Brocade Network Advisor SAN User Manual v11.1x (53-1002167-01, May 2011)

Brocade Network Advisor SAN User Manual 389
53-1002167-01
Layer 2 access control list management
15
The new ACL configuration displays in the ACLs table. To create additional ACLs, repeat step 2
through step 10.
11. Click OK on the Device_Name - L2 ACL Configuration dialog box.
The Deploy to Products - L2 ACL dialog box displays. To save the configuration, refer to “Saving
a security configuration deployment” on page 402
Editing a standard L2 ACL configuration
To create a standard L2 ACL configuration on a Fabric OS device, complete the following steps.
1. Select the device and select Configure > Security > L2 ACL > Product.
The Device_Name - L2 ACL Configuration dialog box displays.
2. Select the ACL you want to edit in the ACLs table and click Edit.
The Configuration_Name Edit Standard L2 ACL Configuration dialog box displays.
3. To edit an existing ACL rule, complete the following steps.
a. Select the rule you want to edit in the ACL Entries table and click the left arrow button.
b. Change the sequence number for the ACL in the Sequence field.
c. Select Permit or Deny from the Action list.
d. In the Source list, select one of the following options:
Any
MAC
Selecting MAC enables the Source field. Enter the source MAC address on which the
configuration filters traffic in the Source field.
e. Select the Count check box to enable counting.
Count specifies the number of packets filtered (allowed or denied) for the ACL rule.
f. Click the right arrow button.
The updated ACL entry displays in the ACL Entries table. To edit additional ACL entries,
repeat step 3.
4. To delete an existing ACL rule, select the rule you want to edit in the ACL Entries table and click
the left arrow button.
5. To add a new ACL rule, complete the following steps.
a. Enter the sequence number for the ACL in the Sequence field.
b. Select Permit or Deny from the Action list.
c. In the Source list, select one of the following options:
Any
MAC
Selecting MAC enables the Source field. Enter the source MAC address on which the
configuration filters traffic in the Source field.