Access Control
MAC-based ACLs
585 Cisco 500 Series Stackable Managed Switch Administration Guide
27
STEP 1 Click Access Control > Mac-Based ACE.
STEP 2 Select an ACL, and click Go. The ACEs in the ACL are listed.
STEP 3 Click Add.
STEP 4 Enter the parameters.
• ACL Name—Displays the name of the ACL to which an ACE is being added.
• Priority—Enter the priority of the ACE. ACEs with higher priority are
processed first. One is the highest priority.
• Action—Select the action taken upon a match. The options are:
-
Permit
—Forward packets that meet the ACE criteria.
-
Deny
—Drop packets that meet the ACE criteria.
-
Shutdown
—Drop packets that meet the ACE criteria, and disable the port
from where the packets were received. Such ports can be reactivated
from the Port Settings page.
• Logging—Select to enable logging ACL flows that match the ACL rule.
• Time Range—Select to enable limiting the use of the ACL to a specific time
range.
• Time Range Name—If Time Range is selected, select the time range to be
used. Time ranges are defined in the Configuring System Time section.
• Destination MAC Address—Select Any if all destination addresses are
acceptable or User defined to enter a destination address or a range of
destination addresses.
• Destination MAC Address Value—Enter the MAC address to which the
destination MAC address is to be matched and its mask (if relevant).
• Destination MAC Wildcard Mask—Enter the mask to define a range of MAC
addresses. Note that this mask is different than in other uses, such as subnet
mask. Here, setting a bit as 1 indicates don't care and 0 indicates to mask
that value.
NOTE Given a mask of 0000 0000 0000 0000 0000 0000 1111 1111 (which
means that you match on the bits where there is 0 and don't match on the bits
where there are 1's). You need to translate the 1's to a decimal integer and you
write 0 for each four zeros. In this example since 1111 1111 = 255, the mask
would be written: as 0.0.0.255.