D-Link DES-3552 [96/260] Access profile table

D-Link DES-3552 [96/260] Access profile table
DES-3550 Fast Ethernet Layer 2 Switch
Access Profile Table
Configuring the Access Profile Table
Access profiles allow you to establish criteria to determine whether or not the Switch will forward packets based on the
information contained in each packet's header.
Note: Treatment of the Access Profile feature has been changed for the Release III version of the
firmware. There are also some restrictions on the use of access profiles on the Switch. For more
information on the changes for Release III and the limitations on access profiles, please read the CLI
Reference Manual’s discussion of Access Control Lists (ACL) Commands.
Creating an access profile is divided into two basic parts. The first is to specify which part or parts of a frame the Switch will
examine, such as the MAC source address or the IP destination address. The second part is entering the criteria the Switch
will use to determine what to do with the frame.
To display the currently configured Access Profiles on the Switch, open the Configuration folder and click on the Access
Profile Table link. This will open the Access Profile Table window, as shown below.
Figure 6- 53. Access Profile Table window
To add an entry to the Access Profile Table, click the Add button. This will open the Access Profile Configuration window,
as shown below. There are three Access Profile Configuration windows; one for Ethernet (or MAC address-based) profile
configuration, one for IP address-based profile configuration and one for the Packet Content Mask. You can switch between
the three Access Profile Configuration windows by using the Type drop-down menu. The window shown below is the
Access Profile Configuration window for Ethernet.
Note: Up to 9 Access Profiles may be created for the Switch. The Profile ID is used for relative
priority for an Access Profile should a conflict arise between a rule created in one profile and a rule
created in a different profile. Please read the CLI Reference Manual chapter dicussing Access
Control List (ACL) Commands.
82

Содержание

Скачать