<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic S/N/K-Series Policy to permit SNMP Requests only from Specific IP Addresses in FAQs</title>
    <link>https://community.extremenetworks.com/t5/faqs/s-n-k-series-policy-to-permit-snmp-requests-only-from-specific/m-p/41240#M41</link>
    <description>Article ID: 14649 &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Products&lt;/B&gt;&lt;BR /&gt;
S-Series&lt;BR /&gt;
Matrix N-Series DFE&lt;BR /&gt;
K-Series&lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Goals&lt;/B&gt;&lt;BR /&gt;
Sample configuration.&lt;BR /&gt;
Configure Policy so that only certain IP addresses can SNMP-access the device.&lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Solution&lt;/B&gt;&lt;BR /&gt;
This may be accomplished as follows:&lt;BR /&gt;
&lt;BR /&gt;
&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;set policy profile 1 name "SNMP_protect"&lt;/PRE&gt;&lt;/DIV&gt;&lt;BR /&gt;
&lt;BR /&gt;
Establish policy role/profile #1, with no default actions.&lt;BR /&gt;
&lt;BR /&gt;
&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;set policy rule admin-profile udpsourceport 161 mask 16 admin-pid 1&lt;/PRE&gt;&lt;/DIV&gt;&lt;BR /&gt;
&lt;BR /&gt;
Invoke policy role/profile #1 if the UDP Source Port value is 161, identifying SNMP traffic. This test and action occur on behalf of all ingress ports in the system.&lt;BR /&gt;
&lt;BR /&gt;
&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;set policy rule 1 ipsourcesocket&lt;/PRE&gt;&lt;/DIV&gt;  &amp;lt;&lt;I&gt;&lt;/I&gt;&lt;PRE&gt;&lt;I&gt;allowed user IP address&lt;/I&gt;&lt;/PRE&gt;&amp;gt;  &lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;mask 32 forward&lt;/PRE&gt;&lt;/DIV&gt;&lt;BR /&gt;
&lt;BR /&gt;
Within the role, permit processing to continue by exiting the role if the source IP address is allowed to request SNMP data from the protected IP address(es). Multiple rules of this type can be stacked if multiple users are allowed. If any of these rules "hits", then the drop rule(s) below will be ignored - because "&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;IPSource (12)&lt;/PRE&gt;&lt;/DIV&gt;" rules have a higher precedence than "&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;IPDest (13)&lt;/PRE&gt;&lt;/DIV&gt;" rules.&lt;BR /&gt;
&lt;BR /&gt;
&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;set policy rule 1 ipdestsocket&lt;/PRE&gt;&lt;/DIV&gt;  &amp;lt;&lt;I&gt;&lt;/I&gt;&lt;PRE&gt;&lt;I&gt;protected switch/router IP address&lt;/I&gt;&lt;/PRE&gt;&amp;gt;  &lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;mask 32 drop&lt;/PRE&gt;&lt;/DIV&gt;&lt;BR /&gt;
&lt;BR /&gt;
 Within the role, we know that this SNMP traffic is not from an allowed user. If it's destined to a protected address, then drop it. Otherwise, exit the role after taking no default action. Multiple rules of this type can be stacked if multiple (host/router) management IP addresses to be protected exist on this system.&lt;BR /&gt;
&lt;BR /&gt;
The resulting configuration may then be reviewed: N7(su)-&amp;gt;&lt;B&gt;show policy profile 1 -verbose&lt;/B&gt;&lt;BR /&gt;
Profile Index           :1&lt;BR /&gt;
Profile Name            :SNMP_protect&lt;BR /&gt;
Row Status              :active&lt;BR /&gt;
Port VID Status         :disabled&lt;BR /&gt;
Port VID Override       :1&lt;BR /&gt;
CoS Status              :disabled&lt;BR /&gt;
CoS                     :0&lt;BR /&gt;
