Page 1
Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x First Published: 2017-09-27 Last Modified: 2018-02-27 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883...
Page 2
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks . Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company.
AAA Security Services Benefits of Using AAA Remote AAA Services AAA Server Groups AAA Service Configuration Options Authentication and Authorization Process for User Logins Prerequisites for Remote AAA Guidelines and Limitations for AAA Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
Page 4
RADIUS Network Environments Information About RADIUS Operations RADIUS Server Monitoring Vendor-Specific Attributes Prerequisites for RADIUS Guidelines and Limitations for RADIUS Configuring RADIUS Servers Configuring RADIUS Server Hosts Configuring RADIUS Global Preshared Keys Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
Page 5
Configuring TACACS+ Server Groups Configuring the Global Source Interface for TACACS+ Server Groups Configuring the Global TACACS+ Timeout Interval Configuring the Timeout Interval for a Server Configuring TCP Ports Configuring Periodic TACACS+ Server Monitoring Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
Page 6
Configuration Examples for SSH Configuring X.509v3 Certificate-Based SSH Authentication Configuration Example for X.509v3 Certificate-Based SSH Authentication Configuring Telnet Enabling the Telnet Server Reenabling the Telnet Server Configuring the Telnet Source Interface Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
Page 7
Applying an IP ACL as a Port ACL Applying an IP ACL as a Router ACL Verifying the ACL Logging Configuration About System ACLs Carving a TCAM Region Configuring System ACLs Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
Documentation Feedback, page xii • Related Documentation for Cisco Nexus 3600 Platform Switches, page xiii Audience This publication is for network administrators who install, configure, and maintain Cisco Nexus switches. Document Conventions Command descriptions use the following conventions: Convention Description...
Subscribe to What's New in Cisco Product Documentation, which lists all new and revised Cisco technical documentation as an RSS feed and delivers content directly to your desktop using a reader application. The RSS feeds are a free service.
Preface Related Documentation for Cisco Nexus 3600 Platform Switches Related Documentation for Cisco Nexus 3600 Platform Switches The entire Cisco Nexus 3600 platform switch documentation set is available at the following URL: http://www.cisco.com/c/en/us/support/switches/nexus-3000-series-switches/ tsd-products-support-series-home.html Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
Page 14
Preface Related Documentation for Cisco Nexus 3600 Platform Switches Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
• New and Changed Information, page 1 New and Changed Information This table summarizes the new and changed features for the Cisco Nexus 3600 Series NX-OS Security Configuration Guide and where they are documented. Table 1: New and Changed Features...
Page 16
Release Unicast RPF Added support for unicast RPF. 7.0(3)F3(1) Configuring Unicast RPF, on page 101 Control Plane Policing (CoPP) Added support for CoPP 7.0(3)F3(1) Configuring Control Plane Policing, on page 109 Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
C H A P T E R Overview The Cisco NX-OS software supports security features that can protect your network against degradation or failure and also against data loss or compromise resulting from intentional attacks and from unintended but damaging mistakes by well-meaning network users.
You can use the Secure Shell (SSH) server to enable an SSH client to make a secure, encrypted connection to a Cisco NX-OS device. SSH uses strong encryption for authentication. The SSH server in the Cisco NX-OS software can interoperate with publicly and commercially available SSH clients.
Each rule specifies a set of conditions that a packet must satisfy to match the rule. When the Cisco NX-OS software determines that an IP ACL applies to a packet, it tests the packet against the conditions of all rules. The first match determines whether a packet is permitted or denied, or if there is no match, the Cisco NX-OS software applies the applicable default rule.
The authentication, authorization, and accounting (AAA) features allows you to verify the identity of, grant access to, and track the actions of users who manage Cisco Nexus devices. The Cisco Nexus device supports Remote Access Dial-In User Service (RADIUS) or Terminal Access Controller Access Control device Plus (TACACS+) protocols.
Configuring AAA Benefits of Using AAA Authorization to access a Cisco Nexus device is provided by attributes that are downloaded from AAA servers. Remote security servers, such as RADIUS and TACACS+, authorize users for specific rights by associating attribute-value (AV) pairs, which define those rights with the appropriate user.
• None—Uses only the username. Note If the method is for all RADIUS servers, instead of a specific server group, the Cisco Nexus devices choose the RADIUS server from the global pool of configured RADIUS servers in the order of configuration.
