-
Notifications
You must be signed in to change notification settings - Fork 87
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
caclmgrd interface rules patch 1 #197
base: master
Are you sure you want to change the base?
caclmgrd interface rules patch 1 #197
Conversation
/azp run |
Azure Pipelines successfully started running 1 pipeline(s). |
91e84f7
to
38f32c7
Compare
/azp run |
Azure Pipelines successfully started running 1 pipeline(s). |
38f32c7
to
d131a47
Compare
/azp run |
Azure Pipelines successfully started running 1 pipeline(s). |
@ZhaohuiS Could you help review? |
if (dst_port not in self.ACL_SERVICES["NTP"]["dst_ports"] and | ||
dst_port not in self.ACL_SERVICES["SNMP"]["dst_ports"] and | ||
dst_port not in self.ACL_SERVICES["SSH"]["dst_ports"]): | ||
rule_cmd = self.exclude_mgmt_port(rule_cmd) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
For EXTERNAL_CLIENT, there is no DST_PORT setting for it, with your change, does it mean it will block restapi or gnmi traffic from eth0?
@qiluo-msft @prsunny could you please review this change? It will prohibit traffic from eth0 except NTP,SNMP and SSH.
"EXTERNAL_CLIENT": {
"ip_protocols": ["tcp"],
"multi_asic_ns_to_host_fwd":True
},
Added management port exclusion (!, -i, eth0) for data plane protocols in iptable rules. Data plane protocols like BGP, BFD, and VXLAN are restricted to data interfaces only, while management protocols (NTP, SNMP, SSH) retain management port access. This enforces proper traffic segregation between management and data plane.
What is the motivation for this PR?
To enhance security by properly segregating management and data plane traffic through iptable rules in caclmgrd.
How did you do it?
Added exclude_mgmt_port rule (!, -i, eth0)
Applied exclusion to data plane protocols (BGP, BFD, VXLAN)
Preserved management port access for management services (NTP, SNMP, SSH)
Implemented conditional exclusion for other ACL rules based on service type