-
Notifications
You must be signed in to change notification settings - Fork 850
Update iptables to block BGP (TCP 179) traffic on eth0 #18834
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
/azp run |
Azure Pipelines successfully started running 1 pipeline(s). |
@ZhaohuiS please help review |
/azp run |
Azure Pipelines successfully started running 1 pipeline(s). |
/azp run |
Azure Pipelines successfully started running 1 pipeline(s). |
c743560
to
e8e5314
Compare
/azp run |
Azure Pipelines successfully started running 1 pipeline(s). |
Hi @ZhaohuiS, Full test log: test_cacl_application.log I have also updated the PR to re-enable Thanks! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good to me.
@gupurush could you please use "/azpw run" to trigger another run? |
It is also included in 202505, need to cherry pick this change into 202505 branch as well. |
will close it to retrigger the PR test. |
open it to trigger PR test |
/azp run |
Azure Pipelines successfully started running 1 pipeline(s). |
/azp run |
Azure Pipelines successfully started running 1 pipeline(s). |
PR for 202505 - #19351 |
…est_cacl_application for PR test (#19351) Description of PR Summary: Original PR: #18834 This PR updates the iptables and ip6tables rules to block incoming BGP (TCP port 179) traffic on the eth0 interface. This change ensures that BGP sessions are only allowed on non-management interfaces. Fixes: N/A Type of change Bug fix Testbed and Framework(new/improvement) New Test case Skipped for non-supported platforms Test case improvement Back port request 202205 202305 202311 202405 202411 202505 Approach What is the motivation for this PR? To support test updates in this PR: sonic-host-services#197. Additionally, it ensures BGP port 179 is not exposed on the management interface (eth0). How did you do it? How did you verify/test it? On t0-64 testbed
@gupurush PR conflicts with 202505 branch |
included in 202505 |
Description of PR
Summary: This PR updates the iptables and ip6tables rules to block incoming BGP (TCP port 179) traffic on the
eth0
interface. This change ensures that BGP sessions are only allowed on non-management interfaces.Fixes: N/A
Type of change
Back port request
Approach
What is the motivation for this PR?
To support test updates in this PR: sonic-host-services#197.
Additionally, it ensures BGP port 179 is not exposed on the management interface (
eth0
).How did you do it?
How did you verify/test it?
On t0-64 testbed
Any platform specific information?
None
Supported testbed topology if it's a new test case?
N/A
Documentation
No new documentation required.