Authentication and Authorization Process for User Logins The authentication and authorization process for user login is as occurs: • When you log in to the required Cisco Nexus device, you can use the Telnet, SSH, Fabric Manager or Device Manager, or console login options.
• The Cisco Nexus device is configured as a client of the AAA servers. • The preshared secret key is configured on the Cisco Nexus device and on the remote AAA servers. • The remote server responds to AAA requests from the Cisco Nexus device.
The Cisco Nexus devices do not support all numeric usernames, whether created with TACACS+ or RADIUS, or created locally. If an all numeric username exists on an AAA server and is entered during a login, the Cisco Nexus device still logs in the user.
Configuring Default Login Authentication Methods The default method is local. Before you configure default login authentication methods, configure RADIUS or TACACS+ server groups as needed. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
Enabling MSCHAP Authentication Microsoft Challenge Handshake Authentication Protocol (MSCHAP) is the Microsoft version of CHAP. You can use MSCHAP for user logins to a Cisco Nexus device through a remote authentication server (RADIUS or TACACS+). Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
Configuring AAA Accounting Default Methods The Cisco Nexus device supports TACACS+ and RADIUS methods for accounting. The switches report user activity to TACACS+ or RADIUS security servers in the form of accounting records. Each accounting record contains accounting attribute-value (AV) pairs and is stored on the AAA server.
Page 33
Configuring AAA Configuring AAA Accounting Default Methods When you activate AAA accounting, the Cisco Nexus device reports these attributes as accounting records, which are then stored in an accounting log on the security server. You can create default method lists defining specific accounting methods, which include the following:.
The Cisco RADIUS implementation supports one vendor-specific option using the format recommended in the specification. The Cisco vendor ID is 9, and the supported option is vendor type 1, which is named cisco-av-pair. The value is a string with the following format:...
The SNMPv3 authentication protocol options are SHA and MD5. The privacy protocol options are AES-128 and DES. If you do not specify these options in the cisco-av-pair attribute, MD5 and DES are the default authentication protocols.
No Quiet-Mode access list has been configured, default ACL will be applied. Switch is enabled to watch for login Attacks. If more than 2 login failures occur in 45 seconds or less, logins will be disabled for 70 Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
1 to 7. If you set the maximum login limit as 1, then only one session (telnet/SSH) is Example: allowed per user. Switch(config)# user max-logins 1 Step 3 exit Exits to privileged EXEC mode. Example: Switch(config)# exit Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
7. While generating an encrypted shared secret, user input is hidden. Example: You can generate encrypted equivalent of Note Switch(config)# generate plain text separately and can configure the type7_encrypted_secret encrypted shared secret later. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
Exits to privileged EXEC mode. exit Example: Switch(config)# exit Monitoring and Clearing the Local AAA Accounting Log The Cisco Nexus device maintains a local log for the AAA accounting activity. Procedure Command or Action Purpose Step 1 switch# show accounting log [size] Displays the accounting log contents.
The Remote Access Dial-In User Service (RADIUS) distributed client/server system allows you to secure networks against unauthorized access. In the Cisco implementation, RADIUS clients run on Cisco Nexus device and send authentication and accounting requests to a central RADIUS server that contains all user authentication and network service access information.
• Networks already using RADIUS. You can add a Cisco Nexus device with RADIUS to the network. This action might be the first step when you make a transition to an AAA server. • Networks that require resource accounting.
The Cisco RADIUS implementation supports one vendor-specific option using the format recommended in the specification. The Cisco vendor ID is 9, and the supported option is vendor type 1, which is named cisco-av-pair. The value is a string with the following format:...
• You must obtain IPv4 or IPv6 addresses or hostnames for the RADIUS servers. • You must obtain preshared keys from the RADIUS servers. • Ensure that the Cisco Nexus device is configured as a RADIUS client of the AAA servers. Guidelines and Limitations for RADIUS RADIUS has the following configuration guidelines and limitations: •...
Saves the change persistenetly through reboots and restarts by copying the running configuration to the startup configuration. The following example shows how to configure host 10.10.1.1 as a RADIUS server: switch# configure terminal Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
Configuring RADIUS Global Preshared Keys You can configure preshared keys at the global level for all servers used by the Cisco Nexus device. A preshared key is a shared secret text string between the switch and the RADIUS server hosts.
You can specify one or more remote AAA servers for authentication using server groups. All members of a group must belong to the RADIUS protocol. The servers are tried in the same order in which you configure them. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
Page 50
The following example shows how to configure a RADIUS server group: switch# configure terminal switch (config)# aaa group server radius RadServer switch (config-radius)# server 10.10.1.1 switch (config-radius)# deadtime 30 switch (config-radius)# use-vrf management switch (config-radius)# exit Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
0 switch(config)# exit switch# copy running-config startup-config Allowing Users to Specify a RADIUS Server at Login You can allow users to specify a RADIUS server at login. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
RADIUS server only once before reverting to local authentication. You can increase this number up to a maximum of five retries per server. The timeout interval determines how long the Cisco Nexus device waits for responses from RADIUS servers before declaring a timeout failure. Procedure...
(Optional) Specifies a UDP port to use for RADIUS {ipv4-address | ipv6-address | host-name} auth-port udp-port authentication messages. The default UDP port is 1812. The range is from 0 to 65535. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
Enters global configuration move. Step 2 switch(config)# radius-server host Specifies parameters for server monitoring. The default {ipv4-address | ipv6-address | username is test and the default password is test. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
You can configure the dead-time interval for all RADIUS servers. The dead-time interval specifies the time that the Cisco Nexus device waits after declaring a RADIUS server is dead, before sending out a test packet to determine if the server is now alive. The default value is 0 minutes.
This example shows how to send a test message to the RADIUS server and server group to confirm availability: switch# test aaa server radius 10.10.1.1 user 1 Ur2Gd2BH switch# test aaa group RadGroup user2 As3He3CI Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
{hostname | Displays the RADIUS statistics. ipv4-address | ipv6-address} Clearing RADIUS Server Statistics You can display the statistics that the Cisco NX-OS device maintains for RADIUS server activity. Before You Begin Configure RADIUS servers on the Cisco NX-OS device. Procedure...
Periodic server monitoring password test Feature History for RADIUS Table 7: Feature History for RADIUS Feature Name Releases Feature Information RADIUS 5.0(3)U1(1) This feature was introduced. IPv6 5.0(3)U3(1) IPv6 support was introduced. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
The Terminal Access Controller Access Control System Plus (TACACS+) security protocol provides centralized validation of users attempting to gain access to a Cisco Nexus device. TACACS+ services are maintained in a database on a TACACS+ daemon typically running on a UNIX or Windows NT workstation. You must have access to and must configure a TACACS+ server before the configured TACACS+ features on your Cisco Nexus device are available.
You must configure the TACACS+ that is preshared key to authenticate the switch to the TACACS+ server. A preshared key is a secret text string shared between the Cisco Nexus device and the TACACS+ server host. The length of the key is restricted to 63 characters and can include any printable ASCII characters (white spaces are not allowed).
Simple Network Management Protocol (SNMP) trap is generated and the Cisco Nexus device displays an error message that a failure is taking place before it can impact performance. The following figure shows the different TACACS+ server states: Figure 3: TACACS+ Server States The monitoring interval for alive servers and dead servers are different and can be configured by the user.
If needed, configure periodic TACACS+ server monitoring. Configuring Periodic TACACS+ Server Monitoring, on page 54 Enabling TACACS+ Although by default, the TACACS+ feature is disabled on the Cisco Nexus device. You can enable the TACACS+ feature to access the configuration and verification commands for authentication. Procedure...
To access a remote TACACS+ server, you must configure the IPv4 or IPv6 address or the hostname for the TACACS+ server on the Cisco Nexus device. All TACACS+ server hosts are added to the default TACACS+ server group.You can configure up to 64 TACACS+ servers.
Configuring TACACS+ Global Preshared Keys You can configure preshared keys at the global level for all servers used by the Cisco Nexus device. A preshared key is a shared secret text string between the Cisco Nexus device and the TACACS+ server hosts.
Exits configuration mode. Step 6 switch(config)# show tacacs-server (Optional) Displays the TACACS+ server group configuration. groups Step 7 switch(config)# copy (Optional) running-config startup-config Copies the running configuration to the startup configuration. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
Configuring the Global TACACS+ Timeout Interval You can set a global timeout interval that the Cisco Nexus device waits for responses from all TACACS+ servers before declaring a timeout failure. The timeout interval determines how long the switch waits for responses from TACACS+ servers before declaring a timeout failure.
Configuring the Timeout Interval for a Server You can set a timeout interval that the Cisco Nexus device waits for responses from a TACACS+ server before declaring a timeout failure. The timeout interval determines how long the switch waits for responses from a TACACS+ server before declaring a timeout failure.
