- About This Guide
-
- Information about AAA
- Configuring the Local Database for AAA
- Configuring RADIUS Servers for AAA
- Configuring TACACS+ Servers for AAA
- Configuring LDAP Servers for AAA
- Configuring Windows NT Servers for AAA
- Configuring the Identity Firewall
- Configuring the ASA to Integrate with Cisco TrustSec
- Configuring Digital Certificates
- Index
Adding an EtherType Access Control List
This chapter describes how to configure EtherType ACLs and includes the following sections:
Information About EtherType ACLs
An EtherType ACL is made up of one or more Access Control Entries (ACEs) that specify an EtherType. An EtherType rule controls any EtherType identified by a 16-bit hexadecimal number, as well as selected traffic types. See the Supported EtherTypes and Other Traffic section in the firewall configuration guide for more information.
For information about creating an access rule with the EtherType ACL, see Chapter 6, “Configuring Access Rules,” in the firewall configuration guide.
Licensing Requirements for EtherType ACLs
The following table shows the licensing requirements for this feature:
|
|
|
|---|---|
Guidelines and Limitations
This section includes the guidelines and limitations for this feature.
Available in single and multiple context modes.
Supported in transparent firewall mode only.
Additional Guidelines and Limitations
The following guidelines and limitations apply to EtherType ACLs:
- For EtherType ACLs, the implicit deny at the end of the ACL does not affect IP traffic or ARPs; for example, if you allow EtherType 8037, the implicit deny at the end of the ACL does not now block any IP traffic that you previously allowed with an extended ACL (or implicitly allowed from a high security interface to a low security interface). However, if you explicitly deny all traffic with an EtherType ACE, then IP and ARP traffic is denied.
- 802.3-formatted frames are not handled by the ACL because they use a length field as opposed to a type field.
- See the Supported EtherTypes and Other Traffic section in the firewall configuration guide for more information about supported traffic.
Default Settings
ACL logging generates system log message 106023 for denied packets. Deny packets must be present to log denied packets.
When you configure logging for the ACL, the default severity level for system log message 106100 is 6 (informational).
Configuring EtherType ACLs
This section includes the following topics:
Task Flow for Configuring EtherType ACLs
Use the following guidelines to create and implement an ACL:
Step 1
Create an ACL by adding an ACE and applying an ACL name, as shown in the “Adding EtherType ACLs” section.
Step 2
Apply the ACL to an interface. (See the Configuring Access Rules section in the firewall configuration guide for more information.)
Adding EtherType ACLs
To configure an ACL that controls traffic based upon its EtherType, perform the following steps:
Detailed Steps
Example
The following sample ACL allows common traffic originating on the inside interface:
Adding Remarks to ACLs
You can include remarks about entries in any ACL, including extended, EtherType, IPv6, standard, and Webtype ACLs. The remarks make an ACL easier to understand.
To add a remark after the last access-list command you entered, enter the following command:
Example
You can add remarks before each ACE, and the remarks appear in the ACL in these locations. Entering a dash (-) at the beginning of a remark helps to set it apart from the ACE.
What to Do Next
Apply the ACL to an interface. (See the Configuring Access Rules section in the firewall configuration guide for more information.)
Monitoring EtherType ACLs
To monitor EtherType ACLs, enter one of the following commands:
|
|
|
|---|---|
|
|
|
|
|
Configuration Examples for EtherType ACLs
The following example shows how to configure EtherType ACLs:
The following ACL allows some EtherTypes through the ASA, but it denies IPX:
The following ACL denies traffic with EtherType 0x1256, but it allows all others on both interfaces:
Feature History for EtherType ACLs
Table 20-1 lists the release history for this feature.
Feedback