Hi,

On 24.06.2020 12:28, Marcel Bößendörfer wrote:
*Issue: *However, IPFIX is not considering the next-ip, instead it's acting
like the next-ip would not exist at all. That means, traffic from
192.168.0.2 is reported to be egressing multiple interfaces like the router
would handle it without the next-ip rule. So it seems that the sampling is
taking place before the firewall rule is applied. This is a very unexpected
behaviour. In reality traffic from that source IP is only egressing the
interface that's related to 192.168.1.1.

I have seen things like this with Flow Export on MX before. In my case it was filter 
based forwarding towards a different RI with different interfaces for TE purposes. In 
that case the flow export would match the "Original" destination before the FBF 
took place which lead to wrong flow statistics on $collector.

This was years ago and i never checked back on that, seems like the behavior is 
still there.

I kind of remember it happening for flow-spec drop/rate-loimit routes/filters 
as well. So Flow would still report the traffic ingressing the interfaces while 
the filters were already blocking them. Which in the Case of flow-Spec was a 
good thing, because you could keep the announcement active as long as the 
attack lasted.

--
Kind Regards
Tobias Heister
_______________________________________________
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Reply via email to