net packet-filterΒΆ

net packet-filter(1)				  BIG-IP TMSH Manual				 net packet-filter(1)

NAME
       packet-filter - Configures packet filter rules.

MODULE
       net

SYNTAX
       Configure the packet-filter component within the net module using the syntax in the following sections.

   CREATE/MODIFY
	create packet-filter [name]
	modify packet-filter [name]
	  options:
	    action [accept | continue | discard | reject]
	    app-service [[string] | none]
	    description [string]
	    logging [enabled | disabled]
	    order [integer]
	    rate-class [name]
	    rule "[BPF expression]"
	    vlan [name]

	edit packet-filter [ [ [name] | [glob] | [regex] ] ... ]
	  options:
	    all-properties
	    non-default-properties

	reset-stats packet-filter
	reset-stats packet-filter
	  [ [ [name] | [glob] | [regex] ] ... ]

   DISPLAY
	list packet-filter
	list packet-filter
	  [ [ [name] | [glob] | [regex] ] ... ]
	show running-config packet-filter
	show running-config packet-filter
	  [ [ [name] | [glob] | [regex] ] ... ]
	  options:
	    all-properties
	    non-default-properties
	    one-line

	show packet-filter
	show packet-filter [ [ [name] | [glob] | [regex] ] ... ]
	  options:
	    (default | exa | gig | kil | meg | peta | raw | tera | yotta | zetta)
	    field-fmt

   DELETE
	delete packet-filter [ all | [name] ]

DESCRIPTION
       You can use the packet-filter component to create a layer of security for the traffic management system using
       packet filter rules.

       The BIG-IP(r) system packet filters are based on the Berkeley Software Design Packet Filter (BPF)
       architecture. Packet filter rules are composed of four mandatory attributes and three optional attributes. The
       mandatory attributes are name, order, action, and rule. The optional attributes are vlan, logging, and rate-
       class. The rule attribute you choose defines the BPF script to match for the rule.

       Important: By default, packet filtering is disabled. You must enable packet filtering using the Configuration
       utility. For more information, see the TMOS(r) Management Guide for BIG-IP(r) Systems.

EXAMPLES
       You can create a set of rules that specify what incoming traffic you want the system to accept and how to
       accept it. See the examples following.

       Example 1: Block spoofed addresses
	    This example prevents private IP addresses from being accepted on a public VLAN. This is a way of
	    ensuring that no one can spoof private IP addresses through the external VLAN of the system. In this
	    example, the system logs when this happens:

	     create packet-filter spoof_blocker {
		order 5
		action discard
		vlan external
		logging enabled
		rule " (src net 172.19.255.0/24) "
	     }

       Example 2: Allow restricted management access
	    You can provide restricted SSH and HTTPS access to the traffic management system for management purposes,
	    and keep a log of that access. Note: This not the same management access you can get through the
	    management port/interface (mgmt); that interface is not affected by any packet filter configuration, and
	    if that is the only way you want to allow access to your system, this configuration is not necessary.

	    In the first rule shown below, SSH is allowed access from a single fixed-address administrative
	    workstation, and each access is logged. In the subsequent rule, browser-based Configuration utility
	    access is allowed from two fixed-address administrative workstations; however, access is not logged.

	     create packet-filter management_ssh {
		  order 10
		  action accept
		  logging enabled
		  rule " (proto TCP) and (src host 172.19.254.10) and
			 (dst port 22) "
	     }

	     create packet-filter management_gui {
		  order 15
		  action accept
		  rule " (proto TCP) and (src host 172.19.254.2 or
			 src host 172.19.254.10) and (dst port 443) "
	     }

       Example 3: Allow access to all virtual servers
	    In this final example, you can verify that all of the virtual servers in your configuration are reachable
	    from the public network. This is critical if you have decided to use a default-deny policy. This example
	    also shows how to rate shape all traffic to the virtual server IP address with a default rate class (that
	    can be overridden by individual virtual servers or iRules(r) later).

