net packet-filterΒΆ

net packet-filter(1)	      BIG-IP TMSH Manual	  net packet-filter(1)



NAME
       packet-filter - Configures packet filter rules.

MODULE
       net

SYNTAX
       Configure the packet-filter component within the net module using the
       syntax in the following sections.

   CREATE/MODIFY
	create packet-filter [name]
	modify packet-filter [name]
	  options:
	    action [accept | continue | discard | reject]
	    app-service [[string] | none]
	    description [string]
	    logging [enabled | disabled]
	    order [integer]
	    rate-class [name]
	    rule "[BPF expression]"
	    vlan [name]

	edit packet-filter [ [ [name] | [glob] | [regex] ] ... ]
	  options:
	    all-properties
	    non-default-properties

	reset-stats packet-filter
	reset-stats packet-filter
	  [ [ [name] | [glob] | [regex] ] ... ]

   DISPLAY
	list packet-filter
	list packet-filter
	  [ [ [name] | [glob] | [regex] ] ... ]
	show running-config packet-filter
	show running-config packet-filter
	  [ [ [name] | [glob] | [regex] ] ... ]
	  options:
	    all-properties
	    non-default-properties
	    one-line

	show packet-filter
	show packet-filter [ [ [name] | [glob] | [regex] ] ... ]
	  options:
	    (default | exa | gig | kil | meg | peta | raw | tera | yotta | zetta)
	    field-fmt

   DELETE
	delete packet-filter [ all | [name] ]

DESCRIPTION
       You can use the packet-filter component to create a layer of security
       for the traffic management system using packet filter rules.

       The BIG-IP(r) system packet filters are based on the Berkeley Software
       Design Packet Filter (BPF) architecture. Packet filter rules are
       composed of four mandatory attributes and three optional attributes.
       The mandatory attributes are name, order, action, and rule. The
       optional attributes are vlan, logging, and rate-class. The rule
       attribute you choose defines the BPF script to match for the rule.

       Important: By default, packet filtering is disabled. You must enable
       packet filtering using the Configuration utility. For more information,
       see the TMOS(r) Management Guide for BIG-IP(r) Systems.

EXAMPLES
       You can create a set of rules that specify what incoming traffic you
       want the system to accept and how to accept it. See the examples
       following.

       Example 1: Block spoofed addresses
	    This example prevents private IP addresses from being accepted on
	    a public VLAN. This is a way of ensuring that no one can spoof
	    private IP addresses through the external VLAN of the system. In
	    this example, the system logs when this happens:

	     create packet-filter spoof_blocker {
		order 5
		action discard
		vlan external
		logging enabled
		rule " (src net 172.19.255.0/24) "
	     }

       Example 2: Allow restricted management access
	    You can provide restricted SSH and HTTPS access to the traffic
	    management system for management purposes, and keep a log of that
	    access. Note: This not the same management access you can get
	    through the management port/interface (mgmt); that interface is
	    not affected by any packet filter configuration, and if that is
	    the only way you want to allow access to your system, this
	    configuration is not necessary.

	    In the first rule shown below, SSH is allowed access from a single
	    fixed-address administrative workstation, and each access is
	    logged. In the subsequent rule, browser-based Configuration
	    utility access is allowed from two fixed-address administrative
	    workstations; however, access is not logged.

	     create packet-filter management_ssh {
		  order 10
		  action accept
		  logging enabled
		  rule " (proto TCP) and (src host 172.19.254.10) and
			 (dst port 22) "
	     }

	     create packet-filter management_gui {
		  order 15
		  action accept
		  rule " (proto TCP) and (src host 172.19.254.2 or
			 src host 172.19.254.10) and (dst port 443) "
	     }

       Example 3: Allow access to all virtual servers
	    In this final example, you can verify that all of the virtual
	    servers in your configuration are reachable from the public
	    network. This is critical if you have decided to use a default-
	    deny policy. This example also shows how to rate shape all traffic
	    to the virtual server IP address with a default rate class (that
	    can be overridden by individual virtual servers or iRules(r)
	    later).

