The following example policy demonstrates how these new tokens can be used to create “user profiles” where each user is identified by source MAC address:
twostage_example1.pol:
 # First stage rules:
 entry firststage_1 {
if{
    ethernet-source-address 00:00:00:00:00:01;
} then {
    class-id 7;
}}
entry firststage_2 {
if {
    ethernet-source-address 00:00:00:00:00:02;
} then {
    class-id 8;
}}entry firststage_3 {
if {
    ethernet-source-address 00:00:00:00:00:03;
} then {
    class-id 7;
}}
 # Second stage rules: 
entry secondstage_1 {
 if{ 
   class-id 7;
   destination-address 10.68.9.0/24;
} then {
    permit;
}}
entry secondstage_2 {
if {
    class-id 8;
    destination-address 10.68.0.0/16;
} then {
    permit;
}}entry secondstage_3 {
if {
} then {
    deny;
    }}
         Print
                        this page
Print
                        this page Email this topic
Email this topic Feedback
Feedback View PDF
View PDF Download EPUB
Download EPUB