Cisco Systems BC-23 Filters particular MAC-layer station addresses, Filtering by Vendor Code

Page 25

Configuring Transparent Bridging

Transparent and SRT Bridging Configuration Task List

Filtering by Specific MAC Address

You can filter frames with a particular MAC-layer station source or destination address. Any number of addresses can be configured into the system without a performance penalty. To filter by MAC-layer address, use the following command in global configuration mode:

Command

Purpose

 

 

bridge bridge-group address mac-address {forward

Filters particular MAC-layer station addresses.

discard}[interface]

 

 

 

When filtering specific MAC destination addresses, allow for multicast or broadcast packets that are required by the bridged network protocols. Refer to the example in the section “Multicast or Broadcast Packets Bridging Example” later in this chapter to guide you in building your configuration to allow for multicast or broadcast packets.

Filtering by Vendor Code

The bridging software allows you to create access lists to administratively filter MAC addresses. These access lists can filter groups of MAC addresses, including those with particular vendor codes. There is no noticeable performance loss in using these access lists, and the lists can be of indefinite length. You can filter groups of MAC addresses with particular vendor codes by performing the first task and one or both of the other tasks that follow:

Establish a vendor code access list

Filter source addresses

Filter destination addresses

To establish a vendor code access list, use the following command in global configuration mode:

Command

Purpose

 

 

access-list access-list-number{permit

Prepares access control information for filtering of frames by canonical

deny} address mask

(Ethernet-ordered) MAC address.

 

 

The vendor code is the first three bytes of the MAC address (left to right). For an example of how to filter by vendor code, see “Multicast or Broadcast Packets Bridging Example” later in this chapter.

Note Remember that, as with any access list using MAC addresses, Ethernets swap their MAC address bit ordering, and Token Rings and FDDI do not. Therefore, an access list that works for one medium might not work for others.

Once you have defined an access list to filter by a particular vendor code, you can assign an access list to a particular interface for filtering on the MAC source addresses of packets received on that interface or the MAC destination addresses of packets that would ordinarily be forwarded out that interface. To filter by source or destination addresses, use one of the following commands in interface configuration mode:

