Brocade TurboIron 24X Series Configuration Guide User Manual
Page 954

920
Brocade TurboIron 24X Series Configuration Guide
53-1003053-01
Enabling ACL support for switched traffic in the router image
The fragments are forwarded even if the first fragment, which contains the Layer 4 information,
was denied. Generally, denying the first fragment of a packet is sufficient, since a transaction
cannot be completed without the entire packet.
For tighter control, you can configure the port to drop all packet fragments. To do so, enter
commands such as the following.
TurboIron(config)#interface ethernet 1
TurboIron(config-if-1)#ip access-group frag deny
This option begins dropping all fragments received by the port as soon as you enter the command.
This option is especially useful if the port is receiving an unusually high rate of fragments, which
can indicate a hacker attack.
Syntax: [no] ip access-group frag deny
Enabling ACL support for switched traffic in the router image
By default, when an ACL is applied to a physical or virtual routing interface, the Layer 3 device
filters routed traffic only. It does not filter traffic that is switched from one port to another within
the same VLAN or virtual routing interface, even if an ACL is applied to the interface.
You can enable the device to filter switched traffic within a VLAN or virtual routing interface. When
filtering is enabled, the device uses the ACLs applied to inbound traffic to filter traffic received by a
port from another port in the same virtual routing interface.
To enable this feature, enter a command such as the following.
TurboIron(config)#access-list 101 bridged-routed
Applying the ACL rule above to an interface, enables filtering of traffic switched within a VLAN or
virtual routing interface.
Syntax: [no] ip access-list <ACL-ID> bridged-routed
The <ACL-ID> parameter specifies a standard or extended numbered or named ACL.
You can use this feature in conjunction with enable ACL-per-port-per-vlan, to assign an ACL to a
single port within a virtual interface. In this case, all of the Layer 3 traffic (bridged and routed) are
filtered by the ACL.
TurboIron(config)#enable ACL-per-port-per-vlan
TurboIron(config)#write memory
TurboIron(config)#exit
TurboIron#reload
Enabling ACL filtering based on VLAN membership or VE port
membership
NOTE
This section applies to IPv4 ACLs only.
You can apply an inbound IPv4 ACL to specific VLAN members on a port (Layer 2 devices only) or to
specific ports on a virtual interface (VE) (Layer 3 Devices only).