Creating a named layer-2 acl table, Binding a named layer-2 acl table to an interface – Brocade Multi-Service IronWare Security Configuration Guide (Supporting R05.6.00) User Manual
Page 104
![background image](/manuals/361632/104/background.png)
86
Multi-Service IronWare Security Configuration Guide
53-1003035-02
Creating a named Layer-2 ACL table
2
Creating a named Layer-2 ACL table
To create for example a named Layer-2 ACL called example_l2_acl, enter the following commands.
Brocade(config)#mac access-list example_l2_acl
Brocade(config-mac-nacl)#deny 0000.0000.0001 ffff.ffff.ffff any
Brocade(config-mac-nacl)#permit any 0000.0000.0002 ffff.ffff.ffff
Brocade(config-mac-nacl)#exit
Following is an example of how a named Layer-2 ACL “example_l2_acl” is displayed in the
configuration file.
!
mac access-list example_l2_acl
deny 0000.0000.0001 ffff.ffff.ffff any
permit any 0000.0000.0002 ffff.ffff.ffff
!
The following example displays the output of the show access-list command for “l2_ACL”.
L2 MAC Access List l2_acl:
21: sequence 21 permit 0000.3333.3333 ffff.ffff.ffff any any etype any
31: deny any any any etype any log
In this example, the display of “sequence 21” for the first entry indicates that the sequence
number is user-configured. In the second entry, the sequence number is not displayed; this
indicates that the sequence number was not specified by the user but generated by the system.
To re-sequence a named Layer-2 ACL table, enter the following command:
Brocade(config)# mac access-list l2_acl
Brocade(config-std-nacl-l2_acl)# regenerate-seq-num
Syntax: [no] mac access-list acl_name
Syntax: [no] sequence num permit | deny src-mac mask | any dest-mac mask | any [vlan-id | any]
[etype etype-str ] [ priority 802.1p-value | priority-force 802.1p-value | priority-mapping
802.1p-value | mark-flow-id | dscp-marking number]
Syntax: regenerate-seq-num [num]
Binding a named Layer-2 ACL table to an interface
Following is an example of the named Layer-2 ACL “example_l2_acl” applied to the inbound of port
2/2.
Brocade(config)# interface e 2/2
Brocade(config-if-e1000-2/2)#mac access-group example_l2_acl in
Syntax: [no] mac access-group acl_name in| out
If a Layer-2 ACL name is bound to an interface before the actual Layer-2 ACL filters are defined, the
behavior will be implicit deny of all traffic. This is consistent with the behavior of other types of
ACLs.