Configuration rules and notes, Configuring layer 2 acls, Creating a layer 2 acl table – Brocade BigIron RX Series Configuration Guide User Manual

Page 666

Advertising
background image

588

BigIron RX Series Configuration Guide

53-1002484-04

Configuration rules and notes

21

Configuration rules and notes

You cannot bind Layer 2 ACLs and IP ACLs to the same port. However, you can configure one
port on the device to use Layer 2 ACLs and another port on the same device to use IP ACLs.

You cannot bind a Layer 2 ACL to a virtual interface.

The Layer 2 ACL feature cannot perform SNAP and LLC encapsulation type comparisons.

BigIron RX processes ACLs in hardware.

You can use Layer 2 ACLs to block management access to the BigIron RX. For example, you can
use a Layer 2 ACL clause to block a certain host from establishing a connection to the device
through Telnet.

You cannot edit or modify an existing Layer 2 ACL clause. If you want to change the clause, you
must delete it first, then re-enter the new clause.

You cannot add remarks to a Layer 2 ACL clause.

Configuring Layer 2 ACLs

Configuring a Layer 2 ACL is similar to configuring standard and extended ACLs. Layer 2 ACL table
IDs range from 400 to 499, for a maximum of 100 configurable Layer 2 ACL tables. Within each
Layer 2 ACL table, you can configure from 64 (default) to 256 clauses. Each clause or entry can
define a set of Layer 2 parameters for filtering. Once you completely define a Layer 2 ACL table, you
must bind it to the interface for filtering to take effect.

The device evaluates traffic coming into the port against each ACL clause. When a match occurs,
the device takes the corresponding action. Once a match entry is found, the device either forwards
or drops the traffic, depending upon the action specified for the clause. Once a match entry is
found, the device does not evaluate the traffic against subsequent clauses.

By default, if the traffic does not match any of the clauses in the ACL table, the device drops the
traffic. To override this behavior, specify a “permit any any…” clause at the end of the table to
match and forward all traffic not matched by the previous clauses.

NOTE

Use precaution when placing entries within the ACL table. The Layer 2 ACL feature does not attempt
to resolve conflicts and assumes you know what you are doing.

Creating a Layer 2 ACL table

You create a Layer 2 ACL table by defining a Layer 2 ACL clause.

To create a Layer 2 ACL table, enter commands (clauses) such as the following at the Global
CONFIG level of the CLI. Note that you can add additional clauses to the ACL table at any time by
entering the command with the same table ID and different MAC parameters.

BigIron RX(config)# access-list 400 deny any any any etype arp

BigIron RX(config)# access-list 400 deny any any any etype ipv6

BigIron RX(config)# access-list 400 permit any any 100

This configuration creates a Layer 2 ACL with an ID of 400. When applied to an interface, this Layer
2 ACL table will deny all ARP and IPv6 traffic, and permit all other traffic in VLAN 100.

Advertising