This chapter provides information about filter policies and management.
Filter policies, also referred to as Access Control Lists (ACLs), are templates applied to services or network IP interfaces to control network traffic into (ingress) or out of (egress) a service access port (SAP) or network IP interface based on IP and MAC matching criteria. Filters are applied to services to look at packets entering or leaving a SAP. Filters can be used on several interfaces. The same filter can be applied to ingress traffic, egress traffic, or both. Ingress filters affect only inbound traffic destined for the routing complex, and egress filters affect only outbound traffic sent from the routing complex.
Configuring an entity with a filter policy is optional. If an entity such as a service or network IP interface is not configured with filter policies, then all traffic is allowed on the ingress and egress interfaces. By default, there are no filters associated with services or interfaces. They must be explicitly created and associated. When you create a new filter, default values are provided although you must specify a unique filter ID value to each new filter policy as well as each new filter entry and associated actions. The filter entries specify the filter matching criteria and also an action to be taken upon a match.
Available ingress and egress CAM hardware resources can be allocated as per user needs for use with different filter criteria. By default, the system allocates resources to maintain backward compatibility with release 4.0. Users can modify the resource allocation based on their need to scale the number of entries or number of associations (that is, number of SAP/IP interfaces using a filter policy that defines particular match criteria). If no CAM resources are allocated to particular match criteria defined in a filter policy, then the association of that filter policy to a SAP will fail. This is true for both ingress and egress filter policy. Please read the configuration notes section below for more information.
Only one ingress IP or MAC filter policy and one egress IP or MAC filter policy can be applied to a Layer 2 SAP. Both IPv4 and IPv6 ingress and egress filter policy can be used simultaneously with a Layer 2 SAP. Only one ingress IP filter policy and one egress IP filter policy can be applied to a network IP interface. Both IPv4 and IPv6 ingress and egress filter policy can be used simultaneously with an IP interface (For example: network Port IP interface in network mode and IES IP interface in access-uplink mode) for which IPv6 addressing is supported. Network filter policies control the forwarding and dropping of packets based on IP match criteria. Note that non-IP packets are not hitting the IP filter policy, so the default action in the filter policy will not apply to these packets.
Note that non-IP packets are not hitting the IP filter policy, so the default action in the filter policy will not apply to these packets.
IP and MAC filter policies specify either a forward or a drop action for packets based on information specified in the match criteria.
Filter entry matching criteria can be as general or specific as you require, but all conditions in the entry must be met in order for the packet to be considered a match and the specified entry action performed. The process stops when the first complete match is found and executes the action defined in the entry, either to drop or forward packets that match the criteria.
A filter policy compares the match criteria specified within a filter entry to packets coming through the system, in the order the entries are numbered in the policy. When a packet matches all the parameters specified in the entry, the system takes the specified action to either drop or forward the packet. If a packet does not match the entry parameters, the packet continues through the filter process and is compared to the next filter entry, and so on. If the packet does not match any of the entries, then system executes the default action specified in the filter policy. Each filter policy is assigned a unique filter ID. Each filter policy is defined with:
Each filter entry contains:
Filter policies can be applied to the following specific service types:
Table 34, Table 35, Table 36, and Table 37 describe support of filter policies on different 7210 platforms.
Service | IP Filter | IPv6 Filter | MAC Filter |
Network port IP interface | Network port IP interface (ingress and egress) | Network port IP interface (ingress and egress) | Not available |
Epipe | Epipe SAP (ingress and egress) | Epipe SAP (ingress and egress) | Epipe SAP (ingress and egress) |
VPLS | VPLS SAP (ingress and egress) | VPLS SAP (ingress and egress) | VPLS SAP (ingress and egress) |
IES | IES interface SAP (ingress and egress) | IES interface SAP (ingress and egress) | Not available |
VPRN | VPRN interface SAP (ingress and egress) | VPRN interface SAP (ingress and egress) | Not available |
PBB | Ingress and egress of Epipe I-SAP and I-VPLS I-SAP | Ingress and egress of Epipe I-SAP, and I-VPLS I-SAP | Ingress and egress of Epipe I-SAP, I-VPLS I-SAP and B-VPLS B-SAP |
RVPLS (RVPLS SAPs) | VPLS access (ingress and egress) and network SAPs (ingress and egress) | Not available | Not available |
RVPLS (RVPLS IES IP Interface) | Ingress override filters (ingress) | Not available | Not available |
Service | IP Filter | IPv6 Filter | MAC Filter |
Epipe | Epipe access SAP (egress and ingress), Epipe access-uplink SAP (egress and ingress) | Epipe (egress and ingress), Epipe access-uplink SAP (egress and ingress) | Epipe (egress and ingress), Epipe access-uplink SAP (egress and ingress) |
VPLS | VPLS access SAP (ingress and egress), VPLS access-uplink SAP (ingress and egress) | VPLS access SAP (ingress and egress), VPLS access-uplink SAP (ingress and egress) | VPLS access SAP (ingress and egress), VPLS access-uplink SAP (ingress and egress) |
RVPLS (VPLS SAPs) | VPLS access (ingress and egress) and access-uplink SAPs (ingress and egress) | Not available | Not available |
RVPLS (RVPLS IES IP Interface) | Ingress override filters (ingress) | Not available | Not available |
IES | IES access SAP, IES access-uplink SAP | IES access-uplink SAP | Not available |
Service | IP Filter | IPv6 Filter | MAC Filter |
Network port IP interface | Network port IP interface (ingress and egress) | Network port IP interface (ingress and egress) | Not available |
Epipe | Epipe SAP (ingress and egress) | Epipe SAP (ingress and egress) | Epipe SAP (ingress and egress) |
VPLS | VPLS SAP (ingress and egress) | VPLS SAP (ingress and egress) | VPLS SAP (ingress and egress) |
IES | IES interface SAP (ingress and egress) | IES interface SAP (ingress and egress) | Not available |
VPRN | VPRN interface SAP (ingress and egress) | VPRN interface SAP (ingress and egress) | Not available |
PBB | Not supported | Not supported | Not supported |
RVPLS (VPLS SAPs) | VPLS access (ingress and egress) and access-uplink SAPs (ingress and egress) | Available only for 7210 SAS-Mxp Not available for 7210 SAS-R6 and 7210 SAS-R12 | Not available |
RVPLS (RVPLS IES and VPRN IP interface) | Ingress override filters (ingress) | Available only for 7210 SAS-Mxp Not available for 7210 SAS-R6 and 7210 SAS-R12 | Not available |
Service | IP Filter | IPv6 Filter | MAC Filter |
Network port IP interface | Network port IP interface (ingress and egress) | Network port IP interface (ingress and egress) | Not available |
Epipe | Epipe SAP (ingress and egress) | Epipe SAP (ingress and egress) | Epipe SAP (ingress and egress) |
VPLS | VPLS SAP (ingress and egress) | VPLS SAP (ingress and egress) | VPLS SAP (ingress and egress) |
IES | IES interface SAP (ingress and egress) | IES interface SAP (ingress and egress) | Not available |
VPRN | VPRN interface SAP (ingress and egress) | VPRN interface SAP (ingress and egress) | Not available |
PBB | Not available | Not available | Not available |
RVPLS (VPLS SAPs) | VPLS access (ingress and egress) and access-uplink SAPs (ingress and egress) | Not available | Not available |
RVPLS (RVPLS IES and VPRN IP interface) | Ingress override filters (ingress) | Not available | Not available |
The ACLs on VLAN range SAPs are supported only on ingress (for Epipe and VPLS services). Table 38, Table 39, and Table 40 list the support.
Platforms/Types of filters | 7210 SAS-M (Access-uplink mode) | 7210 SAS-M (Network mode) | 7210 SAS-T (Network mode) | 7210 SAS-T (Access-uplink mode) |
Ingress IP or IPv6 | Yes | Yes | Yes | Yes |
Ingress MAC | Yes | Yes | Yes | Yes |
Egress IP | No | No | No | No |
Egress MAC | No | No | No | No |
Platforms/Types of filters | 7210 SAS-R6 and 7210 SAS-R12 | 7210 SAS-Mxp | 7210 SAS-Sx/S 1/10GE | 7210 SAS-Sx 10/100GE |
Ingress IP or IPv6 | Yes | Yes | Yes | Yes |
Ingress MAC | Yes | Yes | Yes | Yes |
Egress IP | No | No | No | No |
Egress MAC | No | No | No | No |
Platforms/Types of filters | 7210 SAS-M (Access-uplink mode) | 7210 SAS-M (Network mode) | 7210 SAS-T (Access-uplink mode) | 7210 SAS-M (Network mode) |
Ingress IP or IPv6 | Yes | No | Yes | No |
Ingress MAC | Yes | No | Yes | No |
Egress IP | No | No | No | No |
Egress MAC | No | No | No | No |
![]() | Note: Range SAPs are not supported for VPLS services in network mode. |
Filter policies are applied to the following service entities:
Configuration Guidelines for Routed VPLS and ACLs
Figure 9 shows the process to create filter policies and apply them to a service network IP interface.
As few or as many match parameters can be specified as required, but all conditions must be met for the packet to be considered a match and the specified action performed. The process stops when the first complete match is found and then executes the action defined in the entry, either to drop or forward packets that match the criteria.
IP filter policies match criteria that associate traffic with an ingress or egress SAP. Matching criteria to drop or forward IP traffic include:
MAC filter policies match criteria that associate traffic with an ingress or egress SAP. Matching criteria to drop or forward MAC traffic include:
Table 41 lists DSCP values.
DSCP Name | Decimal DSCP Value | Hexadecimal DSCP Value | Binary DSCP Value |
default | 0 | * | |
cp1 | 1 | ||
cp2 | 2 | ||
cp3 | 3 | ||
cp4 | 4 | ||
cp5 | 5 | ||
cp6 | 6 | ||
cp7 | 7 | * | |
cs1 | 8 | ||
cp9 | 9 | ||
af11 | 11 | * | |
af12 | 12 | * | |
cp13 | 13 | ||
cp15 | 15 | ||
cs2 | 16 | * | |
cp17 | 17 | ||
af21 | 18 | * | |
cp19 | 19 | ||
af22 | 20 | * | |
cp21 | 21 | ||
af23 | 22 | * | |
cp23 | 23 | ||
cs3 | 24 | * | |
cp25 | 25 | ||
af31 | 26 | * | |
cp27 | 27 | ||
af32 | 28 | * | |
cp29 | 29 | ||
af33 | 30 | * | |
cp21 | 31 | ||
cs4 | 32 | * | |
cp33 | 33 | ||
af41 | 34 | * | |
cp35 | 35 | ||
af42 | 36 | * | |
cp37 | 37 | ||
af43 | 38 | * | |
cp39 | 39 | ||
cs5 | 40 | * | |
cp41 | 41 | ||
cp42 | 42 | ||
cp43 | 43 | ||
cp44 | 44 | ||
cp45 | 45 | ||
ef | 46 | * | |
cp47 | 47 | ||
nc1 | 48 | * | (cs6) |
cp49 | 49 | ||
cp50 | 50 | ||
cp51 | 51 | ||
cp52 | 52 | ||
cp53 | 53 | ||
cp54 | 54 | ||
cp55 | 55 | ||
cp56 | 56 | ||
cp57 | 57 | ||
nc2 | 58 | * | (cs7) |
cp60 | 60 | ||
cp61 | 61 | ||
cp62 | 62 |
When entries are created, they should be arranged sequentially from the most explicit entry to the least explicit. Filter matching ceases when a packet matches an entry. The entry action is performed on the packet. 7210 SAS supports either drop or forward action.To be considered a match, the packet must meet all the conditions defined in the entry.
Packets are compared to entries in a filter policy in an ascending entry ID order. To reorder entries in a filter policy, edit the entry ID value; for example, to reposition entry ID 6 to a more explicit location, change the entry ID 6 value to entry ID 2.
When a filter consists of a single entry, the filter executes actions as follows:
If a filter policy contains two or more entries, packets are compared in ascending entry ID order (1, 2, 3 or 10, 20, 30, etc.):
Figure 10 shows an example of several packets forwarded upon matching the filter criteria and several packets traversing through the filter entries and then dropped.
After filters are created, they can be applied to the following entities:
During the SAP creation process, ingress and egress filters are selected from a list of qualifying IP and MAC filters. When ingress filters are applied to a SAP, packets received at the SAP are checked against the matching criteria in the filter entries. If the packet completely matches all criteria in an entry, the checking stops and an entry action is performed. If permitted, the traffic is forwarded according to the specification of the action. If the packets do not match, the default filter action is applied. If permitted, the traffic is forwarded.
When egress filters are applied to a SAP, packets received at the egress SAP are checked against the matching criteria in the filter entries. If the packet completely matches all criteria in an entry, the checking stops. If permitted, the traffic is transmitted. If denied, the traffic is dropped. If the packets do not match, the default filter action is applied.
Filters can be added or changed to an existing SAP configuration by modifying the SAP parameters. Filter policies are not operational until they are applied to a SAP and the service enabled.
An IP filter can be applied to a network port IP interface. Packets received on the interface are checked against the matching criteria in the filter entries. If the packet completely matches all criteria in an entry, the checking stops. If permitted, the traffic is forwarded. If the packets do not match, they are discarded or forwarded based on the default action specified in the policy.
![]() | Note: Refer to the 7210 SAS-M, T, Mxp, Sx, S Services Guide and the 7210 SAS-R6, R12 Services Guide for service-specific ACL support and restrictions. |
The following information describes filter implementation guidelines and caveats:
Frame Format | Etype |
Ethernet – II | Yes |
802.3 | No |
802.3 – snap | No |
![]() | Note:
|
When the user allocates resources from the ingress CAM resource pool for use by filter policies using the configure> system> resource-profile CLI commands, the system allocates resources in chunks of fixed-size entries (example - 256 entries per chunk on 7210 SAS-T). The usage of these entries by different type of match criteria is described below.
The users can use the tools>dump>system-resources command to know the current usage and availability. For example: Though chunks are allocated in 256 entries, only 128 entries show up against filters using those of IPv6 128-bit addresses. One or more entries are reserved for system use and is not available for user.
When the user allocates resources for use by filter policies using the config>system>resource-profile>egress-internal-tcam CLI commands, the system allocates resources in chunks of fixed-size entries (example - 512 entries per chunk on 7210 SAS-M) from the egress internal tcam pool in hardware. The usage of these entries by different type of match criteria is described below.
The user can use the tools>dump>system-resources command to know the current usage and availability.