D-Link DES-3526DC Product Manual - Page 95

Access Profile Table, Configuring the Access Profile Table

Page 95 highlights

xStack DES-3500 Series Layer 2 Stackable Fast Ethernet Managed Switch User Manual Access Profile Table Configuring the Access Profile Table Access profiles allow you to establish criteria to determine whether or not the Switch will forward packets based on the information contained in each packet's header. Note: Treatment of the Access Profile feature has been changed for the Release III version of the firmware. There are also some restrictions on the use of access profiles on the Switch. For more information on the changes for Release III and the limitations on access profiles, please read the CLI Reference Manual's discussion of Access Control Lists (ACL) Commands. Creating an access profile is divided into two basic parts. The first is to specify which part or parts of a frame the Switch will examine, such as the MAC source address or the IP destination address. The second part is entering the criteria the Switch will use to determine what to do with the frame. To display the currently configured Access Profiles on the Switch, open the Configuration folder and click on the Access Profile Table link. This will open the Access Profile Table window, as shown below. Figure 6- 57. Access Profile Table window To add an entry to the Access Profile Table, click the Add Profile button. This will open the Access Profile Configuration window, as shown below. There are three Access Profile Configuration windows; one for Ethernet (or MAC address-based) profile configuration, one for IP address-based profile configuration and one for the Packet Content Mask. You can switch between the three Access Profile Configuration windows by using the Type drop-down menu. The window shown below is the Access Profile Configuration window for Ethernet. Note: Up to 9 Access Profiles of the possible 255 profile IDs available may be created for the Switch. The Profile ID is used for relative priority for an Access Profile should a conflict arise between a rule created in one profile and a rule created in a different profile. Please read the CLI Reference Manual chapter discussing Access Control List (ACL) Commands. Figure 6- 58. Access Profile Configuration window (Ethernet) The following parameters can be set, for the Ethernet type: 81

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260

xStack DES-3500 Series Layer 2 Stackable Fast Ethernet Managed Switch User Manual
81
Access Profile Table
Configuring the Access Profile Table
Access profiles allow you to establish criteria to determine whether or not the Switch will forward packets based on the
information contained in each packet's header.
Note:
Treatment of the Access Profile feature has been changed for the Release III version of the
firmware. There are also some restrictions on the use of access profiles on the Switch. For more
information on the changes for Release III and the limitations on access profiles, please read the CLI
Reference Manual’s discussion of Access Control Lists (ACL) Commands.
Creating an access profile is divided into two basic parts. The first is to specify which part or parts of a frame the Switch will
examine, such as the MAC source address or the IP destination address. The second part is entering the criteria the Switch will use
to determine what to do with the frame.
To display the currently configured Access Profiles on the Switch, open the
Configuration
folder and click on the
Access Profile
Table
link. This will open the
Access Profile Table
window, as shown below.
Figure 6- 57. Access Profile Table window
To add an entry to the Access Profile Table, click the
Add Profile
button. This will open the
Access Profile Configuration
window, as shown below. There are three
Access Profile Configuration
windows; one for Ethernet (or MAC address-based)
profile configuration, one for IP address-based profile configuration and one for the Packet Content Mask. You can switch
between the three
Access Profile Configuration
windows by using the Type drop-down menu. The window shown below is the
Access Profile Configuration
window for Ethernet.
Note:
Up to 9 Access Profiles of the possible 255 profile IDs available may be created for the Switch.
The Profile ID is used for relative priority for an Access Profile should a conflict arise between a rule
created in one profile and a rule created in a different profile. Please read the CLI Reference Manual
chapter discussing Access Control List (ACL) Commands.
Figure 6- 58. Access Profile Configuration window (Ethernet)
The following parameters can be set, for the Ethernet type: