Alcatel-Lucent 6600 Switch User Manual


 
Using ACL Security Features Configuring ACLs
page 25-18 OmniSwitch 6600 Family Network Configuration Guide April 2006
Configuring a DisablePorts ACL
An additional method for dealing with spoofed IP traffic is to create a DisablePorts ACL that will adminis-
tratively disable ports that receive this type of traffic. To achieve this result, a policy action called
stringDisablePorts is available. Note that string represents text that the user enters as a required part of
the policy action and must be followed by DisablePorts (e.g., badDisablePorts).
Note the following when using the DisablePorts action:
Only routed traffic is affected by this action.
The DisablePorts action must be specified using the capitalization shown here and in the example ACL
below.
A disposition is not required with DisablePorts because a drop action is implied and interpreted as a
disable port function.
To restore disabled ports to enabled status, disconnect and reconnect the cable or use the
interfaces admin command to administratively enable the ports.
This feature can be used with source IP addresses and source MAC addresses.
A source IP address DisablePorts rule will disable a port that receives an IP packet that contains a
source IP address that does not match the rule or an ARP packet that contains a source protocol address
field that does not match the rule.
A source MAC address DisablePorts rule will disable a port that receives an IP packet that contains a
source MAC address that does not match the rule.
The DisablePorts action and the UserPorts port group are not mutually exclusive, both can be used
together in the same ACL.
Use the following steps to create a DisablePorts ACL that only allows traffic from a specific IP subnet on
specific source ports and disables those ports that receive traffic from other subnets. Two rules are
involved with this type of ACL: one rule denies all source IP addresses on certain ports and a second,
higher precedence rule only allows traffic from a specific subnet on those same ports.
1 Create a port group that identifies the ports to which the rule will apply. For example:
-> policy port group edgePorts 1/1-24 2/1-24
2 Create a condition that specifies all source IP addresses combined with a source port group that
contains the ports identified in Step 1. For example:
-> policy condition denyip source ip address 0.0.0.0 mask 0.0.0.0 source port
group edgePorts
3 Create another condition that specifies only IP addresses within a desired subnet combined with a
source port group that contains the ports identified in Step 1. For example:
-> policy condition allowip source ip address 198.18.1.0 mask 255.255.255.0
source port group edgePorts
4 Create a DisablePorts action with a string prefix, such as badDisablePorts, and an accept action. For
example:
-> policy action badDisablePorts
-> policy action PASS disposition accept