<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Filtering Egress Traffic based on Frame Characteristics in FAQs</title>
    <link>https://community.extremenetworks.com/t5/faqs/filtering-egress-traffic-based-on-frame-characteristics/m-p/41559#M59</link>
    <description>Article ID: 5888 &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Products&lt;/B&gt;&lt;BR /&gt;
DFE&lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Protocols/Features&lt;/B&gt;&lt;BR /&gt;
Policy&lt;BR /&gt;
SVL&lt;BR /&gt;
UPN&lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Cause&lt;/B&gt;&lt;BR /&gt;
It may sometimes be desired to filter certain traffic upon &lt;I&gt;egress&lt;/I&gt;, based on frame characteristics such as MAC Address, IP Address, TCP/UDP Destination Port, etc. This traffic would be allowed to egress most ports within its VLAN except one or two physical ports.&lt;BR /&gt;
&lt;BR /&gt;
Achieving this goal can be difficult because Policy can only take filtering/forwarding action against &lt;I&gt;ingress&lt;/I&gt; traffic, at which time it has not yet been determined which egress port(s) will receive that traffic.&lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Solution&lt;/B&gt;&lt;BR /&gt;
The following design should work well in a switching environment on devices such as the DFE that support both Policy and SVL (&lt;A href="http://bit.ly/1iwHISK" target="_blank" rel="nofollow noreferrer noopener"&gt;4918&lt;/A&gt;&lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;OL&gt; 
&lt;LI&gt;Instead of using only VLAN x, use VLANs x and x2. 
&lt;/LI&gt;&lt;LI&gt;Configure Shared VLAN Learning (&lt;A href="http://bit.ly/1avSTRA" target="_blank" rel="nofollow noreferrer noopener"&gt;5397&lt;/A&gt;) for these two VLANs, giving them a common FID. 
&lt;/LI&gt;&lt;LI&gt;Configure the non-constrained ports as VLAN x PVID, with untagged egress for VLANs x and x2. 
&lt;/LI&gt;&lt;LI&gt;Configure the constrained ports as VLAN x PVID, with untagged egress for VLAN x. 
&lt;/LI&gt;&lt;LI&gt;Use Policy to reassign any targeted to-be-constrained frames from VLAN x to VLAN x2. 
&lt;/LI&gt;&lt;LI&gt;Targeted frames egress only non-constrained ports, leaving all other switching unimpacted.&lt;/LI&gt;&lt;/OL&gt;Even if supported, the use of the SecureStacks' "Protected Port" feature would not help here because the decision process requires more granularity than merely the Source Port / Destination Port combination.&lt;BR /&gt;
&lt;BR /&gt;
&lt;A href="http://www.enterasys.com/support/contact-support.aspx" target="_blank" rel="nofollow noreferrer noopener"&gt;Contact the GTAC&lt;/A&gt; for further assistance, as necessary.</description>
    <pubDate>Fri, 07 Feb 2014 20:31:00 GMT</pubDate>
    <dc:creator>FAQ_User</dc:creator>
    <dc:date>2014-02-07T20:31:00Z</dc:date>
    <item>
      <title>Filtering Egress Traffic based on Frame Characteristics</title>
      <link>https://community.extremenetworks.com/t5/faqs/filtering-egress-traffic-based-on-frame-characteristics/m-p/41559#M59</link>
      <description>Article ID: 5888 &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Products&lt;/B&gt;&lt;BR /&gt;
DFE&lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Protocols/Features&lt;/B&gt;&lt;BR /&gt;
Policy&lt;BR /&gt;
SVL&lt;BR /&gt;
UPN&lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Cause&lt;/B&gt;&lt;BR /&gt;
It may sometimes be desired to filter certain traffic upon &lt;I&gt;egress&lt;/I&gt;, based on frame characteristics such as MAC Address, IP Address, TCP/UDP Destination Port, etc. This traffic would be allowed to egress most ports within its VLAN except one or two physical ports.&lt;BR /&gt;
&lt;BR /&gt;
Achieving this goal can be difficult because Policy can only take filtering/forwarding action against &lt;I&gt;ingress&lt;/I&gt; traffic, at which time it has not yet been determined which egress port(s) will receive that traffic.&lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Solution&lt;/B&gt;&lt;BR /&gt;
The following design should work well in a switching environment on devices such as the DFE that support both Policy and SVL (&lt;A href="http://bit.ly/1iwHISK" target="_blank" rel="nofollow noreferrer noopener"&gt;4918&lt;/A&gt;&lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;OL&gt; 
&lt;LI&gt;Instead of using only VLAN x, use VLANs x and x2. 
&lt;/LI&gt;&lt;LI&gt;Configure Shared VLAN Learning (&lt;A href="http://bit.ly/1avSTRA" target="_blank" rel="nofollow noreferrer noopener"&gt;5397&lt;/A&gt;) for these two VLANs, giving them a common FID. 
&lt;/LI&gt;&lt;LI&gt;Configure the non-constrained ports as VLAN x PVID, with untagged egress for VLANs x and x2. 
&lt;/LI&gt;&lt;LI&gt;Configure the constrained ports as VLAN x PVID, with untagged egress for VLAN x. 
&lt;/LI&gt;&lt;LI&gt;Use Policy to reassign any targeted to-be-constrained frames from VLAN x to VLAN x2. 
&lt;/LI&gt;&lt;LI&gt;Targeted frames egress only non-constrained ports, leaving all other switching unimpacted.&lt;/LI&gt;&lt;/OL&gt;Even if supported, the use of the SecureStacks' "Protected Port" feature would not help here because the decision process requires more granularity than merely the Source Port / Destination Port combination.&lt;BR /&gt;
&lt;BR /&gt;
&lt;A href="http://www.enterasys.com/support/contact-support.aspx" target="_blank" rel="nofollow noreferrer noopener"&gt;Contact the GTAC&lt;/A&gt; for further assistance, as necessary.</description>
      <pubDate>Fri, 07 Feb 2014 20:31:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/faqs/filtering-egress-traffic-based-on-frame-characteristics/m-p/41559#M59</guid>
      <dc:creator>FAQ_User</dc:creator>
      <dc:date>2014-02-07T20:31:00Z</dc:date>
    </item>
  </channel>
</rss>

