[j-nsp] Firewall filter for locally generated packets

Ian MacKinnon ian.mackinnon at lumison.net
Thu Mar 27 12:33:13 EDT 2008


Hi all,

I am doing some work with PXE-booting of servers and using bootp helpers 
to get to the dhcp server.

All working fine so far.

However the dhcp response back to the server appears to be coming from 
the local interface directly, and our standard firewalling is dropping it.

I can open the firewall to allow all udp 67/68 packets through,but I 
would rather limit it.

Now I could add the local ip address to the rule, but have have a 
standard set of rules we apply to all interfaces, so if there is some 
way of specifying allow locally generated packets through that would be 
better.

eg
we have an interface with an ip address like 192.168.0.1/24
In syslog we see
Mar 27 16:05:41 my-router-01/my-router-01 /kernel: %FIREWALL-6-FW: 
.local..0    R  udp 192.168.0.1 255.255.255.255    67    68


ie the interface name is .local..0 and the source is 192.168.0.1


Our firewall rule then looks like :-
term permit_bootp_install {
     from {
         source-address {
             192.168.0.1/32;
         }
         protocol udp;
         destination-port [ 67 68 ];
     }
}


But rather than use the source-address what can I use for locally 
generated packets?

Thanks


-- 

This email and any files transmitted with it are confidential and intended 
solely for the use of the individual or entity to whom they are addressed.  
If you have received this email in error please notify the sender. Any 
offers or quotation of service are subject to formal specification.  
Errors and omissions excepted.  Please note that any views or opinions 
presented in this email are solely those of the author and do not 
necessarily represent those of Lumison, nplusone or lightershade ltd.  
Finally, the recipient should check this email and any attachments for the 
presence of viruses.  Lumison, nplusone and lightershade ltd accepts no 
liability for any damage caused by any virus transmitted by this email.



More information about the juniper-nsp mailing list