Specifications

Policy Overview
May 18, 2009 Page 11 of 32
SIP(ip),DIP(ip),Protocol,TOS/DSCP,Fragmentationindication,DestinationPORT,andSource
Port.
Usethesetpolicysyslogcommandtosetsyslogruleusageconfiguration.
Quality of Service in a Policy Rules Context
QualityofService(QoS)canbespecifieddirectlyinapolicyroleasstatedinAssigningaClassof
ServicetothisRoleonpage 5.ACoScanalsobeappliedtoapolicyrule.TheCoSspecifiedatthe
policyrolelevelisthedefaultandisonlyused
ifnoruleistriggered.Therefore,ifaCoSisapplied
toboththepolicyroleandapolicyrule,theCoSspecifiedinthepolicyruletakesprecedenceover
theCoSinthepolicyroleforthetrafficclassificationcontextspecifiedinthepolicyrule.Asstated
inthe
policyrolediscussion,CoSconfigurationdetailsarebeyondthescopeofthisdocument.See
theQoSConfigurationfeatureguidelocatedathttp://secure.enterasys.com/support/manuals/fora
completediscussionofQoSconfiguration.
Blocking Non-Edge Protocols at the Edge Network Layer
EdgeclientsshouldbepreventedfromactingasserversforanumberofIPservices.IfnonedgeIP
servicesaccidentlyormaliciouslyattachtotheedgeofthenetwork,theyarecapableofdisrupting
networkoperation.IPservicesshouldonlybeallowedwhereandwhenyournetworkdesign
requires.This
sectionidentifiestenIPServicesyoushouldconsiderblockingattheedgeunless
allowingthemispartofyournetworkarchitecture.SeeAssigningTrafficClassificationRuleson
page 25foranexampleofhowtoconfigureasubsetoftheserecommendedIPservicestodrop
trafficattheedge.
Table 2 Non-Edge Protocols
Protocol Policy Effect
DHCP Server Protocol Every network needs DHCP. Automatically mitigate the accidental
or malicious connection of a DHCP server to the edge of your
network to prevent DoS or data integrity issues, by blocking DHCP
on the source port for this device.
DNS Server Protocol DNS is critical to network operations. Automatically protect your
name servers from malicious attack or unauthorized spoofing and
redirection, by blocking DNS on the source port for this device.
Routing Topology Protocols RIP, OSPF, and BGP topology protocols should only originate
from authorized router connection points to ensure reliable
network operations.
Router Source MAC and Router
Source IP Address
Routers and default gateways should not be moving around your
network without approved change processes being authorized.
Prevent DoS, spoofing, data integrity and other router security
issues by blocking router source MAC and router source IP
addresses at the edge.
SMTP/POP Server Protocols Prevent data theft and worm propagation by blocking SMTP at the
edge.
SNMP Protocol Only approved management stations or management data
collection points need to be speaking SNMP. Prevent
unauthorized users from using SNMP to view, read, or write
management information.
FTP and TFTP Server Protocols Ensure file transfers and firmware upgrades are only originating
from authorized file and configuration management servers.