User Manual

Table Of Contents
NETGEAR M4500 Series Switches CLI Command Reference Manual 606
5.28. Control Plane Policing Commands
Control plane packets are generated or received from network device that are used for the operation of the
network itself. Therefore, control plane packets always have a receive destination IP address and are handled by
the CPU in the network device. Examples include protocols such as ARP, BGP, OSPF, and other protocols that
glue the network together.
Main purpose of Control Plane Policing (CoPP) is to enhance security on the switch to prohibit unnecessary or
DoS traffic and giving priority to important control plane and management traffic.
To use CoPP feature needs to set Access Control List (ACL) which matches your purpose and bind it to control-
plane interface. Binding ACL to control-plane interface is always considered as “out direction”, so CoPP doesn’t
support some ACL conditions which uses for “in direction” only, for example, condition “mirror”, or “redirect”.
You must ensure that the CoPP policy does not filter critical traffic such as routing protocols or interactive access
to the switches. If you want to prevent access some of switch services, for example: SSH, it should set
destination IP address to switch IP address in associating ACL rules. Since unassigned destination IP address
(destination IP address is “any”) will filter out all service associating packets, and make them fail to route to
remote server.
5.28.1. interface control-plane
To enter control-plane configuration mode and apply an IP, IPv6 or MAC access list to police traffic destined for
the CPU port.
Format interface control-plane
Default None
Mode Global Config
Example: To deny all GRE packets which come from host 10.3.1.1
(M4500-32C) #configure
(M4500-32C) (Config)#ip access-list acl001
(M4500-32C) (Config-ipv4-acl)# deny gre host 10.3.1.1 any
Create ACL 1000 : Rule ID 1
(M4500-32C) (Config-ipv4-acl)#permit every
Create ACL 1000 : Rule ID 2
(M4500-32C) (Config-ipv4-acl)#exit