16.03.2014 Views

Policy Framework Configuration Guide - Juniper Networks

Policy Framework Configuration Guide - Juniper Networks

Policy Framework Configuration Guide - Juniper Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Junos 10.4 <strong>Policy</strong> <strong>Framework</strong> <strong>Configuration</strong> <strong>Guide</strong><br />

Configuring VPLS Match Conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209<br />

Configuring Layer 2 Bridging Match Conditions for MX Series Ethernet Services<br />

Routers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214<br />

Overview of Protocol Match Conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217<br />

Example: Matching on Destination Port and Protocol Fields . . . . . . . . . . . . . . . . 218<br />

Overview of Class-Based Match Conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219<br />

How to Specify Firewall Filter Match Conditions . . . . . . . . . . . . . . . . . . . . . . . . . 220<br />

Numeric and Text Values in Match Conditions . . . . . . . . . . . . . . . . . . . . . . . 220<br />

Prefixes in Match Conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221<br />

Bit-Field Values in Match Conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224<br />

Configuring Actions in Firewall Filter Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226<br />

Example: Counting and Sampling Accepted Packets . . . . . . . . . . . . . . . . . . 231<br />

Example: Setting the DSCP Bit to Zero . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233<br />

Configuring Nested Firewall Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233<br />

Example: Configuring Nested Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234<br />

Applying Firewall Filters to Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235<br />

Configuring Interface-Specific Counters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236<br />

Example: Configuring Interface-Specific Counters . . . . . . . . . . . . . . . . . 237<br />

Defining Interface Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237<br />

Example: Defining Interface Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238<br />

Overview of Firewall Filter Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239<br />

Firewall Filter Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244<br />

Example: Blocking Telnet and SSH Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244<br />

Example: Blocking TFTP Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245<br />

Example: Accepting DHCP Packets with Specific Addresses . . . . . . . . . . . . . . . 245<br />

Example: Defining a Policer for a Destination Class . . . . . . . . . . . . . . . . . . . . . . . 246<br />

Example: Counting IP Option Packets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246<br />

Example: Counting and Discarding IP Options Packets . . . . . . . . . . . . . . . . . . . . 247<br />

Example: Accepting OSPF Packets from Certain Addresses . . . . . . . . . . . . . . . . 248<br />

Example: Matching Packets Based on Two Unrelated Criteria . . . . . . . . . . . . . . 248<br />

Example: Counting Both Accepted and Rejected Packets . . . . . . . . . . . . . . . . . . 249<br />

Example: Blocking TCP Connections to a Certain Port Except from BGP<br />

Peers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250<br />

Example: Accepting Packets with Specific IPv6 TCP Flags . . . . . . . . . . . . . . . . . 250<br />

Example: Setting a Rate Limit for Incoming Layer 2 Control Packets . . . . . . . . . . 251<br />

Configuring Service Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252<br />

Configuring Simple Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253<br />

Example: Configuring a Simple Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254<br />

Configuring Firewall Filters for Logical Systems . . . . . . . . . . . . . . . . . . . . . . . . . . 255<br />

<strong>Guide</strong>lines for Firewall <strong>Configuration</strong> in Logical Systems . . . . . . . . . . . . . . . 256<br />

Scenario 1: Firewall Objects Reference Other Firewall Objects . . . . . . . 256<br />

Scenario 2: Nonfirewall Objects Reference Firewall Objects . . . . . . . . . 257<br />

Scenario 3: Firewall Objects Reference Nonfirewall Objects . . . . . . . . . 261<br />

Unsupported <strong>Configuration</strong> Statements, Actions, and Action Modifiers . . . 263<br />

Configuring Accounting for Firewall Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268<br />

Configuring Filter-Based Forwarding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269<br />

Examples: Configuring Filter-Based Forwarding . . . . . . . . . . . . . . . . . . . . . . 270<br />

xiv<br />

Copyright © 2010, <strong>Juniper</strong> <strong>Networks</strong>, Inc.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!