On 21/04/2014 17:26, Saku Ytti wrote:
On (2014-04-21 17:09 +0100), Phil Mayers wrote:

Can you expand on this? Currently you can either do "platform rate-limit"
for IP options or disable the RL and use the built-in / magic CPP class-map:

As ACL match work, you could do it in iACL and then you're only left with own
customers attacking you.
Mind you, I don't run PFC4. But amongst things I'm missing in PFC3 ACL
classification are packet size and IP options, both should be available in
PFC4.

Seems so; I had assumed options ACL match was still absent because it had a platform RL/CPP match, but a test on our box says:

#sh ip access-list TEST
Extended IP access list TEST
    10 deny ip any any option any-options
    20 deny ip any any pak-len lt 128 (117 matches)
    30 permit ip any any

#sh platform hardware acl entry interface vlNNN security in ip
...
tcam:B, bank:0, prot:0    Aces

L3_Deny               ip any 224.0.0.0 15.255.255.255 L3_len lt 128
L3_Deny               ip any 224.0.0.0 15.255.255.255 v6_flags(0,0)
Permit                ip any 224.0.0.0 15.255.255.255
L3_Deny               ip any any L3_len lt 128   (53 matches)
L3_Deny               ip any any v6_flags(0,0)
Permit                ip any any

...and the "len" match certainly works, just tested. Assume the v6_flags thing is just an internal / field re-use detail, though I didn't have any easy way to test IP options.

That said, the ACL merge logic seems a bit sub-optimal currently on this release - the thing with duplicate copies of ACEs for 224.0.0.0/4 and longer routes versus everything else, even with the same outcome, seems to be pretty consistent. Wonder if they'll optimise that?

I will refrain from ranting on the pain of *managing* ACLs on IOS-based platforms however ;o)
_______________________________________________
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

Reply via email to