[comp.sys.proteon] P4200 IP Router & access-control

aks@somewhere.ucsb.edu (Alan Stebbens) (09/27/90)

We have a P4200 with IP routing, and we are trying to setup a selective
filter using the "access-control" feature, where except for a few,
special IP addresses, IP traffic to or from any systems on a small range
of subnets is supressed.  This can be done using access lists on cisco
routers, with their combination of "permit" and "deny" keywords on each
list.  We cannot figure out how to do this on the P4200, using either
the "inclusive" or "exclusive" modes.

To make this clear: we want to limit access of systems on two subnets to
just a few machines in another subnet.  For example: we have systems on
subnets 128.111.1.0 and 128.111.2.0 which we want to restrict access to
those systems only coming from 128.111.3.0 (not the real subnet
numbers).  In other words, access from any other network, or any other
subnets within our own network is to be denied to the systems on our
subnets 1 and 2.  Try to construct an "exclusive" access-control list
which does this (hint: it's possible, but incredibly complicated, and
requires enumeration of all networks above 128.111.0.0).

Is there any plan to enhance the access-control feature to allow both
"permit" and "deny" style address filters?  Is V8.1a the latest version?
Should we punt and buy cisco?

Alan Stebbens   Computer Resource Manager
		Center for Computational Sciences and Engineering (CCSE)
		University of California, Santa Barbara
		3111 Engineering I
		Santa Barbara, CA 93106

Internet: aks@hub.ucsb.edu
BITNET:   aks%hub@ucsbuxa.bitnet
UUCP:     ...{ucbvax,sdcsvax,cepu}!ucsbcsl!aks
Voice:    (805) 893-8135 (CCSE Office: 893-3221)

--

Alan Stebbens <aks@hub.ucsb.edu>

medin@NSIPO.NASA.GOV ("Milo S. Medin", NASA ARC NSI Project Office) (09/27/90)

Alan, I don't see what the problem is...  Use inclusive access control.

Unless I know your particular subnet numbers, I can't tell you what
masks to use however.  Note that your mask doesn't have to deal with
a subnet or network.  If you did the following:

128.111.128.0	FFFF8000	0.0.0.0		00000000 
0.0.0.0		00000000 	128.111.128.0	FFFF8000

I think you would get everything over subnet 128 to be allowed to talk
to the outside world.  Even if the 2 subnets aren't adjacent, it doesn't take
much to set it up.  Use the mask feature.  It's extremely powerful,
and the way Proteon implemented it is relatively efficient for forwarding
rates...  The manual isn't very nourishing in this area, but it's
terse and very concise, and tells you what you need to know.

With OSPF we now have variable length subnet masks, so we all need to
start thinking in terms of masking and matching for routing as well
as access control.

					Thanks,
					   Milo

aks@HUB.UCSB.EDU (Alan Stebbens) (09/27/90)

> Alan, I don't see what the problem is...  Use inclusive access control.
> 
> Unless I know your particular subnet numbers, I can't tell you what
> masks to use however.  Note that your mask doesn't have to deal with
> a subnet or network.  If you did the following:
> 
> 128.111.128.0	FFFF8000	0.0.0.0		00000000 
> 0.0.0.0		00000000 	128.111.128.0	FFFF8000
> 
> I think you would get everything over subnet 128 to be allowed to talk
> to the outside world.  Even if the 2 subnets aren't adjacent, it doesn't take
> much to set it up.  Use the mask feature.  It's extremely powerful,
> and the way Proteon implemented it is relatively efficient for forwarding
> rates...  The manual isn't very nourishing in this area, but it's
> terse and very concise, and tells you what you need to know.

Milo,

A problem with this is that the router in question has five active
interfaces: three Ethernets, one 80MB fiber token-ring, and one
synchronous serial.  It would be applying these filters against all
packets, regardless of which interface they came from.  We don't want to
filter packets EXCEPT those destined or sourced from a couple of
restricted subnets in our network.  Essentially, we want to limit access
to hosts on the restricted subnets to hosts on another subnet, all
within the same Class B network.

I *have* used masks; I *know* how to use masks; we administrate several
cisco routers and terminal servers with access lists, using masks, and
I've been playing with the Proteon access controls for more than a
little while.  On the other hand, there probably are some cute tricks
with masks to which I've not been exposed.

I'll try again:

Here's the desired filter using an English-like PDL:

	Addr := IPSrcAddr or IPDestAddr
	IF   (IPSrcAddr is in subnet 128.111.43.0 
	   or IPSrcAddr is in subnet 128.111.44.0)
	  and IPDstAddr is not in subnet 128.111.24.0)
	THEN drop it
	ELSE route it

I don't believe that, currently, under 8.1a, it is possible to do this
with the access-control lists.  I may be wrong, of course, but I'd have
to be shown how to do it, at this point.

My purpose in the mailing was not to illustrate how clueless I am
(although that may have been an unintended side-effect :^), but to point
out that, IMHO, there is a serious deficiency in Proteon's
access-controls mechanism.

In a private mailing from someone at Proteon, it turns out that there is
a new software load, not generally available yet, which is purported to
address this issue.  Apparently, we're not the first to stumble on more
than simple filtering problems.

Thanks for your response, though.

Alan Stebbens   Computer Resource Manager
		Center for Computational Sciences and Engineering (CCSE)
		University of California, Santa Barbara
		3111 Engineering I
		Santa Barbara, CA 93106

Internet: aks@hub.ucsb.edu
BITNET:   aks%hub@ucsbuxa.bitnet
UUCP:     ...{ucbvax,sdcsvax,cepu}!ucsbcsl!aks
Voice:    (805) 893-8135 (CCSE Office: 893-3221)