Filtering On Source Ip Address And Destination Protocol - Brocade Communications Systems 5600 vRouter Configuration Manual

Hide thumbs Also See for 5600 vRouter:
Table of Contents

Advertisement

TABLE 2 Filtering on source and destination IP
Step
Create the configuration node for the FWTEST-2 firewall instance and its
rule 1. This rule accepts traffic matching the specified criteria.
Define a rule that filters traffic on the 10.10.30.46 source IP address.
Define a rule that filters traffic on the 10.10.40.101 destination IP address.
Apply FWTEST-2 to outbound packets on dp0p1p2 vif 40.
Commit the configuration.
Show the configuration.

Filtering on source IP address and destination protocol

The following example shows how to define a firewall rule that filters on source IP address and destination protocol. This rule allows TCP
packets originating from address 10.10.30.46 (that is, R5), and destined for the Telnet port of R1. The instance is applied to local packets
(that is, packets destined for this router, R1) through the dp0p1p2 interface.
To create an instance that filters on source IP address and destination protocol, perform the following steps in configuration mode.
TABLE 3 Filtering on source IP and destination protocol
Step
Create the configuration node for the FWTEST-3 firewall instance and its
rule 1. This rule accepts traffic matching the specified criteria.
Define a rule that filters traffic on the 10.10.30.46 source IP address.
Define a rule that filters TCP traffic.
Brocade 5600 vRouter Firewall Configuration Guide
53-1004253-01
Command
vyatta@R1# set security firewall name FWTEST-2
rule 1 action accept
vyatta@R1# set security firewall name FWTEST-2
rule 1 source address 10.10.30.46
vyatta@R1# set security firewall name FWTEST-2
rule 1 destination address 10.10.40.101
vyatta@R1# set interfaces dataplane dp0p1p2 vif 40
firewall out FWTEST-2
vyatta@R1# commit
vyatta@R1# show security firewall name FWTEST-2
rule 1 {
action accept
destination {
address 10.10.40.101
}
source {
address 10.10.30.46
}
}
vyatta@R1# show interfaces dataplane dp0p1p2
vif 40 {
firewall {
out FWTEST-2
}
}
Command
vyatta@R1# set security firewall name FWTEST-3
rule 1 action accept
vyatta@R1# set security firewall name FWTEST-3
rule 1 source address 10.10.30.46
vyatta@R1# set security firewall name FWTEST-3
rule 1 protocol tcp
Configuration Examples
23

Advertisement

Table of Contents
loading

Table of Contents