Skip to content

Commit 8426b24

Browse files
authored
comments from Linda
1 parent ddcadfc commit 8426b24

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

draft-ietf-netmod-acl-extensions.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -349,7 +349,7 @@ subtrees and data nodes have particular sensitivities/vulnerabilities:
349349
an attacker to identify the actual resources that are bound
350350
to ACLs.
351351

352-
The document defines a match policy based on a pattern that can be observed in a packet. For example, such a policy can be combined with header-based matches in the context of DDoS mitigation. Filtering based on a pattern match is deterministic for packets with unencrypted data. However, the efficiency for encrypted packets depend on the presence of an unvarying pattern.
352+
The document defines a match policy based on a pattern that can be observed in a packet. For example, such a policy can be combined with header-based matches in the context of DDoS mitigation. Filtering based on a pattern match is deterministic for packets with unencrypted data. However, the efficiency for encrypted packets depend on the presence of an unvarying pattern. Readers may also refer to {{Section 11 of ?RFC8329}} for security considerations related to Network Security Functions (NSFs) that apply packet content matching.
353353

354354
The YANG modules "iana-icmpv4-types", "iana-icmpv6-types", and "iana-ipv6-ext-types" define a set of types. These nodes are intended to be reused by other YANG
355355
modules. Each of these modules by itself does not expose any data nodes that
@@ -1001,7 +1001,7 @@ packets. The following ACEs are defined (in this order):
10011001

10021002
## Pattern-based Filtering
10031003

1004-
Pattern-based filtering is useful to detect specific patterns, signatures, or encapsulated packets. {{example_p}} shows an example of the message body of a request to install a filter to discard IP-in-IP encapsulated messages with an inner source IP address equal to "2001:db8::1/128". By using the offset at the end of layer 3, the rule targets a specific portion of the payload that starts 20 bytes after the beginning of the data (skipping the first 20 bytes).
1004+
Pattern-based filtering is useful to detect specific patterns, signatures, or encapsulated packets. {{example_p}} shows an example of the message body of a request to install a filter to discard IP-in-IP encapsulated messages with an inner destination IP address equal to "2001:db8::1". By using the offset at the end of layer 3, the rule targets a specific portion of the payload that starts 20 bytes after the beginning of the data (that is, skipping the first 20 bytes of the inner IPv6 header).
10051005

10061006
For the readers' convenience, the textual representation of the pattern is used in the example instead of the binary form.
10071007

@@ -1034,7 +1034,7 @@ For the readers' convenience, the textual representation of the pattern is used
10341034
}
10351035
}
10361036
~~~
1037-
{: #example_p title="Example of an ACL to Deny Encapsulated Messages with a Specific Inner Source Address (Request Body)"}
1037+
{: #example_p title="Example of an ACL to Deny Encapsulated Messages with a Specific Inner Destination Address (Request Body)"}
10381038

10391039

10401040
## VLAN Filtering

0 commit comments

Comments
 (0)