Creating Filters Using Command Line Interface 6-31

 

 

 

 

 

IPX

src-net

=, !=

 

Source IPX network (xx-xx-xx-xx)

 

dst-net

=, !=

 

Destination IPX network (xx-xx-xx-xx)

 

src-host

=, !=

 

Source IPX host node address (xx-xx-xx-xx-xx-xx)

 

dst-host

=, !=

 

Destination IPX host node address (xx-xx-xx-xx-xx-xx)

 

src-socket

all

 

Source IPX socket (0x1 - 0xFFFF)

 

dst-socket

all

 

Destination IPX socket (0x1 - 0xFFFF)

 

generic

=

 

Generic Filter

 

 

 

 

 

IPX-RIP

network

=, !=

 

IPX network (xx-xx-xx-xx)

 

 

 

 

 

IPX-SAP

network

=, !=

 

IPX network (xx-xx-xx-xx)

 

node

=, !=

 

IPX node (xx-xx-xx-xx-xx-xx)

 

server

=, !=

 

Server name (character string to 32 characters)

 

service-type

=, !=

 

Service type (0x0 - 0xFFFF)

 

socket

all

 

Socket (0x1 - 0xFFFF)

 

 

 

 

 

BR-ETH

src-addr

=, !=

 

Source MAC address (xx-xx-xx-xx-xx-xx)

 

dst-addr

=, !=

 

Destination MAC address (xx-xx-xx-xx-xx-xx)

 

generic

=

 

Generic filter

 

 

 

 

 

Generic Filter Rule The syntax for generic filters is slightly different than that for other filters:

<line #> <verb> GENERIC => ORIGIN = <FRAME > DATA>/OFFSET = <# of

bytes>/ LENGTH = <# of bytes>/MASK = < 0x Mask>/VALUE = <0x value>

ORIGIN - The location in the packet to start the offset count. This location can be at byte 0 (FRAME) or at the start of the protocol data (DATA).

OFFSET - The number of bytes from the origin to skip before comparing the value to the packet contents.

LENGTH - The number of bytes in the packet to compare to the value.

MASK - The mask to logically "and" with the packet contents before

￿comparing with the value (hex).

VALUE - The value (hex) to compare to the packet contents.

For example, a generic bridge filter to prevent all IP packets from being bridged is:

BR-ETH:

1reject generic=>origin=frame/offset=12/length=2/mask=0xFFFF/value=0x0800;

Applying the Rules The following sections provide detailed information and examples for creating Using CLI specific filters based on protocol.

IP Source and Destination Network Filtering Using CLI

Source and destination address filtering is generally used to limit permitted access to trusted hosts and networks only, to explicitly deny access to hosts and networks that are not trusted, or to limit external access to a given host (for example, a web server or a firewall).

Note that only the part of the IP address specified by the mask field is used in the comparison. If a match is found, the packet is forwarded (rules containing accept) or discarded (rules containing reject).

The following rule example allows forwarding of only IP packets with source addresses that match the first 16 bits of the given IP address (addresses beginning with 192.77):

Page 69
Image 69
3Com 812 manual IP Source and Destination Network Filtering Using CLI, Ipx