xStack® DES-3528/DES-3552 Series Layer 2 Stackable Fast Ethernet Managed Switch Web UI Reference Guide
chunk0
B126,
B127,
B0,
B1
Example:
offset_chunk_1 0 0xffffffff will match packet byte offset 126,127,0,1
offset_chunk_1 0 0x0000ffff will match packet byte offset,0,1
With this advanced unique Packet Content Mask (also known as Packet Content Access Control List -
ACL), the
common ARP Spoofing attack that is wide spread today. This is why the Packet Content ACL
is able to inspect any specified content of a packet in different protocol layers.
Click the Select button to select an ACL type.
Click the Create button to create a profile.
Click the <<Back button to discard the changes made and return to the previous page.
After clicking the Show Details button, the following page will appear:
Click the Show All Profiles button to navigate back to the Access Profile List Page.
NOTE: Address Resolution Protocol (ARP) is the standard for finding a host's hardware address (MAC
address). However, ARP is vulnerable as it can be easily spoofed and utilized to attack a LAN (i.e.
an ARP spoofing attack). For a more detailed explanation on how ARP protocol works and how to
employ D-Link's unique Packet Content ACL to prevent ARP spoofing attack, please see Appendix
E at the end of this manual.
After clicking the Add/View Rules button, the following page will appear:
chunk1
chunk2
B2,
B6,
B3,
B7,
B4,
B8,
B5
B9
NOTE: Only one packet_content_mask profile can be created.
®
D-Link xStack
switch family can effectively mitigate some network attacks like the
Figure 7-19 Access Profile Detail Information (Packet Content ACL)
Figure 7-20 Access Rule List (Packet Content ACL)
......
chunk29
chunk30
......
B114,
B118,
B115,
B119,
B116,
B120,
B117
B121
181
chunk31
B122,
B123,
B124,
B125
Need help?
Do you have a question about the DES-3528 - xStack Switch - Stackable and is the answer not in the manual?
Questions and answers