Firewall
The nv unset
commands remove the configuration you set with the equivalent nv set
commands. This guide only describes an nv unset
command if it differs from the nv set
command.
nv set acl acl-default-dos rule <rule-id> action deny
Configures a deny action for the firewall DoS rule to deny packets.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 action deny
nv set acl acl-default-dos rule <rule-id> action dest-nat translate-ip <range-id>
Configures an IP address destination NAT for the firewall DoS rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
<range-id> |
The IPv4 range; for example, <ip-address> to <ip-address> |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 action dest-nat translate-ip 172.30.58.0 to 172.30.58.80
nv set acl acl-default-dos rule <rule-id> action dest-nat translate-port <port-id>
Configures a port destination NAT firewall DoS rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
<port-id> |
The port ID or port range. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 action dest-nat translate-port 22
nv set acl acl-default-dos rule <rule-id> action erspan dest-ip
Configures the ERSPAN destination IP address for the firewall DoS rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 action erspan dest-ip 10.10.10.3
nv set acl acl-default-dos rule <rule-id> action erspan source-ip
Configures the ERSPAN source IP address for the firewall DoS rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 action erspan dest-ip 10.10.10.10
nv set acl acl-default-dos rule <rule-id> action erspan ttl
Configures the ERSPAN Time to Live (TTL) for the firewall DoS rule. You can specify a value between 1 and 255.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 action erspan ttl 200
nv set acl acl-default-dos rule <rule-id> action log
Configures logging for the firewall DoS rule.
nv set acl acl-default-dos rule <rule-id> action log level
Configures the log level for the firewall DoS rule. You can specify a value between 1 and 7.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 action log level 5
nv set acl acl-default-dos rule <rule-id> action log log-prefix <prefix>
Configures logging for packets with a specific prefix for the firewall DoS rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
<prefix> |
The prefix with which you want to log matching packets. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 action log log-prefix 10.10.10.1/32
nv set acl acl-default-dos rule <rule-id> action log rate
Configures the number of logs per minute you want to generate for the firewall DoS rule. You can set a value between 1 and 50000.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 action log rate 30000
nv set acl acl-default-dos rule <rule-id> action permit
Configures a permit action to permit packets for the firewall DoS rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 action permit
nv set acl acl-default-dos rule <rule-id> action police burst
Configures quality of service for traffic for the firewall DoS rule. Using QoS policers, you can rate limit traffic so incoming packets get dropped if they exceed specified thresholds. This command configures the police burst rate; the number of packets or kilobytes (KB) allowed to arrive sequentially. You can specify a value between 1 and 2147483647.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 action police burst 1000
nv set acl acl-default-dos rule <rule-id> action police class
Configures quality of service for traffic for the firewall DoS rule. Using QoS policers, you can rate limit traffic so incoming packets get dropped if they exceed specified thresholds. This command configures the police action class. You can specify an integer between 0 and 7.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 action police class 5
nv set acl acl-default-dos rule <rule-id> action police mode
Configures quality of service for traffic for the firewall DoS rule. Using QoS policers, you can rate limit traffic so incoming packets get dropped if they exceed specified thresholds. This command configures the traffic mode. You can specify packet, kbps, mbps or gbps.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 action police mode mbps
nv set acl acl-default-dos rule <rule-id> action police rate
Configures quality of service for traffic for the firewall DoS rule. Using QoS policers, you can rate limit traffic so incoming packets get dropped if they exceed specified thresholds. This command configures the policing rate. You can specify a value between 1 and 2147483647.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 action police rate 2000
nv set acl acl-default-dos rule <rule-id> action recent
Configures the firewall DoS rule to be the most recent.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 action recent
nv set acl acl-default-dos rule <rule-id> action set class
Modifies the class value for packet classification for the firewall DoS rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 action set class 3
nv set acl acl-default-dos rule <rule-id> action set cos
Configures the 802.1p CoS value to modify in the packet for the firewall DoS rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 action set cos 6
nv set acl acl-default-dos rule <rule-id> action set dscp
Configures the DSCP value to modify in the packet for the firewall DoS rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 action set dscp af12
nv set acl acl-default-dos rule <rule-id> action source-nat translate-ip <range-id>
Configures a dynamic NAT action DoS rule to translate a source IP address range to a public address.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
