background image
Answers to Scenario 7-4: IPX Filtering 511
·
1.ffff.ffff.ffff--Source network and node wildcard mask. With leading zeroes written in,
the mask would be 00000001.ffff.ffff.ffff. This mask matches networks 102 and 103,
which are identical except for the final bit in the network part of the address. The mask
means, "all bits in the network must match network 102, except for the last bit in the
network number." (All Fs for the node mean that any node number will match.)
·
All--All sockets.
·
100--Destination network.
So, the first entry in list 903 matches packets from network 102 and 103, destined for network
100, any protocol, any socket. These packets are denied. The second entry in 903 permits all
protocols, all source networks, and, by implication, all destination networks; in other words,
this statement changes the default to be "permit all else."
By enabling list 903 for inbound packets on Atlanta's serial 0.2 and serial 0.3 interfaces, clients
in Nashville and Boston cannot reach network 100.
Access list 801 stops all packets from network 101 from reaching Server 2's Ethernet IPX
address. It also has a "permit everything else" statement at the end of the list, but because
standard IPX access lists do not use the any keyword, ­1 is used to signify any.
Neither list stops access to Server 1 or Server 2 because the destination of packets to these
servers will be the internal IPX addresses (1000.0000.0000.0001 and 1001.0000.0000.0001).
Packets sent to networks 1000 and 1001 will not be matched until the "permit all" at the end of
the lists.
Answers to Task 2 for Scenario 7-4
Task 2 for Scenario 7-4 asks you to create IPX packet filters to meet the following criteria:
·
Clients in Nashville and Boston are not allowed access to Server 1.
·
Clients in Charlotte are not allowed access to Server 2.
·
Use standard access lists, if possible.
·
Place the access lists close to the source of the packets.
·
Assume that all access lists from Task 1 have been disabled and deleted.
This can be accomplished by configuring standard IPX access lists. Because the goal is to filter
packets close to the source, and because the client initiates the process of connecting to a server,
the filters all were placed at the remote routers and not in Atlanta. Each filter matches packets
sourced in their local IPX networks and destined for network 1000 (if filtering packets destined
for Server 1), or destined for network 1001 (if filtering packets destined for Server 2). Examples
7-26 through 7-28 show the configurations necessary to create IPX packet filters to satisfy the
criteria.
ch07.fm Page 511 Monday, March 20, 2000 5:14 PM