Management Access Filter Commands

management-access-filter

Syntax

[no] management-access-filter

Context

config>system>security

Description

This command enables the context to edit management access filters and to reset match criteria.

Management access filters control all traffic in and out of the CSM. They can be used to restrict management of the 7705 SAR by other nodes outside either specific (sub)networks or through designated ports.

Management filters, as opposed to other traffic filters, are enforced by system software.

The no form of the command removes management access filters from the configuration.

Default

n/a

ip-filter

Syntax

ip-filter

Context

config>system>security>management-access-filter

Description

This command enables the context to configure IP filter commands.

ipv6-filter

Syntax

ipv6-filter

Context

config>system>security>management-access-filter

Description

This command enables the context to configure IPv6 filter commands.

default-action

Syntax

default-action {permit | deny | deny-host-unreachable}

Context

config>system>security>management-access-filter>ip-filter

config>system>security>management-access-filter>ipv6-filter

Description

This command creates the default action for management access in the absence of a specific management access filter match.

The default-action is applied to a packet that does not satisfy any match criteria in any of the management access filters. Whenever management access filters are configured, the default-action must be defined.

Default

n/a

Parameters

permit

specifies that packets not matching the configured selection criteria in any of the filter entries will be permitted

deny

specifies that packets not matching the selection criteria will be denied

deny-host-unreachable

specifies that packets not matching the selection criteria will be denied and a host unreachable message will be issued

entry

Syntax

[no] entry

Context

config>system>security>management-access-filter>ip-filter

config>system>security>management-access-filter>ipv6-filter

Description

This command is used to create or edit a management access filter entry. Multiple entries can be created with unique entry-id numbers. The 7705 SAR exits the filter upon the first match found and executes the actions according to the respective action command. For this reason, entries must be sequenced correctly from most to least explicit.

An entry may not have any match criteria defined (in which case, everything matches) but must have at least the keyword action defined to be considered complete. Entries without the action keyword are considered incomplete and inactive.

The no form of the command removes the specified entry from the management access filter.

Default

n/a

Parameters

entry-id

an entry ID uniquely identifies a match criteria and the corresponding action. It is recommended that entries be numbered in staggered increments. This allows users to insert a new entry in an existing policy without having to renumber the existing entries.

Values

1 to 9999

action

Syntax

action {permit | deny | deny-host-unreachable}

no action

Context

config>system>security>management-access-filter>ip-filter>entry

config>system>security>management-access-filter>ipv6-filter>entry

Description

This command creates the action associated with the management access filter match criteria entry.

The action keyword is required. If no action is defined, the filter is ignored. If multiple action statements are configured, the last one overwrites previous configured actions.

If the packet does not meet any of the match criteria, the configured default action is applied.

Default

n/a

Parameters

permit

specifies that packets matching the configured criteria will be permitted

deny

specifies that packets not matching the selection criteria will be denied

deny-host-unreachable

specifies that packets not matching the selection criteria will be denied and a host unreachable message will be issued

dst-port

Syntax

dst-port port [mask]

no dst-port

Context

config>system>security>management-access-filter>ip-filter>entry

config>system>security>management-access-filter>ipv6-filter>entry

Description

This command configures a destination TCP or UDP port number or port range for a management access filter match criterion.

The no form of the command removes the destination port match criterion.

Default

n/a

Parameters

port

the source TCP or UDP port number as match criteria

Values

1 to 65535 (decimal)

mask

mask used to specify a range of destination port numbers as the match criterion

This 16-bit mask can be configured using the formats in Table: 16-bit Mask Formats.

Table: 16-bit Mask Formats

Format Style

Format Syntax

Example

Decimal

DDDDD

63488

Hexadecimal

0xHHHH

0xF800

Binary

0bBBBBBBBBBBBBBBBB

0b1111100000000000

For example, to select a range from 1024 up to 2047, specify 1024 0xFC00 for value and mask.

Values

1 to 65535 (decimal)

Default

65535 (exact match)

flow-label

Syntax

flow-label value

no flow-label

Context

config>system>security>management-access-filter>ipv6-filter>entry

Description

This command configures flow label match conditions for a management access filter match criterion. Flow labeling enables the labeling of packets belonging to particular traffic flows for which the sender requests special handling, such as non-default QoS or real-time service.

This command applies to IPv6 filters only.

Parameters

value

the flow identifier in an IPv6 packet header that can be used to discriminate traffic flows (see RFC 3595, Textual Conventions for IPv6 Flow Label)

Values

0 to 1048575

log

Syntax

[no] log

Context

config>system>security>management-access-filter>ip-filter>entry

config>system>security>management-access-filter>ipv6-filter>entry

Description

This command enables match logging.

The no form of this command disables match logging.

Default

no log

next-header

Syntax

[no] next-header next-header

Context

config>system>security>management-access-filter>ipv6-filter>entry

Description

This command specifies the next header to match as a management access filter match criterion.

This command applies to IPv6 filters only.

Parameters

next-header

protocol-number or protocol-name

protocol-number

the IPv6 next header to match, expressed as a protocol number in decimal, hexadecimal, or binary. This parameter is similar to the protocol parameter used in IPv4 filter match criteria. See Table: IP Protocol IDs and Descriptions for the protocol IDs and descriptions for the IP protocols.

Values

[0 to 255]D

[0x0 to 0xFF]H

[0b0 to 0b11111111]B

protocol-name

the IPv6 next header to match, expressed as a protocol name. This parameter is similar to the protocol parameter used in IPv4 filter match criteria. See Table: IP Protocol IDs and Descriptions for the protocol IDs and descriptions for the IP protocols.

Values

none, icmp, igmp, ip, tcp, egp, igp, udp, rdp, ipv6, ipv6-route, ipv6-frag, idrp, rsvp, gre, ipv6-icmp, ipv6-no-nxt, ipv6-opts, iso-ip, eigrp, ospf-igp, ether-ip, encap, pnni, pim, vrrp, l2tp, stp, ptp, isis, crtp, crudp, sctp, mpls-in-ip, * - udp/tcp wildcard

protocol

Syntax

[no] protocol protocol-id

Context

config>system>security>management-access-filter>ip-filter>entry

Description

This command configures an IP protocol type to be used as a management access filter match criterion.

The protocol type is identified by its respective protocol number. Well-known protocol numbers include ICMP (1), TCP (6), and UDP (17).

This command applies to IPv4 filters only.

The no form of the command removes the protocol from the match criteria.

Default

n/a

Parameters

protocol-id

protocol-number or protocol-name

protocol-number

the protocol number for the match criterion, expressed in decimal, hexadecimal, or binary. See Table: IP Protocol IDs and Descriptions for the protocol IDs and descriptions for the IP protocols.

Values

[0 to 255]D

[0x0 to 0xFF]H

[0b0 to 0b11111111]B

protocol-name

the protocol name for the match criterion. See Table: IP Protocol IDs and Descriptions for the protocol IDs and descriptions for the IP protocols.

Values

none, icmp, igmp, ip, tcp, egp, igp, udp, rdp, ipv6, ipv6-route, ipv6-frag, idrp, rsvp, gre, ipv6-icmp, ipv6-no-nxt, ipv6-opts, iso-ip, eigrp, ospf-igp, ether-ip, encap, pnni, pim, vrrp, l2tp, stp, ptp, isis, crtp, crudp, sctp, mpls-in-ip, * - udp/tcp wildcard

router

Syntax

router router-instance

router service-name service-name

no router

Context

config>system>security>management-access-filter>ip-filter>entry

config>system>security>management-access-filter>ipv6-filter>entry

Description

This command configures a router name or service ID to be used as a management access filter match criterion.

The no form of the command removes the router name or service ID from the match criteria.

Parameters

router-instance

specifies one of the following parameters for the router instance:

router-name — specifies a router name up to 32 characters to be used in the match criteria

service-id — specifies an existing service ID to be used in the match criteria

Values

1 to 2147483647

service-name

specifies the service name of an existing service

Values

up to 64 characters

src-ip

Syntax

src-ip {ip-prefix[/mask] [/netmask]| ip-prefix-list ip-prefix-list-name}

no src-ip

Context

config>system>security>management-access-filter>ip-filter>entry

Description

This command specifies a source IPv4 address range or specifies an IPv4 prefix list configured under the match-list command to be used as a match criterion for a management access filter. See the 7705 SAR Router Configuration Guide for information about the match-list command.

To match on the source IP address, specify the address and the associated mask (for example, 10.1.0.0/16). The conventional notation of 10.1.0.0 255.255.0.0 can also be used.

The no form of the command removes the source IPv4 address or IPv4 prefix list match criterion.

Default

n/a

Parameters

ip-prefix

the IP prefix for the IP match criterion in dotted-decimal notation

Values

a.b.c.d (host bits must be 0)

mask

the subnet mask length expressed as a decimal integer

Values

1 to 32

netmask

the subnet mask in dotted-decimal notation

Values

a.b.c.d (network bits all 1, host bits must all 0)

ip-prefix-list-name

the name of the IP prefix list configured with the match-list command

src-ip

Syntax

src-ip {ipv6-address/prefix-length | ipv6-prefix-list ipv6-prefix-list-name}

no src-ip

Context

config>system>security>management-access-filter>ipv6-filter>entry

Description

This command configures a source IPv6 address range or specifies an IPv6 prefix list configured under the match-list command to be used as a match criterion for a management access filter. See the 7705 SAR Router Configuration Guide for information about the match-list command.

To match on the source IP address, specify the address and prefix length; for example, 11::12/128.

The no form of the command removes the source IP address or IPv6 prefix list match criterion.

Default

n/a

Parameters

ipv6-address/prefix-length

the IPv6 address on the interface

Values

ipv6-address:        x:x:x:x:x:x:x:x (eight 16-bit pieces)

                                 x:x:x:x:x:x:d.d.d.d

                                   x:   [0 to FFFF]H

                                   d:   [0 to 255]D

prefix-length:      1 to 128

ipv6-prefix-list-name

the name of the IPv6 prefix list configured with the match-list command

src-port

Syntax

src-port {port-id | cpm | lag lag-id}

no src-port

Context

config>system>security>management-access-filter>ip-filter>entry

config>system>security>management-access-filter>ipv6-filter>entry

Description

This command restricts ingress management traffic to either the CSM Ethernet port or any other logical port (port or channel) on the device.

When the source interface is configured, only management traffic arriving on those ports satisfy the match criteria.

The no form of the command reverts to the default value.

Default

any interface

Parameters

port-id

the port ID

Values

port-id

slot/mda/port

bundle-id

bundle-type-slot/mda.bundle-num

type

ima, ppp

bundle-num

1 to 128

cpm

specifies that ingress management traffic is restricted to the CSM Ethernet port

lag-id

the LAG ID

Values

1 to 32

renum

Syntax

renum old-entry-number new-entry-number

Context

config>system>security>management-access-filter>ip-filter

config>system>security>management-access-filter>ipv6-filter

Description

This command renumbers existing management access filter entries to resequence filter entries.

The 7705 SAR exits on the first match found and executes the actions in accordance with the accompanying action command. This may require some entries to be renumbered from most to least explicit.

Parameters

old-entry-number

the entry number of the existing entry

Values

1 to 9999

new-entry-number

the new entry number that will replace the old entry number

Values

1 to 9999