Catalyst Port ACLs
Catalyst Port ACLs (PACLs)
- Applied on L2 ports
- Only supported on ingress traffic
- Filter transit traffic on interface or VLAN
- MAC or IP based
- MAC only affects non-IP traffic
- Commands:
- (config)#mac access-list extended <name>
- (config-ext-macl)#<permit | deny> <any | src mac-address> <any | dst mac-address> <layer 2 options>
VLAN ACLs
VLAN ACLs (VACLs)
- Also known as VLAN maps
- Configuration similar to route-maps
- Need to work in opposite of ACLs
- Explicit deny of specific traffic
- Explicit permit everything else
- Applied to VLAN or SVI
- Effective for all ports in VLAN
- Controls IP and non-IP traffic
- Matches based on MAC ACL
- Configuration:
- Permit IP based traffic with ACL
- Apply ACL to vlan map
- Set action of traffic
- Commands:
- (config)#ip access-list [standard | extended] <ACL name>
- (config-ext-nacl)#permit | deny <protocol> <source> <destination> [eq <port number>]
- (config)#vlan access-map <name> <sequence number>
- (config-access-map)#match ip address <ACL name>
- (config-access-map)#action [drop | forward]
Unicast Reverse Path Forwarding (uRPF)
Unicast Reverse Path Forwarding (uRPF)
- Applied on interface
- Ingress traffic has source checked against CEF table
- Packets not matching are dropped
- Modes:
- Strict
- Reverse route must be via same interface packet arrived on
- Loose
- Reverse route can be via any interface
- Simplified bogon/martian filters
- e.g. traffic shouldn’t be source from multicast address, broadcast address, network address, RFC 1918 addresses etc.
- Command:
- (config-if)#ip verify source unicast source reachable via [any | rx]
- Can be used for Remotely Triggered Black Hole Filtering (RTBHF)
Flexible Packet Matching
Flexible Packet Matching (FPM)
- Uses Network-Based Application Recognition to discover packet types
- Use to match protocol information in the data plane
- e.g. HTTP packet and URL matching or different HTTP mime types
- Can create custom NBAR matches based on certain criteria
- eg match traffic with TEST in the first packet from the TCP source port of 1111
- Commands:
- (config)#ip nbar custom app_test1 <sequence> ascii TEST source port 1111
- (config-cmap)#match protocol app_test1
- Traffic can be selectively dropped
- Unconditional discard
- Policer with conform and transmit drop actions