diff options
Diffstat (limited to 'docs/configuration')
| -rw-r--r-- | docs/configuration/container/index.rst | 5 | ||||
| -rw-r--r-- | docs/configuration/firewall/index.rst | 8 | ||||
| -rw-r--r-- | docs/configuration/protocols/bgp.rst | 50 | ||||
| -rw-r--r-- | docs/configuration/service/dns.rst | 14 | ||||
| -rw-r--r-- | docs/configuration/service/ids.rst | 179 | ||||
| -rw-r--r-- | docs/configuration/service/index.rst | 4 | ||||
| -rw-r--r-- | docs/configuration/system/option.rst | 8 | 
7 files changed, 249 insertions, 19 deletions
| diff --git a/docs/configuration/container/index.rst b/docs/configuration/container/index.rst index 0487f863..670ca29f 100644 --- a/docs/configuration/container/index.rst +++ b/docs/configuration/container/index.rst @@ -93,6 +93,11 @@ Configuration      Volume is either mounted as rw (read-write - default) or ro (read-only) +.. cfgcmd:: set container name <name> uid <number> +.. cfgcmd:: set container name <name> gid <number> + +    Set the User ID or Group ID of the container +  .. cfgcmd:: set container name <name> restart [no | on-failure | always]     Set the restart behavior of the container. diff --git a/docs/configuration/firewall/index.rst b/docs/configuration/firewall/index.rst index 74d5bc20..5d9190d6 100644 --- a/docs/configuration/firewall/index.rst +++ b/docs/configuration/firewall/index.rst @@ -66,10 +66,10 @@ packetis processed at the **IP Layer**:       can be filtered and controlled. Bear in mind that this traffic can be a       new connection originated by a internal process running on VyOS router,       such as NTP, or a response to traffic received externaly through -     **inputt** (for example response to an ssh login attempt to the router). +     **input** (for example response to an ssh login attempt to the router).       This includes ipv4 and ipv6 filtering rules, defined in: -     * ``set firewall ipv4 input filter ...``. +     * ``set firewall ipv4 output filter ...``.       * ``set firewall ipv6 output filter ...``. @@ -81,7 +81,7 @@ packetis processed at the **IP Layer**:         destination...``.  If the interface where the packet was received is part of a bridge, then  -packetis processed at the **Bridge Layer**, which contains a basic setup for +the packet is processed at the **Bridge Layer**, which contains a basic setup for  bridge filtering:     * **Forward (Bridge)**: stage where traffic that is trespasing through the @@ -89,7 +89,7 @@ bridge filtering:       * ``set firewall bridge forward filter ...``. -The main structure VyOS firewall cli is shown next: +The main structure of the VyOS firewall CLI is shown next:  .. code-block:: none diff --git a/docs/configuration/protocols/bgp.rst b/docs/configuration/protocols/bgp.rst index 8fc69111..3c983aae 100644 --- a/docs/configuration/protocols/bgp.rst +++ b/docs/configuration/protocols/bgp.rst @@ -209,35 +209,35 @@ Defining Peers  .. cfgcmd:: set protocols bgp neighbor <address|interface> local-role     <role> [strict] -   BGP roles are defined in RFC :rfc:`9234` and provide an easy way to  -   add route leak prevention, detection and mitigation. The local Role  -   value is negotiated with the new BGP Role capability which has a  -   built-in check of the corresponding value. In case of a mismatch the  +   BGP roles are defined in RFC :rfc:`9234` and provide an easy way to +   add route leak prevention, detection and mitigation. The local Role +   value is negotiated with the new BGP Role capability which has a +   built-in check of the corresponding value. In case of a mismatch the     new OPEN Roles Mismatch Notification <2, 11> would be sent.     The correct Role pairs are: -    +     Provider - Customer     Peer - Peer     RS-Server - RS-Client -   If :cfgcmd:`strict` is set the BGP session won’t become established  -   until the BGP neighbor sets local Role on its side. This  +   If :cfgcmd:`strict` is set the BGP session won’t become established +   until the BGP neighbor sets local Role on its side. This     configuration parameter is defined in RFC :rfc:`9234` and is used to     enforce the corresponding configuration at your counter-parts side. -    -   Routes that are sent from provider, rs-server, or the peer local-role  -   (or if received by customer, rs-client, or the peer local-role) will  + +   Routes that are sent from provider, rs-server, or the peer local-role +   (or if received by customer, rs-client, or the peer local-role) will     be marked with a new Only to Customer (OTC) attribute. -    +     Routes with this attribute can only be sent to your neighbor if your     local-role is provider or rs-server. Routes with this attribute can -   be received only if your local-role is customer or rs-client.  -    +   be received only if your local-role is customer or rs-client. +     In case of peer-peer relationship routes can be received only if OTC     value is equal to your neighbor AS number. -    +     All these rules with OTC will help to detect and mitigate route leaks     and happen automatically if local-role is set. @@ -584,6 +584,12 @@ General Configuration  Common parameters  ^^^^^^^^^^^^^^^^^ +.. cfgcmd:: set protocols bgp parameters allow-martian-nexthop + +   When a peer receives a martian nexthop as part of the NLRI for a route +   permit the nexthop to be used as such, instead of rejecting and resetting +   the connection. +  .. cfgcmd:: set protocols bgp parameters router-id <id>     This command specifies the router-ID. If router ID is not specified it will @@ -598,6 +604,12 @@ Common parameters     Path (both AS number and AS path length), Origin code, MED, IGP     metric. Also, the next hop address for each path must be different. +.. cfgcmd:: set protocols bgp parameters no-hard-administrative-reset + +   Do not send Hard Reset CEASE Notification for "Administrative Reset" +   events. When set and Graceful Restart Notification capability is exchanged +   between the peers, Graceful Restart procedures apply, and routes will be retained. +  .. cfgcmd:: set protocols bgp parameters log-neighbor-changes     This command enable logging neighbor up/down changes and reset reason. @@ -643,6 +655,16 @@ Common parameters     compatibility with older versions of VyOS. With this option one can     enable :rfc:`8212` functionality to operate. +.. cfgcmd:: set protocols bgp parameters labeled-unicast <explicit-null | +   ipv4-explicit-null | ipv6-explicit-null> + +   By default, locally advertised prefixes use the implicit-null label to +   encode in the outgoing NLRI. + +   The following command uses the explicit-null label value for all the +   BGP instances. + +  Administrative Distance  ^^^^^^^^^^^^^^^^^^^^^^^ diff --git a/docs/configuration/service/dns.rst b/docs/configuration/service/dns.rst index 7624d309..e430dc73 100644 --- a/docs/configuration/service/dns.rst +++ b/docs/configuration/service/dns.rst @@ -156,6 +156,20 @@ avoid being tracked by the provider of your upstream DNS server.     recursor does not like, it is throttled. Any servers matching the supplied     netmasks will never be throttled. +.. cfgcmd:: set service dns forwarding options ecs-add-for <address> + +   The requestor netmask for which the requestor IP Address should be used as the +   EDNS Client Subnet for outgoing queries. + +.. cfgcmd:: set service dns forwarding options ecs-ipv4-bits <number> + +   Number of bits of client IPv4 address to pass when sending EDNS Client Subnet +   address information. + +.. cfgcmd:: set service dns forwarding options edns-subnet-allow-list <address|domain> + +   The netmask or domain that EDNS Client Subnet should be enabled for in outgoing queries. +  Example  ======= diff --git a/docs/configuration/service/ids.rst b/docs/configuration/service/ids.rst new file mode 100644 index 00000000..3e508d50 --- /dev/null +++ b/docs/configuration/service/ids.rst @@ -0,0 +1,179 @@ +.. _ids: + +############### +DDoS Protection +############### + +********** +FastNetMon +********** + +FastNetMon is a high-performance DDoS detector/sensor built on top of multiple +packet capture engines: NetFlow, IPFIX, sFlow, AF_PACKET (port mirror). It can +detect hosts in the deployed network sending or receiving large volumes of +traffic, packets/bytes/flows per second and perform a configurable action to +handle that event, such as calling a custom script. + +VyOS includes the FastNetMon Community Edition. + +Configuration +============= + +.. cfgcmd:: set service ids ddos-protection alert-script <text> + +    Configure alert script that will be executed when an attack is detected. + +.. cfgcmd:: set service ids ddos-protection ban-time <1-4294967294> + +    Configure how long an IP (attacker) should be kept in blocked state. +    Default value is 1900. + +.. cfgcmd:: set service ids ddos-protection direction [in | out] + +    Configure direction for processing traffic.  + +.. cfgcmd:: set service ids ddos-protection exclude-network <x.x.x.x/x> +.. cfgcmd:: set service ids ddos-protection exlude-network <h:h:h:h:h:h:h:h/x> + +    Specify IPv4 and/or IPv6 networks which are going to be excluded. + +.. cfgcmd:: set service ids ddos-protection listen-interface <text> + +    Configure listen interface for mirroring traffic. + +.. cfgcmd:: set service ids ddos-protection mode [mirror | sflow] + +    Configure traffic capture mode. + +.. cfgcmd:: set service ids ddos-protection network <x.x.x.x/x> +.. cfgcmd:: set service ids ddos-protection network <h:h:h:h:h:h:h:h/x> + +    Specify IPv4 and/or IPv6 networks that should be protected/monitored. + +.. cfgcmd:: set service ids ddos-protection sflow listen-address <x.x.x.x> + +    Configure local IPv4 address to listen for sflow. + +.. cfgcmd:: set service ids ddos-protection sflow port <1-65535> + +    Configure port number to be used for sflow conection. Default port is 6343. + +.. cfgcmd:: set service ids ddos-protection threshold general +   [fps | mbps | pps] <0-4294967294> + +    Configure general threshold parameters. + +.. cfgcmd:: set