Data Masking Components: IP Address
Search
OpenNavigationArticle
SSIS Data Masking Components
OpenNavigationArticle
Open Navigation Article
Data Masking Components: IP Address
  • Request Trial Request
    a trial
  • Request Demo Request
    a demo
  • Request Quote Request
    a quote

SSIS IP Address DATA MASKING COMPONENT


Description

 

 
The IP Address Masking component replaces an IP address with a randomly generated IP of the same format. It preserves the original IPv4 or IPv6 structure while maintaining the rules of the first octet (for IPv4) or the relevant prefix (for IPv6).

Usage Instructions:

1. Set up a source containing a column with IP address values (assuming a character data type).

+

2. Drag and drop the IP Address masking component. Connect the source to the IP Address data masking component using the source's precedence constraint:

3. The precedence constraint (the blue arrow) now passes the appropriate metadata to the IP Address component. If you click on constraint, you will see the metadata being passed:

+

4. Open the component editor:

+

5. In the Input Columns tab, select only the columns that need to be masked using the IP Address masking algorithm:

+

6. The component will create an additional column with the prefix Masked_:

+

7. Create a Connection Manager for the destination. Configure the Source component for the destination. In the Mappings tab of the Connection Manager, map the newly created Masked_Field column to replace the original value by:

  1. Clicking on the available input columns.

  2. Selecting the masked value.

  3. Mapping it to the appropriate “Available Destination Column”.

+

8. Now, all configurations for valid values are complete. You can run the package with the IP Address data masking component and view the masked results in the Destination component by clicking the Preview button.

+

Error Handling

9. If the package's source contains invalid values, error handling must be configured. Invalid values are those that do not conform to the entity’s rules. To manage these, each data masking component includes an error-handling precedence constraint.
To handle errors:
Create an error destination connection.
Connect the red arrow (error-handling constraint) to this destination.
Configure the error-handling behavior by selecting one of the following failure states:
Fail – Stops execution upon encountering an error.
Ignore – Continues execution without processing the invalid values.
Redirect – Sends invalid values to the specified error destination for further handling.
This ensures proper management of invalid data during the masking process.

+

10. It is recommended to redirect the output to the error destination for later analysis and data quality assessment. Errors from the IP Address data masking component are highly structured and difficult to break. Therefore, it is advisable to conduct a thorough analysis of the IP address data before determining the appropriate processing approach.

+


TutorialIcon Go to Documentation
About Hush-Hush Contact Us

E-mail: info@mask-me.net

tel: 855.968.4874

Privacy Policy Terms of Use