The following example policy demonstrates how these new tokens can be used to create “user profiles” where each user is identified by source MAC address:
twostage_example1.pol:
# First stage rules:
entry firststage_1 {
if{
ethernet-source-address 00:00:00:00:00:01;
} then {
class-id 7;
}}
entry firststage_2 {
if {
ethernet-source-address 00:00:00:00:00:02;
} then {
class-id 8;
}}entry firststage_3 {
if {
ethernet-source-address 00:00:00:00:00:03;
} then {
class-id 7;
}}
# Second stage rules:
entry secondstage_1 {
if{
class-id 7;
destination-address 10.68.9.0/24;
} then {
permit;
}}
entry secondstage_2 {
if {
class-id 8;
destination-address 10.68.0.0/16;
} then {
permit;
}}entry secondstage_3 {
if {
} then
{entry permit_arp {
if {
ethernet-type 0x0806;
} then {
permit;
}
}
deny;
}}
Print
this page
Email this topic
Feedback