keep in mind that MAC access lists work for non-IP traffic only. What are you trying to accomplish ? If you need to block specific MAC addresses from entering a switchport, you might want to consider port security, as in the example below, where you would only allow a single specified MAC address to enter a port:
As an alternative, if you want to block a certain MAC address from your entire switch, you could add a static entry for that MAC address and direct it to an unused port (GigabitEthernet0/2 in the example), as described below, effectively blackholing traffic for that MAC address:
port security should still work in your situation. Basically, what you do is to allow only the MAC addresses from server A and B to access the switchport where server B is connected to. Traffic from all other MAC addresses will be blocked. Since your server B is connected to interface FastEthernet0/2, the configuration of that interface should look like this:
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...