D-Link dgs-3420 Work Light User Manual


 
xStack® DGS-3420 Series Layer 2 Managed Stackable Gigabit Switch CLI Reference Guide
904
Offset
Chunk
Offset
Chunk16
Offset
Chunk17
Offset
Chunk18
Offset
Chunk19
Offset
Chunk20
Offset
Chunk21
Offset
Chunk22
Offset
Chunk23
Offset
Chunk24
Offset
Chunk25
Offset
Chunk26
Offset
Chunk27
Offset
Chunk28
Offset
Chunk29
Offset
Chunk30
Offset
Chunk31
Byte
63 67 71 75 79 83 87 91 95 99 103 107 111 115 119 123
Byte
64 68 72 76 80 84 88 92 96 100 104 108 112 116 120 124
Byte
65 69 73 77 81 85 89 93 97 101 105 109 113 117 121 125
Byte
66 70 74 78 82 86 90 94 98 102 106 110 114 118 122 126
Table 1 - Chunk and Packet Offset
The following figure indicates a completed ARP packet contained in Ethernet frame which is the
pattern for the calculation of packet offset.
Figure 14 - A Completed ARP Packet Contained in an Ethernet Frame
Command Description
Step 1:
create access_profile profile_id 1
profile_name 1 ethernet source_mac
FF-FF-FF-FF-FF-FF ethernet_type
Create access profile 1 to match Ethernet
Type and Source MAC address.
Step 2:
config access_profile profile_id 1
add access_id 1 ethernet
source_mac 01-02-03-04-05-06
ethernet_type 0x806 port 1-12
permit
Configure access profile 1
Only if the gateway’s ARP packet that
contains the correct Source MAC in the
Ethernet frame can pass through the switch.
Step 3:
create access_profile profile_id 2
profile_name 2 packet_content_mask
offset_chunk_1 3 0xFFFF
offset_chunk_2 7 0xFFFF
offset_chunk_3 8 0xFFFF0000
Create access profile 2
The first chunk starts from Chunk 3 mask for
Ethernet Type. (Blue in Table 6, 13th and 14th
bytes)
The second chunk starts from Chunk 7 mask
for Sender IP in ARP packet. (Green in Table
6, 29th and 30th bytes)
The third chunk starts from Chunk 8 mask for
Sender IP in ARP packet. (Brown in Table 6,
31st and 32nd bytes)
Step 4:
config access_profile profile_id 2
add access_id 1 packet_content
offset_chunk_1 0x806
offset_chunk_2 0xA5A
offset_chunk_3 0x5A5A0000 port 1-
12 deny
Configure access profile 2.
The rest of the ARP packets whose Sender IP
claim they are the gateway’s IP will be
dropped.