Forum Discussion
Charles_Harris
Nimbostratus
Feb 02, 2007Internal Access Control via iRules.
Hi,
We have a requirement to control internal access to one of our services hosted behind a local VIP, I've mangled together the following (working) iRule but wondered if an expert could cast an eye and let me know of potential problems...
My concern is that the authorized client class (TST_ACL_DATA) could become very large (1000+) and I wondered if there was a better way of achieving the same result.
Thanks in advance!
-=ChaZ=-
-------------SNIP-------------
class TST_ACL_DATA {
"10.0.0.1"
"10.0.0.2"
"10.0.0.3"
}
when CLIENT_ACCEPTED {
if {![matchclass [IP::remote_addr] eq $::TST_ACL_DATA]} {
log "Unauthorized connection attempted from [IP::remote_addr]"
reject
} else {
log "Client Accepted [IP::remote_addr]"
}
}
2 Replies
- Charles_Harris
Nimbostratus
I'll get my coat.
-=ChaZ=- - Charles_Harris
Nimbostratus
Hi Colin,
Thanks again for the comments, I did only discover the filters after playing with this rule, the filter setup looks messy by comparison (there are approx 200 allowable IP's) and less easy to maintain. It is however part of the 'built in' functionality so I assume it will be as fast if not quicker than the iRule although I'm not brave enough to benchmark each approach.
Cheers!
-=ChaZ=-
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects
