From: M S (michaelgstout@hotmail.com)
Date: Sun Jul 08 2007 - 21:25:16 ART
afraid i am posting the obvious.
Thank you for the excellent Copy command!
web server Loop0 SW1 -------------fa0/0 R2 fa0/1------------- R6 Web
Clinet
R2#sho run class
Building configuration...
Current configuration : 644 bytes
!
class-map match-all HOSTNAME
description this works inbound and outbound on both interfaces
 match protocol http host "150.1.7.7"
class-map match-all MIME
description THIS DOES NOT WORK the DOT is not a MIMEtype
 match protocol http mime "*.gif"
class-map match-all URL-GIF
description this works inbound and outbound on both interfaces
 match protocol http url "*.gif"
class-map match-all URL-DIR
description this works inbound and outbound on both interfaces
 match protocol http url "*/imag*"
class-map match-all MIME-no-dot
description this works inbound and outbound on both interfaces
 match protocol http mime "*gif"
!
end
R2#sho run policy
Building configuration...
Current configuration : 52 bytes
!
policy-map IO-TEST
 class URL-DIR
drop
!
end
  --------------------------------------------------------------------
  From:  "Antonio Soares" <amsoares@netcabo.pt>
  Reply-To:  "Antonio Soares" <amsoares@netcabo.pt>
  To:  "'Sasa Milic'" <smilic2@pexim.co.yu>, "'Bit Gossip'"
  <bit.gossip@chello.nl>, "'WorkerBee'" <ciscobee@gmail.com>,
  <ccielab@groupstudy.com>
  CC:  "'Cecil Wilson'" <Cecil.Wilson@flextronics.com>, "'M S'"
  <michaelgstout@hotmail.com>, <malcolm.salmons@gmail.com>
  Subject:  RE: NBAR http matching
  Date:  Sat, 7 Jul 2007 19:16:52 +0100
  Hello group,
  Still working on this topic. I developed a 3-level service policy and
  it
  works perfectly !!! Even better than i would expect :)
  +++++++++++++++++++++++++
  Topology:
  Web-client (SW1)===R6===Web-Server (SW2)
  +++++++++++++++++++++++++
  Objective:
  - Limit replies from web server to 3Mbps
  - Limit replies from specific URL to 2Mbps
  - Limit transfer of image file to 1 Mbps
  +++++++++++++++++++++++++
  !
  class-map match-all 1st-level
    match protocol http host "68.68.68.8"
  !
  class-map match-all 2nd-level
    match protocol http url "/univercd*"
  !
  class-map match-all 3rd-level
    match protocol http url "*.gif|*.jpg|*.jpeg"
  !
  !
  policy-map 3rd-level
    class 3rd-level
      police 1000000
  !
  policy-map 2nd-level
    class 2nd-level
      police 2000000
  service-policy 3rd-level
  !
  policy-map 1st-level
    class 1st-level
      police 3000000
  service-policy 2nd-level
  !
  +++++++++++++++++++++++++
  R6#sh runn int f0/1
  Building configuration...
  Current configuration : 127 bytes
  !
  interface FastEthernet0/1
    ip address 68.68.68.6 255.255.255.0
    duplex auto
    speed auto
    service-policy input 1st-level
  end
  R6#
  +++++++++++++++++++++++++
  SW1#copy http://68.68.68.8/univercd/config.gif null:
  Loading http://68.68.68.8/univercd/config.gif !
