Open as PDF
Cisco IP Solution Center L2VPN and Carrier Ethernet User Guide, 6.0
Chapter 7 Creating an L2VPN Policy
Defining an Ethernet ERS (EVPL) Policy with a CE
Step 21 Enter one or more Ethernet MAC addresses in UNI MAC addresses.
This selection is present only if you uncheck the Use Existing ACL Name check box. Click the Edit
button to bring up a pop-up window in which you enter MAC addresses to be allowed or denied on the
port. You can also specify a range of addresses by setting a base MAC address and a filtered MAC
Step 22 Choose a UNI Port Type.
The choices are:
• Access Port
• Trunk with Native VLAN
Note Enter a UNI Port Type only if the encapsulation type is DEFAULT.
Step 23 Check the UNI Port Security check box (see Figure 7-4) if you to want to provision port security-related
CLIs to the UNI port by controlling the MAC addresses that are allowed to go through the interface.
a. For Maximum Number of MAC address, enter the number of MAC addresses allowed for port
b. For Aging, enter the length of time the MAC address can stay on the port security table.
c. For Violation Action, choose what action will occur when a port security violation is detected:
• PROTECT—Drops packets with unknown source addresses until a sufficient number of secure
MAC addresses are removed to drop below the maximum value.
• RESTRICT—Drops packets with unknown source addresses until a sufficient number of secure
MAC addresses are removed to drop below the maximum value and causes the Security Violation
counter to increment.
• SHUTDOWN—Puts the interface into the error-disabled state immediately and sends an SNMP
d. In the Secure MAC Addresses field, enter one or more Ethernet MAC addresses.
Figure 7-4 UNI Port Security
Step 24 Check the Enable Storm Control check box (see Figure 7-5) to help prevent the UNI port from being
disrupted by a broadcast, multicast or unicast storm.
Enter a threshold value for each type of traffic. The value, which can be specified to two significant
digits, represents the percentage of the total available bandwidth of the port. If the threshold of a traffic
type is reached, further traffic of that type is suppressed until the incoming traffic falls below the