Sample Firewall Policy Configurations On Oa-700 - Alcatel-Lucent OmniAccess 700 Cli Configuration Manual

Release versions: 2.2, 2.2-r02, 2.3
Hide thumbs Also See for OmniAccess 700:
Table of Contents

Advertisement

S
F
P
AMPLE
IREWALL
E
1
XAMPLE
As the default setting, detection of all stateless attacks with logging is applied at
the ingress path of all interfaces. To be exact, the following is the default setting
for a brand new box out of factory:
match-list everything
ip any any type any
firewall
attack a1
policy p1
match everything attack a1 reset
interface GigabitEthernet7/0
firewall policy in p1
E
2
XAMPLE
This example checks traffic from outside-zone to inside-zone for attacks defined in
"d1". If found, TCP RST will be sent to both source and destination for TCP traffic.
Packets will be dropped for non-TCP traffic.
list outside-zone interface GigabitEthernet7/0
GigabitEthernet3/0
list inside-zone interface GigabitEthernet7/1
match-list m1
tcp list outside-zone list inside-zone type ftp
firewall
attack d1
policy p1
interface GigabitEthernet7/0
firewall policy in p1
CLI Configuration Guide
Beta
C
OLICY
ONFIGURATIONS ON
default stateless
default
match m1 attack d1 reset
Alcatel-Lucent
Except on the first page, right running head:
Heading1 or Heading1NewPage text (automatic)
Network Attack Prevention Configuration
OA-700
695
Beta

Advertisement

Table of Contents
loading

Table of Contents