Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
en:dpi:dpi_components:platform:subscriber_management:subsman_cmd:start [2023/12/05 14:52] – elena.krasnobryzh | en:dpi:dpi_components:platform:subscriber_management:subsman_cmd:start [Unknown date] (current) – removed - external edit (Unknown date) 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== Management of policing and services ====== | ||
- | {{indexmenu_n> | ||
- | Subscribers' | ||
- | |||
- | <note important> | ||
- | |||
- | ===== Command syntax ===== | ||
- | |||
- | General command format: | ||
- | <code bash> | ||
- | fdpi_ctrl command { --service service_identifier | --policing policing_description_file} [IP_list] [LOGIN_list] | ||
- | </ | ||
- | |||
- | Here ' | ||
- | <code bash> | ||
- | load : load data | ||
- | del : remove. You have to specify ' | ||
- | list : show the information on the specified ' | ||
- | </ | ||
- | |||
- | service_identifier - is one of these values or their comma separated list: | ||
- | < | ||
- | 1 - bonus program | ||
- | 2 - advertising | ||
- | 3 - block advertisements | ||
- | 4 - block list filtering | ||
- | 5 - allow list and Captive Portal | ||
- | 6 - notification via HTTP redirect | ||
- | 7 - caching | ||
- | 8 - DDos protection passed | ||
- | 9 - RADIUS accounting / collect netflow statistics for billing | ||
- | 10 - DDOS protection | ||
- | 11 - CGNAT and NAT 1:1 | ||
- | 12 - traffic recording in PCAP | ||
- | 13 - mini-Firewall | ||
- | 14 - traffic diversion to the TAP interface | ||
- | 15 - specific subscriber (all traffic is placed in cs0, no filtering (4 service) is applied for vChannel and shared channel) | ||
- | 16 - allow list and redirecting to Captive Portal when there is no access to the Internet | ||
- | 17 - traffic mirroring to a specified VLAN | ||
- | 18 - session policing for certain protocols and traffic class definition at channel and subscriber levels | ||
- | 19 - destination IP spoofing for DNS traffic | ||
- | 49 - IPv6 traffic blocking | ||
- | 50 - member of a marketing campaign with notification via HTTP redirect | ||
- | 51 - reserved (internal) | ||
- | 254 - VRF | ||
- | </ | ||
- | |||
- | <note tip>When blocking services are activated (4, 16, 49), only TCP traffic is blocked. To block UDP traffic as well, you must [[en: | ||
- | |||
- | IP_list | ||
- | < | ||
- | --file | ||
- | --ip - a single IP | ||
- | --ip_range - inclusive IP range | ||
- | --cidr | ||
- | </ | ||
- | |||
- | You can exclude reserved addresses from the CIDR range (by classless convention, these are gateway and broadcast addresses) by adding the “~” symbol to the range definition at the end of the cidr definition, for example –cidr 5.200.43.0/ | ||
- | |||
- | LOGIN_list | ||
- | <code bash> | ||
- | --login USER1 | ||
- | --login " | ||
- | </ | ||
- | |||
- | IP list or LOGIN can be specified as: | ||
- | <code bash> | ||
- | 192.168.0.1 | ||
- | 192.168.0.1-192.168.0.5 inclusive IP range | ||
- | 192.168.0.0/ | ||
- | " | ||
- | ' | ||
- | </ | ||
- | |||
- | Lines starting from '#' | ||
- | |||
- | <note important> | ||
- | |||
- | ===== Examples ===== | ||
- | |||
- | To get the policing application list: | ||
- | <code bash> | ||
- | fdpi_ctrl list all --policing | ||
- | </ | ||
- | |||
- | To get the list of subscribers with active service 1: | ||
- | <code bash> | ||
- | fdpi_ctrl list all --service 1 | ||
- | </ | ||
- | |||
- | To get the information for specified IP: | ||
- | <code bash> | ||
- | fdpi_ctrl list --policing | ||
- | fdpi_ctrl list --service 1 --ip 192.168.0.1 | ||
- | </ | ||
- | |||
- | To activate service 1: | ||
- | <code bash> | ||
- | fdpi_ctrl load --service 1 --ip 192.168.0.1 | ||
- | or | ||
- | fdpi_ctrl load --service 1 --login USER1 | ||
- | </ | ||
- | |||
- | To activate policing: | ||
- | <code bash> | ||
- | fdpi_ctrl load --policing tbf.cfg --ip 192.168.0.1 | ||
- | </ | ||
- | |||
- | To disable service 1: | ||
- | <code bash> | ||
- | fdpi_ctrl del --service 1 --ip 192.168.0.1 | ||
- | </ | ||
- | |||
- | One can specify several options ' | ||
- | <code bash> | ||
- | fdpi_ctrl list --service 1 --ip 192.168.0.1 --ip 192.168.0.2 --file fip_1.txt --ip_range 192.168.0.3-192.168.0.6 --login USER1 | ||
- | </ | ||
- | This action would be applied to all elements that do not cause any errors. | ||
- | |||
- | <note warning> | ||
- | |||
- | Detailed description on policing and services' | ||
- | |||
- | ===== Configuring TCP and UDP protocol blocking ===== | ||
- | The '' | ||
- | |||
- | To start blocking UDP protocols (e.g. QUIC), it is necessary to add the '' | ||
- | <code bash> | ||
- | udp_block=3 | ||
- | </ | ||
- | |||
- | Adding a parameter does not require a DPI restart, just a reload: | ||
- | <code bash> | ||
- | service fastdpi reload | ||
- | </ | ||