The following example shows how to create a stateless firewall filter, protect-RE, that discards all traffic destined for the Routing Engine, except SSH and BGP protocol packets from specified trusted sources. Table 97 lists the terms that are configured in this sample filter.
Table 97: Sample Stateless Firewall Filter protect-RE Terms to Allow Packets from Trusted Sources
|
Term |
Purpose |
|---|---|
|
ssh-term |
Accepts TCP packets with a source address of 192.168.122.0/24 and a destination port that specifies SSH. |
|
bgp-term |
Accepts TCP packets with a source address of 10.2.1.0/24 and a destination port that specifies the BGP protocol. |
|
discard-rest-term |
For all packets that are not accepted by ssh-term or bgp-term, creates a firewall filter log and system logging records, then discards all packets. To view the log, enter the show firewall log operational mode command. (For more information, see Displaying Stateless Firewall Filter Logs.) |
By applying firewall filter protect-RE to the Routing Engine, you specify which protocols and services, or applications, are allowed to reach the Routing Engine, and you ensure the packets are from a trusted source. This protects processes running on the Routing Engine from an external attack.
To use the configuration editor to configure the stateless firewall filter:
Table 98: Configuring a Protocols and Services Firewall Filter for the Routing Engine