<range-id> |
The IP address range; for example, <ip-address> to <ip-address> . |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 action source-nat translate-ip 172.30.58.0 to 172.30.58.80
nv set acl acl-default-dos rule <rule-id> action source-nat translate-port <port-id>
Configures a NAT action DoS rule to translate a source IP port.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
<port-id> |
The port number or range of ports (separated with a - ). |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 action source-nat translate-port 1024-1200
nv set acl acl-default-dos rule <rule-id> action span <interface-id>
Configures the SPAN session for the specified interface for the firewall DoS rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
<interface-id> |
The interface name. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 action span swp1
nv set acl acl-default-dos rule <rule-id> match ip connection-state
Configures the connection state you want to match for the firewall DoS rule. You can set the value to established
, related
, new
, or invalid
.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 match ip connection-state related
nv set acl acl-default-dos rule <rule-id> match ip dest-ip <ip-address-id>
Configures the destination IP address you want to match for the firewall DoS rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
<ip-address-id> |
The destination IP address. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 match ip dest-ip 10.0.15.8/32
nv set acl acl-default-dos rule <rule-id> match ip dscp
Configures the DSCP value you want to match for the firewall DoS rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 match ip dscp af13
nv set acl acl-default-dos rule <rule-id> match ip ecn flags tcp-cwr
Configures the firewall DoS rule to match on the TCP Congestion Window Reduced Flag.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 match ip ecn flags tcp-cwr
nv set acl acl-default-dos rule <rule-id> match ip ecn flags tcp-ece
Configures the firewall DoS rule to match on the TCP ECN Echo Flag.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 match ip ecn flags tcp-ece
nv set acl acl-default-dos rule <rule-id> match ip ecn ip-ect
Configures the firewall DoS rule to match on the ECT bit. The ECT codepoints negotiate if the connection is ECN capable by setting one of the two bits to 1. Routers also use the ECT bit to indicate that they are experiencing congestion by setting both the ECT codepoints to 1.
By default, ECN rules match a packet with the bit set. You can reverse the match by using an explanation point (!).
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 match ip ecn ip-ect
nv set acl acl-default-dos rule <rule-id> match ip fragment
Configures IP fragment packet match for the firewall DoS rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 match ip fragment
nv set acl acl-default-dos rule <rule-id> match ip hashlimit burst
Configures the hashlimit burst rate you want to match for the firewall DoS rule. You can specify a value between 1 and 4294967295.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 match ip hashlimit burst 10
nv set acl acl-default-dos rule <rule-id> match ip hashlimit destination-mask
Configures the hashlimit destination mask you want to match for the firewall DoS rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 match ip hashlimit destination-mask 32
nv set acl acl-default-dos rule <rule-id> match ip hashlimit expire
Configures the hashlimit expire time (in milliseconds) you want to match for the firewall DoS rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 match ip hashlimit expire 1000
nv set acl acl-default-dos rule <rule-id> match ip hashlimit mode
Configures the hashlimit mode you want to match for the firewall DoS rule. You can specify src-ip
or dst-ip
.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 match ip hashlimit mode dst-ip
nv set acl acl-default-dos rule <rule-id> match ip hashlimit name
Configures the hashlimit name you want to match for the firewall DoS rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 match ip hashlimit name SSH
nv set acl acl-default-dos rule <rule-id> match ip hashlimit rate-above
Configures how much above the hashlimit rate you want to match for the firewall DoS rule. You can specify an <integer>/second
, <integer>/min
, or <integer>/hour
. The maximum rate is 1000000/second
.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 match ip hashlimit rate-above 1000/min
nv set acl acl-default-dos rule <rule-id> match ip hashlimit source-mask
Configures the hashlimit source mask you want to match for the firewall DoS rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 match ip hashlimit source-mask 32
nv set acl acl-default-dos rule <rule-id> match ip icmp-type
Configures the IP ICMP type you want to match for the firewall DoS rule. You can specify: dest-unreachable, echo-reply, echo-request, port-unreachable, time-exceeded, or an integer between 0 and 255.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 match ip icmp-type dest-unreachable
nv set acl acl-default-dos rule <rule-id> match ip icmpv6-type
Configures the IP ICMPv6 type you want to match for the firewall DoS rule. You can specify router-solicitation
, router-advertisement
, neighbor-solicitation
, neighbor-advertisement
, or an integer between 0 and 255.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 match ip icmpv6-type router-solicitation
nv set acl acl-default-dos rule <rule-id> match ip protocol