The idle timer specifies the interval in which a TACACS+ server receives no requests before the Cisco Nexus device sends out a test packet.You can configure this option to test servers periodically, or you can run a one-time only test.
You can configure the dead-time interval for all TACACS+ servers. The dead-time interval specifies the time that the Cisco Nexus device waits, after declaring a TACACS+ server is dead, before sending out a test packet to determine if the server is now alive.
The Secure Shell Protocol (SSH) server feature enables a SSH client to make a secure, encrypted connection to a Cisco Nexus device. SSH uses strong encryption for authentication. The SSH server in the Cisco Nexus device switch interoperates with publicly and commercially available SSH clients.
The SSH client in the Cisco Nexus device works with publicly and commercially available SSH servers. SSH Server Keys SSH requires server keys for secure communications to the Cisco Nexus device. You can use SSH keys for the following SSH options: •...
Telnet can accept either an IP address or a domain name as the remote system address. The Telnet server is enabled by default on the Cisco Nexus device. Guidelines and Limitations for SSH SSH has the following configuration guidelines and limitations: •...
Copies the running configuration to the startup configuration. The following example shows how to specify an SSH public key in open SSH format: switch# configure terminal switch(config)# username User1 sshkey ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEAri3mQy4W1AV9Y2t2hrEWgbUEYz Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
Specifying the SSH Public Keys in PEM-Formatted Public Key Certificate Form You can specify the SSH public keys in PEM-formatted Public Key Certificate form for user accounts. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
VRF Name Interface default Ethernet1/7 Starting SSH Sessions to Remote Devices You can start SSH sessions to connect to remote devices from your Cisco Nexus device. Procedure Command or Action Purpose Step 1 switch# ssh {hostname | Creates an SSH session to a remote device.
Displays the SSH server configuration. Step 6 switch# copy running-config (Optional) startup-config Copies the running configuration to the startup configuration. Clearing SSH Sessions You can clear SSH sessions from the Cisco Nexus device. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
The default is 0 (clear text). If you do not specify a password, the user might Note not be able to log in to the Cisco NX-OS device. If you create a user account with the encrypted Note password option, the corresponding SNMP user will not be created.
Page 83
Step 9 show user-account (Optional) Displays configured user account details. Example: switch(config)# show user-account Step 10 show users (Optional) Displays the users logged into the device. Example: switch(config)# show users Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
Configuring SSH and Telnet Configuring Telnet Configuring Telnet Enabling the Telnet Server By default, the Telnet server is enabled. You can disable the Telnet server on your Cisco Nexus device. Procedure Command or Action Purpose Step 1 switch# configure terminal Enters global configuration move.
Before you start a Telnet session to connect to remote devices, you should do the following: • Obtain the hostname for the remote device and, if needed, obtain the username on the remote device. • Enable the Telnet server on the Cisco Nexus device. • Enable the Telnet server on the remote device.
Displays the contents of the CRL list of the specified trustpoint for X.509v3 certificate-based SSH authentication. Default Settings for SSH The following table lists the default settings for SSH parameters. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
Page 88
Default Settings for SSH Table 9: Default SSH Parameters Parameters Default SSH server Enabled SSH server key RSA key generated with 1024 bits RSA key bits for generation 1024 Telnet server Enabled Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
C H A P T E R Configuring IP ACLs This chapter describes how to configure IP access control lists (ACLs) on Cisco NX-OS devices. Unless otherwise specified, the term IP ACL refers to IPv4 and IPv6 ACLs. • Information About ACLs, page 75 •...
IP ACL Types and Applications The Cisco Nexus device supports IPv4, IPv6, and MAC ACLs for security traffic filtering. The switch allows you to use IP access control lists (ACLs) as port ACLs, and Router ACLs as shown in the following table.
• Established TCP connections Sequence Numbers The Cisco Nexus device supports sequence numbers for rules. Every rule that you enter receives a sequence number, either assigned by you or assigned automatically by the device. Sequence numbers simplify the following ACL tasks: •...
The IPv4 TCAMs are single wide. You can create IPv6 port ACLs, router ACLs, and you can match IPv6 addresses for QoS. Cisco NX-OS provides simultaneous support for all three TCAMs. You must remove or reduce the size of the existing TCAMs to enable these new IPv6 TCAMs.