Tagged Egress VLAN List :none&lt;BR /&gt;
Forbidden VLAN List     :none&lt;BR /&gt;
Untagged VLAN List      :none&lt;BR /&gt;
Replace TCI Status      :disabled&lt;BR /&gt;
Rule Precedence         :1-8,12-19,21-22,25-28,31&lt;BR /&gt;
                        :MACSource (1), MACDest (2), IPXSource (3),&lt;BR /&gt;
                        :IPXDest (4), IPXSrcSocket (5), IPXDstSocket (6),&lt;BR /&gt;
                        :IPXClass (7), IPXType (8), IPSource (12),&lt;BR /&gt;
                        :IPDest (13), IPFrag (14), UDPSrcPort (15),&lt;BR /&gt;
                        :UDPDestPort (16), TCPSrcPort (17), TCPDestPort (18),&lt;BR /&gt;
                        :ICMPType (19), IPTOS (21), IPProto (22), Ether (25),&lt;BR /&gt;
                        :LLCDSAPSSAP (26), VLANTag (27), TCI (28), Port (31)&lt;BR /&gt;
Admin Profile Usage     :fe.1.28&lt;BR /&gt;
Oper Profile Usage      :none&lt;BR /&gt;
Dynamic Profile Usage   :fe.1.28&lt;BR /&gt;
N7(su)-&amp;gt;&lt;B&gt;show policy rule admin-profile -verbose&lt;/B&gt;&lt;BR /&gt;
========================================&lt;BR /&gt;
Profile Index       :Admin-Profile&lt;BR /&gt;
Rule Type           :UDP port source&lt;BR /&gt;
Rule Data           :161&lt;BR /&gt;
Mask                :16&lt;BR /&gt;
Port                :All ports&lt;BR /&gt;
- - - - - - - - - - - - - - - - - - - -&lt;BR /&gt;
Status              :active&lt;BR /&gt;
Storage Type        :nonVolatile&lt;BR /&gt;
Ports Used          :lag.0.1;host.0.1&lt;BR /&gt;
Dynamic-PID         :-1&lt;BR /&gt;
Admin-PID           :1&lt;BR /&gt;
Audit Syslog Status :disabled&lt;BR /&gt;
Audit Trap Status   :disabled&lt;BR /&gt;
Disable Port Status :disabled&lt;BR /&gt;
========================================&lt;BR /&gt;
N7(su)-&amp;gt;&lt;B&gt;show policy rule 1 -verbose&lt;/B&gt;&lt;BR /&gt;
========================================&lt;BR /&gt;
Profile Index       :1&lt;BR /&gt;
Rule Type           :IP source address&lt;BR /&gt;
Rule Data           :1.2.3.4&lt;BR /&gt;
Mask                :32&lt;BR /&gt;
Port                :All ports&lt;BR /&gt;
- - - - - - - - - - - - - - - - - - - -&lt;BR /&gt;
Status              :active&lt;BR /&gt;
Storage Type        :nonVolatile&lt;BR /&gt;
Ports Used          :None&lt;BR /&gt;
VLAN                :4095 (Forward)&lt;BR /&gt;
CoS                 :-1   (Unconfigured)&lt;BR /&gt;
Audit Syslog Status :disabled&lt;BR /&gt;
Audit Trap Status   :disabled&lt;BR /&gt;
Disable Port Status :disabled&lt;BR /&gt;
========================================&lt;BR /&gt;
Profile Index       :1&lt;BR /&gt;
Rule Type           :IP destination address&lt;BR /&gt;
Rule Data           :1.2.3.1&lt;BR /&gt;
Mask                :32&lt;BR /&gt;
Port                :All ports&lt;BR /&gt;
- - - - - - - - - - - - - - - - - - - -&lt;BR /&gt;
Status              :active&lt;BR /&gt;
Storage Type        :nonVolatile&lt;BR /&gt;
Ports Used          :None&lt;BR /&gt;
VLAN                :0    (Drop)&lt;BR /&gt;
CoS                 :-1   (Unconfigured)&lt;BR /&gt;
Audit Syslog Status :disabled&lt;BR /&gt;
Audit Trap Status   :disabled&lt;BR /&gt;
Disable Port Status :disabled&lt;BR /&gt;
========================================&lt;BR /&gt;
N7(su)-&amp;gt;</description>
    <pubDate>Fri, 19 Sep 2014 00:38:00 GMT</pubDate>
    <dc:creator>FAQ_User</dc:creator>
    <dc:date>2014-09-19T00:38:00Z</dc:date>
    <item>
      <title>S/N/K-Series Policy to permit SNMP Requests only from Specific IP Addresses</title>
      <link>https://community.extremenetworks.com/t5/faqs/s-n-k-series-policy-to-permit-snmp-requests-only-from-specific/m-p/41240#M41</link>
      <description>Article ID: 14649 &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Products&lt;/B&gt;&lt;BR /&gt;
S-Series&lt;BR /&gt;
Matrix N-Series DFE&lt;BR /&gt;
K-Series&lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Goals&lt;/B&gt;&lt;BR /&gt;
Sample configuration.&lt;BR /&gt;
Configure Policy so that only certain IP addresses can SNMP-access the device.&lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Solution&lt;/B&gt;&lt;BR /&gt;
This may be accomplished as follows:&lt;BR /&gt;
&lt;BR /&gt;
&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;set policy profile 1 name "SNMP_protect"&lt;/PRE&gt;&lt;/DIV&gt;&lt;BR /&gt;
&lt;BR /&gt;
Establish policy role/profile #1, with no default actions.&lt;BR /&gt;
&lt;BR /&gt;
&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;set policy rule admin-profile udpsourceport 161 mask 16 admin-pid 1&lt;/PRE&gt;&lt;/DIV&gt;&lt;BR /&gt;
&lt;BR /&gt;
Invoke policy role/profile #1 if the UDP Source Port value is 161, identifying SNMP traffic. This test and action occur on behalf of all ingress ports in the system.&lt;BR /&gt;
&lt;BR /&gt;
&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;set policy rule 1 ipsourcesocket&lt;/PRE&gt;&lt;/DIV&gt;  &amp;lt;&lt;I&gt;&lt;/I&gt;&lt;PRE&gt;&lt;I&gt;allowed user IP address&lt;/I&gt;&lt;/PRE&gt;&amp;gt;  &lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;mask 32 forward&lt;/PRE&gt;&lt;/DIV&gt;&lt;BR /&gt;
&lt;BR /&gt;
Within the role, permit processing to continue by exiting the role if the source IP address is allowed to request SNMP data from the protected IP address(es). Multiple rules of this type can be stacked if multiple users are allowed. If any of these rules "hits", then the drop rule(s) below will be ignored - because "&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;IPSource (12)&lt;/PRE&gt;&lt;/DIV&gt;" rules have a higher precedence than "&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;IPDest (13)&lt;/PRE&gt;&lt;/DIV&gt;" rules.&lt;BR /&gt;
&lt;BR /&gt;
&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;set policy rule 1 ipdestsocket&lt;/PRE&gt;&lt;/DIV&gt;  &amp;lt;&lt;I&gt;&lt;/I&gt;&lt;PRE&gt;&lt;I&gt;protected switch/router IP address&lt;/I&gt;&lt;/PRE&gt;&amp;gt;  &lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;mask 32 drop&lt;/PRE&gt;&lt;/DIV&gt;&lt;BR /&gt;
&lt;BR /&gt;
 Within the role, we know that this SNMP traffic is not from an allowed user. If it's destined to a protected address, then drop it. Otherwise, exit the role after taking no default action. Multiple rules of this type can be stacked if multiple (host/router) management IP addresses to be protected exist on this system.&lt;BR /&gt;
&lt;BR /&gt;
The resulting configuration may then be reviewed: N7(su)-&amp;gt;&lt;B&gt;show policy profile 1 -verbose&lt;/B&gt;&lt;BR /&gt;
Profile Index           :1&lt;BR /&gt;
Profile Name            :SNMP_protect&lt;BR /&gt;
Row Status              :active&lt;BR /&gt;
Port VID Status         :disabled&lt;BR /&gt;
Port VID Override       :1&lt;BR /&gt;
CoS Status              :disabled&lt;BR /&gt;
CoS                     :0&lt;BR /&gt;
Tagged Egress VLAN List :none&lt;BR /&gt;
Forbidden VLAN List     :none&lt;BR /&gt;
