[c-nsp] IOS XR 4.3.4, control-plane policing, and NTP
Daniel Suchy
danny at danysek.cz
Sat Aug 2 12:03:51 EDT 2014
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello,
this should help:
lpts pifib hardware police
flow ntp default rate 0
Configured ntp servers uses "flow ntp known". There're many other HW
ratelimiters.
With regards,
Daniel
On 2.8.2014 17:27, Gert Doering wrote:
> Hiya,
>
> I'm confused. I have this new and shiny ASR9001 with IOS XR on it,
> with supposedly totally superior local services access control, and
> stuff.
>
> So, I configure:
>
> control-plane management-plane inband interface all allow all peer
> address ipv4 1.1.1.0/24 address ipv6 2001:1:1::/48 ! ! ! !
>
> (nothing else under control-plane/management-plane, addresses
> obviously faked)
>
> I can see that this works perfectly to restrict access to telnet
> and ssh to sources in 1.1.1.0/24 or 2001:1:1::/48 -- but at the
> same time, the box happily answers NTP packets, both "time query"
> as well as "status query", from all over the world.
>
> If I configure an explicit NTP ACL ("ntp access-group ipv* serve
> $ACL"), it stops answering the packet, but "debug ntp packet" tells
> me the packet is still arriving at the CPU level:
>
> RP/0/RSP0/CPU0:Aug 2 17:18:51.686 : ntpd[258]: Rx
> 213.95.27.20->193.149.45.3 on if 0x4000180[unnamed, flags:0x0/0x11]
> (48 bytes) RP/0/RSP0/CPU0:Aug 2 17:18:52.687 : ntpd[258]: Rx
> 213.95.27.20->193.149.45.3 on if 0x4000180[unnamed, flags:0x0/0x11]
> (48 bytes)
>
> ... so, what am I missing here? How do I stop NTP packets not
> coming from configured NTP servers (those are all inside
> "1.1.1.0/24") from arriving at the CPU level? (Yes, interface ACLs
> would work, of course, and when the box is in it's final location,
> incoming ACLs on all transit links will prevent packets to the box,
> but I still think its control plane policing should catch NTP
> packets just as well as SSH or SNMP)
>
> IOS XR 4.3.4, ASR 9001
>
> gert
>
>
>
> _______________________________________________ cisco-nsp mailing
> list cisco-nsp at puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp archive at
> http://puck.nether.net/pipermail/cisco-nsp/
>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iEYEARECAAYFAlPdC+UACgkQ0m6yQqKjWoLBlACghDQUQdhgbnZ46rBomBHJ2FVd
SuoAoKnBubVnVErNXbniBpIrb+sgbSQp
=kIbX
-----END PGP SIGNATURE-----
More information about the cisco-nsp
mailing list