Converged Enhanced Ethernet Command Reference 3
53-1001762-01
L2 ACL commands 1
DRAFT: BROCADE CONFIDENTIAL
L2 ACL commands
Use Layer 2 Media Access Control (MAC) list commands to do the following:
Identify traffic based on the MAC-addresses, such as VLAN IDs and different encapsulations.
Configure multiple access-lists or rules and store them in a configuration.
After you apply the access list either to an interface, a Virtual TeletYpe (VTY), or through a
command using the access-list keyword, it becomes effective.
Following are the two types of access list commands:
Standard Access Control Lists
Standard Access Control Lists filter the traffic on a source address and block traffic close to a
destination. There are exceptions when the address in a standard access list is not a source
address. When using a Telnet session, for outbound VTY access lists, the address in the
access list entry is used as a destination address instead of a source address.
Extended Access Control Lists
Extended Access Lists block traffic based on any given packet attribute. Use Extended access
control lists to test source and destination addresses and other IP packet data, such as
protocols, TCP or UDP port numbers, type of service and to provide Reflective access-lists and
Time-based access-lists.capabilities.