Configures the IP protocol you want to match for the firewall DoS rule. You can specify tcp
, udp
, ospf
, pim
, icmp
, icmpv6
, or igmp
.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 match ip protocol tcp
nv set acl acl-default-dos rule <rule-id> match ip recent-list action
Configures the IP recent list action you want to match for the firewall DoS rule. You can specify set
or update
.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 match ip recent-list action update
nv set acl acl-default-dos rule <rule-id> match ip recent-list hit-count
Configures the IP recent list hit count you want to match for the firewall DoS rule. You can specify a value between 1 and 4294967295.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 match ip recent-list hit-count 2000
nv set acl acl-default-dos rule <rule-id> match ip recent-list name
Configures the IP recent list name you want to match for the firewall DoS rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 match ip recent-list name list1
nv set acl acl-default-dos rule <rule-id> match ip recent-list update-interval
Configures the IP recent list update interval you want to match for the firewall DoS rule. You can specify a value between 1 and 4294967295
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 match ip recent-list update-interval 1000
nv set acl acl-default-dos rule <rule-id> match ip source-ip
Configures the source IP address you want to match for the firewall DoS rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 match ip source-ip 10.0.14.2/32
nv set acl acl-default-dos rule <rule-id> match ip tcp all-mss-except
Configures the firewall DoS rule to match all TCP maximum segment size (MSS) values except for the specified value.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 match ip tcp all-mss-except 536
nv set acl acl-default-dos rule <rule-id> match ip tcp flags
Configures the IP TCP flag you want match in the packet for the firewall DoS rule. You can specify ack
, all
, fin
, none
, psh
, rst
, syn
, or urg
.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 match ip tcp flags syn
nv set acl acl-default-dos rule <rule-id> match ip tcp mask
Configures the IP TCP mask you want match in the packet for the firewall DoS rule. You can specify ack
, all
, fin
, none
, psh
, rst
, syn
, or urg
.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 match ip tcp mask ack
nv set acl acl-default-dos rule <rule-id> match ip tcp mss
Configures the TCP maximum segment size (MSS) you want match in the packet for the firewall DoS rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 match ip tcp mss 536
nv set acl acl-default-dos rule <rule-id> match ip tcp state established
Configures the firewall DoS rule to match on the TCP established state.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 match ip tcp state established
nv set acl acl-default-dos rule <rule-id> match ip ttl
Configures the firewall DoS rule to match on the IP TTL.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 match ip ttl 100
nv set acl acl-default-dos rule <rule-id> match ip udp dest-port
Configures the firewall DoS rule to match on the specified IP UDP destination port. You can specify ANY
,bootps
, http
, ntp
, telnet
, bfd
, clag
, https
, pop3
, tftp
, bfd-echo
, dhcp-client
, imap2
, smtp
, bfd-multihop
, dhcp-server
, ldap
, snmp
, bgp
, domain
, ldaps
, snmp-trap
, bootpc
, ftp
, msdp
, or ssh
.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 match ip udp dest-port https
nv set acl acl-default-dos rule <rule-id> match ip udp source-port
Configures the firewall DoS rule to match on the specified IP UDP source port. You can specify ANY
,bootps
, http
, ntp
, telnet
, bfd
, clag
, https
, pop3
, tftp
, bfd-echo
, dhcp-client
, imap2
, smtp
, bfd-multihop
, dhcp-server
, ldap
, snmp
, bgp
, domain
, ldaps
, snmp-trap
, bootpc
, ftp
, msdp
, or ssh
.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 match ip udp source-port https
nv set acl acl-default-dos rule <rule-id> match mac dest-mac
Configures the firewall DoS rule to match on the specified destination MAC address.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 match mac dest-mac any
nv set acl acl-default-dos rule <rule-id> match mac dest-mac-mask
Configures the firewall DoS rule to match on the specified destination MAC address mask.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 match mac dest-mac-mask 00:00:00:00:00:12
nv set acl acl-default-dos rule <rule-id> match mac protocol
Configures the firewall DoS rule to match on the specified destination MAC protocol. You can specify ANY
, arp
, ipv4
, ipv6
, or a value between 0 and 255.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 match mac protocol arp
nv set acl acl-default-dos rule <rule-id> match mac source-mac
Configures the firewall DoS rule to match on the specified source MAC address.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 match mac source-mac any
nv set acl acl-default-dos rule <rule-id> match mac source-mac-mask
Configures the firewall DoS rule to match on the specified source MAC address mask.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 match mac source-mac-mask any
nv set acl acl-default-dos rule <rule-id> match vlan
Configures the firewall DoS rule to match on the specified VLAN ID.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 match vlan 10
nv set acl acl-default-dos rule <rule-id> remark
Configures a remark (description) about deny or permit conditions in the firewall DoS rule. You must enclose multiple words in double quotes (").
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-dos rule 10 remark "The following line permits TCP packets"
nv set acl acl-default-whitelist rule <rule-id> action deny
Configures a deny action for the firewall whitelist rule to deny packets.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 action deny
nv set acl acl-default-whitelist rule <rule-id> action dest-nat translate-ip <range-id>
Configures an IP address destination NAT for the firewall whitelist rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
<range-id> |
The IPv4 range; for example, <ip-address> to <ip-address> |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 action dest-nat translate-ip 172.30.58.0 to 172.30.58.80
nv set acl acl-default-whitelist rule <rule-id> action dest-nat translate-port <port-id>
Configures a port destination NAT for the firewall whitelist rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
<port-id> |
The port ID or port range. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 action dest-nat translate-port 22
nv set acl acl-default-whitelist rule <rule-id> action erspan dest-ip
Configures the ERSPAN destination IP address for the firewall whitelist rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 action erspan dest-ip 10.10.10.3
nv set acl acl-default-whitelist rule <rule-id> action erspan source-ip
Configures the ERSPAN source IP address for the firewall whitelist rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 action erspan source-ip 10.10.10.10
nv set acl acl-default-whitelist rule <rule-id> action erspan ttl
Configures the ERSPAN Time to Live (TTL) for the firewall whitelist rule. You can specify a value between 1 and 255.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 action erspan ttl 200
nv set acl acl-default-whitelist rule <rule-id> action log
Configures logging for the firewall whitelist rule.
nv set acl acl-default-whitelist rule <rule-id> action log level
Configures the log level for the firewall whitelist rule. You can specify a value between 1 and 7.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 action log level 5
nv set acl acl-default-whitelist rule <rule-id> action log log-prefix <prefix>
Configures logging for packets with a specific prefix for the firewall whitelist rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
<prefix> |
The prefix with which you want to log matching packets. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 action log log-prefix 10.10.10.1/32
nv set acl acl-default-whitelist rule <rule-id> action log rate
Configures the number of logs per minute you want to generate for the firewall whitelist rule. You can set a value between 1 and 50000.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 action log rate 30000
nv set acl acl-default-whitelist rule <rule-id> action permit
Configures a permit action to permit packets for the firewall whitelist rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 action permit
nv set acl acl-default-whitelist rule <rule-id> action police burst
Configures quality of service for traffic for the firewall whitelist rule. Using QoS policers, you can rate limit traffic so incoming packets get dropped if they exceed specified thresholds. This command configures the police burst rate; the number of packets or kilobytes (KB) allowed to arrive sequentially. You can specify a value between 1 and 2147483647.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 action police burst 1000
nv set acl acl-default-whitelist rule <rule-id> action police class
Configures quality of service for traffic for the firewall whitelist rule. Using QoS policers, you can rate limit traffic so incoming packets get dropped if they exceed specified thresholds. This command configures the police action class. You can specify an integer between 0 and 7.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 action police class 5
nv set acl acl-default-whitelist rule <rule-id> action police mode
Configures quality of service for traffic for the firewall whitelist rule. Using QoS policers, you can rate limit traffic so incoming packets get dropped if they exceed specified thresholds. This command configures the traffic mode. You can specify packet
, kbps
, mbps
, or gbps
.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 action police mode mbps
nv set acl acl-default-whitelist rule <rule-id> action police rate
Configures quality of service for traffic for the firewall whitelist rule. Using QoS policers, you can rate limit traffic so incoming packets get dropped if they exceed specified thresholds. This command configures the policing rate. You can specify a value between 1 and 2147483647.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 action police rate 2000
nv set acl acl-default-whitelist rule <rule-id> action recent
Configures the firewall whitelist rule to be the most recent.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 action recent
nv set acl acl-default-whitelist rule <rule-id> action set class
Modifies the class value for packet classification for the firewall whitelist rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 action set class 3
nv set acl acl-default-whitelist rule <rule-id> action set cos
Configures the 802.1p CoS value to modify in the packet for the firewall whitelist rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 action set cos 6
nv set acl acl-default-whitelist rule <rule-id> action set dscp
Configures the DSCP value to modify in the packet for the firewall whitelist rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 action set dscp af12
nv set acl acl-default-whitelist rule <rule-id> action source-nat translate-ip <range-id>
Configures a dynamic NAT action whitelist rule to translate a source IP address range to a public address.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
<range-id> |
The IP address range; for example, <ip-address> to <ip-address> . |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 action source-nat translate-ip 172.30.58.0 to 172.30.58.80
nv set acl acl-default-whitelist rule <rule-id> action source-nat translate-port <port-id>
Configures a NAT action whitelist rule to translate a source IP port.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
<port-id> |
The port number or range of ports (separated with a - ). |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 action source-nat translate-port 1024-1200
nv set acl acl-default-whitelist rule <rule-id> action span <interface-id>
Configures the SPAN session for the specified interface for the firewall whitelist rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
<interface-id> |
The interface name. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 action span swp1
nv set acl acl-default-whitelist rule <rule-id> match ip connection-state
Configures the connection state you want to match for the firewall whitelist rule. You can set the value to established
, related
, new
, or invalid
.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 match ip connection-state related
nv set acl acl-default-whitelist rule <rule-id> match ip dest-ip <ip-address-id>
Configures the destination IP address you want to match for the firewall whitelist rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
<ip-address-id> |
The destination IP address. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 match ip dest-ip 10.0.15.8/32
nv set acl acl-default-whitelist rule <rule-id> match ip dscp
Configures the DSCP value you want to match for the firewall whitelist rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 match ip dscp af13
nv set acl acl-default-whitelist rule <rule-id> match ip ecn flags tcp-cwr
Configures the firewall whitelist rule to match on the TCP Congestion Window Reduced Flag.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 match ip ecn flags tcp-cwr
nv set acl acl-default-whitelist rule <rule-id> match ip ecn flags tcp-ece
Configures the firewall whitelist rule to match on the TCP ECN Echo Flag.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 match ip ecn flags tcp-ece
nv set acl acl-default-whitelist rule <rule-id> match ip ecn ip-ect
Configures the firewall whitelist rule to match on the ECT bit. The ECT codepoints negotiate if the connection is ECN capable by setting one of the two bits to 1. Routers also use the ECT bit to indicate that they are experiencing congestion by setting both the ECT codepoints to 1.
By default, ECN rules match a packet with the bit set. You can reverse the match by using an explanation point (!).
