Perform the following procedure to drop
incoming traffic using MAC, IPv4, or IPv6 ACL.
Procedure
Configure the ingress group with
the required ingress ports.
Configure L2 (MAC) or L3 ACL
(IPv4 or IPv6) in the access list with Deny option.
Set L2 or L3 ACL in the
route-map.
Apply route-map policy to the
ingress group.
Send traffic flows to the device
under test.
The traffic flows or packets
are dropped based on L2 or L3 ACL configured in the route-map.
Verify the CLI statistics of
ingress group and L2 or L3 ACL counters to determine the number of packets or
flows dropped.
Verify the CLI statistics of
egress port or egress group.
Verify that the packets matching
the L2 or L3 ACL are not getting forwarded in egress port by validating or
capturing the wired PCAP collected in the analytical tools.