[rbak-nsp] Policy access-list

Bartek Mickiewicz bmtych at gmail.com
Mon Jul 15 05:58:24 EDT 2019


I've tried to use ACL like this:
seq 30 permit tcp host xx.xx.xx.xx any eq 88
With two combinations of denying traffic to port 88
seq 40 deny tcp any any eq 88- does nothing, all incoming traffic is
allowed

seq 40 deny tcp any eq 888 - blocks all traffic from everywhere.
There is no acl from 1-29.

On Mon, 15 Jul 2019, 10:49 Анатолий Соломатин, <solomatin.av at gmail.com>
wrote:

> Your configuration should work. The context in the formard policy is
> probably incorrect or in AСL there are rules 1-95, where traffic from srсIP
> to port 8080
>
> 92
>
> Forward-Policy
>
> No
>
> Yes
>
> Yes
>
> String. Attaches an in or out forward policy to the subscriber session.
> The forward policy is in the following format
>
> *in:forward-policy-name*
>
> out:forward-policy-name
> OR
>  radius service profile BALANCE
>   parameter value URL
>   accounting in circuit
>   seq 10 attribute HTTP-Redirect-url $URL
>   *seq 20 attribute Forward-Policy in UNPAID*
>   seq 200 attribute Service-Interim-Accounting 1800
>
> But I do not understand why use Forward-policy ...
> If it is necessary to prohibit, then AСL should be used. If you need a
> forward, it is not configured where to send traffic.
>
> P.S. Google translation
>
>
> пн, 15 июл. 2019 г. в 11:21, Bartek Mickiewicz <bmtych at gmail.com>:
>
>> Maybe my question was not clear enough.
>> My client use pppoe for Internet access, radius assigns forward policy
>> which uses ip access-group.
>>
>> forward policy FP-DEFAULT
>>  ip access-group ACL-DEFAULT r01
>>   class Permit
>>   class Deny
>>    drop
>>
>>
>>  policy access-list ACL-DEFAULT
>>   seq 96 permit tcp host xxx.xxx.xxx.xxx any eq 8080 class Permit
>>   seq 97 permit tcp host yyy.yyy.yyy.yyy any eq 8080 class Permit
>>   seq 98 permit tcp any any eq 8080 class Deny
>>
>> On Fri, 12 Jul 2019, 10:59 Анатолий Соломатин, <solomatin.av at gmail.com>
>> wrote:
>>
>>> Redbuk traffic is controlled by the ACL or/and QoS policy.
>>> Example
>>> 1) ACL
>>>  ip access-list CONTROL_DNS_NTP_USER
>>>   seq 1000 deny udp any neq domain any eq domain
>>>   seq 1001 deny udp any neq ntp any eq ntp
>>>   seq 1100 permit ip any any
>>> !
>>>  subscriber default
>>>    ip access-group  CONTROL_DNS_NTP_USER   out
>>> !
>>> 2) QoS Policy (policing or metering)
>>> context USER
>>>  policy access-list REDBACK_IN
>>>   seq 96 permit tcp host xx.xx.xx.xx any eq 88 class Permit
>>>   seq 97 permit tcp host yy.yy.yy.yy any eq 88 class Permit
>>>   seq 98 permit tcp any any eq 88 class Deny
>>>  exit
>>> exit
>>> !
>>> (config)#qos policy  REDBACK_IN  policing
>>>  ip access-group REDBACK_IN USER
>>>   class Permit
>>>   class Deny
>>>    drop
>>>   exit
>>> !
>>> context USER
>>> subscriber default
>>>  qos policy policing REDBACK_IN
>>>
>>> пт, 12 июл. 2019 г. в 12:53, Bartek Mickiewicz <bmtych at gmail.com>:
>>>
>>>> I've used your acl but without effect, still can access port 88 from
>>>> other IP's than x and y. Those three statements are my first three in ACL.
>>>>
>>>> On Fri, 12 Jul 2019, 09:36 Анатолий Соломатин, <solomatin.av at gmail.com>
>>>> wrote:
>>>>
>>>>> HI,
>>>>> seq 96 permit tcp host xx.xx.xx.xx any eq 88 class Permit
>>>>> seq 97 permit tcp host yy.yy.yy.yy any eq 88 class Permit
>>>>> seq 98 permit tcp any any eq 88 class Deny
>>>>>
>>>>> "
>>>>> 1.1.2   IP ACL Statements (Rules)
>>>>> <http://localhost:9032/alexserv?AC=LINK&ID=26857&FN=35_1543-CRA1191170_1-V1Uen.M.html&PA=access-list&ST=FULLTEXT#TOP>
>>>>> In IP ACLs, each rule defines the action, either permit or deny, to
>>>>> be taken for a packet if the packet satisfies the rule. A *permit*
>>>>> statement causes any packet matching the criteria to be accepted. A
>>>>> *deny* statement causes any packet matching the criteria to be
>>>>> dropped. A packet that does not match the criteria of the first statement
>>>>> is subjected to the criteria of the second statement, and so on, until the
>>>>> end of the IP ACL is reached; at which point, the packet is dropped
>>>>> due to an implicit *deny any any* statement at the end of every IP ACL
>>>>> ."
>>>>>
>>>>> пт, 12 июл. 2019 г. в 11:49, Bartek Mickiewicz <bmtych at gmail.com>:
>>>>>
>>>>>> Hi,
>>>>>> I'm having problem with policy access-list. I want to block all
>>>>>> incoming connections to port 88 and allow two IP addresses to access that
>>>>>> port.
>>>>>> I've tried:
>>>>>> seq 98 permit tcp any any eq 88 class Deny
>>>>>> seq 103 permit tcp host xx.xx.xx.xx any eq 88 class Permit
>>>>>> seq 103 permit tcp host yy.yy.yy.yy any eq 88 class Permit
>>>>>> _______________________________________________
>>>>>> redback-nsp mailing list
>>>>>> redback-nsp at puck.nether.net
>>>>>> https://puck.nether.net/mailman/listinfo/redback-nsp
>>>>>>
>>>>>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://puck.nether.net/pipermail/redback-nsp/attachments/20190715/bcb68179/attachment.htm>


More information about the redback-nsp mailing list