Prevent AppleTalk attack on switchport fa0/10.


        My first solution:


        

        !

        mac access-list extended MAC_ACL

         deny host 1234.1234.1234 any eq appletalk

         permit any any

        !

        interface fa0/10

         mac access-group MAC_ACL in

         


        But I found this in the documentation:


        
------------------------------------------------------------------------------------------------------------------------------------------------

        NOTE:

        

        Cisco doc 3560SCG 12.2(44)SE (Creating Named MAC Extended ACLs page 
32-26).

        

        – Though visible in the command-line help strings, AppleTalk is 
not supported as
a matching condition for

          the deny and permit MAC access-list configuration mode commands.

        
------------------------------------------------------------------------------------------------------------------------------------------------


        Solution: Use ethertype 0x809B for Appletalk (Ethertalk).


        So my solution should instead look like this:


        mac access-list extended MAC_ACL

         deny host 1234.1234.1234 any eq 0x809B

         permit any any

        !

        interface fa0/10

         mac access-group MAC_ACL in


         


        Can anyone confirm that this assumption is
correct?


         

_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Are you a CCNP or CCIE and looking for a job? Check out 
www.PlatinumPlacement.com

Reply via email to