Configuring Transparent Bridging

Transparent and SRT Bridging Configuration Task List

To filter these packets on input or output, use either or both of the following commands in interface configuration mode:

Command

Purpose

 

 

bridge-group bridge-groupinput-type-list

Adds a filter for Ethernet- and SNAP-encapsulated packets on input.

access-list-number

 

 

 

bridge-group bridge-groupoutput-type-list

Adds a filter for Ethernet- and SNAP-encapsulated packets on output.

access-list-number

 

 

 

You can filter IEEE 802-encapsulated packets on input. The access list you create is applied to all IEEE 802 frames received on that interface prior to the bridge-learning process. SNAP frames also must pass any applicable Ethernet type-code access list.

You can also filter IEEE 802-encapsulated packets on output. SNAP frames also must pass any applicable Ethernet type-code access list. The access list you create is applied just before sending out a frame to an interface.

To filter these packets on input or output, use one or both of the following commands in interface configuration mode:

Command

Purpose

 

 

bridge-group bridge-groupinput-lsap-list

Adds a filter for IEEE 802-encapsulated packets on input.

access-list-number

 

 

 

bridge-group bridge-groupoutput-lsap-list

Adds a filter for IEEE 802-encapsulated packets on output.

access-list-number

 

 

 

Access lists for Ethernet- and IEEE 802-encapsulated packets affect only bridging functions. You cannot use such access lists to block frames with protocols that are being routed.

Defining and Applying Extended Access Lists

If you are filtering by the MAC-layer address, whether it is by a specific MAC address, vendor code, or protocol type, you can define and apply extended access lists. Extended access lists allow finer granularity of control. They allow you to specify both source and destination addresses and arbitrary bytes in the packet.

To define an extended access list, use the following command in global configuration mode:

Command

Purpose

 

 

 

 

access-list access-list-number{permit

Defines an extended access list for finer control of bridged traffic.

deny} source source-mask destination

 

 

destination-mask offset size operator operand

 

 

 

 

 

To apply an extended access list to an interface, use one or both of the following commands in interface

configuration mode:

 

 

 

 

 

Command

Purpose

 

 

 

bridge-group bridge-groupinput-pattern-list

Applies an extended access list to the packets being received by an

access-list-number

interface.

 

 

 

bridge-group bridge-groupoutput-pattern-list

Applies an extended access list to the packet being sent by an

access-list-number

interface.

 

 

 

Cisco IOS Bridging and IBM Networking Configuration Guide

BC-49

Page 27
Image 27
Cisco Systems BC-23 manual Defining and Applying Extended Access Lists, Configuration mode, Interface, BC-49

BC-23 specifications

Cisco Systems has long been a leader in the networking industry, and its BC-23 model exemplifies the company's commitment to innovation and performance. Aimed at enhancing business operations, the BC-23 is tailored for organizations looking for robust solutions that support their digital transformation efforts.

One of the standout features of the Cisco BC-23 is its advanced networking capabilities. It supports high-speed data transmission, enabling seamless communication across networks. With multi-gigabit Ethernet ports, the BC-23 facilitates faster data rates, accommodating the increasing bandwidth demands of modern applications. This feature is particularly beneficial for businesses that rely heavily on cloud services, video conferencing, and data-heavy applications.

Security is a top priority, and the Cisco BC-23 incorporates cutting-edge security measures. Integrated threat detection and prevention systems help safeguard sensitive data from cyber threats. Additionally, the device supports secure access protocols, ensuring that only authorized users can connect to the network. This multi-layered security approach not only protects the network infrastructure but also secures the integrity of the data being transmitted.

Another significant characteristic of the BC-23 is its support for software-defined networking (SDN). This technology allows businesses to manage their networks through centralized software applications, facilitating real-time adjustments and optimizations. The flexibility afforded by SDN is especially advantageous in dynamic environments where network demands can shift rapidly.

The Cisco BC-23 also offers enhanced management features, allowing IT teams to monitor network performance and analytics effectively. This visibility into network operations enables organizations to identify potential issues before they escalate, minimizing downtime and keeping business processes smooth.

Furthermore, the BC-23 is designed for scalability. As organizations grow, their networking needs evolve, and the BC-23 can easily adapt to these changes. Businesses can add additional devices and capabilities without the need for a complete overhaul of their existing infrastructure.

With its combination of speed, security, and scalability, the Cisco Systems BC-23 is an invaluable asset for modern businesses. It stands out not just as a networking device but as a comprehensive solution that meets the demands of today's fast-paced, technology-driven environment. As companies continue to leverage digital tools for growth and efficiency, the BC-23 will undoubtedly play a significant role in their success.