Access Security Guide K/KA/KB.15.15

Example 19 Example
Suppose you wanted to configure the filters in table 12-3 on a switch. (For more on source-port
filters, see “Configuring a source-port traffic filter” (page 431).
Table 46 Filter Example
Destination PortsActionFilter ValueFilter Type
D1-D4DropInbound ports: A1, A2
1
source-port
C1-C24, D5-D10Drop010000-123456multicast
B1-B4Drop010000-224466multicast
C12-C18, D1DropAppletalkprotocol
D17, D21-D24DropARPprotocol
1
*Because the switch allows one inbound port in a source-port filter, the requirement to filter ports A1 and A2 means you
will configure two separate source-port filters.
The following commands configure the filters listed above:
Figure 325 Configuring various traffic/security filters
Viewing
Viewing a named source-port filer
You can list all source-port filters configured in the switch, both named and unnamed, and their
action using the showcommand below.
Syntax
show filter source-port
Displays a listing of configured source-port filters, where each filter entry includes
a Filter Name, Port List, and Action:
Filter Name
The filter-name used when a named source-port filter is defined. Non-named
source-port filters are automatically assigned the port or port trunk number of
the source port.
Port List
Lists the port and port trunk destinations using the filter. Named source-port
filters that are not in use display NOT USED.
Action
Lists the ports and port trunks dropped by the filter. If a named source-port filter
has been defined but not configured, this field is blank.
[ index ]
For the supplied index (IDX) displays the action taken (Drop or Forward) for each destination
port on the switch.
434 Traffic/Security Features and Monitors