  2435 bytes copied in 0.025 secs (97400 bytes/sec)
  SW1#
  +++++++++++++++++++++++++
  R6#sh policy-map interface
    FastEthernet0/1
  Service-policy input: 1st-level
  Class-map: 1st-level (match-all)
  8 packets, 3119 bytes <--------------------------- 8 packets matched
  5 minute offered rate 0 bps, drop rate 0 bps
  Match: protocol http host "68.68.68.8"
  police:
  cir 3000000 bps, bc 93750 bytes
  conformed 8 packets, 3119 bytes; actions:
  transmit
  exceeded 0 packets, 0 bytes; actions:
  drop
  conformed 0 bps, exceed 0 bps
  Service-policy : 2nd-level
  Class-map: 2nd-level (match-all)
  8 packets, 3119 bytes <--------------------------- 8 packets
  matched
  5 minute offered rate 0 bps, drop rate 0 bps
  Match: protocol http url "/univercd*"
  police:
  cir 2000000 bps, bc 62500 bytes
  conformed 8 packets, 3119 bytes; actions:
  transmit
  exceeded 0 packets, 0 bytes; actions:
  drop
  conformed 0 bps, exceed 0 bps
  Service-policy : 3rd-level
  Class-map: 3rd-level (match-all)
  8 packets, 3119 bytes <--------------------------- 8 packets
  matched
  5 minute offered rate 0 bps, drop rate 0 bps
  Match: protocol http url "*.gif|*.jpg|*.jpeg"
  police:
  cir 1000000 bps, bc 31250 bytes
  conformed 8 packets, 3119 bytes; actions:
  transmit
  exceeded 0 packets, 0 bytes; actions:
  drop
  conformed 0 bps, exceed 0 bps
  Class-map: class-default (match-any)
  0 packets, 0 bytes
  5 minute offered rate 0 bps, drop rate 0 bps
  Match: any
  Class-map: class-default (match-any)
  0 packets, 0 bytes
  5 minute offered rate 0 bps, drop rate 0 bps
  Match: any
  Class-map: class-default (match-any)
  2 packets, 120 bytes
  5 minute offered rate 0 bps, drop rate 0 bps
  Match: any
  R6#
  +++++++++++++++++++++++++
  Thanks,
  Antonio
  -----Original Message-----
  From: Sasa Milic [mailto:smilic2@pexim.co.yu]
  Sent: sexta-feira, 6 de Julho de 2007 8:02
  To: Antonio Soares; 'Bit Gossip'; 'WorkerBee'; ccielab@groupstudy.com
  Cc: 'Cecil Wilson'; 'M S'; malcolm.salmons@gmail.com
  Subject: Re: NBAR http matching
  It will match server-to-client only if router can see client request
  and
  then match host in server replies. Won't work with asymetric paths.
  Could be
  trick in the lab, take care.
  Regards,
  Sasa
  ----------------------------------
  Sasa Milic, CCIE #8635 (R&S), CCSP
  ----- Original Message -----
  From: "Antonio Soares" <amsoares@netcabo.pt>
  To: "'Bit Gossip'" <bit.gossip@chello.nl>; "'WorkerBee'"
  <ciscobee@gmail.com>; <ccielab@groupstudy.com>
  Cc: "'Cecil Wilson'" <Cecil.Wilson@flextronics.com>; "'M S'"
  <michaelgstout@hotmail.com>; <malcolm.salmons@gmail.com>
  Sent: Thursday, July 05, 2007 10:53 PM
  Subject: RE: NBAR http matching
  > Yes, we have matches in both directions. I made the same test a few
  days
  > ago
  > and posted it in another discussion here at groupstudy. It's good
  to be
  > sure
  > about this. It means we can match not only the client queries but
  also the
  > server replies.
  >
  > -----Original Message-----
  > From: Bit Gossip [mailto:bit.gossip@chello.nl]
  > Sent: quinta-feira, 5 de Julho de 2007 19:14
  > To: WorkerBee; Antonio Soares; ccielab@groupstudy.com
  > Cc: Cecil Wilson; M S; malcolm.salmons@gmail.com
  > Subject: Re: NBAR http matching
  >
  > Group,
  > I have done a very simple test that proves a behaviour different
  from what
  > the link below describes, at least in the case of URL match:
  > the very same service-policy matches client requests if it is
  configured
  > in
  > the direction from client -> server the very same service-policy
  matches
  > server responses if it is configured in the direction from server
  ->
  > client
  > Please comment, Bit.
  >
  > SW1 (client 174.1.67.7) ---- R2 (NBAR) -----R3 (server 150.1.3.3)
  >
  > ~~~~~~~~~~~~~~~~~~~~~~~~~~~ SW1
  > Rack1SW1#copy http://150.1.3.3/index.html null:
  > Loading http://150.1.3.3/index.html !
  > 2696 bytes copied in 0.210 secs (12838 bytes/sec) Rack1SW1#
  >
  > ~~~~~~~~~~~~~~~~~~~~~~~~~~~ R2
  >
  > class-map match-all NBAR
  > match protocol http host "150.1.3.3"
  > match protocol http url "index.html"
  > !
  > policy-map NBAR1
  > class NBAR
  > !
