 21
L2 ACL commands
View all HP StorageWorks 1606 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 21 highlights
L2 ACL commands 1 L2 ACL commands Use Layer 2 Media Access Control (MAC) list commands to do the following: • Identify traffic based on the MAC-addresses, such as VLAN IDs and different encapsulations. • Configure multiple access-lists or rules and store them in a configuration. • After you apply the access list either to an interface, a Virtual TeletYpe (VTY), or through a command using the access-list keyword, it becomes effective. Following are the two types of access list commands: • Standard Access Control Lists Standard Access Control Lists filter the traffic on a source address and block traffic close to a destination. There are exceptions when the address in a standard access list is not a source address. When using a Telnet session, for outbound VTY access lists, the address in the access list entry is used as a destination address instead of a source address. • Extended Access Control Lists Extended Access Lists block traffic based on any given packet attribute. Use Extended access control lists to test source and destination addresses and other IP packet data, such as protocols, TCP or UDP port numbers, type of service and to provide Reflective access-lists and Time-based access-lists.capabilities. Converged Enhanced Ethernet Command Reference 3 53-1001347-01