Hi Mike,
Thanks for the quick response and provided information. I currently have
only one interface (in and out). I will try  to use the vlan option as well
to be more precise. My rule might look like:
#cxgbetool t5nex0 filter 10 iport 0 action drop dip 192.168.1.122 dport 23
vlan 100
Just to be on the safe side, if I add only the above drop rule in the
firewall I won't need explicit "allow all" in the end?

I don't have "hw.cxgbe.attack_filter" and
"hw.cxgbe.drop_pkts_with_l3_errors". These will either appear after I add a
rule or if a change the firmware. I will check after adding a rule.

Regards,
Lyubomir


On Sun, 7 Mar 2021 at 19:15, mike tancsa <m...@sentex.net> wrote:

> Hi,
>     I am using the T5 firewall features on FreeBSD 11 and 12 in
> production and it works great!
>
> On 3/7/2021 10:41 AM, Lyubomir Yotov wrote:
> > - is it safe to add rules on the fly in BSDRP?
> I add and remove rules on the fly all the time.
> > - is it safe to implement drop only rules on a production server
> > without breaking the other traffic (should I have an allow-all in the
> > end)?
> > I would like to test dropping all packets incoming on cxl0 from any
> > host to host 192.168.1.122 with destination port 23. I suppose a rule
> > like the following will do the job:
> >
> > #cxgbetool t5nex0 filter 10 iport 0 action drop dip 192.168.1.122
> > dport 23
> >
> Careful of the orientation. If you have 2 ports, the iport makes a
> difference as to whether the rule gets hit or not.
>
>
> > If I want this persistent I should create a script probably and start
> > it with the system boot?
> Yes. I have yet to come up with a nice interface to do this. For some
> strange reason, cxgbetool displays IP addresses in HEX ?!?
> > How many rules can I plug in?
>
> I am not sure, but I think
>
> dev.t5nex.0.nfilters: number of filters
>
> shows the limit ? I have 20 on one box that handles about 1Gb/s of
> packet forwarding. Under DDoS it sees 5-8 and nicely drops those packets
> and normal traffic flows unhindered.
>
> I also have
>
> hw.cxgbe.attack_filter="1"
> hw.cxgbe.drop_pkts_with_l3_errors="1"
>
> as I often see corrupted packets as part of the DDoS, so I just drop
> those anyways.  The packets do show up in the NIC counters, so if you
> are using graphana/cacti to monitor bandwidth, you will see them as part
> of the traffic counts.
>
> I run this every 5min and then graph it on cacti to keep track of how
> much is dropped on the box. Its kinda depressing how much RFC1918 and
> Bogon traffic gets dropped :(
>
> /usr/sbin/cxgbetool t5nex0 filter list | /usr/bin/grep -v Hits |
> /usr/bin/awk '{ sum+=$2;} END{print sum;}' > /var/run/filter-stats.log
>
>
>     ---Mike
>
>
> >
> > Regards,
> > Lyubomir
> >
> >
> > _______________________________________________
> > Bsdrp-users mailing list
> > Bsdrp-users@lists.sourceforge.net
> > https://lists.sourceforge.net/lists/listinfo/bsdrp-users
>
>
_______________________________________________
Bsdrp-users mailing list
Bsdrp-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/bsdrp-users

Reply via email to