07-30-2024 04:15 AM
hi Team,
i have configured an ACL to reject the targeted Hello from LDP neighbor, but despite of applying ACL, why LDP session TLDP session is showing up.
07-30-2024 04:20 AM
First target ldp use tcp not udp
Second check direction of ACL with LO IP ypu use in acl
MHM
07-30-2024 04:35 AM - edited 07-30-2024 04:35 AM
Hi ,
Thanks for your reply, its just ACL Name "UDP" , i'm not specifying any L4 Protocol TCP/UDP in ACL .
ACL is applied in incoming direction.
Source >>>> Neighbors' Transport address /Targeted Hello source address
Destination >> Any
Targeted Hello also use UDP for LDP hello packets.
BR:
Sunil Kumar
07-30-2024 04:38 AM - edited 07-30-2024 04:39 AM
Apply to LO you use as MPLS router-ID 1.1.1.1?
MHM
07-30-2024 05:04 AM
Hi MHM ,
can you please confirm what is the behavior of below command when applied to LDP and why TLDP is showing up.
mpls ldp address-family ipv4 discovery targeted-hello accept from xxxxxx
BR://
Sunil Kumar
07-30-2024 05:15 AM - edited 07-30-2024 05:48 AM
MHM
07-30-2024 05:46 AM
this for you to explain some point here
in R3 I use LO 3.3.3.3 as LDP router-id
I use ACL under the LO 3.3.3.3 to prevent target ldp between R2 (LO 2.2.2.2) and R3 and it not effect
why ?
to prevent traffic to LO not only LDP you need to use CoPP or use ACL in interface LO use as egress
and that what I do
I apply same ACL to the interface f1/1 and it work
you need to check
xmit/recv <<- if you dont see recv or xmit then there is ACL drop the target hello
for command you share
mpls ldp address-family ipv4 discovery targeted-hello accept from xxxxxx <<-
I dont find some detail about it I will make double check and inform you
BUT
this command if available in your router is more better than use ACL under egress or LO interface
07-30-2024 05:48 AM
The default behavior of an LSR is to ignore requests from other LSRs that send targeted Hello messages. You can configure an LSR to respond to requests for targeted Hello messages by issuing the mpls ldp discovery targeted-hello accept command.
MHM
07-30-2024 12:49 PM
Hello @Sunil_06 ,
I would expect the command to use a standard ACL and not an extended ACL if all you need to define is the denied and allowed LDP peers LDP router-IDs .
I would suggest you to try to use a standard ACL instead of your named extended ACL.
Hope to help
Giuseppe
08-04-2024 03:52 AM
Hi ,
as we can see in the output, counters are increasing it means LDP Hello's are hitting on ACL .
but not sure why it's not denying it.
08-04-2024 04:04 AM
Add deny tcp port 646 to see if target drop or ACL hit for other traffic
And did ypu use target discovery command??
MHM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide