firewall

firewall

allow-tri-session

amsdu

app-perf-monitoring

attack-rate

arp <1-16384> {blacklist/denylist|drop}

cp <1-16384>

grat-arp <1-16384> {blacklist/denylist|drop}

ping <1-16384>

session <1-16384>

tcp-syn <1-16384>

bwcontracts-subnet-broadcast

cp-bandwidth-contract

debug-route

deny-inter-user-bridging

deny-inter-user-traffic

deny-needfrag-df-gre-xmit-icmp

deny-needfrag-df-gre

deny-needfrag-df-ipsec

deny-needfrag-gre-xmit-icmp

deny-needfrag-gre

deny-source-routing

dhcp-perf monitoring

disable-ftp-server

disable-tftp-server

dpi

drop-ip-fragments

drop-ipv4-options

enable-bridging

enable-gre-inner-pkt-frag

enable-per-packet-logging

enable-port-packet-drop-logging

enable-stateful-icmp

enforce-tcp-handshake

enforce-tcp-sequence

gre-call-id-processing

imm-fb

ip-classification

ipsec-mark-mgmt-frames

jumbo

local-valid-users

log-icmp-error

macast-red maxp-inv <maxp-inv> min-th <minimum-threshold> max-th <maximum threshold>

optimize-dad-frames

prevent-dhcp-exhaustion

prohibit-arp-spoofing

prohibit-ip-spoofing

prohibit-ip-spoofing-all

prohibit-rst-replay

prohibit-rc-update

public-access

session-idle-timeout <seconds>

session-spread

session-tunnel-fib

shape-mcast

stall-crash

track-spoof

voip-qos-trusted

voip-wmm-content-enforcement

web-cc

web-cc-cache-miss-drop

wireless-bridge-aging

Description

This command configures global firewall options on the managed device.

Parameter

Description

allow-tri-session

Allows three-way session when performing destination NAT. This option should be enabled when the managed device is not the default gateway for wireless clients and the default gateway is behind the managed device. This option is typically used for captive portal configuration.

Default: Disabled

amsdu

Aggregated Medium Access Control Service Data Units (AMSDU) packets are dropped if this option is enabled.

Default: Disabled

app-perf-monitoring

Enables app performance monitoring. This parameter is used to measure the time taken for an application to respond.

attack-rate

arp <1-16384> {blacklist/denylist|drop}

cp <1-16384>

grat-arp <1-16384> {blacklist/denylist|drop}

ping <1-16384>

session <1-16384>

tcp-syn <1-16384>

 

Sets rates which, if exceeded, can indicate a denial of service attack.

  • arp: Monitor/police ARP attack (non Gratuitous ARP).

    Default: 100

  • cp: Monitor/police control processor attack.

  • grat-arp: Monitor/police Gratuitous ARP attack.

    Default: 50

  • ping: Monitor ping attack.

  • session: Monitor IP session attack.

  • tcp-syn: Monitor TCP SYN attack.

Range: 1-16384 is the number of requests per 30 seconds.

bwcontracts-subnet-broadcast

Applies bw contracts to local subnet broadcast traffic.

cp-bandwidth-contract

Configures bandwidth contract traffic rate limits, in packets per second, to prevent denial of service attacks.

debug-route

Enable route or route-cache specific IP tracing in datapath.

disable

Disable route or route-cache debugging in datapath

ipv4 <ipv4-addr>

Specify IPv4 route or route-cache address.

ipv6 <ipv6-addr>

Specify IPv6 route or route-cache address.

deny-inter-user-bridging

Prevents the forwarding of Layer2 traffic between wired or wireless users. You can configure user role policies that prevent Layer3 traffic between users or networks but this does not block Layer2 traffic. This option can be used to prevent traffic, such as Appletalk or IPX from being forwarded. If enabled, traffic (all non-IP traffic) to untrusted port or tunnel is also blocked.

Default: Disabled

deny-inter-user-traffic

Denies downstream traffic between users in a wireless network (untrusted users) by disallowing layer2 and layer3 traffic. This parameter does not depend on the deny-inter-user-bridging parameter being enabled or disabled.

Default: Disabled

deny-needfrag-df-gre-xmit-icmp

Drops IP packets with DF bit set when packet length is greater than GRE tunnel MTU and an ICMP error message is sent.

Default: Disabled

deny-needfrag-df-gre

Drops IP packets with DF bit set when packet length is greater than GRE tunnel MTU and an ICMP error message is not sent.