	    Note: This example has a single virtual server IP, and it does not matter what port traffic is destined
	    for. If you want to be more specific, you can specify each service port, as well (for example, HTTP, FTP,
	    telnet).

	     create packet-filter virtuals {
		   order 20
		   action accept
		   vlan external
		   rate class root
		   rule " ( dst host 172.19.254.80 ) "
	      }

OPTIONS
       You can use these options with the packet-filter component to create packet filter rules:

       action
	    Specifies how the system handles a packet that matches the criteria in the packet filter rule. There is
	    no default; you must specify a value when you create a packet filter rule.

	    The possible values are:

	    accept
		 Indicates that the system accepts the packet, and stops processing additional packet filter rules,
		 if there are any.

	    continue
		 Indicates that the system acknowledges the packet for logging or statistical purposes, but makes no
		 decision on how to handle the packet. The system continues to evaluate traffic matching a rule with
		 the Continue action, starting with the next packet filter rule in the list.

	    discard
		 Indicates that the system drops the packet, and stops processing additional packet filter rules, if
		 there are any.

	    reject
		 Indicates that the system drops the packet, and also sends a reject packet to the sender, indicating
		 that the packet was refused.

       app-service
	    Specifies the name of the application service to which the object belongs. The default value is none.
	    Note: If the strict-updates option is enabled on the application service that owns the object, you cannot
	    modify or delete the object. Only the application service can modify or delete the object.

       description
	    User defined description.

       glob Displays the items that match the glob expression. See help glob for a description of glob expression
	    syntax.

       logging
	    Enables or disables packet filter logging. If you omit this value, no logging is performed.

       name Specifies a unique name for the component. This option is required for the commands create, delete, and
	    modify.

       order
	    Specifies a sort order greater than 0 (zero). No two rules may have the same sort order. There is a
	    single, global list of rules. Each rule in the list has a relative integer order. The system first
	    evaluates the rule with the lowest order value, and then evaluates all other rules based on ascent of the
	    order value assigned to each rule.

	    For example, if there are 5 rules, numbered 500, 100, 300, 200, 201; the rule evaluation order is 100,
	    200, 201, 300, 500.

	    The system compares each packet to be filtered against the list of rules in sequence, starting with the
	    first. Evaluation of the rule list stops on the first match that has an action of accept, discard or
	    reject. A match on a rule with an action of none does not stop further evaluation of the rule list; the
	    system updates the statistics count and generates a log if the rule indicates it, but otherwise rule
	    processing continues with the next rule in the list.

	    F5 Networks recommends that you sequence rules for effect and efficiency; generally this means:

	    -- Assign the lowest order to more specific rules, so that the system will evaluate those rules first.

	    -- The system evaluates one expression with multiple criteria more efficiently than multiple expressions
	    each with a single criterion.

	    This option is required.

       rate-class
	    Specifies the name of a rate class. The value is the name of any existing rate class. If omitted, no rate
	    filter is applied.

       regex
	    Displays the items that match the regular expression. The regular expression must be preceded by an at
	    sign (@[regular expression]) to indicate that the identifier is a regular expression. See help regex for
	    a description of regular expression syntax.

       rule Specifies the BPF expression to match. The rule is mandatory, however you can leave it empty. If empty,
	    the packet filter rule matches all packets.

       vlan Specifies the VLAN to which the packet filter rule applies. The value for this option is any VLAN name
	    currently in existence. If you omit this value, the rule applies to all VLANs. If you do not provide a
	    VLAN name when you create a packet-filter, the rule applies to all VLANs.

SEE ALSO
       create, delete, edit, glob,   list, ltm virtual, modify, net packet-filter-trusted, net vlan, net vlan-group,
       regex, reset-stats, show, tmsh

COPYRIGHT
       No part of this program may be reproduced or transmitted in any form or by any means, electronic or
       mechanical, including photocopying, recording, or information storage and retrieval systems, for any purpose
       other than the purchaser's personal use, without the express written permission of F5 Networks, Inc.

       F5 Networks and BIG-IP (c) Copyright 2008-2010, 2012-2013. All rights reserved.

BIG-IP						      2013-10-25				 net packet-filter(1)