11.07.2015 Views

Catalyst 3750-E and 3560-E Switch Cisco IOS ... - DNIP . NET

Catalyst 3750-E and 3560-E Switch Cisco IOS ... - DNIP . NET

Catalyst 3750-E and 3560-E Switch Cisco IOS ... - DNIP . NET

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 2<strong>Catalyst</strong> <strong>3750</strong>-E <strong>and</strong> <strong>3560</strong>-E <strong>Switch</strong> <strong>Cisco</strong> <strong>IOS</strong> Comm<strong>and</strong>smac access-groupmac access-groupUse the mac access-group interface configuration comm<strong>and</strong> on the switch stack or on a st<strong>and</strong>aloneswitch to apply a MAC access control list (ACL) to a Layer 2 interface. Use the no form of this comm<strong>and</strong>to remove all MAC ACLs or the specified MAC ACL from the interface. You create the MAC ACL byusing the mac access-list extended global configuration comm<strong>and</strong>.mac access-group {name} inno mac access-group {name}Syntax DescriptionnameinSpecify a named MAC access list.Specify that the ACL is applied in the ingress direction. Outbound ACLs are notsupported on Layer 2 interfaces.DefaultsNo MAC ACL is applied to the interface.Comm<strong>and</strong> ModesInterface configuration (Layer 2 interfaces only)Comm<strong>and</strong> HistoryRelease12.2(35)SE2ModificationThis comm<strong>and</strong> was introduced.Usage Guidelines You can apply MAC ACLs only to ingress Layer 2 interfaces. You cannot apply MAC ACLs to Layer 3interfaces.On Layer 2 interfaces, you can filter IP traffic by using IP access lists <strong>and</strong> non-IP traffic by using MACaccess lists. You can filter both IP <strong>and</strong> non-IP traffic on the same Layer 2 interface by applying both anIP ACL <strong>and</strong> a MAC ACL to the interface. You can apply no more than one IP access list <strong>and</strong> one MACaccess list to the same Layer 2 interface.If a MAC ACL is already configured on a Layer 2 interface <strong>and</strong> you apply a new MAC ACL to theinterface, the new ACL replaces the previously configured one.If you apply an ACL to a Layer 2 interface on a switch, <strong>and</strong> the switch has an input Layer 3 ACL or aVLAN map applied to a VLAN that the interface is a member of, the ACL applied to the Layer 2interface takes precedence.When an inbound packet is received on an interface with a MAC ACL applied, the switch checks thematch conditions in the ACL. If the conditions are matched, the switch forwards or drops the packet,according to the ACL.If the specified ACL does not exist, the switch forwards all packets.For more information about configuring MAC extended ACLs, see the “Configuring Network Securitywith ACLs” chapter in the software configuration guide for this release.OL-9776-08<strong>Catalyst</strong> <strong>3750</strong>-E <strong>and</strong> <strong>3560</strong>-E <strong>Switch</strong> Comm<strong>and</strong> Reference2-331

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!