16.03.2014 Views

Policy Framework Configuration Guide - Juniper Networks

Policy Framework Configuration Guide - Juniper Networks

Policy Framework Configuration Guide - Juniper Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 8: Introduction to Firewall Filters<br />

If a packet arrives on an interface and a firewall filter is not configured for the incoming<br />

traffic on that interface, the packet is accepted by default.<br />

Match Conditions<br />

Match conditions are the fields or values that the packet must contain. You can define<br />

various match conditions, including the IP source address field, IP destination address<br />

field, TCP or User Datagram Protocol UDP source port field, IP protocol field, Internet<br />

Control Message Protocol (ICMP) packet type, IP options, TCP flags, incoming logical or<br />

physical interface, and outgoing logical or physical interface.<br />

Actions<br />

Within a single term, all the match conditions configured must match the packet before<br />

the configured action is taken on the packet. For a single match condition configured<br />

with multiple values, such as a range of values, only one of the values must match the<br />

packet before the match occurs and the configured action is taken on the packet.<br />

Actions fall into the following categories:<br />

• Terminating—A terminating action halts all evaluation of a firewall filter for a specific<br />

packet. The router performs the specified action, and no additional terms are examined.<br />

• Nonterminating<br />

• Actions—Nonterminating actions are used to perform other functions on a packet,<br />

such as incrementing a counter, logging information about the packet header,<br />

sampling the packet data, or sending information to a remote host using the system<br />

log functionality.<br />

• Next Term—The action next term enables the router to perform configured actions<br />

on the packet and then evaluate the following term in the filter, rather than<br />

terminating the filter. If the next term action is included, the matching packet is then<br />

evaluated against the next term in the firewall filter; otherwise, the matching packet<br />

is not evaluated against subsequent terms in the firewall filter. For example, when<br />

you configure a term with the action modifier count, the term’s action changes from<br />

an implicit discard to an implicit accept. The next term action forces the continued<br />

evaluation of the firewall filter.<br />

Terminating and nonterminating actions that are configured within a single term are all<br />

taken on traffic that matches the conditions configured.<br />

Application Points<br />

After you define the firewall filter, you must apply it to an application point. These<br />

application points include logical interfaces, physical interfaces, routing interfaces, and<br />

routing instances. In most cases, you can apply a firewall filter as an input filter or an<br />

output filter, or both at the same time. Input filters take action on packets being received<br />

on the specified interface, whereas output filters take action on packets that are<br />

transmitted through the specified interface. You typically apply one filter with multiple<br />

terms to a single logical interface, to incoming traffic, outbound traffic, or both. However,<br />

there are times when you might want to chain multiple firewall filters (with single or<br />

multiple terms) together and apply them to an interface. You use an input list to apply<br />

Copyright © 2010, <strong>Juniper</strong> <strong>Networks</strong>, Inc.<br />

185

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!