[rbak-nsp] Policy access-list

Анатолий Соломатин solomatin.av at gmail.com
Mon Jul 15 04:49:26 EDT 2019


Your configuration should work. The context in the formard policy is
probably incorrect or in AСL there are rules 1-95, where traffic from srсIP
to port 8080

92

Forward-Policy

No

Yes

Yes

String. Attaches an in or out forward policy to the subscriber session. The
forward policy is in the following format

*in:forward-policy-name*

out:forward-policy-name
OR
 radius service profile BALANCE
  parameter value URL
  accounting in circuit
  seq 10 attribute HTTP-Redirect-url $URL
  *seq 20 attribute Forward-Policy in UNPAID*
  seq 200 attribute Service-Interim-Accounting 1800

But I do not understand why use Forward-policy ...
If it is necessary to prohibit, then AСL should be used. If you need a
forward, it is not configured where to send traffic.

P.S. Google translation


пн, 15 июл. 2019 г. в 11:21, Bartek Mickiewicz <bmtych at gmail.com>:

> Maybe my question was not clear enough.
> My client use pppoe for Internet access, radius assigns forward policy
> which uses ip access-group.
>
> forward policy FP-DEFAULT
>  ip access-group ACL-DEFAULT r01
>   class Permit
>   class Deny
>    drop
>
>
>  policy access-list ACL-DEFAULT
>   seq 96 permit tcp host xxx.xxx.xxx.xxx any eq 8080 class Permit
>   seq 97 permit tcp host yyy.yyy.yyy.yyy any eq 8080 class Permit
>   seq 98 permit tcp any any eq 8080 class Deny
>
> On Fri, 12 Jul 2019, 10:59 Анатолий Соломатин, <solomatin.av at gmail.com>
> wrote:
>
>> Redbuk traffic is controlled by the ACL or/and QoS policy.
>> Example
>> 1) ACL
>>  ip access-list CONTROL_DNS_NTP_USER
>>   seq 1000 deny udp any neq domain any eq domain
>>   seq 1001 deny udp any neq ntp any eq ntp
>>   seq 1100 permit ip any any
>> !
>>  subscriber default
>>    ip access-group  CONTROL_DNS_NTP_USER   out
>> !
>> 2) QoS Policy (policing or metering)
>> context USER
>>  policy access-list REDBACK_IN
>>   seq 96 permit tcp host xx.xx.xx.xx any eq 88 class Permit
>>   seq 97 permit tcp host yy.yy.yy.yy any eq 88 class Permit
>>   seq 98 permit tcp any any eq 88 class Deny
>>  exit
>> exit
>> !
>> (config)#qos policy  REDBACK_IN  policing
>>  ip access-group REDBACK_IN USER
>>   class Permit
>>   class Deny
>>    drop
>>   exit
>> !
>> context USER
>> subscriber default
>>  qos policy policing REDBACK_IN
>>
>> пт, 12 июл. 2019 г. в 12:53, Bartek Mickiewicz <bmtych at gmail.com>:
>>
>>> I've used your acl but without effect, still can access port 88 from
>>> other IP's than x and y. Those three statements are my first three in ACL.
>>>
>>> On Fri, 12 Jul 2019, 09:36 Анатолий Соломатин, <solomatin.av at gmail.com>
>>> wrote:
>>>
>>>> HI,
>>>> seq 96 permit tcp host xx.xx.xx.xx any eq 88 class Permit
>>>> seq 97 permit tcp host yy.yy.yy.yy any eq 88 class Permit
>>>> seq 98 permit tcp any any eq 88 class Deny
>>>>
>>>> "
>>>> 1.1.2   IP ACL Statements (Rules)
>>>> <http://localhost:9032/alexserv?AC=LINK&ID=26857&FN=35_1543-CRA1191170_1-V1Uen.M.html&PA=access-list&ST=FULLTEXT#TOP>
>>>> In IP ACLs, each rule defines the action, either permit or deny, to be
>>>> taken for a packet if the packet satisfies the rule. A *permit*
>>>> statement causes any packet matching the criteria to be accepted. A
>>>> *deny* statement causes any packet matching the criteria to be
>>>> dropped. A packet that does not match the criteria of the first statement
>>>> is subjected to the criteria of the second statement, and so on, until the
>>>> end of the IP ACL is reached; at which point, the packet is dropped
>>>> due to an implicit *deny any any* statement at the end of every IP ACL
>>>> ."
>>>>
>>>> пт, 12 июл. 2019 г. в 11:49, Bartek Mickiewicz <bmtych at gmail.com>:
>>>>
>>>>> Hi,
>>>>> I'm having problem with policy access-list. I want to block all
>>>>> incoming connections to port 88 and allow two IP addresses to access that
>>>>> port.
>>>>> I've tried:
>>>>> seq 98 permit tcp any any eq 88 class Deny
>>>>> seq 103 permit tcp host xx.xx.xx.xx any eq 88 class Permit
>>>>> seq 103 permit tcp host yy.yy.yy.yy any eq 88 class Permit
>>>>> _______________________________________________
>>>>> redback-nsp mailing list
>>>>> redback-nsp at puck.nether.net
>>>>> https://puck.nether.net/mailman/listinfo/redback-nsp
>>>>>
>>>>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://puck.nether.net/pipermail/redback-nsp/attachments/20190715/69818278/attachment-0001.htm>


More information about the redback-nsp mailing list