Proprietary protocol filtering – Dell PowerEdge VRTX User Manual
Page 224

224
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Dell Plasma\User
Guide\Plasma_UGSwitching_NetworkSecurity.fm
D E L L C O N F ID E N T IA L – P R E L IM I N A RY 4 / 1 8 /1 3 - F O R P R O O F O N LY
The following is an example of some of the CLI commands:
Proprietary Protocol Filtering
Protocol filters are used to disallow receiving specific proprietary protocol
packets through an interface. These can be enabled for specific ports.
If a protocol filter is enabled on a port, you cannot enable a QoS ACL on this
port.
To configure Proprietary Protocol Filtering:
1 Click Switching > Network Security > Proprietary Protocol Filtering to
display the Proprietary Protocol Filtering: Summary page.
A list of the ports and their filtered protocols is displayed.
2 Click Edit to modify the filtered protocols for a specific port.
3 Select a unit and an interface. (TBD_External-Internal???)
4 Move the required protocols from the Available Protocols list to the
Filtered Protocols list. The following displays the protocols and the
addresses that are blocked:
console(config)# mac access-list extended server
console(config-mac-al)# permit 00:00:00:00:00:01
00:00:00:00:00:ff any
console(config-mac-al)# exit
console(config)# interface gi/0/1
console(config-if)# service-acl input server
Table 7-9. Protocol Filtering
Protocol
Destination Address
Protocol Type
blockcdp
0100.0ccc.cccc
0x2000
blockvtp
0100.0ccc.cccc
0x2003
blockdtp
0100.0ccc.cccc
0x2004
blockudld
0100.0ccc.cccc
0x0111
blockpagp
0100.0ccc.cccc
0x0104
blocksstp
0100.0ccc.cccd
-