RE: NMC DOIT 5.14.3 QOS: Would this solution work?

From: asadovnikov (asadovnikov@comcast.net)
Date: Sun Jun 17 2007 - 17:07:43 ART


JB,

Here are some issues which I can see with your solution:

1) The logic of the policy map is to drop traffic which is matched by the
class and the class will match what is matched by the ACL.
    As such you want the ACL to permit what you want to get dropped. For
example you want the ACL to permit traffic coming from
    FEC0::16:6 and you ACL is denying it (versus to permitting) which will
result in result oposite to the intended.

2) The task says that the protocol and port are not known ('random'), which
is not the same as "undetermined-transport". The fact
    that you do not know what transport will be does not mean that router
would not be able to detemine it. For example if the packet
    happens to be ipv6 telnet packets, the router would not take it as
undetermined transport and hence ACE would not match it.

So if I were to re-write your solution to take care of two issues discussed
above (but not of the issue #3 discussed below) here is what I get:

    class-map match-all FLOOD
     match access-group name FLOODv6
     match packet length min 110 max 110
    !
    policy-map FLOOD
     class FLOOD
       drop
    !
    ipv6 access-list FLOODv6
     permit ipv6 host FEC0::146:6 host FEC0::146:1
     permit ipv6 host FEC0::146:6 host FEC0::16:1
     permit ipv6 host FEC0::146:6 host FEC0::12:1
     permit ipv6 host FEC0::16:6 host FEC0::146:1
     permit ipv6 host FEC0::16:6 host FEC0::16:1
     permit ipv6 host FEC0::16:6 host FEC0::12:1
    !
    int fa0/0.16
     Service-policy input FLOOD
    int fa0/0.146
     Service-policy input FLOOD

3) The task is looking for a solution for traffic which is not originated
and probably not terminated on routers of your POD.
    If you think about real application, the flood attack would be coming
from outside of your network and will target hosts
    within your network, then you can use filtering on you border router to
block the traffic. Imagine that there is a workstation
    behind R6 which is infected with a virus and sending the traffic you are
trying to block.

    This is what makes matching on mac address important, without such match
you can not distibguish packets coming via R4
    (known good traffic) from packets coming from elsewhere (suspected bad
traffic), becouse you do not know what the actual
    source or destination IPv6 addresses are.

    Going back to the application example above, chances are that there is
not a virus on R6, so the only significance of
    IPv6 addresses on R6 is that it allows you to test your solution, but
solution needs to accomadate for other IPv6 source
    addresses.

    Similary you should not make an assumption that packets are addressed to
R1, although in testing the solution you will
    use IPv6 ping from R4 and R6 to R1.

HTH,
Alexei

-----Original Message-----
From: nobody@groupstudy.com [mailto:nobody@groupstudy.com] On Behalf Of
Jeffrey Biggs
Sent: Saturday, June 16, 2007 9:58 PM
To: ccielab@groupstudy.com
Cc: 'Biggs Jeff'
Subject: NMC DOIT 5.14.3 QOS: Would this solution work?

I am trying to prevent an IPV6 flood attack of random protocol,
source/destination and ports, but length is always 110. All packets are
attacking on the R1 from R6 (both interfaces below attach to R1). But no
problems from R4 (on the ::146:0 subnet). So block 110 length packets from
R6, but leave R4 alone. The solution on Netmasters shows them not matching
the MAC address of R4, but matching IPv6 traffic and Length. This is the
solution I came up with, I wanted to know if it would work.

Will it block R4 also?

class-map match-all FLOOD
 match access-group name FLOODv6
 match packet length min 110 max 110
!
policy-map FLOOD
 class FLOOD
   drop
!
ipv6 access-list FLOODv6
 deny ipv6 host FEC0::146:6 host FEC0::146:1 undetermined-transport
 deny ipv6 host FEC0::146:6 host FEC0::16:1 undetermined-transport
 deny ipv6 host FEC0::146:6 host FEC0::12:1 undetermined-transport
 deny ipv6 host FEC0::16:6 host FEC0::146:1 undetermined-transport
 deny ipv6 host FEC0::16:6 host FEC0::16:1 undetermined-transport
 deny ipv6 host FEC0::16:6 host FEC0::12:1 undetermined-transport
 permit ipv6 any any
!
int fa0/0.16
 Service-policy input FLOOD
int fa0/0.146
 Service-policy input FLOOD

Thanks,
JB



This archive was generated by hypermail 2.1.4 : Sun Jul 01 2007 - 17:24:49 ART