Добрый день..
свитч DGS-3200-24 FW:1.62.B017
необходимо ограничить на опред портах весь трафик кроме РРРоЕ
вот правила
Код:
# ACL
create access_profile profile_id 1 ethernet ethernet_type
config access_profile profile_id 1 add access_id 1 ethernet ethernet_type 0x8863 port 11,15 permit rx_rate no_limit
config access_profile profile_id 1 add access_id 2 ethernet ethernet_type 0x8864 port 11,15 permit rx_rate no_limit
config access_profile profile_id 1 add access_id 3 ethernet ethernet_type 0x86DD port 11,13,15 deny
config access_profile profile_id 1 add access_id 4 ethernet ethernet_type 0x800 port 11,15 deny
config access_profile profile_id 1 add access_id 5 ethernet ethernet_type 0x806 port 11,15 deny
config access_profile profile_id 1 add access_id 6 ethernet ethernet_type 0xE0 port 11,15 deny
disable cpu_interface_filtering
собсно третье правило запрещает прохождение пакетов IPv6 на 11,13,15 портах
но снифиром вижу такую картину
Код:
09:08:50.758649 00:26:9e:7d:6d:f3 > 33:33:00:01:00:02, ethertype IPv6 (0x86dd), length 159: fe80::5482:a4:434:5542.546 > ff02::1:2.547: dhcp6 solicit
09:08:51.241596 00:04:61:45:b4:08 > 33:33:00:01:00:02, ethertype IPv6 (0x86dd), length 147: fe80::5d7d:2dfd:4d08:4093.546 > ff02::1:2.547: dhcp6 solicit
09:08:51.673030 00:13:60:ec:ab:9a > 01:00:0c:cc:cc:cd, 802.3, length 64: LLC, dsap SNAP (0xaa) Individual, ssap SNAP (0xaa) Command, ctrl 0x03: oui Cisco (0x00000c), pid PVST (0x010b): STP 802.1d, Config, Flags [none], bridge-id 8259.00:18:74:2c:37:00.800f, length 42
09:08:51.678114 00:24:01:fc:2f:4f > cf:00:00:00:00:00, ethertype Loopback (0x9000), length 60:
09:08:51.678274 00:24:01:fc:2f:59 > cf:00:00:00:00:00, ethertype Loopback (0x9000), length 60:
09:08:51.681297 00:24:01:fc:2f:59 > cf:00:00:00:00:00, ethertype Loopback (0x9000), length 60:
09:08:52.407674 00:1e:90:8e:88:29 > 33:33:ff:34:55:42, ethertype IPv6 (0x86dd), length 86: fe80::dc45:3832:5581:f2a4 > ff02::1:ff34:5542: ICMP6, neighbor solicitation, who has fe80::5482:a4:434:5542, length 32
09:08:52.407927 00:26:9e:7d:6d:f3 > 33:33:ff:81:f2:a4, ethertype IPv6 (0x86dd), length 86: fe80::5482:a4:434:5542 > ff02::1:ff81:f2a4: ICMP6, neighbor solicitation, who has fe80::dc45:3832:5581:f2a4, length 32
09:08:52.675146 00:24:01:fc:2f:4f > cf:00:00:00:00:00, ethertype Loopback (0x9000), length 60:
09:08:52.676204 00:24:01:fc:2f:59 > cf:00:00:00:00:00, ethertype Loopback (0x9000), length 60:
09:08:52.678366 00:24:01:fc:2f:59 > cf:00:00:00:00:00, ethertype Loopback (0x9000), length 60:
09:08:53.675171 00:24:01:fc:2f:4f > cf:00:00:00:00:00, ethertype Loopback (0x9000), length 60:
09:08:53.675173 00:24:01:fc:2f:59 > cf:00:00:00:00:00, ethertype Loopback (0x9000), length 60:
09:08:53.677781 00:24:01:fc:2f:59 > cf:00:00:00:00:00, ethertype Loopback (0x9000), length 60:
09:08:53.686943 00:13:60:ec:ab:9a > 01:00:0c:cc:cc:cd, 802.3, length 64: LLC, dsap SNAP (0xaa) Individual, ssap SNAP (0xaa) Command, ctrl 0x03: oui Cisco (0x00000c), pid PVST (0x010b): STP 802.1d, Config, Flags [none], bridge-id 8259.00:18:74:2c:37:00.800f, length 42
09:08:54.678544 00:24:01:fc:2f:4f > cf:00:00:00:00:00, ethertype Loopback (0x9000), length 60:
09:08:54.678546 00:24:01:fc:2f:59 > cf:00:00:00:00:00, ethertype Loopback (0x9000), length 60:
09:08:54.680811 00:24:01:fc:2f:59 > cf:00:00:00:00:00, ethertype Loopback (0x9000), length 60:
09:08:54.759106 00:26:9e:7d:6d:f3 > 33:33:00:01:00:02, ethertype IPv6 (0x86dd), length 159: fe80::5482:a4:434:5542.546 > ff02::1:2.547: dhcp6 solicit
09:08:55.106095 00:1a:4d:98:43:fd > 33:33:ff:eb:9d:5a, ethertype IPv6 (0x86dd), length 86: fe80::6094:498c:2e8b:df0a > ff02::1:ffeb:9d5a: ICMP6, neighbor solicitation, who has fe80::4c55:544f:7eeb:9d5a, length 32
09:08:55.609972 40:61:86:1d:65:d1 > 33:33:00:01:00:02, ethertype IPv6 (0x86dd), length 156: fe80::241d:80ef:dfed:221.546 > ff02::1:2.547: dhcp6 solicit
09:08:55.675328 00:24:01:fc:2f:4f > cf:00:00:00:00:00, ethertype Loopback (0x9000), length 60:
09:08:55.675465 00:24:01:fc:2f:59 > cf:00:00:00:00:00, ethertype Loopback (0x9000), length 60:
09:08:55.677756 00:24:01:fc:2f:59 > cf:00:00:00:00:00, ethertype Loopback (0x9000), length 60:
09:08:55.700002 00:13:60:ec:ab:9a > 01:00:0c:cc:cc:cd, 802.3, length 64: LLC, dsap SNAP (0xaa) Individual, ssap SNAP (0xaa) Command, ctrl 0x03: oui Cisco (0x00000c), pid PVST (0x010b): STP 802.1d, Config, Flags [none], bridge-id 8259.00:18:74:2c:37:00.800f, length 42
получается, что IPv4, ARP, IPX запрещены - а IPv6 нет..
понимаю, что можно попробовать запретить прохождение IPv6 другим путем - но хотелось бы использовать Ethernet тип.
Жду предложений - может, что не так делаю??