22.05.2017 Views

nx.os.and.cisco.nexus.switching.2nd.edition.1587143046

Nexus Switching 2nd Edition

Nexus Switching 2nd Edition

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

0001 ip access-list TCP1<br />

0002 permit tcp any any<br />

0003 interface Ethernet1/1<br />

0004 ip access-group TCP1 in<br />

Number of active configuration sessions = 3<br />

Congo(config-s-if)# save bootflash:SessionMgrTCPIn<br />

Congo(config-s)# verify<br />

Verification Successful<br />

Congo(config-s)# commit<br />

Commit Successful<br />

Congo# show access-lists TCP1<br />

IP access list TCP1<br />

10 permit tcp any any<br />

Congo# show running-config interface e1/1<br />

!Comm<strong>and</strong>: show running-config interface Ethernet1/1<br />

!Time: Sat Oct 10 12:10:55 2009<br />

version 5.2(3a)<br />

interface Ethernet1/1<br />

description to Egypt<br />

ip access-group TCP1 in<br />

switchport<br />

switchport access vlan 500<br />

mtu 9216<br />

no shutdown<br />

Congo#<br />

Configuring MAC ACLs<br />

MAC ACLs match traffic information in the Layer 2 header of packets to filter traffic. MAC<br />

packet classification enables you to control whether a MAC ACL on a Layer 2 interface<br />

applies to all traffic entering the interface, including IP traffic, or to non-IP traffic only.<br />

Note<br />

MAC ACLs can be applied to ingress traffic only.<br />

Example 5-50 shows how to create a MAC ACL <strong>and</strong> enter ACL configuration.<br />

Example 5-50. Creating a MAC ACL <strong>and</strong> Entering ACL Configuration

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!