Class IPFilterRule
- java.lang.Object
-
- org.jainslee.resources.diameter.base.types.IPFilterRule
-
public class IPFilterRule extends Object
Java class to represent the Diameter IPFilterRule AVP type.The IPFilterRule format is derived from the OctetString AVP Base Format. It uses the ASCII charset. Packets may be filtered based on the following information that is associated with it.
Direction (in or out) Source and destination IP address (possibly masked) Protocol Source and destination port (lists or ranges) TCP flags IP fragment flag IP options ICMP types
Rules for the appropriate direction are evaluated in order, with the first matched rule terminating the evaluation. Each packet is evaluated once. If no rule matches, the packet is dropped if the last rule evaluated was a permit, and passed if the last rule was a deny. IPFilterRule filters MUST follow the format:action dir proto from src to dst [options] action permit - Allow packets that match the rule. deny - Drop packets that match the rule. dir "in" is from the terminal, "out" is to the terminal. proto An IP protocol specified by number. The "ip" keyword means any protocol will match. src and dst <address/mask> [ports] The <address/mask> may be specified as: ipno An IPv4 or IPv6 number in dotted- quad or canonical IPv6 form. Only this exact IP number will match the rule. ipno/bits An IP number as above with a mask width of the form 1.2.3.4/24. In this case, all IP numbers from 1.2.3.0 to 1.2.3.255 will match. The bit width MUST be valid for the IP version and the IP number MUST NOT have bits set beyond the mask. For a match to occur, the same IP version must be present in the packet that was used in describing the IP address. To test for a particular IP version, the bits part can be set to zero. The keyword "any" is 0.0.0.0/0 or the IPv6 equivalent. The keyword "assigned" is the address or set of addresses assigned to the terminal. For IPv4, a typical first rule is often "deny in ip! assigned" The sense of the match can be inverted by preceding an address with the not modifier (!), causing all other addresses to be matched instead. This does not affect the selection of port numbers. With the TCP, UDP and SCTP protocols, optional ports may be specified as: {port/port-port}[,ports[,...]] The '-' notation specifies a range of ports (including boundaries). Fragmented packets that have a non-zero offset (i.e., not the first fragment) will never match a rule that has one or more port specifications. See the frag option for details on matching fragmented packets. options: frag Match if the packet is a fragment and this is not the first fragment of the datagram. frag may not be used in conjunction with either tcpflags or TCP/UDP port specifications. ipoptions spec Match if the IP header contains the comma separated list of options specified in spec. The supported IP options are: ssrr (strict source route), lsrr (loose source route), rr (record packet route) and ts (timestamp). The absence of a particular option may be denoted with a '!'. tcpoptions spec Match if the TCP header contains the comma separated list of options specified in spec. The supported TCP options are: mss (maximum segment size), window (tcp window advertisement), sack (selective ack), ts (rfc1323 timestamp) and cc (rfc1644 t/tcp connection count). The absence of a particular option may be denoted with a '!'. established TCP packets only. Match packets that have the RST or ACK bits set. setup TCP packets only. Match packets that have the SYN bit set but no ACK bit. tcpflags spec TCP packets only. Match if the TCP header contains the comma separated list of flags specified in spec. The supported TCP flags are: fin, syn, rst, psh, ack and urg. The absence of a particular flag may be denoted with a '!'. A rule that contains a tcpflags specification can never match a fragmented packet that has a non-zero offset. See the frag option for details on matching fragmented packets. icmptypes types ICMP packets only. Match if the ICMP type is in the list types. The list may be specified as any combination of ranges or individual types separated by commas. Both the numeric values and the symbolic values listed below can be used. The supported ICMP types are: echo reply (0), destination unreachable (3), source quench (4), redirect (5), echo request (8), router advertisement (9), router solicitation (10), time-to-live exceeded (11), IP header bad (12), timestamp request (13), timestamp reply (14), information request (15), information reply (16), address mask request (17) and address mask reply (18).
There is one kind of packet that the access device MUST always discard, that is an IP fragment with a fragment offset of one. This is a valid packet, but it only has one use, to try to circumvent firewalls. An access device that is unable to interpret or apply a deny rule MUST terminate the session. An access device that is unable to interpret or apply a permit rule MAY apply a more restrictive rule. An access device MAY apply deny rules of its own before the supplied rules, for example to protect the access device owner's infrastructure. The rule syntax is a modified subset of ipfw(8) from FreeBSD.- Author:
- Open Cloud
-
-
Field Summary
Fields Modifier and Type Field Description static int
ACTION_DENY
static int
ACTION_PERMIT
static int
DIR_IN
static int
DIR_OUT
-
Constructor Summary
Constructors Constructor Description IPFilterRule(String rule)
-
Method Summary
All Methods Static Methods Instance Methods Concrete Methods Modifier and Type Method Description int
getAction()
int
getDestBits()
String
getDestIp()
int[][]
getDestPorts()
int
getDirection()
String[]
getIcmpTypes()
String[]
getIpOptions()
int[]
getNumericIcmpTypes()
int
getProtocol()
String
getRuleString()
int
getSourceBits()
String
getSourceIp()
int[][]
getSourcePorts()
String[]
getTcpFlags()
String[]
getTcpOptions()
boolean
isAnyProtocol()
boolean
isDestAssignedIps()
boolean
isEstablised()
boolean
isFragment()
boolean
isSetup()
boolean
isSourceAssignedIps()
static void
main(String[] args)
String
toString()
-
-
-
Field Detail
-
ACTION_PERMIT
public static final int ACTION_PERMIT
- See Also:
- Constant Field Values
-
ACTION_DENY
public static final int ACTION_DENY
- See Also:
- Constant Field Values
-
DIR_IN
public static final int DIR_IN
- See Also:
- Constant Field Values
-
DIR_OUT
public static final int DIR_OUT
- See Also:
- Constant Field Values
-
-
Constructor Detail
-
IPFilterRule
public IPFilterRule(String rule)
-
-
Method Detail
-
getRuleString
public String getRuleString()
-
getAction
public int getAction()
-
getDirection
public int getDirection()
-
isAnyProtocol
public boolean isAnyProtocol()
-
getProtocol
public int getProtocol()
-
getSourceIp
public String getSourceIp()
-
getSourceBits
public int getSourceBits()
-
isSourceAssignedIps
public boolean isSourceAssignedIps()
-
getSourcePorts
public int[][] getSourcePorts()
-
getDestIp
public String getDestIp()
-
getDestBits
public int getDestBits()
-
isDestAssignedIps
public boolean isDestAssignedIps()
-
getDestPorts
public int[][] getDestPorts()
-
isFragment
public boolean isFragment()
-
getIpOptions
public String[] getIpOptions()
-
getTcpOptions
public String[] getTcpOptions()
-
isEstablised
public boolean isEstablised()
-
isSetup
public boolean isSetup()
-
getTcpFlags
public String[] getTcpFlags()
-
getIcmpTypes
public String[] getIcmpTypes()
-
getNumericIcmpTypes
public int[] getNumericIcmpTypes()
-
main
public static void main(String[] args)
-
-