Protection from unauthorized access
92
6.6
Access Control Lists (ACL)
Basic - L3P
Release
3.1
06/07
Note: If you use IP ACLs at ports which belong to a HIPER-Ring or which are
part of a Ring/Network Coupling add the following rule to the ACLs:
PERMIT
Protocol: UDP
Source IP: ANY
Destination IP: 0.0.0.0/32
Source Port: 0
Destination Port: 0
CLI Command:
access-list 1xx permit udp any eq 0 0.0.0.0 0.0.0.0 eq 0
Note: IP ddress masks in the rules for ACLs are inverse. This means that if you
want to mask an individual IP address, you select the network mask 0.0.0.0.
6.6.2 Description of MAC-based ACLs
While you identify IP-based ACLs using an ID number, you identify
MAC-based ACLs using a unique name of your choice.
MAC-based ACLs provide the following criteria for filtering:
D Source MAC addresses or all sources (any)
D Destination MAC addresses or all destinations (any)
D Ethernet types, also areas
D VLAN ID
D VLAN priority (COS)
D Secondary VLAN ID
D Secondary VLAN priority
Note: If you use ACLs at ports which belong to a HIPER-Ring or which are
part of a Ring/Network Coupling add the following rule to the ACLs: