Skip to content

Commit 4e3f950

Browse files
Initial Content Upload
1 parent 13ff6cc commit 4e3f950

File tree

216 files changed

+59530
-2
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

216 files changed

+59530
-2
lines changed
Lines changed: 82 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,82 @@
1+
*****************************
2+
iSCSI Auto-provisioning
3+
https://marketplace.extremenetworks.com/#details/iSCSI_Auto_provisioning
4+
*****************************
5+
6+
7+
Files:
8+
*****************************
9+
iscsi.pol - The Example policy file
10+
iscsi-Readme.txt - This Readme
11+
12+
13+
Infrastructure Requirements
14+
*******************************
15+
Firmware: ExtremeXOS(TM) 11.6.x and Newer for iscsi.pol standard
16+
Platform(s): Summit Series; BlackDiamond 8800, 8900-series, 8900-XL series,
17+
BlackDiamond BDX
18+
19+
20+
Description:
21+
*****************************
22+
This simple script uses CLEAR-Flow to identify iSCSI traffic (port 3260),
23+
assign it the right Quality of Service, and enable jumbo frames.
24+
This pre-provisioned settings in a network allows iSCSI traffic to be
25+
protected in a higher priority queue.
26+
27+
28+
Example:
29+
****************************
30+
<X650 Running CLEAR-FLow policy> (Rule becomes true)
31+
<X650 Running CLEAR-FLow policy> (CLEAR-Flow takes configured actions
32+
(e.g. QoS Provision))
33+
34+
35+
In the above example the rule becomes true and CLEAR-Flow executes its actions
36+
automatically.
37+
38+
39+
Notes:
40+
*******************************
41+
- This requires a CLEAR-Flow enabled switch
42+
43+
1.0 - (1 April 2010) First Version of the script
44+
1.1 - (17 April 2012) Version tested for xKit
45+
46+
47+
License:
48+
*******************************
49+
Copyright (c) 2015, Extreme Networks
50+
All rights reserved.
51+
52+
Redistribution and use in source and binary forms, with or without modification,
53+
are permitted provided that the following conditions are met:
54+
55+
1. Redistributions of source code must retain the above copyright notice, this
56+
list of conditions and the following disclaimer.
57+
58+
2. Redistributions in binary form must reproduce the above copyright notice,
59+
this list of conditions and the following disclaimer in the documentation
60+
and/or other materials provided with the distribution.
61+
62+
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
63+
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
64+
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
65+
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
66+
FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
67+
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
68+
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
69+
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
70+
OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
71+
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
72+
73+
Support
74+
******************************
75+
The software is provided as is and Extreme has no obligation to provide
76+
maintenance, support, updates, enhancements or modifications.
77+
Any support provided by Extreme is at its sole discretion.
78+
Issues and/or bug fixes may be reported in the Hub:
79+
80+
https://community.extremenetworks.com/extreme
81+
82+
Be Extreme,
Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
@description "Auto iSCSI Example"
2+
#############################################################################
3+
#
4+
# Policy : Automatic iSCSI Provisioning
5+
# Revision : 1.1
6+
# EXOS Version(s) : 15.1.x and Newer
7+
# Last Updated : April 17, 2012
8+
#
9+
# Purpose:
10+
# This simple script uses CLEAR-Flow to identify iSCSI traffic (port 3260) , assign it the right
11+
# Quality of Service, and enable jumbo frames. This pre-provisioned settings in a network allows
12+
# iSCSI traffic to be protected in a higher priority queue.
13+
#
14+
# Contact : https://community.extremenetworks.com/extreme
15+
###############################################################################
16+
# Change Log
17+
#
18+
# 19 April 2010: Change Log Created
19+
# 17 April 2012: Verified on 15.1.1.6
20+
################################################################################
21+
22+
23+
entry iscsi_count {
24+
if {
25+
protocol tcp;
26+
destination-port 3260;
27+
} then {
28+
permit;
29+
count iscsi_count;
30+
}
31+
}
32+
entry iscsi_configure {
33+
if match all {
34+
count iscsi_count >= 100; period 5; hysteresis 50;
35+
} then {
36+
# Configure your QP as needed
37+
qosprofile iscsi_count qp5;
38+
# Automatically Enables Jumbo frames, uncomment as needed
39+
# cli "enable jumbo-frame ports all";
40+
} else {
41+
permit iscsi_count;
42+
}
43+
}
Lines changed: 67 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,67 @@
1+
@description "BcastStormDectect Example"
2+
#############################################################################
3+
#
4+
# Script : Broadcast Storm Detection
5+
# Revision : 1.2
6+
# EXOS Version(s) : 11.6.x and Newer
7+
# Last Updated : April 21, 2010
8+
#
9+
# Purpose: This policy provides a CLEAR-Flow monitoring example that
10+
# inspects received broadcast message packets (destination
11+
# MAC address of FF:FF:FF:FF:FF:FF) to spot potential remote
12+
# broadcast storm attacks. Shown in this policy are three entry
13+
# points:
14+
#
15+
# 1. UDP broadcast message counter
16+
# 2. TCP broadcast message counter
17+
# 3. CLEAR-Flow delta expression for determining
18+
# a potential broadcast storm.
19+
#
20+
# Note: The ratio of broadcast packets greater than 100,000 per second
21+
# is for illustrative purposes only. This ratio should be
22+
# adjusted based on actual network activity.
23+
#
24+
# Author : Extreme Extensibility Team
25+
# Contact : https://community.extremenetworks.com/extreme
26+
###############################################################################
27+
# Change Log
28+
# 21 April 2010 : Change Log Created
29+
#
30+
###############################################################################
31+
32+
##############################################################################
33+
# UDP broadcast entry point
34+
##############################################################################
35+
36+
entry ACL_BCAST_UDP {
37+
if {
38+
protocol UDP; ethernet-destination-address FF:FF:FF:FF:FF:FF mask FF:FF:FF:FF:FF:FF;
39+
}
40+
then {
41+
count BCAST;
42+
} }
43+
44+
##############################################################################
45+
# TCP broadcast entry point
46+
##############################################################################
47+
48+
entry ACL_BCAST_TCP {
49+
if {
50+
protocol TCP; ethernet-destination-address FF:FF:FF:FF:FF:FF mask FF:FF:FF:FF:FF:FF;
51+
}
52+
then {
53+
count BCAST;
54+
} }
55+
56+
##############################################################################
57+
# CLEAR-Flow Broadcast check entry point
58+
##############################################################################
59+
60+
entry BCAST_UN_LVL1 {
61+
if {
62+
# This period should be adjusted to fit your requirements
63+
delta BCAST > 100000; period 1;
64+
} then {
65+
snmptrap 8009 "BCAST_UN LVL 1";
66+
syslog "BCAST_UN LVL 1" CRIT;
67+
} }
Lines changed: 80 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,80 @@
1+
*****************************
2+
Broadcast Storm Detect
3+
https://marketplace.extremenetworks.com/#details/Broadcast_Storm_Detect
4+
*****************************
5+
6+
7+
Files:
8+
*****************************
9+
BcastStormDetect.pol - The Example policy file
10+
bcast-Readme.txt - This Readme
11+
12+
Infrastructure Requirements
13+
*******************************
14+
Firmware: ExtremeXOS(TM) 11.6.x and Newer for BcastStormDetect.pol standard
15+
Platform(s): Summit X450a, X480, X650; BlackDiamond 8800 c-series, 8900-series, 8900-XL series, BlackDiamond 10K, 12K
16+
17+
Description:
18+
*****************************
19+
Purpose: This policy provides a CLEAR-Flow monitoring example that
20+
inspects received broadcast message packets to detect potential
21+
broadcast storm attacks. Both TCP and UDP broadcast packets are
22+
counted and should the sum of these broadcast messages exceed
23+
100,000 in one second. In this case, an SNMP trap is issued
24+
along with a syslog message to provide notification of a
25+
potential broadcast storm attack.
26+
27+
Example:
28+
****************************
29+
<X650 Running CLEAR-FLow policy> (Rule becomes true)
30+
<X650 Running CLEAR-FLow policy> (CLEAR-Flow takes configured actions
31+
(e.g. QoS BCast Traffic))
32+
33+
34+
In the above example the rule becomes true and CLEAR-Flow executes its
35+
actions automatically.
36+
37+
38+
Notes:
39+
*******************************
40+
- This requires a CLEAR-Flow enabled switch
41+
42+
1.0 - (1 April 2010) First Version of the script
43+
44+
45+
License:
46+
*******************************
47+
