From: asadovnikov (asadovnikov@comcast.net)
Date: Mon Jun 18 2007 - 12:43:04 ART
For me the question is very clear there and does not allow for an
interpretation that 'bad' traffic is generated on R6.
Having said that procter may always help providing the question is put right
(as he may not help if question is put wrong). Predicting what proctor may
or may not help with is not an exact sience especially when I can not hear
the exact question. My advise would be to not hesitate to ask, but also
remember as you asking that you and not the proctor are there to pass the
exam.
Best regards,
Alexei
-----Original Message-----
From: Biggs, Jeff (M/CIO/BIE) [mailto:JBiggs@usaid.gov]
Sent: Monday, June 18, 2007 7:39 AM
To: asadovnikov; ccielab@groupstudy.com
Subject: RE: NMC DOIT 5.14.3 QOS: Would this solution work?
Thanks Alexei. Sunday morning I got up and took a fresh look at this and
realized the issues after reviewing the Showit again (Permit instead of
deny), etc....
As far as the assumption that the "infected" device is behind R6, would that
be a question for the proctor (say if I were in the LAB)?
If I Explained that I understand the requirement for dropping packets
lengths 110, but should I assume the rouge device is not R6 itself, but
behind it? Would that be a valid question or would it be considered
"fishing" for an answer?
Jeffrey Biggs
Sr. Network Engineer
M/CIO/BIE
CCNP, CCDA
240-646-5003
jbiggs@usaid.gov
This e-mail is intended for the addressee only. If you are not the intended
recipient, please be aware that the unauthorised use or disclosure of the
information it contains, or the unauthorised copying or re-transmission of
the e-mail are strictly prohibited. Such action may result in legal
proceedings. If the e-mail has been sent to you in error, please accept our
apologies, advise the sender as soon as possible and then delete the
message. Under the Freedom of Information Act 2000 / Data Protection Act
1998, the contents of this e-mail, whether it is marked confidential or
otherwise, may be disclosed.
-----Original Message-----
From: nobody@groupstudy.com [mailto:nobody@groupstudy.com] On Behalf Of
asadovnikov
Sent: Sunday, June 17, 2007 4:08 PM
To: ccielab@groupstudy.com
Subject: RE: NMC DOIT 5.14.3 QOS: Would this solution work?
JB,
Here are some issues which I can see with your solution:
1) The logic of the policy map is to drop traffic which is matched by the
class and the class will match what is matched by the ACL.
As such you want the ACL to permit what you want to get dropped. For
example you want the ACL to permit traffic coming from
FEC0::16:6 and you ACL is denying it (versus to permitting) which will
result in result oposite to the intended.
2) The task says that the protocol and port are not known ('random'), which
is not the same as "undetermined-transport". The fact
that you do not know what transport will be does not mean that router
would not be able to detemine it. For example if the packet
happens to be ipv6 telnet packets, the router would not take it as
undetermined transport and hence ACE would not match it.
So if I were to re-write your solution to take care of two issues discussed
above (but not of the issue #3 discussed below) here is what I get:
class-map match-all FLOOD
match access-group name FLOODv6
match packet length min 110 max 110
!
policy-map FLOOD
class FLOOD
drop
!
ipv6 access-list FLOODv6
permit ipv6 host FEC0::146:6 host FEC0::146:1
permit ipv6 host FEC0::146:6 host FEC0::16:1
permit ipv6 host FEC0::146:6 host FEC0::12:1
permit ipv6 host FEC0::16:6 host FEC0::146:1
permit ipv6 host FEC0::16:6 host FEC0::16:1
permit ipv6 host FEC0::16:6 host FEC0::12:1
!
int fa0/0.16
Service-policy input FLOOD
int fa0/0.146
Service-policy input FLOOD
3) The task is looking for a solution for traffic which is not originated
and probably not terminated on routers of your POD.
If you think about real application, the flood attack would be coming
from outside of your network and will target hosts
within your network, then you can use filtering on you border router to
block the traffic. Imagine that there is a workstation
behind R6 which is infected with a virus and sending the traffic you are
trying to block.
This is what makes matching on mac address important, without such match
you can not distibguish packets coming via R4
(known good traffic) from packets coming from elsewhere (suspected bad
traffic), becouse you do not know what the actual
source or destination IPv6 addresses are.
Going back to the application example above, chances are that there is
not a virus on R6, so the only significance of
IPv6 addresses on R6 is that it allows you to test your solution, but
solution needs to accomadate for other IPv6 source
addresses.
Similary you should not make an assumption that packets are addressed to
R1, although in testing the solution you will
use IPv6 ping from R4 and R6 to R1.
HTH,
Alexei
-----Original Message-----
From: nobody@groupstudy.com [mailto:nobody@groupstudy.com] On Behalf Of
Jeffrey Biggs
Sent: Saturday, June 16, 2007 9:58 PM
To: ccielab@groupstudy.com
Cc: 'Biggs Jeff'
Subject: NMC DOIT 5.14.3 QOS: Would this solution work?
I am trying to prevent an IPV6 flood attack of random protocol,
source/destination and ports, but length is always 110. All packets are
attacking on the R1 from R6 (both interfaces below attach to R1). But no
problems from R4 (on the ::146:0 subnet). So block 110 length packets from
R6, but leave R4 alone. The solution on Netmasters shows them not matching
the MAC address of R4, but matching IPv6 traffic and Length. This is the
solution I came up with, I wanted to know if it would work.
Will it block R4 also?
class-map match-all FLOOD
match access-group name FLOODv6
match packet length min 110 max 110
!
policy-map FLOOD
class FLOOD
drop
!
ipv6 access-list FLOODv6
deny ipv6 host FEC0::146:6 host FEC0::146:1 undetermined-transport deny
ipv6 host FEC0::146:6 host FEC0::16:1 undetermined-transport deny ipv6 host
FEC0::146:6 host FEC0::12:1 undetermined-transport deny ipv6 host
FEC0::16:6 host FEC0::146:1 undetermined-transport deny ipv6 host
FEC0::16:6 host FEC0::16:1 undetermined-transport deny ipv6 host FEC0::16:6
host FEC0::12:1 undetermined-transport permit ipv6 any any !
int fa0/0.16
Service-policy input FLOOD
int fa0/0.146
Service-policy input FLOOD
Thanks,
JB
This archive was generated by hypermail 2.1.4 : Sun Jul 01 2007 - 17:24:49 ART