  > interface Multilink23
  > service-policy input NBAR1
  > service-policy output NBAR1
  >
  > Rack1R2#show policy-map int mu23
  > Multilink23
  >
  >  Service-policy input: NBAR1   <<<<<<<<<< server to client
  >
  >    Class-map: NBAR (match-all)
  >      8 packets, 3348 bytes
  >      5 minute offered rate 0 bps
  >      Match: protocol http host "150.1.3.3"
  >      Match: protocol http url "index.html"
  >
  >  Service-policy output: NBAR1   <<<<<<<<<< client to server
  >
  >    Class-map: NBAR (match-all)
  >      16 packets, 839 bytes
  >      5 minute offered rate 0 bps
  >      Match: protocol http host "150.1.3.3"
  >      Match: protocol http url "index.html"
  >
  > ~~~~~~~~~~~~~~~~~~~~~~~~~~~ R3
  >
  > Rack1R3#show debugging
  > Generic IP:
  >  IP packet debugging is on (detailed) for access list 180
  >
  > This is the capture split per direction: it is clear that the
  number of
  > packets in each direction matches with the counters of the
  policy-map.
  >
  > CONCLUSION: the same policy-map matches the packet of a certain
  http
  > session
  > in the direction in which it is applied
  >
  > *Jul  5 19:44:01.977: IP: s=174.1.67.7 (Multilink23), d=150.1.3.3,
  len 44,
  > rcvd 4
  > *Jul  5 19:44:01.977:     TCP src=11004, dst=80, seq=237677449,
  ack=0,
  > win=4128 SYN
  > *Jul  5 19:44:01.989: IP: s=174.1.67.7 (Multilink23), d=150.1.3.3,
  len 40,
  > rcvd 4
  > *Jul  5 19:44:01.989:     TCP src=11004, dst=80, seq=237677450,
  > ack=508281107, win=4128 ACK
  > *Jul  5 19:44:02.001: IP: s=174.1.67.7 (Multilink23), d=150.1.3.3,
  len
  > 207,
  > rcvd 4
  > *Jul  5 19:44:02.001:     TCP src=11004, dst=80, seq=237677450,
  > ack=508281107, win=4128 ACK
  > *Jul  5 19:44:02.057: IP: s=174.1.67.7 (Multilink23), d=150.1.3.3,
  len 40,
  > rcvd 4
  > *Jul  5 19:44:02.057:     TCP src=11004, dst=80, seq=237677617,
  > ack=508281363, win=3872 ACK
  > *Jul  5 19:44:02.073: IP: s=174.1.67.7 (Multilink23), d=150.1.3.3,
  len 40,
  > rcvd 4
  > *Jul  5 19:44:02.073:     TCP src=11004, dst=80, seq=237677617,
  > ack=508281407, win=3828 ACK
  > *Jul  5 19:44:02.141: IP: s=174.1.67.7 (Multilink23), d=150.1.3.3,
  len 40,
  > rcvd 4
  > *Jul  5 19:44:02.141:     TCP src=11004, dst=80, seq=237677617,
  > ack=508281663, win=3572 ACK
  > *Jul  5 19:44:02.149: IP: s=174.1.67.7 (Multilink23), d=150.1.3.3,
  len 40,
  > rcvd 4
  > *Jul  5 19:44:02.149:     TCP src=11004, dst=80, seq=237677617,
  > ack=508281663, win=4128 ACK
  > *Jul  5 19:44:02.149: IP: s=174.1.67.7 (Multilink23), d=150.1.3.3,
  len 40,
  > rcvd 4
  > *Jul  5 19:44:02.149:     TCP src=11004, dst=80, seq=237677617,
  > ack=508282199, win=3592 ACK
  > *Jul  5 19:44:02.153: IP: s=174.1.67.7 (Multilink23), d=150.1.3.3,
  len 40,
  > rcvd 4
  > *Jul  5 19:44:02.153:     TCP src=11004, dst=80, seq=237677617,
  > ack=508282199, win=4128 ACK
  > *Jul  5 19:44:02.157: IP: s=174.1.67.7 (Multilink23), d=150.1.3.3,
  len 40,
  > rcvd 4
  > *Jul  5 19:44:02.157:     TCP src=11004, dst=80, seq=237677617,
  > ack=508282735, win=3592 ACK
  > *Jul  5 19:44:02.157: IP: s=174.1.67.7 (Multilink23), d=150.1.3.3,
  len 40,
  > rcvd 4
  > *Jul  5 19:44:02.157:     TCP src=11004, dst=80, seq=237677617,
