In this section:
The SBC 5100, SBC 5110, SBC 5200, and SBC 5210 platforms are no longer supported beginning with the SBC Core 10.0.0R0 release. This release supports SBC 5400/7000/SWe/CNe platforms. Contact Ribbon Sales for upgrade information.
IP Access Control Lists (IP ACLs) are the packet filtering objects applied to incoming IP packets on the SBC Core. These objects protect the system from a variety of network-borne attacks.
Use IP ACLs to specify rules to permit or deny packets into the SBC. The IP ACL can optionally pass the traffic but at only a certain policed rate.
When you create an IP ACL rule, its state defaults to "disabled
". Change the state to "enabled
" to active the rule.
The default IP ACL supports 20 Record-Routes.
When a user creates a new management group the user must add user defined ACL rules to get the equivalent rules that are set up for the default management group.
The SBC 7000 system supports creating IP Interface Groups containing sets of IP interfaces that are not "processor friendly" (i.e. carried on physical Ethernet ports served by separate processors). However, restrictions exist regarding the usage of such Interface Groups.
(This ability does not apply to the SBC 5400 system which have only two physical media ports. IP interfaces from the two physical ports may be configured within the same IP Interface Groups without restrictions.)
For complete details, refer to Configuring IP Interface Groups and Interfaces.
Refer to SBC Provisioning Limits for the maximum number of IP ACLs allowed on the SBC.
The SBC 7000/SWe CLI syntax, parameter descriptions and command examples is provided below. Refer to IP Access Control List - Cloud - CLI for Cloud-equivalent CLI.
Command Syntax
% set addressContext <addressContext_name> ipAccessControlList...
// Mandatory parameters.
rule <rule_name> precedence <1-65535>
// Non-mandatory parameters.
action <accept | discard> bucketSize <bucket_size> destinationAddressPrefixLength <length> destinationIpAddress <IPv4/IPv6 Address> destinationPort <port number> fillRate <#> ipInterface <ipInterface name> ipInterfaceGroup <ipInterfaceGroup name> mgmtIpInterface <mgmtIpInterface name> mgmtIpInterfaceGroup <mgmtIpInterfaceGroup name> minTTL <0-255> protocol <any|0-255> sourceAddressPrefixLength <0-128> sourceIpAddress <IPv4/IPv6 Address> sourcePort <port number> state <disbled | enabled> vmAppName <VM application name>
Command Parameters
The following conditions apply:
sourceIpAddress
andsourcePort
belong to the entity that sends packets to the SBC.destinationIpAddress
anddestinationPort
belong to the SBC that receives the packets.ACLs is applicable only when an instance is receiving the packets and not when sending out the packets.
Command Examples
set addressContext default ipAccessControlList rule 2 action accept bucketSize unlimited destinationAddressPrefixLength 2 destinationIpAddress 10.34.25.153 destinationPort any fillRate 33 ipInterface ipInterface1 ipInterfaceGroup INTERNAL_IPIG precedence 22 protocol any sourceAddressPrefixLength 1 sourceIpAddress 10.32.22.145 sourcePort any state disabled show addressContext default ipAccessControlList rule 2 { precedence 22; protocol any; ipInterfaceGroup INTERNAL_IPIG; ipInterface ipInterface1; sourceIpAddress 10.32.22.145; sourceAddressPrefixLength 1; destinationIpAddress 10.34.25.153; destinationAddressPrefixLength 2; sourcePort any; destinationPort any; action accept; fillRate 33; bucketSize unlimited; state disabled; }
To display the IP access control list details with display level set to 1:
show addressContext default ipAccessControlList displaylevel 1 rule RULE1; rule rule1;
To display the IP access control list details with display level set to 3:
show addressContext default ipAccessControlList displaylevel 3 rule RULE1 { precedence 4; } rule rule1 { precedence 1; protocol any; sourceIpAddress 0.0.0.0; sourceAddressPrefixLength 0; destinationIpAddress 0.0.0.0; destinationAddressPrefixLength 0; sourcePort any; destinationPort any; action accept; fillRate unlimited; bucketSize unlimited; state disabled; }
To view the configured rules and precedence from System-level CLI:
show table addressContext default ipAccessControlList rule show table addressContext default ipAccessControlList ipAclRulesByPrecedence
To view statistics from System-level CLI:
show table addressContext default ipAccessControlList ipAclOverallStatistics show table addressContext a1 ipAccessControlList ipAclRuleStatistics
If using a management interface group other than the default, adding a set of ACL rules as shown below will replicate the defaulted ACL rules the system provides for the default management interface group. In this example, a management interface group mgmtGroup1
has been previously created.
