C
ONFIGURING
A
CCESS
C
ONTROL
L
ISTS
8-15
Web – Configure the mask to match the required rules in the MAC ingress
or egress ACLs. Set the mask to check for any source or destination
address, a host address, or an address range. Use a bitmask to search for
specific VLAN ID(s) or Ethernet type(s). Or check for rules where a
packet format was specified. Then click Add.
Figure 8-7 ACL Mask Configuration - MAC