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 match ip ecn ip-ect
nv set acl acl-default-whitelist rule <rule-id> match ip fragment
Configures IP fragment packet match for the firewall whitelist rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 match ip fragment
nv set acl acl-default-whitelist rule <rule-id> match ip hashlimit burst
Configures the hashlimit burst rate you want to match for the firewall whitelist rule. You can specify a value between 1 and 4294967295.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 match ip hashlimit burst 10
nv set acl acl-default-whitelist rule <rule-id> match ip hashlimit destination-mask
Configures the hashlimit destination mask you want to match for the firewall whitelist rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 match ip hashlimit destination-mask 32
nv set acl acl-default-whitelist rule <rule-id> match ip hashlimit expire
Configures the hashlimit expire time (in milliseconds) you want to match for the firewall whitelist rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 match ip hashlimit expire 1000
nv set acl acl-default-whitelist rule <rule-id> match ip hashlimit mode
Configures the hashlimit mode you want to match for the firewall whitelist rule. You can specify src-ip
or dst-ip
.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 match ip hashlimit mode dst-ip
nv set acl acl-default-whitelist rule <rule-id> match ip hashlimit name
Configures the hashlimit name you want to match for the firewall whitelist rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 match ip hashlimit name SSH
nv set acl acl-default-whitelist rule <rule-id> match ip hashlimit rate-above
Configures how much above the hashlimit rate you want to match for the firewall whitelist rule. You can specify an <integer>/second
, <integer>/min
, or <integer>/hour
. The maximum rate is 1000000/second
.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 match ip hashlimit rate-above 1000/min
nv set acl acl-default-whitelist rule <rule-id> match ip hashlimit source-mask
Configures the hashlimit source mask you want to match for the firewall whitelist rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 match ip hashlimit source-mask 32
nv set acl acl-default-whitelist rule <rule-id> match ip icmp-type
Configures the IP ICMP type you want to match for the firewall whitelist rule. You can specify: dest-unreachable, echo-reply, echo-request, port-unreachable, time-exceeded, or an integer between 0 and 255.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 match ip icmp-type dest-unreachable
nv set acl acl-default-whitelist rule <rule-id> match ip icmpv6-type
Configures the IP ICMPv6 type you want to match for the firewall whitelist rule. You can specify router-solicitation
, router-advertisement
, neighbor-solicitation
, neighbor-advertisement
, or an integer between 0 and 255.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 match ip icmpv6-type router-solicitation
nv set acl acl-default-whitelist rule <rule-id> match ip protocol
Configures the IP protocol you want to match for the firewall whitelist rule. You can specify tcp
, udp
, ospf
, pim
, icmp
, icmpv6
, or igmp
.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 match ip protocol tcp
nv set acl acl-default-whitelist rule <rule-id> match ip recent-list action
Configures the IP recent list action you want to match for the firewall whitelist rule. You can specify set
or update
.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 match ip recent-list action update
nv set acl acl-default-whitelist rule <rule-id> match ip recent-list hit-count
Configures the IP recent list hit count you want to match for the firewall whitelist rule. You can specify a value between 1 and 4294967295.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 match ip recent-list hit-count 2000
nv set acl acl-default-whitelist rule <rule-id> match ip recent-list name
Configures the IP recent list name you want to match for the firewall whitelist rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 match ip recent-list name list1
nv set acl acl-default-whitelist rule <rule-id> match ip recent-list update-interval
Configures the IP recent list update interval you want to match for the firewall whitelist rule. You can specify a value between 1 and 4294967295
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 match ip recent-list update-interval 1000
nv set acl acl-default-whitelist rule <rule-id> match ip source-ip
Configures the source IP address you want to match for the firewall whitelist rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 match ip source-ip 10.0.14.2/32
nv set acl acl-default-whitelist rule <rule-id> match ip tcp all-mss-except
Configures the firewall whitelist rule to match all TCP maximum segment size (MSS) values except for the specified value.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 match ip tcp all-mss-except 536
nv set acl acl-default-whitelist rule <rule-id> match ip tcp flags
Configures the IP TCP flag you want match in the packet for the firewall whitelist rule. You can specify ack
, all
, fin
, none
, psh
, rst
, syn
, or urg
.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 match ip tcp flags syn
nv set acl acl-default-whitelist rule <rule-id> match ip tcp mask
Configures the IP TCP mask you want match in the packet for the firewall whitelist rule. You can specify ack
, all
, fin
, none
, psh
, rst
, syn
, or urg
.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 match ip tcp mask ack
nv set acl acl-default-whitelist rule <rule-id> match ip tcp mss