The following table shows the licensing requirements for this feature: Product License Requirement Cisco NX-OS No license is required to use ACLs. Prerequisites for ACLs IP ACLs have the following prerequisites: Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
Table 12: Default IP ACLs Parameters Parameters Default IP ACLs No IP ACLs exist by default. ACL rules Implicit rules apply to all ACLs . The following table lists the default settings for MAC ACLs parameters. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
Implicit rules apply to all ACLs . ACL Logging The Cisco Nexus device supports ACL logging, which allows you to monitor flows that hit specific access control lists (ACLs). To enable the feature for the ACL entry, configure specific ACEs with the optional log keyword.
IP address with a network wildcard, the IP address and variable-length subnet mask, the host address, or any to designate any address. Step 4 exit Updates the configuration and exits IP ACL configuration mode. Example: switch(config-acl)# exit switch(config)# Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
Page 97
ACL logging. The range is from 0 to 30000. Example: Note Cisco Nexus NX-OS 7.0(3)F3(1) does not switch(config)# hardware support the hardware rate-limiter rate-limiter access-list-log 200 access-list-log command. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
For more information, see the Command Reference for your Cisco Nexus device. Step 5 switch(config-acl)# no (Optional) {sequence-number | {permit | deny} Removes the rule that you specified from the IP ACL. protocol source destination} Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
Step 4 switch# show running-config (Optional) Displays the ACL configuration. The removed IP ACL should not appear. Step 5 switch# copy running-config (Optional) Copies the running configuration to the startup startup-config configuration. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
You can apply an IPv4 or or IPv6 ACL to any of the following types of interfaces: • Physical Layer 3 interfaces and subinterfaces • Layer 3 Ethernet port-channel interfaces and subinterfaces • Management interfaces Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
Displays the TCAM sizes that will be applicable on the next reload of the device. switch# show ip access-lists Displays the IPv4 ACL configuration. switch# show ipv6 access-lists Displays the IPv6 ACL configuration. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
ACLs in the startup configuration. About System ACLs Beginning with Cisco NX-OS Release 7.0(3)F3(4) or a later release, you can configure system ACLs on Cisco Nexus 36180YC-R and C3636C-R switches. With system ACLs, you can now configure a Layer 2 port ACL (PACL) on all the ports with the same access-list in the switch.
Configuring IP ACLs Carving a TCAM Region • For quality of service, ACL, or TCAM carving configuration on Cisco Nexus 3600 platform switches, see the Cisco Nexus 3600 NX-OS Quality of Service Configuration Guide, Release 7.x for more information. Carving a TCAM Region Before configuring the system ACLs, carve the TCAM region first.
The range is from 0 to 1000000 packets. The num_packets default value is 0 packets, which means that logging is not triggered by the number of packet matches. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
The following example shows how to apply the Ethernet interface with the logging specified in acl1 for all ingress traffic: switch# configure terminal switch(config)# interface ethernet 1/2 switch(config-if)# ip access-group acl1 in switch(config-if)# copy running-config startup-config Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
Purpose switch# show hardware access-list tcam region Displays the TCAM sizes that will be applicable on the next reload of the device. switch# show ip access-lists Displays the IPv4 ACL configuration. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
You can change the size of the ACL ternary content addressable memory (TCAM) regions in the hardware. You cannot change the size of the small TCAMs (TCAM 12 through 15) Note Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
Page 110
Do you want to continue? (y/n) [n] y This example shows how to display the TCAM region sizes to verify your changes: switch(config)# show hardware accesslist tcam region | exclude "0" IPV4 PACL [ifacl] size = 1024 Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
Follow these guidelines when configuring ACLs on VTY lines: • Set identical restrictions on all VTY lines because a user can connect to any of them. • Statistics per entry is not supported for ACLs on VTY lines. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
Page 112
The following example shows how to apply the access-class ozi2 command to the in-direction of the vty line. switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. switch(config)# line vty switch(config-line)# access-class ozi2 in switch(config-line)# exit switch# Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
172.18.217.20/24 any switch(config-acl)# exit switch# The following example shows how to apply the ACLs on VTY in and out directions: switch(config)# line vty switch(config-line)# ip access-class ozi in Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
Page 114
The following example shows how to remove the access restrictions on the VTY line: switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. switch(config)# line vty switch(config-line)# no access-class ozi2 in switch(config-line)# no ip access-class ozi2 in switch(config-line)# exit switch# Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
Forwards the packet. Global Statistics Each time the Cisco NX-OS device drops a packet at an interface due to a failed unicast RPF check, that information is counted globally on the device on a per-forwarding engine (FE) basis. Global statistics on...
