EasyManua.ls Logo

TP-Link JetStream T3700G-28TQ - spanning-tree guard loop; spanning-tree guard root

TP-Link JetStream T3700G-28TQ
408 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
T3700G-28TQ
JetStream 28-Port Gigabit Stackable L3 Managed Switch CLI Guide
199
no rule rule-id
Parameter
rule-id —— The rule ID.
deny —— The operation to discard packets.
permit ——The operation to forward packets. By default, it is “permit”.
source-mac —— The source MAC address contained in the rule.
source-mac-mask —— The source MAC address mask. It is required if you
typed the source MAC address.
destination-mac —— The destination MAC address contained in the rule.
destination-mac-mask —— The destination MAC address mask. It is required
if you typed the destination MAC address.
ethernet-type —— EtherType contained in the rule, in the format of 4-hex
number.
user-pri —— The user priority contained in the rule, ranging from 0 to 7. By
default, it is not limited.
time-segment —— The time-range for the rule to take effect. By default, it is
not limited.
Command Mode
Mac Access-list Configuration Mode
Example
Create a MAC ACL whose ID is 20, and add Rule 10 for it. In the rule, the source
MAC address is 00:01:3F:48:16:23, the source MAC address mask is ff: ff: ff:
ff:ff:00, the user priority is 5, the time-range for the rule to take effect is tSeg1,
and the packets match this rule will be forwarded by the switch:
T3700G-28TQ(config)#mac access-list 20
T3700G-28TQ(config-mac-acl)#rule 10 permit smac 00:01:3F:48:16:23
smask ff: ff: ff: ff:ff:00 pri 5 tseg tSeg1
access-list policy name
Description
The access-list policy name command is used to add Policy. To delete the
corresponding Policy, please use no access-list policy name command. A
Policy is used to control the data packets those match the corresponding ACL

Table of Contents

Related product manuals