Untagged VLAN List      :none&lt;BR /&gt;
Replace TCI Status      :disabled&lt;BR /&gt;
Rule Precedence         :1-8,12-19,21-22,25-28,31&lt;BR /&gt;
                        :MACSource (1), MACDest (2), IPXSource (3),&lt;BR /&gt;
                        :IPXDest (4), IPXSrcSocket (5), IPXDstSocket (6),&lt;BR /&gt;
                        :IPXClass (7), IPXType (8), IPSource (12),&lt;BR /&gt;
                        :IPDest (13), IPFrag (14), UDPSrcPort (15),&lt;BR /&gt;
                        :UDPDestPort (16), TCPSrcPort (17), TCPDestPort (18),&lt;BR /&gt;
                        :ICMPType (19), IPTOS (21), IPProto (22), Ether (25),&lt;BR /&gt;
                        :LLCDSAPSSAP (26), VLANTag (27), TCI (28), Port (31)&lt;BR /&gt;
Admin Profile Usage     :fe.1.28&lt;BR /&gt;
Oper Profile Usage      :none&lt;BR /&gt;
Dynamic Profile Usage   :fe.1.28&lt;BR /&gt;
N7(su)-&amp;gt;&lt;B&gt;show policy rule admin-profile -verbose&lt;/B&gt;&lt;BR /&gt;
========================================&lt;BR /&gt;
Profile Index       :Admin-Profile&lt;BR /&gt;
Rule Type           :UDP port source&lt;BR /&gt;
Rule Data           :161&lt;BR /&gt;
Mask                :16&lt;BR /&gt;
Port                :All ports&lt;BR /&gt;
- - - - - - - - - - - - - - - - - - - -&lt;BR /&gt;
Status              :active&lt;BR /&gt;
Storage Type        :nonVolatile&lt;BR /&gt;
Ports Used          :lag.0.1;host.0.1&lt;BR /&gt;
Dynamic-PID         :-1&lt;BR /&gt;
Admin-PID           :1&lt;BR /&gt;
Audit Syslog Status :disabled&lt;BR /&gt;
Audit Trap Status   :disabled&lt;BR /&gt;
Disable Port Status :disabled&lt;BR /&gt;
========================================&lt;BR /&gt;
N7(su)-&amp;gt;&lt;B&gt;show policy rule 1 -verbose&lt;/B&gt;&lt;BR /&gt;
========================================&lt;BR /&gt;
Profile Index       :1&lt;BR /&gt;
Rule Type           :IP source address&lt;BR /&gt;
Rule Data           :1.2.3.4&lt;BR /&gt;
Mask                :32&lt;BR /&gt;
Port                :All ports&lt;BR /&gt;
- - - - - - - - - - - - - - - - - - - -&lt;BR /&gt;
Status              :active&lt;BR /&gt;
Storage Type        :nonVolatile&lt;BR /&gt;
Ports Used          :None&lt;BR /&gt;
VLAN                :4095 (Forward)&lt;BR /&gt;
CoS                 :-1   (Unconfigured)&lt;BR /&gt;
Audit Syslog Status :disabled&lt;BR /&gt;
Audit Trap Status   :disabled&lt;BR /&gt;
Disable Port Status :disabled&lt;BR /&gt;
========================================&lt;BR /&gt;
Profile Index       :1&lt;BR /&gt;
Rule Type           :IP destination address&lt;BR /&gt;
Rule Data           :1.2.3.1&lt;BR /&gt;
Mask                :32&lt;BR /&gt;
Port                :All ports&lt;BR /&gt;
- - - - - - - - - - - - - - - - - - - -&lt;BR /&gt;
Status              :active&lt;BR /&gt;
Storage Type        :nonVolatile&lt;BR /&gt;
Ports Used          :None&lt;BR /&gt;
VLAN                :0    (Drop)&lt;BR /&gt;
CoS                 :-1   (Unconfigured)&lt;BR /&gt;
Audit Syslog Status :disabled&lt;BR /&gt;
Audit Trap Status   :disabled&lt;BR /&gt;
Disable Port Status :disabled&lt;BR /&gt;
========================================&lt;BR /&gt;
N7(su)-&amp;gt;</description>
      <pubDate>Fri, 19 Sep 2014 00:38:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/faqs/s-n-k-series-policy-to-permit-snmp-requests-only-from-specific/m-p/41240#M41</guid>
      <dc:creator>FAQ_User</dc:creator>
      <dc:date>2014-09-19T00:38:00Z</dc:date>
    </item>
  </channel>
</rss>

