DES-3500 Layer 2 Fast Ethernet Switch CLI Reference Manual
165
Command Parameters
<hex 0x0-0xffffffff>| offset 16-31 <hex 0x0-0xffffffff> <hex 0x0-0xffffffff> <hex 0x0-0xffffffff>
<hex 0x0-0xffffffff> | {offset 32-47 <hex 0x0-0xffffffff> <hex 0x0-0xffffffff> <hex 0x0-0xffffffff>
<hex 0x0-0xffffffff> | {offset 48-63 <hex 0x0-0xffffffff> <hex 0x0-0xffffffff> <hex 0x0-0xffffffff>
<hex 0x0-0xffffffff> | {offset 64-79 <hex 0x0-0xffffffff> <hex 0x0-0xffffffff> <hex 0x0-0xffffffff>
<hex 0x0-0xffffffff>}]
delete cpu
access_profile
profile_id <value 1-5>
config cpu
access_profile
profile_id <value 1-5> [add access_id <value 1-65535> [ethernet {vlan <vlan_name 32> |
source_mac <macaddr> | destination_mac <macaddr> | 802.1p <value 0-7> | ethernet_type
<hex 0x0-0xffff>} port [<portlist> | all] [permit | deny] | ip {vlan <vlan_name 32> | source_ip
<ipaddr> | destination_ip <ipaddr> | dscp <value 0-63> | [icmp {type <value 0-255> | code
<value 0-255>} | igmp {type <value 0-255>} | tcp {src_port <value 0-65535> | dst_port
<value 0-65535> | urg | ack | psh | rst | syn | fin}]} | udp {src_port <value 0-65535> | dst_port
<value 0-65535>} | protocol_id <value 0 - 255> {user_define <hex 0x0-0xffffffff>}]} port
[<portlist> | all] [permit | deny] | packet_content {offset_0-15 <hex 0x0-0xffffffff> <hex 0x0-
0xffffffff> <hex 0x0-0xffffffff> <hex 0x0-0xffffffff>| offset_16-31 <hex 0x0-0xffffffff> <hex 0x0-
0xffffffff> <hex 0x0-0xffffffff> <hex 0x0-0xffffffff> | offset_32-47 <hex 0x0-0xffffffff> <hex 0x0-
0xffffffff> <hex 0x0-0xffffffff> <hex 0x0-0xffffffff> | offset_48-63 <hex 0x0-0xffffffff> <hex 0x0-
0xffffffff> <hex 0x0-0xffffffff> <hex 0x0-0xffffffff> | offset_64-79 <hex 0x0-0xffffffff> <hex 0x0-
0xffffffff> <hex 0x0-0xffffffff> <hex 0x0-0xffffffff>} port [<portlist> | all] [permit | deny]] | delete
access_id <value 1-65535>]
show cpu
access_profile
profile_id <value 1-5>
show
cpu_interface_filtering
config flow_meter
[profile_id <value 1-255> | add access_id <value 1-65535> | rate <value 0-999936>
rate_exceed drop]
show flow_meter
Access profiles allow users to establish criteria to determine whether or not the Switch will forward packets based on the
information contained in each packet’s header.
Creating an access profile is divided into two basic parts. First, an access profile must be created using the
create access_profile
command. For example, if users want to deny all traffic to the subnet 10.42.73.0 to 10.42.73.255, users must first
create
an
access profile that instructs the Switch to examine all of the relevant fields of each frame.
First create an access profile that uses IP addresses as the criteria for examination:
create access_profile ip source_ip_mask 255.255.255.0 profile_id 1
Here we have created an access profile that will examine the IP field of each frame received by the Switch. Each source IP
address the Switch finds will be combined with the
source_ip_mask
with a logical AND operation. The profile_id parameter is
used to give the access profile an identifying number
−
in this case, 1 – and it is used to assign a priority in case a conflict occurs.
The profile_id establishes a priority within the list of profiles. A lower profile_id gives the rule a higher priority. In case of a
conflict in the rules entered for different profiles, the rule with the highest priority (lowest profile_id) will take precedence.
See
below for information regarding limitations on access profiles and access rules.
The
deny
parameter instructs the Switch to filter any frames that meet the criteria
−
in this case, when a logical AND operation
between an IP address specified in the next step and the
ip_source_mask
match.
The default for an access profile on the Switch is to
permit
traffic flow. If users want to restrict traffic, users must use the
deny
parameter.
Now that an access profile has been created, users must add the criteria the Switch will use to decide if a given frame should be
forwarded or filtered. We will use the
config access_profile
command to create a new rule that defines the criteria we want. Let’s
further specify in the new rule to deny access to a range of IP addresses through an individual port: Here, we want to filter any
packets that have an IP source address between 10.42.73.0 and 10.42.73.255, and specify the port that will not be allowed:
config access_profile profile_id 1 add access_id 1 ip source_ip 10.42.73.1 port 7 deny