EnglishFrenchSpanish

Ad


OnWorks favicon

rapolicy - Online in the Cloud

Run rapolicy in OnWorks free hosting provider over Ubuntu Online, Fedora Online, Windows online emulator or MAC OS online emulator

This is the command rapolicy that can be run in the OnWorks free hosting provider using one of our multiple free online workstations such as Ubuntu Online, Fedora Online, Windows online emulator or MAC OS online emulator

PROGRAM:

NAME


rapolicy - compare a argus(8) data file/stream against a Cisco Access Control List.

COPYRIGHT


Copyright (c) 2000-2003 QoSient. All rights reserved.

SYNOPSIS


rapolicy -r argus-file [ra options]

DESCRIPTION


Rapolicy reads argus data from an argus-file list, and tests the argus data stream
against a Cisco access control list configuration file, printing out records that
represent activity that would violate the policy. Rapolicy can be used to indicate access
control violations, as well as test new access control definitions prior to installing
them in a router.

OPTIONS


Rapolicy, like all ra based clients, supports a large number of options. Options that
have specific meaning to rapolicy are:

-f <Cisco ACL file> Print records that violate the policy.
-D 0 (default) Print records that violate the policy.
-D 1 Print records and the violated ruleset.
-D 2 Print all records and the ruleset that matched.

See ra(1) for a complete description of ra options.

EXAMPLE INVOCATION


rapolicy -r argus.file

CISCO ACL SYNTAX


There does not seem to be authoritative Cisco-ACL-Documentation, nor ACL syntax
standardization. Because Cisco has been know to improve its ACL rules syntax, rapolicy is
known to work with Cisco ACL router defintions up to July, 2002.

A Cisco ACL configuration file consists of a collection of any number of ACL statements,
each on a separte line. The syntax of an ACL statement is:

ACL = "access-list" ID ACTION PROTOCOL SRC DST NOTIFICATION

ID = Number
ACTION = permit | deny
PROTO = protocol name | protocol number

SRC | DST = ADDRESS [PORTMATCH]

ADDRESS = any | host HOSTADDR | HOSTADDR HOSTMASK
HOSTADDR = ipV4 address
HOSTMASK = matching-mask

PORTMATCH = PORTOP PORTNUM | range PORTRANGE
PORTOP = eq | lt | gt | neq | established

PORTRANGE = PORTNUM PORTNUM
PORTNUM = TCP or UDP port value (unsigned decimal from 0 to 65535)

EXAMPLE CONFIGURATION


This example Cisco Access Control List configuration is provided as an example only. No
effort has been made to verify that this example Access Control List enforces a useful
access control policy of any kind.

#allow www-traffic to webserver
access-list 102 permit tcp any 193.174.13.99 0.0.0.0 eq 80

#allow ftp control connection to server
access-list 102 permit tcp any 193.174.13.99 0.0.0.0 eq 21

#allow normal ftp
access-list 102 permit tcp any 193.174.13.99 0.0.0.0 eq 20

#allow ftp passive conncetions in portrange 10000 to 10500
access-list 102 permit tcp any host 193.174.13.99 range 10000 10500

#dummy example
access-list 102 permit tcp host 193.174.13.1 eq 12345 host 193.174.13.2 range 12345 23456

#deny the rest
access-list 102 deny tcp any any

#same thing in other words:
access-list 102 deny tcp 0.0.0.0 255.255.255.255 0.0.0.0 255.255.255.255

AUTHORS


Carter Bullard ([email protected]).
Olaf Gellert ([email protected]).

Use rapolicy online using onworks.net services


Free Servers & Workstations

Download Windows & Linux apps

Linux commands

Ad