The following values must be configured:
id
Identifier for the entry to be configured.
mark-value
Value the session mark must take.
mask-value
Mask that specifies what session mark bits are going to be checked.
Example:
Stateful Access List 5000>entry 3 session-mark 1
Stateful Access List 5000>
2.6.3.37 ENTRY <id> SUBSCRIBER-STATUS
Adds a match criterion based on the status of the subscriber that is the source of the traffic. A subscriber is a concept
used in functions that need to have a session context associated to a physical device. This has to be authorized on
the application layer to receive some service.
Syntax:
Stateful Access List #>entry <id> subscriber-status unauthenticated
Command history:
Release
Modification
11.00.03
This command was introduced.
2.6.3.38 ENTRY <id> HTTP-FILTER
Executes Web page filtering, which denies access to pages with unwanted contents. This unwanted content, or the
url addresses themselves, must be specified in a configuration file detailed below. The device downloads the indic-
ated configuration file through the tftp protocol.
Use this command to specify the tftp server IP address the file has and the name of the configuration file:
Syntax:
Stateful Access List #>entry <id> http-filter <server-ip> <file-name>
The values to configure are as follows:
id
Entry identifier to configure.
server-ip
TFTP server IP address.
file-name
Name of the file to receive with the configuration.
Example:
Stateful Access List 5000>entry 3 http-filter 192.168.212.19 example
Stateful Access List 5000>
The console below shows how the configuration file must look like (format-wise):
Example:
[<config>]
refresh-interval = 3600
[<template>]
<html>
<head>
<title>teldat Filtering Access denied</title>
<meta http-equiv="content-type"
content="text/html; charset=utf-8">
</head>
<body bgcolor=#FFFFFF>
<center>
<table border=0 cellspacing=0 cellpadding=2 height=540 width=700>
<tr>
<td colspan=2 bgcolor=#FEA700 height=100 align=center>
<font face=arial,helvetica size=6>
<b>Access denied!</b>
</td>
bintec elmeg
2 Configuration
Access Control
33