From: asadovnikov (asadovnikov@comcast.net)
Date: Sun Jun 17 2007 - 17:07:43 ART
JB,
Here are some issues which I can see with your solution:
1) The logic of the policy map is to drop traffic which is matched by the
class and the class will match what is matched by the ACL.
As such you want the ACL to permit what you want to get dropped. For
example you want the ACL to permit traffic coming from
FEC0::16:6 and you ACL is denying it (versus to permitting) which will
result in result oposite to the intended.
2) The task says that the protocol and port are not known ('random'), which
is not the same as "undetermined-transport". The fact
that you do not know what transport will be does not mean that router
would not be able to detemine it. For example if the packet
happens to be ipv6 telnet packets, the router would not take it as
undetermined transport and hence ACE would not match it.
So if I were to re-write your solution to take care of two issues discussed
above (but not of the issue #3 discussed below) here is what I get:
class-map match-all FLOOD
match access-group name FLOODv6
match packet length min 110 max 110
!
policy-map FLOOD
class FLOOD
drop
!
ipv6 access-list FLOODv6
permit ipv6 host FEC0::146:6 host FEC0::146:1
permit ipv6 host FEC0::146:6 host FEC0::16:1
permit ipv6 host FEC0::146:6 host FEC0::12:1
permit ipv6 host FEC0::16:6 host FEC0::146:1
permit ipv6 host FEC0::16:6 host FEC0::16:1
permit ipv6 host FEC0::16:6 host FEC0::12:1
!
int fa0/0.16
Service-policy input FLOOD
int fa0/0.146
Service-policy input FLOOD
3) The task is looking for a solution for traffic which is not originated
and probably not terminated on routers of your POD.
If you think about real application, the flood attack would be coming
from outside of your network and will target hosts
within your network, then you can use filtering on you border router to
block the traffic. Imagine that there is a workstation
behind R6 which is infected with a virus and sending the traffic you are
trying to block.
This is what makes matching on mac address important, without such match
you can not distibguish packets coming via R4
(known good traffic) from packets coming from elsewhere (suspected bad
traffic), becouse you do not know what the actual
source or destination IPv6 addresses are.
Going back to the application example above, chances are that there is
not a virus on R6, so the only significance of
IPv6 addresses on R6 is that it allows you to test your solution, but
solution needs to accomadate for other IPv6 source
addresses.
Similary you should not make an assumption that packets are addressed to
R1, although in testing the solution you will
use IPv6 ping from R4 and R6 to R1.
HTH,
Alexei
-----Original Message-----
From: nobody@groupstudy.com [mailto:nobody@groupstudy.com] On Behalf Of
Jeffrey Biggs
Sent: Saturday, June 16, 2007 9:58 PM
To: ccielab@groupstudy.com
Cc: 'Biggs Jeff'
Subject: NMC DOIT 5.14.3 QOS: Would this solution work?
I am trying to prevent an IPV6 flood attack of random protocol,
source/destination and ports, but length is always 110. All packets are
attacking on the R1 from R6 (both interfaces below attach to R1). But no
problems from R4 (on the ::146:0 subnet). So block 110 length packets from
R6, but leave R4 alone. The solution on Netmasters shows them not matching
the MAC address of R4, but matching IPv6 traffic and Length. This is the
solution I came up with, I wanted to know if it would work.
Will it block R4 also?
class-map match-all FLOOD
match access-group name FLOODv6
match packet length min 110 max 110
!
policy-map FLOOD
class FLOOD
drop
!
ipv6 access-list FLOODv6
deny ipv6 host FEC0::146:6 host FEC0::146:1 undetermined-transport
deny ipv6 host FEC0::146:6 host FEC0::16:1 undetermined-transport
deny ipv6 host FEC0::146:6 host FEC0::12:1 undetermined-transport
deny ipv6 host FEC0::16:6 host FEC0::146:1 undetermined-transport
deny ipv6 host FEC0::16:6 host FEC0::16:1 undetermined-transport
deny ipv6 host FEC0::16:6 host FEC0::12:1 undetermined-transport
permit ipv6 any any
!
int fa0/0.16
Service-policy input FLOOD
int fa0/0.146
Service-policy input FLOOD
Thanks,
JB
This archive was generated by hypermail 2.1.4 : Sun Jul 01 2007 - 17:24:49 ART