Brocade Multi-Service IronWare Security Configuration Guide (Supporting R05.6.00) User Manual
Page 152
134
Multi-Service IronWare Security Configuration Guide
53-1003035-02
Enabling ACL filtering of fragmented or non-fragmented packets
3
Brocade(config-if-e1000-3/1)# no spanning-tree
Brocade(config-if-e1000-3/1)# exit
Brocade(config)# access-list 102 deny ip any any fragment
Brocade(config)# access-list 102 permit ip any any
Behavior In Normal ACL Fragment Mode – In the normal Brocade device mode, fragmented and
non-fragmented packets will be dropped or forwarded as described in the following:
All IP fragments (both initial and subsequent fragments) will match the first ACL entry. Because
this is a deny ACL entry, and rate-limit strict-acl is configured, the matching packets are
dropped.
Non-fragmented packets will not match the first ACL entry because the fragment keyword is
present. The packet will then match the second (permit) ACL entry and consequently will be
forwarded and rate-limited.
Behavior In Conservative ACL Fragment Mode – If the Brocade device is configured for
Conservative ACL Fragment mode using the acl-frag-conservative command, fragmented and
non-fragmented packets will be dropped or forwarded as described in the following:
The initial fragment will not match the first ACL entry because the fragment keyword is present.
The packet will then match the second (permit) ACL entry and consequently will be forwarded
and rate-limited.
Non-initial IP fragments will match the first ACL entry based on Layer-3 information. Because
this is a deny ACL entry with Layer-3 information only, and rate-limit strict-acl is configured, the
matching packets are dropped.
Non-fragmented packets will not match the first ACL entry because the fragment keyword is
present. The packet will then match the second (permit) ACL entry and consequently will be
forwarded and rate-limited.
ACL-based rate limiting configuration example with fragment keyword and permit
clause
In the following example, ACL 103 is configured to process fragmented IP packets in Normal and
Conservative ACL modes as described.
Brocade(config)# interface ethernet 3/1
Brocade(config-if-e1000-3/1)# enable
Brocade(config-if-e1000-3/1)# rate-limit strict-acl
Brocade(config-if-e1000-3/1)# rate-limit input access-group 103 499992736
750000000
Brocade(config-if-e1000-3/1)# no spanning-tree
Brocade(config-if-e1000-3/1)# exit
Brocade(config)# access-list 103 permit ip any any fragment
Brocade(config)# access-list 102 deny ip any any
Behavior In Normal ACL Fragment Mode – In the normal Brocade device mode, fragmented and
non-fragmented packets will be dropped or forwarded as described in the following:
All IP fragments (both initial and subsequent fragments) will match the first ACL entry. Because
this is a permit ACL entry, the matching packets are forwarded and rate-limited.
Non-fragmented packets will not match the first ACL entry because the fragment keyword is
present. The packet will then match the second (deny) ACL entry and consequently will be
dropped.