Default: disabled

deny-needfrag-df-ipsec

Drops IP packets with DF bit set when packet length is greater than IPsec tunnel MTU and an ICMP error message is sent.

Default: Enabled

deny-needfrag-gre-xmit-icmp

Drops IP packets when packet length is greater than GRE tunnel MTU and an ICMP error message is sent.

Default: Disabled

deny-needfrag-gre

Drops IP packets when packet length is greater than GRE tunnel MTU and an ICMP error message is not sent.

Default: Disabled

deny-source-routing

Disallows forwarding of IP frames with source routing with the source routing options set.

Default: Disabled

dhcp-perf monitoring

Enables DHCP performance monitoring. This parameter is used to measure the time taken for a DHCP exchange.

Default: Disabled

disable-ftp-server

Disables the FTP server on the managed device. Enabling this option prevents FTP transfers.

Enabling this option could cause APs to not boot up. You should not enable this option unless instructed to do so by an HPE Aruba Networking representative.

Default: disabled

disable-tftp-server

Disables the TFTP server.

dpi

Enables DPI.

Default: Disabled

drop-ip-fragments

When enabled, all IP fragments are dropped. You should not enable this option unless instructed to do so by an HPE Aruba Networking representative.

Default: Disabled

drop-ipv4-options

Drops IPv4 packets when the IPv4 packet header lenght is greater than 20 bytes. Applicable to controllers only.

Default: Disabled

no-drop-ipv4-options

Enables any local and remote IPv4 packets within the options.

Default: Enabled

enable-bridging

Enables bridging when the managed device is in factory default.

Default: Disabled

enable-gre-inner-pkt-frag

Enables fragmenting inner IP frames when packet length is greater than GRE tunnel MTU.

Default: Disabled

enable-per-packet-logging

Enables logging of every packet if logging is enabled for the corresponding session rule. Normally, one event is logged per session. If you enable this option, each packet in the session is logged. You should not enable this option unless instructed to do so by an HPE Aruba Networking representative, as doing so may create unnecessary overhead on the managed device.

Default: Disabled

enable-port-packet-drop-logging

Enables port packet logging. If enabled, the dropped frames are logged.

Default: Disabled

enable-stateful-icmp

Enables stateful ICMP processing. This parameter create sessions for ICMP errors and denies unidirectional replies.

Default: Disabled

enforce-tcp-handshake

Prevents data from passing between two clients until the three-way TCP handshake has been performed. This option should be disabled when you have mobile clients on the network as enabling this option will cause mobility to fail. You can enable this option if there are no mobile clients on the network.

Default: Disabled

enforce-tcp-sequence

Enforces the TCP sequence numbers for all packets.

Default: Disabled

gre-call-id-processing

Creates a unique state for each PPTP tunnel. Do not enable this option unless instructed to do so by a technical support representative.

Default: Disabled

imm-fb

Immediately free buffers on managed device. Do not enable this option unless instructed to do so by a technical support representative.

Default: Disabled

ip-classification

Enables IP reputation / geolocation classification.

ipsec-mark-mgmt-frames

This parameter marks management frames.

jumbo

Enables jumbo frames processing.

Default: Disabled

local-valid-users

Adds only IP addresses, which belong to a local subnet, to the user-table.

Default: Disabled

log-icmp-error

Logs received ICMP errors. You should not enable this option unless instructed to do so by a customer support representative.

Default: Disabled

macast-red

Configures multicast random drop paramaters.

Default: Disabled

maxp-inv <maxp-inv>

Inverse mark probability instance.

Range: 1-255

min-th <minimum threshold>

Configures minimum threshold.

Range: 1-99

max-th <maximum threshold>

Configures maximum threshold.

Range: 1-99

optimize-dad-frames

Reduce flooding of IPv4 Gratuitous ARPs/IPv6 Duplicate Address Detection frames onto wireless clients.

Default: Enabled

prevent-dhcp-exhaustion

Enable check for DHCP client hardware address against the packet source MAC address. This command checks the frame's source-MAC against the DHCPv4 client hardware address and drops the packet if it does not match. Enabling this feature prevents a client from submitting multiple DHCP requests with different hardware addresses, thereby preventing DHCP pool depletion.

Default: Disabled

prohibit-arp-spoofing

Detects and prohibits arp spoofing. When this option is enabled, possible arp spoofing attacks are logged and an SNMP trap is sent.

Default: Disabled

prohibit-ip-spoofing

Detects IP spoofing (where an intruder sends messages using the IP address of a trusted client). When this option is enabled, source and destination IP and MAC addresses are checked; possible IP spoofing attacks are logged and an SNMP trap is sent.

