alcatel Lucent Configuring Packet Ip Filters
alcatel Lucent Configuring Packet Ip Filters
Alcatel-Lucent.ConfiguringPacket(IP)Filters
acketfilters (or in Cisco terminology Access Control Lists aka ACL) are one of the most used tools
in a network engineers tool set. Blocking telnet/ssh access, restricting specific traffic flows,
implementing policy-based routing or NATing all of these tasks use IP filters capabilities.
In this example Ill show you how to configure basic SSH-blocking IP filter on Alcatel-Lucent Service
Routing OS running TiMOS-B-12.0.R8 both/i386 ALCATEL SR 7750 Copyright (c) 2000-2015 AlcatelLucent .
According to the topology provided we will block SSH access to R1s system IP. This particular task
could be done in various ways, but we will configure IP filter on R2 (applied to R2s interface to_R4 in
the incoming direction).
1
2
3
4
5
http://noshut.ru/2015/06/alcatel-lucent-configuring-packet-ip-filters/
1/5
12/26/2015
6
7
8
9
10
11
12
13
14
15
16
[email protected]'s password:
Working, as expected. Good. Now lets block SSH access via IP filter configuration on R2:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
## Creating ip-filter
*A:R2# configure filter ip-filter 100 create
## Specifying match statement for TCP packets, since SSH uses TCP
*A:R2>config>filter>ip-filter>entry$ match protocol "tcp"
## Leaving "match" context and adding DROP action to this filter's entry
*A:R2>config>filter>ip-filter>entry>match$ back
*A:R2>config>filter>ip-filter>entry$ action drop
## Moving one step back to filter's context and addinf default action FORWARD, since implicitly it is D
*A:R2>config>filter>ip-filter>entry$ back
*A:R2>config>filter>ip-filter$ default-action forward
We created a simple IP filter, but it was not applied to any interface. Lets do this:
http://noshut.ru/2015/06/alcatel-lucent-configuring-packet-ip-filters/
2/5
12/26/2015
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
Done, filter has been applied to appropriate interface and now should be workingfully. Now retry to
make an ssh connection on R4 once again
Youuse show filter command to see the details of newly created filter along with # of packets
matched:
1
2
3
4
5
6
7
===============================================================================
IP Filter
===============================================================================
Filter Id: 100Applied: Yes
Scope: Template Def. Action: Forward
http://noshut.ru/2015/06/alcatel-lucent-configuring-packet-ip-filters/
3/5
12/26/2015
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
===============================================================================
MATCH-LISTANDPORTLIST
In the example above we used one ip address and one port to create our filter, but what if we need
tomatch on the wholerange of IP addresses and ports? You need to use match-list and port-list in this
case:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
*A:R1>config>filter# info
---------------------------------------------match-list
ip-prefix-list "3_routes" create
prefix 10.10.10.10/32
prefix 20.20.20.20/32
prefix 30.30.30.30/32
exit
port-list "allowed_ports" create
port 22
port 80
exit
exit
ip-filter 10 create
default-action forward
entry 10 create
match protocol tcp
dst-port port-list "allowed_ports"
src-ip ip-prefix-list "3_routes"
exit
action drop
exit
exit
----------------------------------------------
http://noshut.ru/2015/06/alcatel-lucent-configuring-packet-ip-filters/
4/5
12/26/2015
And thats all for this quick IP filter tutorial. You can always ask questions via comments form and
explore new filter capabilities by hitting Tab =)
noshut# exit all
About LatestPosts
RomanDodin
Network engineer at Alcatel-Lucent
0 Comments
Recommend
noshut
Share
Login
Sort by Oldest
WHAT'S THIS?
ALSO ON NOSHUT
Subscribe
http://noshut.ru/2015/06/alcatel-lucent-configuring-packet-ip-filters/
Privacy
5/5