Unicast RPF requires no license. Any feature not included in a license package is bundled with the Cisco NX-OS system images and is provided at no extra charge to you. For an explanation of the Cisco NX-OS licensing scheme, see the Cisco NX-OS Licensing Guide.
• Because of the hardware limitation on the trap resolution, uRPF might not be applied on supervisor-bound packets via inband. • For IP traffic, both IPv4 and IPv6 configurations should be enabled simultaneously. • Due to hardware limitations, the Cisco Nexus 3600 Series switches support only the following combinations: uRPF Configuration...
Verifying the Unicast RPF Configuration To display Unicast RPF configuration information, perform one of the following tasks: Command Purpose show running-config interface ethernet slot/port Displays the interface configuration in the running configuration. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
Additional References for Unicast RPF This section includes additional information related to implementing unicast RPF. Related Documents Related Topic Document Title MPLS VPN Cisco Nexus 3600 Series NX-OS Label Switching Configuration Guide Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
(DoS) attack, where excessive traffic is directed at the device interfaces. The Cisco NX-OS device provides CoPP to prevent DoS attacks from impacting performance. Such attacks, which can be perpetrated either inadvertently or maliciously, typically involve high rates of traffic destined to the supervisor module or CPU itself.
Control Plane Protection Data plane Handles all the data traffic. The basic functionality of a Cisco NX-OS device is to forward packets from one interface to another. The packets that are not meant for the switch itself are called the transit packets.
ARP request to the host. All of these different packets could be maliciously used to attack the control plane and overwhelm the Cisco NX-OS device. CoPP classifies these packets to different classes and provides a mechanism to individually control the rate at which the supervisor module receives these packets.
Control Plane Protection Rate Controlling Mechanisms Once the packets are classified, the Cisco NX-OS device has different mechanisms to control the rate at which packets arrive at the supervisor module. Two mechanisms control the rate of traffic to the supervisor module.
125. Default Policing Policies When you bring up your Cisco NX-OS device for the first time, the Cisco NX-OS software installs the default copp-system-p-policy-strict policy to protect the supervisor module from DoS attacks. You can set the level of protection by choosing one of the following CoPP policy options from the initial setup utility: •...
The copp-system-class-l3mc-data class has the following configuration: class-map type control-plane match-any copp-system-p-class-l3mc-data match exception multicast rpf-failure match exception multicast dest-miss The copp-system-class-l3uc-data class has the following configuration: class-map type control-plane match-any copp-system-p-class-l3uc-data match exception glean Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
Page 129
The copp-system-class-normal-dhcp-relay-response class has the following configuration: class-map type control-plane match-any copp-system-p-class-normal-dhcp-relay-response match access-group name copp-system-p-acl-dhcp-relay-response match access-group name copp-system-p-acl-dhcp6-relay-response Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
The copp-system-class-fcoe class is not supported for Cisco Nexus 9200 Series switches. Note Strict Default CoPP Policy - For Cisco NX-OS Release 7.0(3)I3(1) On Cisco Nexus 9200 Series switches, the strict CoPP policy has the following configuration: policy-map type control-plane copp-system-p-policy-strict class copp-system-p-class-l3uc-data...
Page 131
0 police cir 400 kbps bc 32000 bytes conform transmit violate drop On Cisco Nexus 9300 and 9500 Series and 3164Q, 31128PQ, 3232C, and 3264Q switches, the strict CoPP policy has the following configuration: policy-map type control-plane copp-system-p-policy-strict...
50 pps bc 32 packets conform transmit violate drop Moderate Default CoPP Policy - For Cisco NX-OS Release 7.0(3)I3(1) On Cisco Nexus 9200 Series switches, the moderate CoPP policy has the following configuration: policy-map type control-plane copp-system-p-policy-moderate class copp-system-p-class-l3uc-data...
Page 133
0 police cir 400 kbps bc 48000 bytes conform transmit violate drop On Cisco Nexus 9300 and 9500 Series and 3164Q, 31128PQ, 3232C, and 3264Q switches, the moderate CoPP policy has the following configuration: policy-map type control-plane copp-system-p-policy-moderate...
50 pps bc 48 packets conform transmit violate drop Lenient Default CoPP Policy - For Cisco NX-OS Release 7.0(3)I3(1) On Cisco Nexus 9200 Series switches, the lenient CoPP policy has the following configuration: policy-map type control-plane copp-system-p-policy-lenient class copp-system-p-class-l3uc-data...
