Subnet ingress access lists
Antonio Querubin
tony@lava.net
Wed, 27 Jun 2001 11:31:05 -1000 (HST)
On Wed, 27 Jun 2001, Phil Benchoff wrote:
> A typical IPv4 ingress access list for a subnet looks like this:
>
> Permit global IP4 prefix assigned to this subnet to any
> Permit host addresses of the other interfaces on multi-homed hosts to any
> (any interface may be the source of a packet, not just the one
> on this subnet)
> Permit unspecified address to broadcast port bootps
> (because we forward DHCP)
> Deny all others
>
> This appears to be a bit more complicated with IPv6. The following
> is what I have come up with so far:
>
> Permit global unicast prefix assigned to this subnet to any
> Permit global unicast prefixes of multi-homed hosts other interfaces (/128s) to any.
> Permit site-local for this subnet to site-local
> Permit site-local for this subnet to site's global unicast
> Permit site-local for this subnet to site-local multicast (ff05::/16)
> Permit site-local interfaces on multi-homed hosts to site's global unicast
> Permit site-local interfaces on multi-homed hosts to site-local
> Permit link-local prefix to link-local unicast of router
> Permit link-local prefix to link-local multicast
> Permit unspecified to link-local multicast (ff02::/16)
> (required for duplicate address detection)
> (required so no other hosts use router's link-local address)
> (should really only need router interface solicited-node multicast)
The last one should probably be to the site-local multicast/anycast or
specific server IP addresses if you want to be more discriminating.
> I suspect a lot of this will be covered by an "ipv6 verify unicast
> reverse-path" command with enhancements similar to the one for IPv4.
> 12.2(2)T does not support the log keyword, so I haven't experimented
> much to see what is really required in the access list. Has anyone else
> given it any thought?
It's a good list though my head hurts thinking about it :)