Chapter 5 Routing policeis and firewall filters Flashcards
Import and export policies
Import are from external to internal
export are from internal to external
Policies for link-state protocols
Import policies should not be used with link-state protocol as all the routers in a link-state area should have the same LSDB
Policies configuration
Policies are configured separately and then applied to the desired protocol, more policies can be applied with an order on the same protocol
Protocol with no matching policies
When a route is not matching any policy it will get the default behaviour, each dynamic routing protocol has its default behaviour (Like RIP discards the route) but it can also be configured by the admin
Policy matching criteria
Route-filters (based on the prefix)
Protocol
Prefix-lists
Attributes (Area, community, preference, AS Path)
Policy actions
Accept
Reject
Next-policy
Modify
Default policy behaviours
Import | Export
BGP: accept all valid routes accept and advertise all
active routes
OSPF: accept all routes reject all routes
IS-IS: accept all routes reject all
RIP: Accept all valid RIP routes from reject all
configured neighbors
Route filters match-types
exact -> exact sm and prefix
orlonger -> exact + subsubnets
longer -> just subsubnets
upto -> up to a certain sm
prefix-length-range -> from sm min to sm max
Change the order of terms in policies
insert <term1> before <term2></term2></term1>
Firewall filters
Equivalent to ACL are configured with multiple terms and then need to be applied to interfaces in input or output
Firewall filters actions
Terminating:
- accept
- deny -> let the user know it’s been denied by a firewall
- discard
Flow-contorl
- next-term -> skip the term
Non terminating
- syslog/log → pass the info to the RE that stores it/keeps less detail
stored in the linecards memory
- count → counts the number of packet, you need to specify a
counter name
- policer → policying the traffic (control the mac packets that can go
through)
- forwarding-class → QoS
- loss-priority → QoS
Firewall filters on RE
To apply a firewall filter on the RE it needs to be applied to the internal switch/interface fxp01