Default: Enabled in IPv4, disabled in IPv6

prohibit-ip-spoofing-all

Detects ARP spoofing, when an intruder sends ARP using the IP and MAC addresses of a known user. When this option is enabled, additional check for the user route cache entry is performed. If the route cache entry is not found or if found, but the route cache entry MAC does not match with the sender MAC in ARP frame, then, the frame is marked as spoof. The IP spoofing attacks are logged and an SNMP trap is sent. If the Prohibit IP Spoofing option is enabled, the controller denies all the traffic from the client using an IP address that is used by another client that has an entry in the user table. This option does not allow multiple MAC addresses to use the same IP address.

Default: Disabled

prohibit-rc-update

This option prohibits route-cache update on user add.

Default: Disabled

prohibit-rst-replay

Closes a TCP connection in both directions if a TCP RST is received from either direction. You should not enable this option unless instructed to do so by an HPE Aruba Networking representative.

Default: Disabled

session-idle-timeout

Time, in seconds, that a non-TCP session can be idle before it is removed from the session table. You should not modify this option unless instructed to do so by an HPE Aruba Networking representative.

Range: 16-300

Default: 16

session-spread

Enables counter CPU to perform encryption. Applicable to 7200 Series controllers only

Default: Disabled

session-tunnel-fib

Enable session tunnel-based forwarding.

NOTE: Best practices is to enable this parameter only during maintenance window or off-peak production hours. On the M3, this parameter only enables tunnel-based forwarding, as session-based forwarding does not apply to this platform.

shape-mcast

Enables multicast optimization and provides excellent streaming quality regardless of the amount of VLANs or IP IGMP groups that are used.

Default: Disabled

stall-crash

Triggers datapath crash on stall detection. Applies to the to 7200 Series managed device only.

Default: Enabled

track-spoof

If enabled, detects spoof in datapath.

Default: Disabled

voip-qos-trusted

Prioritizes the RTP traffic based on the DSCP value set by the end user device.

NOTE: On enabling, all UCC based ALGs will be disabled.

Default: Disabled

voip-wmm-voip-content-enforcement

If traffic to or from the user is inconsistent with the associated QoS policy for voice, the traffic is reclassified to best effort and data path counters incremented.

This parameter requires the PEFNG license.

Default: Disabled

web-cc

Enables web content classification for all HTTP traffic. Once enabled, AOS enforces ACLs and bandwidth policies associated with web content categories or reputation levels.

NOTE: On enabling web-cc, the web-cc feature usage information will be sent to HPE Aruba Networking at every 7 days interval.

Default: Disabled

web-cc-cache-miss-drop

Issue this command to allow the managed device to drop any packets that do not match any web content category or reputation levels in the managed device's internal web content cache.

Default: Disabled

wireless-bridge-aging

Issue this command to prevent the aging of wireless client associated with AP.

Default: Enabled

Example

The following command disallows forwarding of non-IP frames between users:

(host)[/md] (config) #firewall deny-inter-user-bridging

Related Commands

Command

Description

firewall cp

Creates whitelist/allolwlist session ACLs.

firewall cp-bandwidth-contract

Configures bandwidth contract traffic rate limits, in packets per second, to prevent denial of service attacks.

show firewall

Display a list of global firewall policies.

Command History

Release

Description

AOS 8.13.0.0

The drop-ipv4-options and no drop-ipv4-options parameters were introduced.

AOS 8.11.0.0

Default rate added for attack-rate arp parameter.

AOS 8.6.017 and 8.7.1.9

The deny-needfrag-df-ipsec parameter was introduced.

AOS 8.6.0.9

The prohibit-rc-update parameter is added.

AOS 8.9.0.0

All instances of blacklist have been replaced with denylist.

AOS 8.8.0.0

The session-spread and prohibit-ip-spoof-all parameters were added.

AOS 8.7.0.0

The following parameters were introduced:

  • enable-gre-inner-pkt-frag
  • deny-needfrag-df-gre-xmit-icmp
  • deny-needfrag-df-gre
  • deny-needfrag-gre-xmit-icmp
  • deny-needfrag-gre

AOS 8.4.0.0

The voip-qos-trusted parameter was added.

AOS 8.2.0.0

The wireless-bridge-aging parameter was added.

AOS 8.0.0.0

Command introduced.

Command Information

Platforms

License

Command Mode

All platforms

Base operating system except the

voip-wmm-voip-content-enforcement parameter which requires the PEFNG license.

Config mode on Mobility Conductor.