D-Link DWS-3160-24TC Reference Manual page 165

Dws-3160 series web ui reference guide gigabit ethernet unified switch
Hide thumbs Also See for DWS-3160-24TC:
Table of Contents

Advertisement

DWS-3160 Series Gigabit Ethernet Unified Switch Web UI Reference Guide
B0,
B1
Example:
offset_chunk_1 0 0xffffffff will match packet byte offset 126,127,0,1
offset_chunk_1 0 0x0000ffff will match packet byte offset,0,1
NOTE: Only one packet_content_mask profile can be created.
With this advanced unique Packet Content Mask (also known as Packet Content Access Control List -
ACL), the
common ARP Spoofing attack that is wide spread today. This is why the Packet Content
ACL is able to inspect any specified content of a packet in different protocol layers.
Click the Select button to select an ACL type.
Click the Create button to create a profile.
Click the <<Back button to discard the changes made and return to the previous window.
After clicking the Show Details button, the following page will appear:
Click the Show All Profiles button to navigate back to the Access Profile List Page.
NOTE: Address Resolution Protocol (ARP) is the standard for finding a host's hardware address (MAC
address). However, ARP is vulnerable as it can be easily spoofed and utilized to attack a LAN
(i.e. an ARP spoofing attack). For a more detailed explanation on how ARP protocol works and
how to employ D-Link's unique Packet Content ACL to prevent ARP spoofing attack, please
see Appendix E at the end of this manual.
After clicking the Add/View Rules button, the following page will appear:
Click the Add Rule button to create a new ACL rule in this profile.
Click the <<Back button to return to the previous window.
Click the Show Details button to view more information about the specific rule created.
Click the Delete Rules button to remove the specific entry.
Enter a page number and click the Go button to navigate to a specific page when multiple pages exist.
After clicking the Add Rule button, the following page will appear:
B4,
B8,
B5
B9
D-Link switch family can effectively mitigate some network attacks like the
Figure 10-19 Access Profile Detail Information (Packet Content ACL)
Figure 10-20 Access Rule List (Packet Content ACL)
B116,
B120,
B117
B121
160
B124,
B125

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Dws-3160 seriesDws-3160-24pc

Table of Contents