I'm looking for a firewall packet filter to deal with IP Fragments as described 
in the link below.

https://lists.isc.org/pipermail/bind-users/2010-February/078917.html

We run a pair of MX240's with 10.1R3.7 at the edge. Running stateless firewall 
filters inbound on Internet handoffs allowing certain tcp and udp ports.  I'm 
having a problem with non-initial fragments not getting through.  We have a  
temporary workaround, but it is not a global solution at all. 

I was thinking that firewall filter processing for fragments such as below 
could be a solution, but it's scary to open the flood gates.  Interested to 
hear how others have dealt with this.  Any thoughts?

term ip-fragments-1 {
    from {
        first-fragment;
    }
    then policer IP-FRAG-Policer;
}
term ip-fragments-2 {
    from {
        fragment-offset 64-8191;
    }
    then policer IP-FRAG-Policer;
}
policer IP-FRAG-Policer
filter-specific;
if-exceeding {
    bandwidth-limit 8k;
    burst-size-limit 1500;
}
then discard;

Thanks,
Phil

_______________________________________________
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Reply via email to