Differences
This shows you the differences between two versions of the page.
| Next revision | Previous revision | ||
| en:dpi:bras_bng:bras_l2_options:bras_l2_vlan_ipsg [2024/09/26 15:29] – created - external edit 127.0.0.1 | en:dpi:bras_bng:bras_l2_options:bras_l2_vlan_ipsg [2026/03/03 14:01] (current) – [Purpose] elena.krasnobryzh | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== IP source guard ====== | ====== IP source guard ====== | ||
| {{indexmenu_n> | {{indexmenu_n> | ||
| - | FastDPI BRAS allows you to control the correspondence of VLAN tags and IP addresses for subscribers. | ||
| - | When assigning IP addresses using DHCP the fastDPI BRAS stores VLAN/QinQ subscriber tags in its [[en: | ||
| - | and then uses this data to control whether the source IP address and VLAN tag match. | ||
| - | To enable IP source guard mode you should set the value of '' | + | ===== Purpose ===== |
| - | * 0 – IP source guard is disabled. It is the default value. | + | FastDPI BNG verifies |
| - | * 1 – IP source guard is enabled | + | |
| - | The packet will be forwarded | + | When assigning an IP address via DHCP, FastDPI BNG stores the subscriber VLAN/QinQ tags in the built-in [[en:dpi:dpi_components: |
| - | * '' | + | |
| - | * Session is active and packet VLAN tags are the same as registered in DHCP request ones | + | |
| - | * Session state is unknown | + | |
| - | If the conditions are not met the package will be dropped. | + | IP source guard is applied only to outbound traffic (LAN → WAN). |
| - | IP source guard is used just in case of outbound traffic (from LAN to WAN). | + | ===== Enabling the mode ===== |
| + | To activate, set the parameter '' | ||
| - | Stingray Service Gateway 7.4+: the [[en: | + | * 0 — mode disabled (default) |
| + | * 1 — mode enabled and applied | ||
| + | If after restarting fastDPI the session state is unknown, IP source guard is not applied and the packet is allowed. | ||
| + | |||
| + | ===== Packet processing logic ===== | ||
| + | With '' | ||
| + | |||
| + | * the session is active and the packet VLAN tags match the tags registered during DHCP | ||
| + | * the session status is unknown | ||
| + | |||
| + | In all other cases, the packet is dropped. | ||
| + | |||
| + | ===== AS-based termination mode ===== | ||
| + | The [[en: | ||
| + | |||
| + | In this mode, IP source guard is applied only to source IP addresses whose AS is marked with the '' | ||
| + | |||
| + | ===== Filtering by source AS flags ===== | ||
| + | Additional filtering of subscriber traffic by AS flags is supported in the subs → inet direction before packet processing. The mechanism is intended to block outbound DDoS traffic with spoofed IP addresses originating from the operator network. | ||
| + | |||
| + | The parameter '' | ||
| + | |||
| + | Only packets whose source IP AS contains at least one of the specified flags are allowed for processing. Otherwise, the packet is dropped. | ||
| + | |||
| + | Flag values (bitmask): | ||
| + | |||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||