Configuring Policies to Provide Network Security
You can configure policy management to provide a level of network security by using policy rules that selectively forward or filter packet flows:
- ForwardCauses the packet flows that satisfy the classification associated with the rule to be routed by the virtual router
- FilterCauses the interface to drop all packets of the packet flow that satisfy the classification associated with the rule
To stop a denial-of-service attack, you can use a policy with a filter rule. You need to construct the classifier list associated with the filter rule so that it isolates the attacker's traffic into a flow. To determine the criteria for this classifier list, you need to analyze the traffic received on an interface. Chapter 9, Monitoring Policy Management, describes how to capture packets into a log.
For example, you can route packets entering an IP interface (ATM 0/0.0) so that they are handled as indicated:
- Packets from source 1.1.1.1 are routed.
- TCP packets from source 2.2.2.2 with the IP fragmentation offset set to one are dropped.
- All other TCP packets are routed.
- All other packets are dropped.
To configure this policy, issue the following commands:
host1(config)#ip classifier-list claclA ip host 1.1.1.1 anyhost1(config)#ip classifier-list claclB tcp host 2.2.2.2 any ip-frag-offset eq 1host1(config)#ip classifier-list claclC tcp any anyhost1(config)#ip policy-list IpPolicy100host1(config-policy-list)#classifier-group claclAhost1(config-policy-list-classifier-group)#forwardhost1(config-policy-list-classifier-group)#exithost1(config-policy-list)#classifier-group claclBhost1(config-policy-list-classifier-group)#filterhost1(config-policy-list-classifier-group)#exithost1(config-policy-list)#classifier-group claclChost1(config-policy-list-classifier-group)#forwardhost1(config-policy-list-classifier-group)#exithost1(config-policy-list)#classifier-group *host1(config-policy-list-classifier-group)#filterhost1(config-policy-list-classifier-group)#exithost1(config)#interface atm 0/0.0host1(config-subif)#ip policy input IpPolicy100 statistics enabled