Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

rapolicy(1) [debian man page]

RAPOLICY(1)						      General Commands Manual						       RAPOLICY(1)

NAME
rapolicy - compare a argus(8) data file/stream against a Cisco Access Control List. COPYRIGHT
Copyright (c) 2000-2003 QoSient. All rights reserved. SYNOPSIS
rapolicy -r argus-file [ra options] DESCRIPTION
Rapolicy reads argus data from an argus-file list, and tests the argus data stream against a Cisco access control list configuration file, printing out records that represent activity that would violate the policy. Rapolicy can be used to indicate access control violations, as well as test new access control definitions prior to installing them in a router. OPTIONS
Rapolicy, like all ra based clients, supports a large number of options. Options that have specific meaning to rapolicy are: -f <Cisco ACL file> Print records that violate the policy. -D 0 (default) Print records that violate the policy. -D 1 Print records and the violated ruleset. -D 2 Print all records and the ruleset that matched. See ra(1) for a complete description of ra options. EXAMPLE INVOCATION
rapolicy -r argus.file CISCO ACL SYNTAX
There does not seem to be authoritative Cisco-ACL-Documentation, nor ACL syntax standardization. Because Cisco has been know to improve its ACL rules syntax, rapolicy is known to work with Cisco ACL router defintions up to July, 2002. A Cisco ACL configuration file consists of a collection of any number of ACL statements, each on a separte line. The syntax of an ACL statement is: ACL = "access-list" ID ACTION PROTOCOL SRC DST NOTIFICATION ID = Number ACTION = permit | deny PROTO = protocol name | protocol number SRC | DST = ADDRESS [PORTMATCH] ADDRESS = any | host HOSTADDR | HOSTADDR HOSTMASK HOSTADDR = ipV4 address HOSTMASK = matching-mask PORTMATCH = PORTOP PORTNUM | range PORTRANGE PORTOP = eq | lt | gt | neq | established PORTRANGE = PORTNUM PORTNUM PORTNUM = TCP or UDP port value (unsigned decimal from 0 to 65535) EXAMPLE CONFIGURATION
This example Cisco Access Control List configuration is provided as an example only. No effort has been made to verify that this example Access Control List enforces a useful access control policy of any kind. #allow www-traffic to webserver access-list 102 permit tcp any 193.174.13.99 0.0.0.0 eq 80 #allow ftp control connection to server access-list 102 permit tcp any 193.174.13.99 0.0.0.0 eq 21 #allow normal ftp access-list 102 permit tcp any 193.174.13.99 0.0.0.0 eq 20 #allow ftp passive conncetions in portrange 10000 to 10500 access-list 102 permit tcp any host 193.174.13.99 range 10000 10500 #dummy example access-list 102 permit tcp host 193.174.13.1 eq 12345 host 193.174.13.2 range 12345 23456 #deny the rest access-list 102 deny tcp any any #same thing in other words: access-list 102 deny tcp 0.0.0.0 255.255.255.255 0.0.0.0 255.255.255.255 AUTHORS
Carter Bullard (carter@qosient.com). Olaf Gellert (gellert@pca.dfn.de). SEE ALSO
ra(1), rarc(5), argus(8) 22 July 2002 RAPOLICY(1)

Check Out this Related Man Page

RAMON(1)						      General Commands Manual							  RAMON(1)

NAME
ramon - provide RMON2 style reports from argus(8) data. COPYRIGHT
Copyright (c) 2000-2003 QoSient. All rights reserved. SYNOPSIS
ramon [ra-options] -M (TopN | Matrix | HostProto | HostSvc | Svc) [-M Net/masklen] [ expression ] DESCRIPTION
Ramon reads argus(8) data from an argus data source, aggregates the records, sorts them based on user supplied criteria and generates mod- ified argus data that supports RMON2 style tables and data reporting. Ramon supports the same sorting capabilites and calling syntax as rasort() for specifying the sorting algorithm and order. The output is valid argus data, and can be operated on using any ra*() program. Like all ra based clients, ramon supports a large number of options, configuration through .rarc files, and input filtering using the ter- minating filter expression. See the ra(1) man page for details on ra-options and expression syntax. RAMON SPECIFIC OPTIONS
-M TopN Generate the top N list of network addresses and supply the incoming and outgoing packet and bytes counts. The addresses can be modi- fied using the -M Net mode in addition to this mode. -M Matrix Generate the list of talkers ( A <-> B) and supply the incoming and outgoing packet and byte counts. The talker addresses can be mod- ified using the -M Net mode. -M HostProto Generate the list of protocols that are being used by each address and supply the incoming and outgoing packet and byte counts seen. -M HostSvc Generate the list of services that are being used by each address and supply the incoming and outgoing packet and byte counts seen. -M Svc Generate the list of services (dst port number) and supply the incoming and outgoing packet and byte counts seen. -M Net[/masklen] Track addresses as networks rather than host addresses. If the option masklen is not provided, the addresses are traced as subnets based on their Class network address. -a Don't filter output to match expression filter. This generates the complete set of addresses/nets that contributed to the inbound and outbound metrics. AUTHORS
Carter Bullard (carter@qosient.com). SEE ALSO
ra(1), rasort(1), rarc(5), argus(8), 07 November 2000 RAMON(1)
Man Page