LISP Device Recommended Filtering Guidelines
Introduction
The following guidelines are designed to aid site administrators who want to provide access control for LISP devices (typically ITRs and ETRs) that they deploy. These recommendations are not designed to replace the site security polices for hosts behind the LISP device, and should be used in conjunction with filtering/access control of the site. These policies can be implemented as Infrastructure ACLs on firewalls or upstream routers. At this time, it is not possible to deploy these ACLs directly on the Ti box. The following guidlines show rules for IPv4 only; IPv6 should, in general, follow the similar policies.
The following figure provides the context for the filtering guidelines. |--------| E |-----| | upstrm | // // <--I--| xTR |--[*]------[*]------| rtr/fw |----//Internet// D |-----| R ^ |------- | // // L | LISP O | SITE C | | <=== INBOUND POLICY OUTBOUND POLICY ===> * Note: INBOUND and OUTBOUND refer to the direction of traffic from the perspective of the external (RLOC) side of the LISP SITE. Thus, the INBOUND POLICY refers to packets from the Internet headed toward the xTR of the LISP SITE, and the OUTBOUND POLICY refers to packets leaving the xTR of the LISP SITE headed toward the Internet.
For xTRs using Map-Resolvers/Map-Servers
INBOUND POLICY:
For traffic INBOUND to the LISP site from the Internet (RLOC side), certain packets must be permitted to reach the ETR. These packets include: LISP Control Plane: permit udp, dst-port 4342, src-addr=any, dst-addr=ETR RLOC LISP Data Plane: permit udp, dst-port 4341, src-addr=any, dst-addr=ETR RLOC In addition, certain packets should be permitted to reach the ETR. These packets include: LISP Managemnt Plane: permit tcp, dst-port 22 (ssh), src-addr=any, dst-addr=ETR RLOC permit icmp, src-addr=any, dst-addr=ETR RLOC [note 1] Unless LISP-NAT is being used, no traffic should be directly destined to the LISP site's EID addresses. Traffic destined to LISP-site EIDs is always LISP-encapsulated and destined to the ETR's RLOC(s).
OUTBOUND POLICY:
For traffic OUTBOUND from the LISP site toward the Internet, certain packets must be permitted to leave the ITR. These packets include: LISP Control Plane: permit udp, dport 4342, saddr=ITR RLOC, daddr=Map-Resolver permit udp, dport 4342, saddr=ITR RLOC, daddr=Map-Server(s)permit IPsec AH (proto 51), saddr=ITR RLOC, daddr=Map-Server(s)LISP Data Plane: permit udp, dport 4341, saddr=ITR-RLOC, daddr=any Non-LISP Data Plane: permit IP=any, saddr=ITR EID Prefix, daddr=any [note 2, 3] In addition, certain packets should be permitted to reach "any." These packets include: LISP Managemnt Plane: permit tcp, dst-port 22 (ssh), src-addr=any, dst-addr=any permit icmp, src-addr=any, dst-addr=any [note 1] Note 1: ICMP can be further constrained by limiting allowable types to: Type 8 (echo), Type 0 (echo-reply), Type 3 (destination unreachable), and Type 11 (time exceeded). Note 2: Covers non-LISP encapsulated traffic with source addresses of LISP site EIDs. Traffic destined to non-lisp sites is forwarded natively. Return is typically through a PTR. Note 3: Explicit support on the upstream PE router may be required to allow for uRPF checks on traffic sourced from EID prefix space to succeed.
xTR directly connected the ALT
INBOUND POLICY:
These policies are the same as the above xTR example, except that GRE must also be permitted since ETRs receive Map-Request packets directly from the ALT over GRE tunnels. In addition, the IPSEC AH policy is not required for Map-Server Registration. On ingress to the LISP site, certain packets must be permitted to reach the ETR. These packets include: LISP Control Plane: permit udp, dst-port 4342, src-addr=any, dst-addr=ETR RLOC permit GRE (proto 47), saddr=ALT Router(s), daddr=ETR RLOC LISP Data Plane: permit udp, dst-port 4341, src-addr=any, dst-addr=ETR RLOC In addition, certain packets should be permitted to reach the ETR. These packets include: LISP Managemnt Plane: permit tcp, dst-port 22 (ssh), src-addr=any, dst-addr=ETR RLOC permit icmp, src-addr=any, dst-addr=ETR RLOC [note 1] Unless LISP-NAT is being used, no traffic should be directly destined to the LISP site's EID addresses. Traffic destined to LISP-site EIDs is always LISP-encapsulated and destined to the ETR's RLOC(s).
OUTBOUND POLICY:
These policies are the same as the above xTR example, except that
GRE must also be permitted since ITRs send Map-Request packets
directly to the ALT over GRE tunnels. In addition, the policy is
not required to support Map-Server Registration.When controlling Egress traffic from the LISP site, the policy
must permit the following packets:LISP Control Plane:
permit udp, dport 4342, saddr=ITR RLOC, daddr=Map-Resolver
permit GRE (proto 47), saddr=ITR-RLOC, daddr=ALT Router(s)LISP Data Plane:
permit udp, dport 4341, saddr=ITR-RLOC, daddr=anyNon-LISP Data Plane:
permit IP=any, saddr=ITR EID Prefix, daddr=any [note 2, 3]In addition, certain packets should be permitted to reach "any."
These packets include:LISP Managemnt Plane:
permit tcp, dst-port 22 (ssh), src-addr=any, dst-addr=any
permit icmp, src-addr=any, dst-addr=any [note 1]Note 1: ICMP can be further constrained by limiting allowable
types to: Type 8 (echo), Type 0 (echo-reply), Type 3
(destination unreachable), and Type 11 (time exceeded).Note 2: Covers non-LISP encapsulated traffic with source addresses
of LISP site EIDs. Traffic destined to non-lisp sites is
forwarded natively. Return is typically through a PTR.Note 3: Explicit support on the upstream PE router may be
required to allow for uRPF checks on traffic sourced
from EID prefix space to succeed.
Last Update: 09.30.2009 by gschudel@cisco.com