[nsp] ip verify unicast not logging in ACL

Kinczli Zoltán Zoltan.Kinczli at Synergon.hu
Wed Nov 12 09:48:08 EST 2003


hello,

  not sure as with bgp session should or should not drop, but the supressed drops are
because you have 'reachable-via any' configured -- sorry, in my prev mail i was not accurate enough...

  the logic is -- according to a white paper on uRPF:

lookup src ip addr
if entry found
 if ignore-def (==allow-default) specified and entry is default
  do drop-login & return
 if src of pack is different from FIB
  if exist-only (==reachable-via any) specified
    count supressed drop
  else
   do drop-logic & return
 pass packet & return
else
do drop-logic & return

and the srop-logic is:

if spec addr
  pass pack
else if ACL permits
  count supressed drop
  pass packet
else
  count drop
  drop packet

 

  asic based platform's behaviour might look stange in therms of RPF, i seem to recall, that loggin is not available for packs forwarded by the hw/asic/pfc. Perhaps that's the reason you only see logging for pack, being received by the msfc itself.

On the BGP session close: Check the bgp session src in the FIB and check the I/F (for RPF) you receive packets carryig the BGP session.

  
regards
 -zoltan

-----Original Message-----
From: Sam Stickland [mailto:sam_ml at spacething.org]
Sent: Wednesday, November 12, 2003 2:56 PM
To: Kinczli Zoltán; Cisco Nsp
Cc: dr at cluenet.de
Subject: Re: [nsp] ip verify unicast not logging in ACL


Hmm... But if that's the case how come configuring:

access-list 199 ip any any deny log
!
int vlan x
  ip verify unicast source reachable-via any allow-default 199

Still only shows suppressed drops?

Trying it without any access-list at all still only shows supressed drops,
but appears to cause the BGP session to close. I was running with "debug ip
cef drops rpf" at the time, and it's only recorded entries like:

CEF-Drop-Suppress: Packet from a.b.c.d via VlanX -- ip verify check
(reachable via FastEthernet4/2)

So it says it's a supressed drop, but also that it's reachable via Fa4/2?
That doesn't seem to imply it's a packet that the FIB drop would check?

David, I don't currently have a TAC login to hand (not at the office). Could
you send me some details on cscdz05443 if you get a spare moment.

I'm definately getting a bit jumpy about using loose uRPF for this sort of
checking at all :/

Thanks for both the replies,

Sam

> hello,
>
>   drop: as its name suggests, packet was dropped
>
>   suppressed drop: the FIB check would drop, but the ACL (not available on
asic based platforms)
> supressed the drop, so the packet was passed finally
>
> rgds
>  z.
>
> -----Original Message-----
> From: Sam Stickland [mailto:sam_ml at spacething.org]
> Sent: Wednesday, November 12, 2003 1:58 PM
> To: Cisco Nsp
> Subject: Re: [nsp] ip verify unicast not logging in ACL
>
>
> Oh forgot to ask, what's the difference between a drop and suppressed
drop?
> I can make a couple of educated guesses, but it's not actually mentioned
in
> the documentation.
>
> Sam
>
> > Hi,
> >
> > I'm configuring some routers to drop packets sourced from IP addresses
> given
> > by the bogon servers, using loose uRPF. (Dropping packets with
> destinations
> > from the bogon servers is working fine.)
> >
> > I've tried the following (using a permit initially, just while I'm
> testing -
> > I don't want to actually drop the traffic).
> >
> > access-list 99 permit any log
> >
> > int vlan x
> >   ip verify unicast source reachable-via any allow-default 99
> >
> > If I do 'sh ip int vlan x' I can see
> >
> >   IP verify source reachable-via ANY, allow default, ACL 99
> >    0 verification drops
> >    80948 suppressed verification drops
> >
> > and the suppressed verification drops is rising pretty rapidly (which is
> > suprising since this interface carries less than a meg of traffic). But
> 'sh
> > access-list 99' only shows this (note the lack of a match counter):
> >
> > Standard IP access list 99 (Compiled)
> >     10 permit any log
> >
> > And there's nothing in the logs either. If I take away the ACL from the
> > statement, or change it to a deny I still get get no logs, but this time
> the
> > BGP session on that interface will drop, which it shouldn't do, so I'm
> > assuming the uRPF isn't functioning correctly :/
> >
> > Is there anything wrong with my config? Perhaps I'm hitting a IOS bug?
> This
> > on a Cat6500 running IOS 12.2(14)SY1
> >
> > Sam
> >
> >
> > _______________________________________________
> > cisco-nsp mailing list  cisco-nsp at puck.nether.net
> > https://puck.nether.net/mailman/listinfo/cisco-nsp
> > archive at http://puck.nether.net/pipermail/cisco-nsp/
> >
>
> _______________________________________________
> cisco-nsp mailing list  cisco-nsp at puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/
>




More information about the cisco-nsp mailing list