Page 135
0 police cir 400 kbps bc 64000 bytes conform transmit violate drop On Cisco Nexus 9300 and 9500 Series and 3164Q, 31128PQ, 3232C, and 3264Q switches, the lenient CoPP policy has the following configuration: policy-map type control-plane copp-system-p-policy-lenient...
50 pps bc 64 packets conform transmit violate drop Dense Default CoPP Policy - For Cisco NX-OS Release 7.0(3)I3(1) On Cisco Nexus 9200 Series switches, the dense CoPP policy has the following configuration: policy-map type control-plane copp-system-p-policy-dense class copp-system-p-class-l3uc-data...
Page 137
0 police cir 200 kbps bc 32000 bytes conform transmit violate drop On Cisco Nexus 9300 and 9500 Series and 3164Q, 31128PQ, 3232C, and 3264Q switches, the dense CoPP policy has the following configuration: policy-map type control-plane copp-system-p-policy-dense...
CoPP and the Management Interface The Cisco NX-OS device supports only hardware-based CoPP, which does not support the management interface (mgmt0). The out-of-band mgmt0 interface connects directly to the CPU and does not pass through the in-band traffic hardware where CoPP is implemented.
Filtering this traffic could prevent remote access to the Cisco NX-OS device and require a console connection. • The Cisco NX-OS software does not support egress CoPP or silent mode. CoPP is supported only on ingress (you cannot use the service-policy output copp command to the control plane interface).
Page 140
NX-OS Release 7.0(3)I2(1)]. • Cisco Nexus 9200 Series switches support CoPP policer rates only in multiples of 10 kbps. If a rate is configured that is not a multiple of 10 kbps, the rate is rounded down. For example, the switch will use 50 kbps if a rate of 55 kbps is configured.
Configuring Control Plane Policing Default Settings for CoPP If you are familiar with the Cisco IOS CLI, be aware that the Cisco NX-OS commands for this feature Note might differ from the Cisco IOS commands that you would use. Default Settings for CoPP This table lists the default settings for CoPP parameters.
Page 142
Exits class map configuration mode. Example: switch(config-cmap)# exit switch(config)# Step 9 (Optional) show class-map type control-plane [class-map-name] Displays the control plane class map configuration. Example: switch(config)# show class-map type control-plane Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
You must configure a policy map for CoPP, which includes policing parameters. If you do not configure a policer for a class, the following default is configured: • 50 packets per second (pps) with a burst of 32 packets (for Cisco Nexus 9300 and 9500 Series and 3164Q, 31128PQ, 3232C, and 3264Q switches) •...
Page 144
Configuring Control Plane Policing Configuring a Control Plane Policy Map Command or Action Purpose • 0 to 268435456 pps (for Cisco Nexus 9300 and • police [cir] {cir-rate [rate-type]} [bc] 9500 Series and 3164Q, 31128PQ, 3232C, and burst-size [burst-size-type] 3264Q switches) •...
CoPP 2013 Nov 13 23:16:46 switch %ACLQOS-SLOT4-5-ACLQOS_NON_ATOMIC: Non atomic ACL/QoS policy update done for CoPP Before You Begin Ensure that you have configured a control plane policy map. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
The scale factor configuration is used to scale the policer rate of the applied CoPP policy for a particular line card. The accepted value is from 0.10 to 2.00. You can increase or reduce the policer rate for a particular line Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
Example: switch(config)# copy running-config startup-config Changing or Reapplying the Default CoPP Policy You can change to a different default CoPP policy, or you can reapply the same default CoPP policy. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
Displays the CoPP status, including the last configuration operation and its status. This command Example: also enables you to verify that the copied policy is not switch# show copp status attached to the control plane. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
[class-map-name] Displays the control plane class map configuration, including the ACLs that are bound to this class map. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
Page 150
[all] Displays the user-configured access control lists (ACLs) in the startup configuration. The all option displays both the default (CoPP-configured) and user-configured ACLs in the startup configuration. Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...
This section provides additional information related to implementing CoPP. Related Documents Related Topic Document Title Licensing Cisco NX-OS Licensing Guide Standards Standards Title RFC 2698 A Two Rate Three Color Marker Cisco Nexus 3600 NX-OS Security Configuration Guide, Release 7.x...