Support Support Downloads Knowledge Base Case Manager My Juniper Community

Knowledge Base

Search our Knowledge Base sites to find answers to your questions.

Ask All Knowledge Base Sites All Knowledge Base Sites JunosE Defect (KA)Knowledge BaseSecurity AdvisoriesTechnical BulletinsTechnotes Sign in to display secure content and recently viewed articles

[QFX] Pre-installed internal hardware firewall filters on the PFE to allow BGP, ISIS, and BFD protocol packets

0

0

Article ID: KB24145 KB Last Updated: 05 Mar 2017Version: 3.0
Summary:
This article describes the issue of being unable to filter BGP, ISIS, and BFD packets, which are destined to the CPU, by using the loopback filter on QFX3500.
Symptoms:
  • Firewall filters provide rules that define whether to permit or deny packets, which are transiting an interface on a switch.

  • You can configure firewall filters to determine whether to permit or deny traffic before it enters or exits an interface, to which the firewall filter is applied.

  • An input (or ingress) firewall filter is one that is applied to packets that are entering a network. An output (or egress) firewall filter is one that is applied to packets that are exiting a network.

  • QFX-3500 has some dynamic/hardware filters to allow the control of traffic; such as BGP, ISIS, and BFD.

  • The dynamic/hardware filters are not overwritten by any user defined loopback filters. So, there is no way to discard such packets.



 
Cause:
  •  Pre-installed internal hardware firewall filters on PFE, which allow BGP, ISIS, and BFD protocol packets, prevent any user defined firewall filter from taking action on such packets.

  • So, these built-in filters override any user defined filters.
Solution:
There are more than 70 such hardware filters, which target different protocols. The key protocols, for which traffic is allowed by dynamic or hardware filters (even though they may be explicitly blocked in the user defined loopback filters) are :

  • ISIS (filter name: dyn-isis-pkts)

  • BGP (filter name : dyn-bgp-pkts)

  • BFD (filter name : dyn-bfd)

If the following loopback filter is applied on the switch and the switch receives BGP packets, the dyn-bgp-pkts hardware filter will push the traffic to the new CPU queue; so, the BGP traffic will not hit the user filter.
set firewall family inet filter block_re term t1 from protocol tcp
set firewall family inet filter block_re term t1 from destination-port bgp
set firewall family inet filter block_re term t1 then discard
set firewall family inet filter block_re term t2 from protocol tcp
set firewall family inet filter block_re term t2 from source-port bgp
set firewall family inet filter block_re term t2 then discard

set interfaces lo0 unit 0 family inet filter input block_re
Comment on this article > Affected Products Browse the Knowledge Base for more articles related to these product categories. Select a category to begin.

Getting Up and Running with Junos

Getting Up and Running with Junos Security Alerts and Vulnerabilities Product Alerts and Software Release Notices Problem Report (PR) Search Tool EOL Notices and Bulletins JTAC User Guide Customer Care User Guide Pathfinder SRX High Availability Configurator SRX VPN Configurator Training Courses and Videos End User Licence Agreement Global Search