16.03.2014 Views

Policy Framework Configuration Guide - Juniper Networks

Policy Framework Configuration Guide - Juniper Networks

Policy Framework Configuration Guide - Juniper Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Junos 10.4 <strong>Policy</strong> <strong>Framework</strong> <strong>Configuration</strong> <strong>Guide</strong><br />

all these functions are standard firewall filters. The Junos OS also supports two additional<br />

specialized firewall filter types: simple filters and service filters.<br />

NOTE: There is no limit to the number of filters and counters you can set, but<br />

there are some practical considerations. More counters require more terms,<br />

and a large number of terms can take a long time to process during a commit<br />

operation. However, filters with more than 4000 terms and counters have<br />

been implemented successfully.<br />

Firewall Filter Components<br />

A firewall filter consists of a protocol family and one or more terms that specify the<br />

filtering criteria and the action to take if a match occurs. After you define a firewall filter,<br />

you apply it to specific interfaces. Because the firewall filter process consists of two<br />

aspects—creating filters and then applying them—you can reuse the same filters on your<br />

router. Also, when you need to update the firewall filter itself, you have to make the<br />

change only in one place.<br />

Protocol Family<br />

When writing a firewall filter, you start by selecting the protocol family for which you<br />

want to specify filtering criteria. Firewall filters support the following protocol families:<br />

• IPv4 (inet)<br />

• IPv6 (inet6)<br />

• MPLS (mpls)<br />

• VPLS (vpls)<br />

• Circuit cross-connects (ccc)<br />

• (MX Series Ethernet Services routers only) Bridge (bridge)<br />

• Protocol-independent (any)<br />

Terms<br />

Firewall filters require that you use terms. Each term can include both match criteria and<br />

actions.<br />

The order in which you configure firewall filter terms is important. Terms are evaluated<br />

in the order in which they are configured. By default, new terms are always added to the<br />

end of the existing filter. You can use the insert command to reorder the terms of a firewall<br />

filter.<br />

By default, each firewall filter ends with an implicit deny-all term. The final default action<br />

is to discard all packets. Packets that do not match any of the configured match conditions<br />

in a firewall filter are silently discarded.<br />

184<br />

Copyright © 2010, <strong>Juniper</strong> <strong>Networks</strong>, Inc.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!