Copyright (c) 2015, Extreme Networks
48+
All rights reserved.
49+
50+
Redistribution and use in source and binary forms, with or without modification,
51+
are permitted provided that the following conditions are met:
52+
53+
1. Redistributions of source code must retain the above copyright notice, this
54+
list of conditions and the following disclaimer.
55+
56+
2. Redistributions in binary form must reproduce the above copyright notice,
57+
this list of conditions and the following disclaimer in the documentation
58+
and/or other materials provided with the distribution.
59+
60+
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
61+
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
62+
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
63+
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
64+
FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
65+
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
66+
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
67+
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
68+
OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
69+
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
70+
71+
Support
72+
******************************
73+
The software is provided as is and Extreme has no obligation to provide
74+
maintenance, support, updates, enhancements or modifications.
75+
Any support provided by Extreme is at its sole discretion.
76+
Issues and/or bug fixes may be reported in the Hub:
77+
78+
https://community.extremenetworks.com/extreme
79+
80+
Be Extreme,
Lines changed: 100 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,100 @@
1+
@description "ReconDetect Example"
2+
3+
#############################################################################
4+
#
5+
# Script : Network Recon Detection
6+
# Revision : 1.3
7+
# EXOS Version(s) : 15.1.x and Newer
8+
# Last Updated : April 12, 2012
9+
#
10+
# Purpose: This policy provides a CLEAR-Flow monitoring example that
11+
# inspects the TCP flags on all received TCP packets to detect
12+
# potential TCP flag filtering attacks. Shown in this policy are
13+
# multiple entry points:
14+
#
15+
# 1. TCP FIN flag counter
16+
# 2. TCP SYN flag counter
17+
# 3. TCP RESET flag counter
18+
# 4. TCP PUSH flag counter
19+
# 5. TCP PUSHSYN flag counter
20+
# 6. TCP RESETACK flag counter
21+
# 7. TCP RESETPUSH flag counter
22+
# 8. CLEAR-Flow delta expression for determining
23+
# a potential TCP flag filtering attack.
24+
#
25+
# Note: The delta ratio of 4000 TCP all flag packets per second is
26+
# for illustration purposes only. This ratio should be adjusted
27+
# based on the network traffic of the environment.
28+
#
29+
##############################################################################
30+
# Change Log
31+
#
32+
# 19 April 2010: Change Log Created
33+
# 19 April 2012: Verified on newer platforms with CLEAR-Flow support added
34+
################################################################################
35+
36+
##############################################################################
37+
# TCP all flags entry points
38+
##############################################################################
39+
40+
entry ACL_FINFLAGS_TCP {
41+
if {
42+
protocol TCP; tcp-flags 0x01;
43+
}
44+
then {
45+
count ALLFLAGS_TCP;
46+
} }
47+
48+
entry ACL_SYNFLAGS_TCP {
49+
if {
50+
protocol TCP; tcp-flags 0x02 ;
51+
} then {
52+
count ALLFLAGS_TCP;
53+
} }
54+
55+
entry ACL_RESETFLAGS_TCP {
56+
if {
57+
protocol TCP; tcp-flags 0x04 ;
58+
} then {
59+
count ALLFLAGS_TCP;
60+
} }
61+
62+
entry ACL_PUSHFLAGS_TCP {
63+
if {
64+
protocol TCP; tcp-flags 0x08 ;
65+
} then {
66+
count ALLFLAGS_TCP;
67+
} }
68+
69+
entry ACL_PUSHSYNFLAGS_TCP {
70+
if {
71+
protocol TCP; tcp-flags 0x10 ;
72+
} then {
73+
count ALLFLAGS_TCP;
74+
} }
75+
76+
entry ACL_RESETACKFLAGS_TCP {
77+
if {
78+
protocol TCP; tcp-flags 0x20 ;
79+
} then {
80+
count ALLFLAGS_TCP;
81+
} }
82+
83+
entry ACL_RESETPUSHFLAGS_TCP {
84+
if {
85+
protocol TCP; tcp-flags 0x12 ;
86+
} then {
87+
count ALLFLAGS_TCP;
88+
} }
89+
90+
##############################################################################
91+
# CLEAR-Flow TCP all flags check entry point
92+
##############################################################################
93+
94+
entry ALLFLAGS_UN_LVL1 {
95+
if {
96+
delta ALLFLAGS_TCP > 4000; period 1;
97+
} then {
98+
snmptrap 8007 "ALLFLAGS_UN LVL 1";
99+
syslog "ALLFLAGS_UN LVL 1" CRIT;
100+
} }

0 commit comments

Comments
 (0)