02.10.2013 Views

FTOS Configuration Guide for the C-Series - Force10 Networks

FTOS Configuration Guide for the C-Series - Force10 Networks

FTOS Configuration Guide for the C-Series - Force10 Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Configuring Layer 2 and Layer 3 ACLs on an Interface<br />

Both Layer 2 and Layer 3 ACLs may be configured on an interface in Layer 2 mode. If both L2 and L3<br />

ACLs are applied to an interface, <strong>the</strong> following rules apply:<br />

• The packets routed by <strong>FTOS</strong> are governed by <strong>the</strong> L3 ACL only, since <strong>the</strong>y are not filtered against an<br />

L2 ACL.<br />

• The packets switched by <strong>FTOS</strong> are first filtered by <strong>the</strong> L3 ACL, <strong>the</strong>n by <strong>the</strong> L2 ACL.<br />

• When packets are switched by <strong>FTOS</strong>, <strong>the</strong> egress L3 ACL does not filter <strong>the</strong> packet.<br />

For <strong>the</strong> following features, if counters are enabled on rules that have already been configured and a new<br />

rule is ei<strong>the</strong>r inserted or prepended, all <strong>the</strong> existing counters will be reset:<br />

• L2 Ingress Access list<br />

• L3 Egress Access list<br />

• L2 Egress Access list<br />

If a rule is simply appended, existing counters are not affected.<br />

Table 33 L2 and L3 ACL Filtering on Switched Packets<br />

L2 ACL Behavior L3 ACL Behavior Decision on Targeted Traffic<br />

Deny Deny Denied by L3 ACL<br />

Deny Permit Permitted by L3 ACL<br />

Permit Deny Denied by L2 ACL<br />

Permit Permit Permitted by L2 ACL<br />

Note: If an interface is configured as a “vlan-stack access” port, <strong>the</strong> packets are filtered by an<br />

L2 ACL only. The L3 ACL applied to such a port does not affect traffic. That is, existing rules<br />

<strong>for</strong> o<strong>the</strong>r features (such as trace-list, PBR, and QoS) are applied accordingly to <strong>the</strong> permitted<br />

traffic.<br />

For in<strong>for</strong>mation on MAC ACLs, refer to MAC Addressing and MAC Access Lists on page 189.<br />

Assign an IP ACL to an Interface<br />

Ingress IP ACLs are supported on plat<strong>for</strong>ms: c and s<br />

Ingress and Egress IP ACL are supported on plat<strong>for</strong>m: e<br />

<strong>FTOS</strong> <strong>Configuration</strong> <strong>Guide</strong>, version 7.7.1.0 343

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!