Cisco IOS Bridging and IBM Networking Configuration Guide

BC-47

Image 25
Contents BC-23 Transparent and SRT BridgingIntegrated Routing and Bridging Transparent Bridging FeaturesBC-24 BC-25 Bridge-Group Virtual InterfaceBridge-Group Virtual Interface in the Router BC-26Other Considerations SRT Bridging FeaturesBC-27 BC-28 Transparent and SRT Bridging Configuration Task ListAssigning Each Network Interface to a Bridge Group Configuring Transparent Bridging and SRT BridgingAs Ieee 802.1D standard, DEC or Vlan bridge BC-29Transparently Bridged VLANs for ISL Command PurposeChoosing the OUI for Ethernet Type II Frames BC-30Transparently Bridged VLANs on an Fddi Backbone BC-31BC-32 Routing between ISL VLANsSubinterface with the Vlan Specifies a subinterfaceSame bridge group BC-33Configuring Transparent Bridging over WANs Configuring a Subscriber Bridge GroupConfiguring Fast-Switched Transparent Bridging over ATM BC-34Command Configuring Transparent Bridging over DDRDefining the Protocols to Bridge Specifying the Bridging ProtocolDetermining Access for Bridging Configuring Transparent Bridging over Frame RelayConfiguring an Interface for Bridging Fast-Switched Transparent BridgingBridging in a Frame Relay Network with No Multicasts Configuring Transparent Bridging over Multiprotocol LapbBridging in a Frame Relay Network with Multicasts BC-37Configuring Transparent Bridging over Configuring Transparent Bridging over SmdsSpecifies IP-to-X.121 mapping BC-38Configuring Integrated Routing and Bridging Configuring Concurrent Routing and BridgingSpecifies a protocol to be routed on a bridge group BC-39Configuring the Bridge-Group Virtual Interface Configuring InterfacesEnabling Integrated Routing and Bridging BC-40BC-41 Configuring Protocols for Routing or BridgingDisabling IP Routing Configuring Transparent Bridging OptionsBC-42 Enabling Autonomous Bridging Configuring LAT CompressionBC-43 Establishes a multiple spanning-tree domain Establishing Multiple Spanning-Tree DomainsBC-44 Filtering Transparently Bridged Packets Configuring Bridge Table Aging TimeForwarding Multicast Addresses BC-45BC-46 Setting Filters at the MAC LayerFiltering by Vendor Code Filters particular MAC-layer station addressesEthernet-ordered MAC address BC-47Type Filtering by Protocol TypeBC-48 Configuration mode Defining and Applying Extended Access ListsInterface BC-49BC-50 Enabling LAT Group Code Service Filtering Filtering LAT Service AnnouncementsBC-51 BC-52 Adjusting Spanning-Tree ParametersSetting an Interface Priority Setting the Bridge PriorityAdjusting Bpdu Intervals Assigning Path CostsDefining the Forward Delay Interval Adjusting the Interval between Hello BPDUsDisabling the Spanning Tree on an Interface Defining the Maximum Idle IntervalBC-55 BC-56 Configuring the PA-12E/2FE Port AdapterBC-57 Monitoring and Maintaining the PA-12E/2FE Port AdapterBC-58 BC-59 BC-60 Configuring Circuit GroupsConfigures a transmission pause interval Configuring Constrained Multicast FloodingDistributes base load on the source MAC address only BC-61BC-62 BC-63 Basic Bridging ExampleBC-64 Concurrent Routing and Bridging ExampleBC-65 Basic Integrated Routing and Bridging ExampleBC-66 Complex Integrated Routing and Bridging ExampleBC-67 Transparently Bridged VLANs Configuration ExampleRouter Two Router OneBC-68 BC-69 Router ThreeEthernet-to-FDDI Transparent Bridging Example Routing between VLANs Configuration ExampleBC-70 Router/Bridge in Building Ethernet Bridging ExampleBC-71 BC-72 SRT Bridging ExampleConfiguration for the Thule, Greenland Router Configuration for the New York City RouterMulticast or Broadcast Packets Bridging Example BC-73Transparent Bridging Example Configuration for BridgeBC-74 Bridging in a Frame Relay Network with No Multicasts Frame Relay Transparent Bridging ExamplesBC-75 Bridging in a Frame Relay Network with Multicasts Transparent Bridging over Multiprotocol Lapb ExampleBC-76 BC-77 Transparent Bridging over DDR ExamplesComplex Transparent Bridging Network Topology Example Fast-Switched Transparent Bridging over Smds ExampleBC-78 Bridged Subnetworks with Domains BC-79BC-80 Configuration for Router aConfiguration for Router C Configuration for Router BConfiguration for Router D BC-81ATM Subscriber Ports, ATM Trunk Example Fast Ethernet Subscriber Port, Frame Relay Trunk ExampleBC-82 BC-83 BC-84 Configuration of IRB for PA-12E/2FE Port Adapter Example

BC-23 specifications

Cisco Systems has long been a leader in the networking industry, and its BC-23 model exemplifies the company's commitment to innovation and performance. Aimed at enhancing business operations, the BC-23 is tailored for organizations looking for robust solutions that support their digital transformation efforts.

One of the standout features of the Cisco BC-23 is its advanced networking capabilities. It supports high-speed data transmission, enabling seamless communication across networks. With multi-gigabit Ethernet ports, the BC-23 facilitates faster data rates, accommodating the increasing bandwidth demands of modern applications. This feature is particularly beneficial for businesses that rely heavily on cloud services, video conferencing, and data-heavy applications.

Security is a top priority, and the Cisco BC-23 incorporates cutting-edge security measures. Integrated threat detection and prevention systems help safeguard sensitive data from cyber threats. Additionally, the device supports secure access protocols, ensuring that only authorized users can connect to the network. This multi-layered security approach not only protects the network infrastructure but also secures the integrity of the data being transmitted.

Another significant characteristic of the BC-23 is its support for software-defined networking (SDN). This technology allows businesses to manage their networks through centralized software applications, facilitating real-time adjustments and optimizations. The flexibility afforded by SDN is especially advantageous in dynamic environments where network demands can shift rapidly.

The Cisco BC-23 also offers enhanced management features, allowing IT teams to monitor network performance and analytics effectively. This visibility into network operations enables organizations to identify potential issues before they escalate, minimizing downtime and keeping business processes smooth.

Furthermore, the BC-23 is designed for scalability. As organizations grow, their networking needs evolve, and the BC-23 can easily adapt to these changes. Businesses can add additional devices and capabilities without the need for a complete overhaul of their existing infrastructure.

With its combination of speed, security, and scalability, the Cisco Systems BC-23 is an invaluable asset for modern businesses. It stands out not just as a networking device but as a comprehensive solution that meets the demands of today's fast-paced, technology-driven environment. As companies continue to leverage digital tools for growth and efficiency, the BC-23 will undoubtedly play a significant role in their success.