beautypg.com

Cisco OL-21636-01 User Manual

Page 202

background image

9-10

Cisco IP Solution Center L2VPN and Carrier Ethernet User Guide, 6.0

OL-21636-01

Chapter 9 Creating a VPLS Policy

Defining an MPLS/ERMS (EVP-LAN) Policy without a CE

Step 17

Check the Use Existing ACL Name check box if you want assign your own named access list to the port.

By default, this check box is not checked and ISC automatically assigns a MAC-based ACL on the
customer facing UNI port, based on values you enter in UNI MAC addresses (below).

Step 18

Enter a Port-Based ACL Name (if you checked the Use Existing ACL Name check box, as mentioned
in the previous step).

Note

ISC does not create this ACL automatically. The ACL must already exist on the device, or be
added as part of a template, before the service request is deployed. Otherwise, deployment will
fail.

Step 19

Check the Disable CDP check box if you want to disable the Cisco Discover Protocol (CDP) on the UNI
port.

Step 20

Check the Filter BPDU check box to specify that the UNI port should not process Layer 2 Bridge
Protocol Data Units (BPDUs).

Step 21

Check the UNI Port Security check box (see

Figure 9-8

) if you to want to provision port security-related

CLIs to the UNI port by controlling the MAC addresses that are allowed to go through the interface.

a.

For Maximum Number of MAC address, enter the number of MAC addresses allowed for port
security.

b.

For Aging, enter the length of time the MAC address can stay on the port security table.

c.

For Violation Action, choose what action will occur when a port security violation is detected:

PROTECT—Drops packets with unknown source addresses until a sufficient number of secure
MAC addresses are removed to drop below the maximum value.

RESTRICT—Drops packets with unknown source addresses until a sufficient number of secure
MAC addresses are removed to drop below the maximum value and causes the Security Violation
counter to increment.

SHUTDOWN—Puts the interface into the error-disabled state immediately and sends an SNMP
trap notification.

d.

In the Secure MAC Addresses field, enter one or more Ethernet MAC addresses.

Figure 9-8

UNI Port Security

Step 22

Check the Enable Storm Control check box (see

Figure 9-9

) to help prevent the UNI port from being

disrupted by a broadcast, multicast or unicast storm.

Enter a threshold value for each type of traffic. The value, which can be specified to two significant
digits, represents the percentage of the total available bandwidth of the port. If the threshold of a traffic
type is reached, further traffic of that type is suppressed until the incoming traffic falls below the
threshold level.