	    Note: This example has a single virtual server IP, and it does not
	    matter what port traffic is destined for. If you want to be more
	    specific, you can specify each service port, as well (for example,
	    HTTP, FTP, telnet).

	     create packet-filter virtuals {
		   order 20
		   action accept
		   vlan external
		   rate class root
		   rule " ( dst host 172.19.254.80 ) "
	      }

OPTIONS
       You can use these options with the packet-filter component to create
       packet filter rules:

       action
	    Specifies how the system handles a packet that matches the
	    criteria in the packet filter rule. There is no default; you must
	    specify a value when you create a packet filter rule.

	    The possible values are:

	    accept
		 Indicates that the system accepts the packet, and stops
		 processing additional packet filter rules, if there are any.

	    continue
		 Indicates that the system acknowledges the packet for logging
		 or statistical purposes, but makes no decision on how to
		 handle the packet. The system continues to evaluate traffic
		 matching a rule with the Continue action, starting with the
		 next packet filter rule in the list.

	    discard
		 Indicates that the system drops the packet, and stops
		 processing additional packet filter rules, if there are any.

	    reject
		 Indicates that the system drops the packet, and also sends a
		 reject packet to the sender, indicating that the packet was
		 refused.

       app-service
	    Specifies the name of the application service to which the object
	    belongs. The default value is none. Note: If the strict-updates
	    option is enabled on the application service that owns the object,
	    you cannot modify or delete the object. Only the application
	    service can modify or delete the object.

       description
	    User defined description.

       glob Displays the items that match the glob expression. See help glob
	    for a description of glob expression syntax.

       logging
	    Enables or disables packet filter logging. If you omit this value,
	    no logging is performed.

       name Specifies a unique name for the component. This option is required
	    for the commands create, delete, and modify.

       order
	    Specifies a sort order greater than 0 (zero). No two rules may
	    have the same sort order. There is a single, global list of rules.
	    Each rule in the list has a relative integer order. The system
	    first evaluates the rule with the lowest order value, and then
	    evaluates all other rules based on ascent of the order value
	    assigned to each rule.

	    For example, if there are 5 rules, numbered 500, 100, 300, 200,
	    201; the rule evaluation order is 100, 200, 201, 300, 500.

	    The system compares each packet to be filtered against the list of
	    rules in sequence, starting with the first. Evaluation of the rule
	    list stops on the first match that has an action of accept,
	    discard or reject. A match on a rule with an action of none does
	    not stop further evaluation of the rule list; the system updates
	    the statistics count and generates a log if the rule indicates it,
	    but otherwise rule processing continues with the next rule in the
	    list.

	    F5 Networks recommends that you sequence rules for effect and
	    efficiency; generally this means:

	    -- Assign the lowest order to more specific rules, so that the
	    system will evaluate those rules first.

	    -- The system evaluates one expression with multiple criteria more
	    efficiently than multiple expressions each with a single
	    criterion.

	    This option is required.

       rate-class
	    Specifies the name of a rate class. The value is the name of any
	    existing rate class. If omitted, no rate filter is applied.

       regex
	    Displays the items that match the regular expression. The regular
	    expression must be preceded by an at sign (@[regular expression])
	    to indicate that the identifier is a regular expression. See help
	    regex for a description of regular expression syntax.

       rule Specifies the BPF expression to match. The rule is mandatory,
	    however you can leave it empty. If empty, the packet filter rule
	    matches all packets.

       vlan Specifies the VLAN to which the packet filter rule applies. The
	    value for this option is any VLAN name currently in existence. If
	    you omit this value, the rule applies to all VLANs. If you do not
	    provide a VLAN name when you create a packet-filter, the rule
	    applies to all VLANs.

SEE ALSO
       create, delete, edit, glob,   list, ltm virtual, modify, net packet-
       filter-trusted, net vlan, net vlan-group, regex, reset-stats, show,
       tmsh

COPYRIGHT
       No part of this program may be reproduced or transmitted in any form or
       by any means, electronic or mechanical, including photocopying,
       recording, or information storage and retrieval systems, for any
       purpose other than the purchaser's personal use, without the express
       written permission of F5 Networks, Inc.

       F5 Networks and BIG-IP (c) Copyright 2008-2010, 2012-2013. All rights
       reserved.



BIG-IP				  2013-10-25		  net packet-filter(1)