service ids ddos-protection threshold icmp +   [fps | mbps | pps] <0-4294967294> + +    Configure ICMP threshold parameters. + +.. cfgcmd:: set service ids ddos-protection threshold tcp +   [fps | mbps | pps] <0-4294967294> + +    Configure TCP threshold parameters + +.. cfgcmd:: set service ids ddos-protection threshold udp +   [fps | mbps | pps] <0-4294967294> + +    Configure UDP threshold parameters + +Example +======= + +A configuration example can be found in this section. +In this simplified scenario, main things to be considered are: + +    * Network to be protected: 192.0.2.0/24 (public IPs use by +      customers) + +    * **ban-time** and **threshold**: these values are kept very low in order +      to easily identify and generate and attack. + +    * Direction: **in** and **out**. Protect public network from external +      attacks, and identify internal attacks towards internet. + +    * Interface **eth0** used to connect to upstream. + +Since we are analyzing attacks to and from our internal network, two types +of attacks can be identified, and differents actions are needed: + +    * External attack: an attack from the internet towards an internal IP +      is identify. In this case, all connections towards such IP will be +      blocked + +    * Internal attack: an attack from the internal network (generated by a +      customer) towards the internet is identify. In this case, all connections +      from this particular IP/Customer will be blocked. +  + +So, firewall configuration needed for this setup: + +.. code-block:: none + +    set firewall group address-group FNMS-DST-Block +    set firewall group address-group FNMS-SRC-Block + +    set firewall ipv4 forward filter rule 10 action 'drop' +    set firewall ipv4 forward filter rule 10 description 'FNMS - block destination' +    set firewall ipv4 forward filter rule 10 destination group address-group 'FNMS-DST-Block' + +    set firewall ipv4 forward filter rule 20 action 'drop' +    set firewall ipv4 forward filter rule 20 description 'FNMS - Block source' +    set firewall ipv4 forward filter rule 20 source group address-group 'FNMS-SRC-Block' + +Then, FastNetMon configuration: + +.. code-block:: none + +    set service ids ddos-protection alert-script '/config/scripts/fnm-alert.sh' +    set service ids ddos-protection ban-time '10' +    set service ids ddos-protection direction 'in' +    set service ids ddos-protection direction 'out' +    set service ids ddos-protection listen-interface 'eth0' +    set service ids ddos-protection mode 'mirror' +    set service ids ddos-protection network '192.0.2.0/24' +    set service ids ddos-protection threshold general pps '100' + +And content of the script: + +.. code-block:: none + +    #!/bin/bash + +    # alert-script is called twice. +    # When an attack occurs, the program calls a bash script twice: +    # 1st time when threshold exceed +    # 2nd when we collect 100 packets for detailed audit of what happened. + +    # Do nothing if “attack_details” is passed as an argument +    if [ "${4}" == "attack_details" ]; then +        # Do nothing +        exit +    fi +    # Arguments: +    ip=$1 +    direction=$2 +    pps_rate=$3 +    action=$4  + +    logger -t FNMS "** Start - Running alert script **" + +    if [ "${direction}" == "incoming" ] ; then +        group="FNMS-DST-Block" +        origin="external" +    else +        group="FNMS-SRC-Block" +        origin="internal" +    fi + +    if [ "${action}" == "ban" ] ; then +        logger -t FNMS "Attack detected for IP ${ip} and ${direction} direction from ${origin} network. Need to block IP address." +        logger -t FNMS "Adding IP address ${ip} to firewall group ${group}." +        sudo nft add element ip vyos_filter A_${group} { ${ip} } +    else +        logger -t FNMS "Timeout for IP ${ip}, removing it from group ${group}." +        sudo nft delete element ip vyos_filter A_${group} { ${ip} } +    fi +    logger -t FNMS "** End - Running alert script **" +    exit diff --git a/docs/configuration/service/index.rst b/docs/configuration/service/index.rst index 1195348f..56ce55eb 100644 --- a/docs/configuration/service/index.rst +++ b/docs/configuration/service/index.rst @@ -13,7 +13,9 @@ Service     dhcp-relay     dhcp-server     dns +   eventhandler     https +   ids     ipoe-server     lldp     mdns @@ -26,4 +28,4 @@ Service     ssh     tftp-server     webproxy -   eventhandler +    diff --git a/docs/configuration/system/option.rst b/docs/configuration/system/option.rst index c9c9bfb1..4a1c3bd3 100644 --- a/docs/configuration/system/option.rst +++ b/docs/configuration/system/option.rst @@ -22,6 +22,14 @@ General      Play an audible beep to the system speaker when system is ready. +Kernel +====== + +.. cfgcmd:: set system option kernel disable-mitigations + +    Disable all optional CPU mitigations. This improves system performance, +    but it may also expose users to several CPU vulnerabilities. +  ***********  HTTP client  *********** | 
