11-17-2010 06:44 AM - edited 03-04-2019 10:29 AM
Hi,
I have a couple of hosts on a remote network which are infected with a Trojan and various other malware. The hosts themselves are on a DHCP network and I would like to block access from these hosts using a MAC filter.
Is this possible on 12.4(24)T2?
I have another option where I could configure a DHCP process and assign an IP address based on the MAC and essentially black whole the host with an ACL but I'm wondering if there is an easier approach.
Thanks.
11-17-2010 10:16 AM
Not sure if this is supported on your code/feature set/platform; but it's worth a try:
##################
To establish a MAC address access list, use the access-list command in global configuration mode. To remove access list, use the no form of this command.
access-list access-list-number {permit | deny} address mask
no access-list access-list-number
No MAC address access lists are established.
Global configuration
Configuring bridging access lists of type 700 may cause a momentary interruption of traffic flow.
The following example assumes that you want to disallow the bridging of Ethernet packets of all Sun workstations on Ethernet interface 1. Software assumes that all such hosts have Ethernet addresses with the vendor code 0800.2000.0000. The first line of the access list denies access to all Sun workstations, and the second line permits everything else. You then assign the access list to the input side of Ethernet interface 1.
access-list 700 deny 0800.2000.0000 0000.00FF.FFFF
access-list 700 permit 0000.0000.0000 FFFF.FFFF.FFFF
!
interface ethernet 1
bridge-group 1 input-address-list 700
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide