[nsp] Cat3750G, IP ACL filtering

Gert Doering gert at greenie.muc.de
Sat Mar 6 05:53:37 EST 2004


Hi,

this thing is seriously trying to drive me nuts...

Cat3750G-24TS, c3750-i5-mz.121.14-EA1.bin

Customer connected to a directly routed GigE port.  Customer has a
windows machine, windows machine is infected with the "worm of the week"
(gracious LART *will* be applied) and is happily portscanning.

To stop the scanning while still letting the machine fulfill its
normal service, I try to setup an ACL, denying tcp/445.

interface GigabitEthernet1/0/6
 no switchport
 ip address 195.30.xx.xx 255.255.255.248
 ip access-group 150 in
 ip verify unicast reverse-path
 ip route-cache flow
 mdix auto
end

access-list 150 deny   tcp host 195.30.xx.yy any eq 135
access-list 150 deny   udp host 195.30.xx.yy any range netbios-ns netbios-dgm
access-list 150 permit tcp any any established
access-list 150 permit ip any any log

I can see lots of traffic on the interface:

     99096 packets input, 6773292 bytes, 0 no buffer

... but few-if-any hits on the ACL...

M15-Switch6#sh access-list 150
Extended IP access list 150
    deny tcp host 195.30.xx.yy any eq 135
    deny udp host 195.30.xx.yy any range netbios-ns netbios-dgm (1969 matches)
    permit tcp any any established
    permit ip any any log

(those are all local windows broadcasts)

... and the flow cache is also not populated at all ("show ip cache flow"
yields *no* output).


The machine *is* scanning like hell - I've put a filter on the next
router upstream, and it has caught *quite* some packets in the last 5
minutes:

Cisco-M#sh access-list 150
Extended IP access list 150
    10 deny tcp host 195.30.xx.yy any eq 135
    20 deny tcp host 195.30.xx.yy any eq 445 (39496 matches)
    30 deny tcp host 195.30.xx.yy any eq 139 (3111 matches)
    40 permit tcp any any established (163325 matches)
    50 permit ip host 195.30.xx.yy any log
    60 permit ip any any (59813 matches)

... but obviously the 3750G is another Cisco masterpiece: accept all the
normal commands, but blissfully ignore them.

I just HATE it if they do this.  They could at least print a message
"access-list ignored" or "netflow not supported on this platform".


Anyway.  There must be a way to filter "junk" packets on the 3750G as
well.  Any recommendations *how* to do this?  Using QoS/MCQ classes?

Is there a way to get this box to track what kind of packets it's
observing (netflow / ACL logging), or do you have to guess port numbers
and then setup MCQ for those?

Thanks for any help,

gert

-- 
USENET is *not* the non-clickable part of WWW!
                                                           //www.muc.de/~gert/
Gert Doering - Munich, Germany                             gert at greenie.muc.de
fax: +49-89-35655025                        gert at net.informatik.tu-muenchen.de


More information about the cisco-nsp mailing list