
Multi-Service IronWare Security Configuration Guide 131
53-1003035-02
Enabling ACL filtering of fragmented or non-fragmented packets
3
ACL entries with Layer-3 and Layer-4 information that do not contain the fragment keyword
In this situation, any packet that is not fragmented or is the 1st packet within a fragmented packet
flow and also contains the Layer-3 and Layer-4 information specified in the ACL will be matched.
Packets that are non-initial packets within a fragmented packet flow and match the Layer-3
information will be matched for the permit clause because in conservative ACL fragment mode,
Layer-4 information is disregarded for non-initial packets. Also, non-initial packets within a
fragmented packet flow will not be matched for the deny clause because in conservative ACL
fragment mode, the deny clause is not invoked for non-initial packets within a fragmented packet
flow. Refer to Table 18 for operation in this scenario.
ACL entries with Layer-3 and Layer-4 information that contains the fragment keyword
In this situation, any packet that is not fragmented or is the 1st packet within a fragmented packet
flow will not be matched because the fragment keyword is specified in the ACL. Packets that are
non-initial packets within a fragmented packet flow, match the fragment keyword and match the
Layer-3 information will be matched for the permit clause because in conservative ACL fragment
mode, Layer-4 information is disregarded for non-initial packets. Also, non-initial packets within a
fragmented packet flow will not be matched for the deny clause because in conservative ACL
fragment mode, the deny clause is not invoked for non-initial packets within a fragmented packet
flow. Refer to Table 19 for operation in this scenario.
TABLE 17 ACL entry with Layer-3 information only and fragment keyword in ACL
Packet matches AND is either a non-fragmented
or th e 1 st packet wi thin a f ragmented p ac ke t f low
Packet matches AND is a non-initial packet within
a fragmented packet flow
permit No – Does not match because fragment keyword
is in ACL and packet is either non-fragmented or
the 1st packet within a fragmented packet flow.
Yes – Matches because fragment keyword is in
ACL and packet is a non-initial packet within a
fragmented packet flow and the packet matches
the Layer-3 information in the ACL.
deny No – Does not match because fragment keyword
is in ACL and packet is either non-fragmented or
the 1st packet within a fragmented packet flow.
Yes – Matches because fragment keyword is in
ACL and packet is a non-initial packet within a
fragmented packet flow and the packet matches
the Layer-3 information in the ACL.
TABLE 18 ACL entry with Layer-3 and Layer-4 information and no fragment keyword in ACL
Packet matches AND is either a
non-fragmented or the 1st packet within a
fragmented packet flow
Packet matches AND is a non-initial packet within a
fragmented packet flow
permit Yes – Matches because the packet matches
the Layer-3 and Layer-4 Information in the ACL.
Yes – Matches because the packet matches the
Layer-3 Information in the ACL and in conservative
mode, Layer-4 information is disregarded for
non-initial packets within a fragmented packet flow.
deny Yes – Matches because the packet matches
the Layer-3 and Layer-4 Information in the ACL.
No – Does not match because in conservative mode,
the deny clause is not invoked for non-initial packets
within a fragmented packet flow.
Kommentare zu diesen Handbüchern