set addressContext default ipAccessControlList rule mgmt2_22 destinationPort 22 mgmtIpInterfaceGroup mgmtGroup1 protocol tcp bucketSize 10 fillRate 100 precedence 200 action accept state enabled set addressContext default ipAccessControlList rule mgmt2_80 destinationPort 80 mgmtIpInterfaceGroup mgmtGroup1 protocol tcp bucketSize 10 fillRate 100 precedence 201 action accept state enabled set addressContext default ipAccessControlList rule mgmt2_161 destinationPort 161 mgmtIpInterfaceGroup mgmtGroup1 protocol udp bucketSize 10 fillRate 50 precedence 202 action accept state enabled set addressContext default ipAccessControlList rule mgmt2_123 sourcePort 123 mgmtIpInterfaceGroup mgmtGroup1 protocol udp bucketSize 4 fillRate 4 precedence 103 state enabled set addressContext default ipAccessControlList rule mgmt2_162 sourcePort 162 mgmtIpInterfaceGroup mgmtGroup1 protocol udp bucketSize fillRate 10 precedence 104 state enabled set addressContext default ipAccessControlList rule mgmt2_1812 sourcePort 1812 mgmtIpInterfaceGroup mgmtGroup1 protocol udp bucketSize 4 fillRate 4 precedence 105 state enabled set addressContext default ipAccessControlList rule mgmt2_2022 destinationPort 2022 mgmtIpInterfaceGroup mgmtGroup1 protocol tcp bucketSize 10 fillRate 10 precedence 206 action accept state enabled set addressContext default ipAccessControlList rule mgmt2_443 destinationPort 443 mgmtIpInterfaceGroup mgmtGroup1 protocol tcp bucketSize 10 fillRate 100 precedence 208 action accept state enabled set addressContext default ipAccessControlList rule mgmt2_2024 destinationPort 2024 mgmtIpInterfaceGroup mgmtGroup1 protocol tcp bucketSize 250 fillRate 2500 precedence 209 action accept state enabled set addressContext default ipAccessControlList rule mgmt2_1813 sourcePort 1813 mgmtIpInterfaceGroup mgmtGroup1 protocol udp bucketSize 250 fillRate 1200 precedence 110 state enabled commit
To view the default system IP ACL statistics:
show table addressContext default ipAccessControlList defaultAclStatistics ADDRESS LIF VM ACL CONTEXT GRP SOURCE IP DESTINATION IP POLICING BUCKET POL POL PACKET PACKET GUEST ID PROTOCOL APPLICATION ID ID ADDRESS ADDRESS MODE SIZE CREDIT RATE ID PRIORITY ACCEPT DISCARD AGG POL OWNER ID ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- 9 UDP dns_udp_guest * * * (53) * (0) PktRate 50 pkt 1000 pkt/s 0 0 0 0 none vm anyVm 10 TCP dns_tcp_guest * * * (53) * (0) PktRate 50 pkt 1000 pkt/s 0 0 0 0 none vm anyVm 11 TCP sftp_guest * * * (0) * (2024) DataPktRate 50000 pkt 50000 pkt/s 0 0 0 0 none vm anyVm 12 TCP ssh_guest * * * (0) * (22) DataPktRate 50000 pkt 50000 pkt/s 0 0 1 0 none vm anyVm 13 ICMPv4 icmpv4_guest * * * (0) * (0) DataPktRate 10 pkt 50 pkt/s 18 1 0 0 pol_icmp vm anyVm 14 ICMPv6 icmpv6_guest * * * (0) * (0) DataPktRate 10 pkt 400 pkt/s 18 1 0 0 pol_icmp vm anyVm 18 ICMPv4 icmpv4 * * * (0) * (0) PktRate 50 pkt 50 pkt/s 22 1 66 0 ICMP SBX5000 host 19 ICMPv6 icmpv6 * * * (0) * (0) PktRate 50 pkt 50 pkt/s 22 1 0 0 ICMP SBX5000 host 20 TCP ssh 1 1 * (0) 10.6.82.35/32 (22) PktRate 50 pkt 1000 pkt/s 19 1 118 0 OAM SBX5000 host 21 TCP web-client 1 1 * (0) 10.6.82.35/32 (80) PktRate 50 pkt 10 pkt/s 19 1 31 0 OAM SBX5000 host 22 UDP snmp 1 1 * (0) 10.6.82.35/32 (161) PktRate 50 pkt 1000 pkt/s 19 1 0 0 OAM SBX5000 host 23 TCP confd 1 1 * (0) 10.6.82.35/32 (2022) PktRate 50 pkt 100 pkt/s 19 1 0 0 OAM SBX5000 host 24 TCP secure-web-client 1 1 * (0) 10.6.82.35/32 (443) PktRate 50 pkt 20000 pkt/s 20 1 5583 0 SFTP SBX5000 host 25 TCP sftp 1 1 * (0) 10.6.82.35/32 (2024) PktRate 50 pkt 20000 pkt/s 20 1 0 0 SFTP SBX5000 host 26 TCP connexIp-manager 1 1 * (0) 10.6.82.35/32 (444) PktRate 50 pkt 20000 pkt/s 20 1 0 0 SFTP SBX5000 host 27 TCP secure-LI-client 1 1 * (0) 10.6.82.35/32 (1099) PktRate 50 pkt 10 pkt/s 19 1 0 0 OAM SBX5000 host 28 TCP ssreq-tcp 1 1 * (0) 10.6.82.35/32 (3091) PktRate 50 pkt 10 pkt/s 19 1 0 0 OAM SBX5000 host 29 UDP ssreq-udp 1 1 * (0) 10.6.82.35/32 (3090) PktRate 50 pkt 10 pkt/s 19 1 0 0 OAM SBX5000 host 30 TCP ssh 1 1 * (0) 10.6.83.35/32 (22) PktRate 50 pkt 1000 pkt/s 19 1 0 0 OAM SBX5000 host 31 TCP web-client 1 1 * (0) 10.6.83.35/32 (80) PktRate 50 pkt 10 pkt/s 19 1 0 0 OAM SBX5000 host 32 UDP snmp 1 1 * (0) 10.6.83.35/32 (161) PktRate 50 pkt 1000 pkt/s 19 1 0 0 OAM SBX5000 host 33 TCP confd 1 1 * (0) 10.6.83.35/32 (2022) PktRate 50 pkt 100 pkt/s 19 1 0 0 OAM SBX5000 host 34 TCP secure-web-client 1 1 * (0) 10.6.83.35/32 (443) PktRate 50 pkt 20000 pkt/s 20 1 0 0 SFTP SBX5000 host 35 TCP sftp 1 1 * (0) 10.6.83.35/32 (2024) PktRate 50 pkt 20000 pkt/s 20 1 0 0 SFTP SBX5000 host 36 TCP connexIp-manager 1 1 * (0) 10.6.83.35/32 (444) PktRate 50 pkt 20000 pkt/s 20 1 0 0 SFTP SBX5000 host 37 TCP secure-LI-client 1 1 * (0) 10.6.83.35/32 (1099) PktRate 50 pkt 10 pkt/s 19 1 0 0 OAM SBX5000 host 38 TCP ssreq-tcp 1 1 * (0) 10.6.83.35/32 (3091) PktRate 50 pkt 10 pkt/s 19 1 0 0 OAM SBX5000 host 39 UDP ssreq-udp 1 1 * (0) 10.6.83.35/32 (3090) PktRate 50 pkt 10 pkt/s 19 1 0 0 OAM SBX5000 host 40 UDP ntp 1 1 10.1.1.2/32 (123) * (0) PktRate 50 pkt 10 pkt/s 21 1 267 0 RBA SBX5000 host
The following example CLI ipAccessControlList
commands define ACL rules to allow SSReq to receive packets on ports 3090 and 3091:
- Port 3090 is used by SSReq Server to receive XML requests over UDP from a SSReq Client.
- Port 3091 is used by SSReq Server to receive XML requests over TCP from a SSREeq Client.
set addressContext default ipAcessControlList rule ssrequdp precedence 2 destinationPort 3090 state enabled set addressContext default ipAcessControlList rule ssreqtcp precedence 3 destionationPort 3091 state enabled
System ACLs are displayed only for default AddressContext.
System ACL Command Parameters