Configures the TCP maximum segment size (MSS) you want match in the packet for the firewall whitelist rule.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 match ip tcp mss 536
nv set acl acl-default-whitelist rule <rule-id> match ip tcp state established
Configures the firewall whitelist rule to match on the TCP established state.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 match ip tcp state established
nv set acl acl-default-whitelist rule <rule-id> match ip ttl
Configures the firewall whitelist rule to match on the IP TTL.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 match ip ttl 100
nv set acl acl-default-whitelist rule <rule-id> match ip udp dest-port
Configures the firewall whitelist rule to match on the specified IP UDP destination port. You can specify ANY
,bootps
, http
, ntp
, telnet
, bfd
, clag
, https
, pop3
, tftp
, bfd-echo
, dhcp-client
, imap2
, smtp
, bfd-multihop
, dhcp-server
, ldap
, snmp
, bgp
, domain
, ldaps
, snmp-trap
, bootpc
, ftp
, msdp
, or ssh
.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 match ip udp dest-port https
nv set acl acl-default-whitelist rule <rule-id> match ip udp source-port
Configures the firewall whitelist rule to match on the specified IP UDP source port. You can specify ANY
,bootps
, http
, ntp
, telnet
, bfd
, clag
, https
, pop3
, tftp
, bfd-echo
, dhcp-client
, imap2
, smtp
, bfd-multihop
, dhcp-server
, ldap
, snmp
, bgp
, domain
, ldaps
, snmp-trap
, bootpc
, ftp
, msdp
, or ssh
.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 match ip udp source-port https
nv set acl acl-default-whitelist rule <rule-id> match mac dest-mac
Configures the firewall whitelist rule to match on the specified destination MAC address.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 match mac dest-mac any
nv set acl acl-default-whitelist rule <rule-id> match mac dest-mac-mask
Configures the firewall whitelist rule to match on the specified destination MAC address mask.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 match mac dest-mac-mask 00:00:00:00:00:12
nv set acl acl-default-whitelist rule <rule-id> match mac protocol
Configures the firewall whitelist rule to match on the specified destination MAC protocol. You can specify ANY
, arp
, ipv4
, ipv6
, or a value between 0 and 255.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
——— | ————– |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 match mac protocol arp
nv set acl acl-default-whitelist rule <rule-id> match mac source-mac
Configures the firewall whitelist rule to match on the specified source MAC address.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 match mac source-mac any
nv set acl acl-default-whitelist rule <rule-id> match mac source-mac-mask
Configures the firewall whitelist rule to match on the specified source MAC address mask.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 match mac source-mac-mask any
nv set acl acl-default-whitelist rule <rule-id> match vlan
Configures the firewall whitelist rule to match on the specified VLAN ID.
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 match vlan 10
nv set acl acl-default-whitelist rule <rule-id> remark
Configures a remark (description) about deny or permit conditions in the firewall whitelist rule. You must enclose multiple words in double quotes (").
Command Syntax
Syntax | Description |
---|---|
<rule-id> |
The ACL rule number. |
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv set acl acl-default-whitelist rule 10 remark "The following line permits TCP packets"
nv set system control-plane acl acl-default-dos inbound
Enables or disables the Cumulus Linux default Dos firewall rules that protect the switch control plane and CPU from DOS attacks. Cumulus Linux provides firewall DoS rules to:
- Allow only internal traffic to the loopback interfaces.
- Accept already established connections and outbound traffic.
- Set the - allow option to color the packets from a specific interface. Used when different policies - need to be applied for different eth interfaces.
- Drop packets if the first TCP segment is not SYN.
- Drop fragmented IP packets.
- Drop Christmas tree packets; packets with all TCP flags set.
- Drop NULL packets.
- Drop invalid packets.
- Drop strange MSS values.
- Provide brute-force protection.
- Drop packets with routing Header Type 0.
- Drop packets with a hop limit greater than 1.
- Limit excessive TCP reset packets.
- Protect against SYN flood.
- Rate limit new TCP connections for each IP address.
- Log all remaining packets, then drop them.
In Cumulus Linux 5.8 and earlier, the set of default firewall rules are more open; Cumulus Linux accepts packets from all addresses and protocols. Cumulus Linux 5.9 and later provides a set of default firewall rules that allows only specific addresses and ports, and drops packets that are disallowed.
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv unset system control-plane acl acl-default-dos inbound
nv set system control-plane acl acl-default-whitelist inbound
Enables or disables the Cumulus Linux default whitelist firewall rules that specify the services or application ports enabled on the switch. Cumulus Linux provides firewall whitelist rules to enable TCP ports and UDP ports.
In Cumulus Linux 5.8 and earlier, the set of default firewall rules are more open; Cumulus Linux accepts packets from all addresses and protocols. Cumulus Linux 5.9 and later provides a set of default firewall rules that allows only specific addresses and ports, and drops packets that are disallowed.
Version History
Introduced in Cumulus Linux 5.9.0
Example
cumulus@switch:~$ nv unset system control-plane acl acl-default-whitelist inbound