16.03.2014 Views

Policy Framework Configuration Guide - Juniper Networks

Policy Framework Configuration Guide - Juniper Networks

Policy Framework Configuration Guide - Juniper Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 9: Firewall Filter <strong>Configuration</strong><br />

then {<br />

action;<br />

action-modifiers;<br />

}<br />

}<br />

}<br />

NOTE: You must specify either inet or inet6 as the protocol family in order to<br />

configure a service filter.<br />

Service filters are configured the same way as firewall filters. A subset of match conditions<br />

and actions for firewall filters are supported for service filters.<br />

One of the actions you configure must be service or skip:<br />

• Specifying the service action directs packets for stateful-firewall service.<br />

• Specifying the skip action let packets bypass stateful-firewall service.<br />

The following actions are also supported for service filters:<br />

• count counter-name—Count the packet in the specified counter.<br />

• log—Log the packet header information in a buffer within the Packet Forwarding Engine.<br />

You can access this information by issuing the show firewall log command.<br />

• port-mirror—Send packets to a packet analyzer.<br />

• sample—Sample the packets.<br />

Configuring Simple Filters<br />

For more information about services and service interfaces, see the Junos OS Services<br />

Interfaces <strong>Configuration</strong> <strong>Guide</strong>.<br />

Simple filters are recommended for metropolitan Ethernet applications. They are<br />

supported on Gigabit Ethernet intelligent queuing (IQ2) and Enhanced Queuing Dense<br />

Port Concentrator (EQ DPC) interfaces only. Simple filters are not supported on Modular<br />

Port Concentrator (MPC) interfaces, including Enhanced Queuing MPC interfaces. Unlike<br />

standard filters, simple filters are for IPv4 traffic only and have the following restrictions:<br />

• The next-term action is not supported.<br />

• Qualifiers, such as except and protocol-except match conditions, are not supported.<br />

• Noncontiguous masks are not supported.<br />

• Only one source-address and one destination-address prefix are allowed for each filter<br />

term. If you configure, multiple prefixes, only the last one is used.<br />

• Ranges are only valid as source or destination ports. For example, you can configure<br />

source-port 400-500 or destination-port 600-700.<br />

• Output filters are not supported. You can apply a simple filter to ingress traffic only.<br />

Copyright © 2010, <strong>Juniper</strong> <strong>Networks</strong>, Inc.<br />

253

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!