28.06.2014 Views

Discussion

Discussion

Discussion

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Table 9-5. Header match conditions used in firewall filters (continued)<br />

Match term<br />

source-prefix-list<br />

prefix-list<br />

prefix-list prefix-list<br />

Port matches<br />

destination-port number<br />

destination-port name<br />

source-port number<br />

source-port name<br />

Protocol and packet matches<br />

icmp-type number<br />

icmp-type name<br />

Match description<br />

IP source address of one of the prefixes in the prefix list.<br />

IP source or destination address of one of the prefixes in the prefix list.<br />

TCP or UDP destination port field, specified as a number or name. Use with the<br />

protocol match condition to determine the protocol being used on a port.<br />

Port names and numbers: afs, bgp, biff (512), bootpc (68), bootps (67), cmd (514),<br />

cvspserver (2401), dhcp (67), domain (53), eklogin (2105), ekshell (2106), exec (512),<br />

finger (79), ftp (21), ftp-data (20), http (80), https (443), ident, imap, kerberos-sec (88),<br />

klogin (543), kpasswd (761), krb-prop (754), krbupdate (760), kshell (544), ldap (389),<br />

login (513), mobileip-agent (434), mobilip-mn (435), msdp (639), netbios-dgm,<br />

netbios-ns, netbios-ssn, nfsd (2049), nntp, ntalk (518), ntp pop3, pptp, printer (515),<br />

radacct, radius, rip (520), rkinit (2108), smtp (25), snmp, snmptrap, snpp (444), socks,<br />

ssh (22), sunrpc, syslog (514), tacacs-ds (65), talk (517), telnet(23), tftp (69), timed<br />

(525), who (513), xdmcp, zephyr-clt (2103), zephyr-hm (2104)<br />

TCP or UDP source port field, specified as a number or name. Use with the protocol<br />

match condition to determine the protocol being used on a port.<br />

Port names and numbers same as those listed for destination-port.<br />

ICMP packet type field, specified as a number or name. Use with the protocol match<br />

condition to determine the protocol being used on a port.<br />

Type names and numbers: echo-reply (0), echo-request (8), info-reply, info-request,<br />

mask-request, mask-reply, parameter-problem, redirect (5), router-advertisement (9),<br />

router-solicit, source-quench (4), time-exceeded, timestamp, timestamp-reply,<br />

unreachable (3)<br />

packet-length bytes Length of the IP portion of the packet, including the header but excluding Layer 2<br />

encapsulation overhead.<br />

protocol number<br />

protocol name<br />

Packet field matches<br />

fragment-flags number<br />

fragment-offset number<br />

ip-options number<br />

IP protocol field, specified as a number or name.<br />

Names and numbers: ah, egp (8), esp (50), gre (47), icmp, igmp (2), ipip (4), ipv6 (41),<br />

ospf (89), pim, rsvp (46), tcp (6), udp<br />

IP fragmentation flag field, specified as a number or name.<br />

Flag names and numbers: dont-fragment (0x4000), more-fragments (0x2000),<br />

reserved (0x8000)<br />

Fragment offset from the beginning of the original packet, in 8-byte units. Use to identify<br />

all fragmented packets. The More Fragments (MF) flag is set for all fragmented packets<br />

except the last. To identify fragments, set fragment offset != 0 (or morefragments=1).<br />

IP option field, specified as a number or name.<br />

Option names and numbers: loose-source-route, record-route (7), router-alert,<br />

strict-source-route, timestamp (68)<br />

Creating a Simple Firewall Filter that Matches Packet Contents | 305<br />

This is the Title of the Book, eMatter Edition<br />

Copyright © 2008 O’Reilly & Associates, Inc. All rights reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!