Hi everyone,
I have the following question:
Service-policy access-control input: STACK
Class-map: TCP-80 (match-all)
15 packets, 2441 bytes
5 minute offered rate 0 bps
Match: field IP protocol eq 6 next TCP
Service-policy access-control : ACCESS
Class-map: URI (match-all)
3 packets, 1101 bytes
5 minute offered rate 0 bps
Match: field TCP dest-port eq 80
Match: start TCP payload-start offset 0 size 32 string "/reload"
drop
Class-map: class-default (match-any)
0 packets, 0 bytes
5 minute offered rate 0 bps, drop rate 0 bps
Match: any
Class-map: class-default (match-any)
6 packets, 852 bytes
5 minute offered rate 0 bps, drop rate 0 bps
Match: any
R1#
The exercise explained that I needed to block the GET request from when someone
tried to send the reload on an HTTP packet. Noe that What I did on the type
stack, it was as simple Match IP protocol eq 6 next TCP. Now, on the solution,
it appears as 0x6 but I've seen both applied. This one in this case is showing
packets there. Is this a good approach or do I need to use the hex value?
Mike
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit
www.ipexpert.com
Are you a CCNP or CCIE and looking for a job? Check out
www.PlatinumPlacement.com