EasyManuals Logo

Cisco Catalyst 3750-E User Manual

Cisco Catalyst 3750-E
1414 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #834 background imageLoading...
Page #834 background image
35-30
Catalyst 3750-E and 3560-E Switch Software Configuration Guide
OL-9775-08
Chapter 35 Configuring Network Security with ACLs
Creating Named MAC Extended ACLs
Applying a MAC ACL to a Layer 2 Interface
After you create a MAC ACL, you can apply it to a Layer 2 interface to filter non-IP traffic coming in
that interface. When you apply the MAC ACL, consider these guidelines:
If you apply an ACL to a Layer 2 interface that is a member of a VLAN, the Layer 2 (port) ACL
takes precedence over an input Layer 3 ACL applied to the VLAN interface or a VLAN map applied
to the VLAN. Incoming packets received on the Layer 2 port are always filtered by the port ACL.
You can apply no more than one IP access list and one MAC access list to the same Layer 2 interface.
The IP access list filters only IP packets, and the MAC access list filters non-IP packets.
A Layer 2 interface can have only one MAC access list. If you apply a MAC access list to a Layer 2
interface that has a MAC ACL configured, the new ACL replaces the previously configured one.
Beginning in privileged EXEC mode, follow these steps to apply a MAC access list to control access to
a La
yer 2 interface:
To remove the specified access group, use the no ma
c access-group {name} interface configuration
command.
This example shows how to apply MAC access list ma
c1 to a port to filter packets entering the port:
Switch(config)# interface gigabitethernet1/0/2
Router(config-if)# mac access-group mac1 in
Note The mac access-group interface configuration command is only valid when applied to a physical
Layer 2 interface.You cannot use the command on EtherChannel port channels.
After receiving a packet, the switch checks it against the inbound ACL. If the ACL permits it, the switch
co
ntinues to process the packet. If the ACL rejects the packet, the switch discards it. When you apply an
undefined ACL to an interface, the switch acts as if the ACL has not been applied and permits all packets.
Remember this behavior if you use undefined ACLs for network security.
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
interface interface-id Identify a specific interface, and enter interface configuration
mode. The interface must be a physical Layer 2 interface (port
ACL).
Step 3
mac access-group {name} {in} Control access to the specified interface by using the MAC access
list.
Port ACLs are supported only in the inbound direction.
Step 4
end Return to privileged EXEC mode.
Step 5
show mac access-group [interface interface-id]
Display the MAC access list applied to the interface or all Layer 2
in
terfaces.
Step 6
copy running-config startup-config (Optional) Save your entries in the configuration file.

Table of Contents

Other manuals for Cisco Catalyst 3750-E

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Catalyst 3750-E and is the answer not in the manual?

Cisco Catalyst 3750-E Specifications

General IconGeneral
SeriesCatalyst 3750-E
Switching Capacity32 Gbps
Stacking Bandwidth32 Gbps
StackWise PlusYes
Layer SupportLayer 3
MAC Address Table Size12, 000 entries
RAM256 MB
Flash Memory64 MB
Memory256 MB DRAM, 64 MB Flash
Operating Temperature32 to 113°F (0 to 45°C)
Ports48 10/100/1000 Ethernet ports
Form FactorRack-mountable
Jumbo Frame SupportYes
Input Voltage100 to 240 VAC
Storage Temperature-25 to 70 °C
Relative Humidity10 to 90% non-condensing

Related product manuals