D-Link DES-3828 Product Manual - Page 158

create access_profile packet content mask, config access_profile profile_id packet content mask

Page 158 highlights

xStack DES-3800 Series Layer 3 Stackable Fast Ethernet Managed Switch CLI Manual create access_profile (packet content mask) | offset_16-31 | offset_32-47 | offset_48-63 | offset_64-79 } profile_id } Description This command is used to identify packets by examining the Ethernet packet header, by byte and then decide whether to filter or forward it, based on the user's configuration. The user will specify which bytes to examine by entering them into the command, in hex form, and then selecting whether to forward, filter or mirror them, using the config access_profile command. Parameters packet_content_mask - Allows users to examine any specified content up to 80 bytes within a packet at one time and specifies that the Switch will mask the packet header beginning with the offset value specified as follows: • offset_0-15 - Enter a value in hex form to mask the packet from the beginning of the packet to the 15th byte. • offset_16-31 - Enter a value in hex form to mask the packet from byte 16 to byte 31. • offset_32-47 - Enter a value in hex form to mask the packet from byte 32 to byte 47. • offset_48-63 - Enter a value in hex form to mask the packet from byte 48 to byte 63. • offset_64-79 - Enter a value in hex form to mask the packet from byte 64 to byte 79. With this advanced unique Packet Content Mask (also known as Packet Content Access Control List - ACL), D-Link xStack switch family can effectively mitigate some network attacks like the common ARP Spoofing attack widely spreading today. This is for the reason that Packet Content ACL is able to inspect any specified content of a packet in different protocol layers. profile_id - Specifies an index number between 1 and 255 that will identify the access profile being created with this command. Restrictions Only Administrator or Operator-level users can issue this command. Example usage: To create an Access profile by packet content mask: DES-3800:admin#create access_profile packet_content_mask offset_0-15 0xFFFFFFFF 0xFFFFFFFF 0xFFFFFFFF 0xFFFFFFFF offset_16-31 0xFFFF 0xFFFF0000 0xF 0xF000000 profile_id 3 Command: create access_profile packet_content_mask offset_0-15 0xFFFFFFFF 0xFFFFFFFF 0xFFFFFFFF 0xFFFFFFFF offset_16-31 0xFFFF 0xFFFF0000 0xF 0xF000000 profile_id 3 Success. DES-3800:admin# config access_profile profile_id (packet content mask) Purpose Syntax To configure the rule for a previously created access profile command based on the packet content mask. Packet content masks entered will specify certain bytes of the packet header to be identified by the Switch. When the Switch recognizes a packet with the identical byte as the one configured, it will either forward, filter or mirror the packet, based on the users command entered here. config access_profile profile_id [add access_id packet_content_mask {offset_0-15 154

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452

xStack DES-3800 Series Layer 3 Stackable Fast Ethernet Managed Switch CLI Manual
154
create access_profile (packet content mask)
<hex 0x0-0xffffffff> <hex 0x0-0xffffffff> <hex 0x0-0xffffffff> | offset_16-31 <hex
0x0-0xffffffff> <hex 0x0-0xffffffff> <hex 0x0-0xffffffff> <hex 0x0-0xffffffff> |
offset_32-47 <hex 0x0-0xffffffff> <hex 0x0-0xffffffff> <hex 0x0-0xffffffff> <hex
0x0-0xffffffff> | offset_48-63 <hex 0x0-0xffffffff> <hex 0x0-0xffffffff> <hex 0x0-
0xffffffff> <hex 0x0-0xffffffff> | offset_64-79 <hex 0x0-0xffffffff> <hex 0x0-
0xffffffff> <hex 0x0-0xffffffff> <hex 0x0-0xffffffff>} profile_id <value 1-255>}
Description
This command is used to identify packets by examining the Ethernet packet header,
by byte and then decide whether to filter or forward it, based on the user’s
configuration. The user will specify which bytes to examine by entering them into the
command, in hex form, and then selecting whether to forward, filter or mirror them,
using the
config access_profile
command.
Parameters
packet_content_mask
– Allows users to examine any specified content up to 80
bytes within a packet at one time and specifies that the Switch will mask the packet
header beginning with the offset value specified as follows:
offset_0-15
– Enter a value in hex form to mask the packet from the beginning
of the packet to the 15th byte.
offset_16-31
- Enter a value in hex form to mask the packet from byte 16 to
byte 31.
offset_32-47
- Enter a value in hex form to mask the packet from byte 32 to
byte 47.
offset_48-63
- Enter a value in hex form to mask the packet from byte 48 to
byte 63.
offset_64-79
- Enter a value in hex form to mask the packet from byte 64 to
byte 79. With this advanced unique Packet Content Mask (also known as
Packet Content Access Control List - ACL), D-Link xStack switch family can
effectively mitigate some network attacks like the common ARP Spoofing attack
widely spreading today. This is for the reason that Packet Content ACL is able
to inspect any specified content of a packet in different protocol layers.
profile_id <value 1-255>
- Specifies an index number between 1 and 255 that will
identify the access profile being created with this command.
Restrictions
Only Administrator or Operator-level users can issue this command.
Example usage:
To create an Access profile by packet content mask:
DES-3800:admin#create access_profile packet_content_mask
offset_0-15 0xFFFFFFFF 0xFFFFFFFF 0xFFFFFFFF 0xFFFFFFFF
offset_16-31 0xFFFF 0xFFFF0000 0xF 0xF000000 profile_id 3
Command: create access_profile packet_content_mask offset_0-15
0xFFFFFFFF 0xFFFFFFFF 0xFFFFFFFF 0xFFFFFFFF offset_16-31
0xFFFF 0xFFFF0000 0xF 0xF000000 profile_id 3
Success.
DES-3800:admin#
config access_profile profile_id (packet content mask)
Purpose
To configure the rule for a previously created access profile command based on
the packet content mask. Packet content masks entered will specify certain bytes
of the packet header to be identified by the Switch. When the Switch recognizes a
packet with the identical byte as the one configured, it will either forward, filter or
mirror the packet, based on the users command entered here.
Syntax
config access_profile profile_id <value 1-8> [add access_id <value 1-65535>
packet_content_mask {offset_0-15 <hex0x0-0xffffffff> <hex 0x0-0xffffffff>