  > ack=508282735, win=4128 ACK
  > *Jul  5 19:44:02.161: IP: s=174.1.67.7 (Multilink23), d=150.1.3.3,
  len 40,
  > rcvd 4
  > *Jul  5 19:44:02.161:     TCP src=11004, dst=80, seq=237677617,
  > ack=508283271, win=3592 ACK
  > *Jul  5 19:44:02.169: IP: s=174.1.67.7 (Multilink23), d=150.1.3.3,
  len 40,
  > rcvd 4
  > *Jul  5 19:44:02.169:     TCP src=11004, dst=80, seq=237677617,
  > ack=508283271, win=4128 ACK
  > *Jul  5 19:44:02.169: IP: s=174.1.67.7 (Multilink23), d=150.1.3.3,
  len 40,
  > rcvd 4
  > *Jul  5 19:44:02.169:     TCP src=11004, dst=80, seq=237677617,
  > ack=508283807, win=3592 ACK
  > *Jul  5 19:44:02.173: IP: s=174.1.67.7 (Multilink23), d=150.1.3.3,
  len 40,
  > rcvd 4
  > *Jul  5 19:44:02.173:     TCP src=11004, dst=80, seq=237677617,
  > ack=508283807, win=4128 ACK
  > *Jul  5 19:44:02.173: IP: s=174.1.67.7 (Multilink23), d=150.1.3.3,
  len 40,
  > rcvd 4
  > *Jul  5 19:44:02.173:     TCP src=11004, dst=80, seq=237677617,
  > ack=508284104, win=4128 ACK
  > *Jul  5 19:44:02.173: IP: s=174.1.67.7 (Multilink23), d=150.1.3.3,
  len 40,
  > rcvd 4
  > *Jul  5 19:44:02.173:     TCP src=11004, dst=80, seq=237677617,
  > ack=508284104, win=3832 ACK
  > *Jul  5 19:44:02.177: IP: s=174.1.67.7 (Multilink23), d=150.1.3.3,
  len 40,
  > rcvd 4
  > *Jul  5 19:44:02.177:     TCP src=11004, dst=80, seq=237677617,
  > ack=508284104, win=3832 ACK PSH FIN
  >
  >
  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  > ~~~~~~~~~~~~~~~~~~~~~~~
  >
  > *Jul  5 19:44:01.977: IP: s=150.1.3.3 (local), d=174.1.67.7
  (Multilink23),
  > len 44, sending
  > *Jul  5 19:44:01.977:     TCP src=80, dst=11004, seq=508281106,
  > ack=237677450, win=4128 ACK SYN
  > *Jul  5 19:44:02.045: IP: s=150.1.3.3 (local), d=174.1.67.7
  (Multilink23),
  > len 296, sending
  > *Jul  5 19:44:02.045:     TCP src=80, dst=11004, seq=508281107,
  > ack=237677617, win=3961 ACK
  > *Jul  5 19:44:02.061: IP: s=150.1.3.3 (local), d=174.1.67.7
  (Multilink23),
  > len 84, sending
  > *Jul  5 19:44:02.061:     TCP src=80, dst=11004, seq=508281363,
  > ack=237677617, win=3961 ACK PSH
  > *Jul  5 19:44:02.137: IP: s=150.1.3.3 (local), d=174.1.67.7
  (Multilink23),
  > len 296, sending
  > *Jul  5 19:44:02.137:     TCP src=80, dst=11004, seq=508281407,
  > ack=237677617, win=3961 ACK
  > *Jul  5 19:44:02.137: IP: s=150.1.3.3 (local), d=174.1.67.7
  (Multilink23),
  > len 576, sending
  > *Jul  5 19:44:02.137:     TCP src=80, dst=11004, seq=508281663,
  > ack=237677617, win=3961 ACK
  > *Jul  5 19:44:02.141: IP: s=150.1.3.3 (local), d=174.1.67.7
  (Multilink23),
  > len 576, sending
  > *Jul  5 19:44:02.141:     TCP src=80, dst=11004, seq=508282199,
  > ack=237677617, win=3961 ACK
  > *Jul  5 19:44:02.153: IP: s=150.1.3.3 (local), d=174.1.67.7
  (Multilink23),
  > len 576, sending
  > *Jul  5 19:44:02.153:     TCP src=80, dst=11004, seq=508282735,
  > ack=237677617, win=3961 ACK
  > *Jul  5 19:44:02.153: IP: s=150.1.3.3 (local), d=174.1.67.7
  (Multilink23),
  > len 576, sending
  > *Jul  5 19:44:02.153:     TCP src=80, dst=11004, seq=508283271,
  > ack=237677617, win=3961 ACK
  > *Jul  5 19:44:02.161: IP: s=150.1.3.3 (local), d=174.1.67.7
  (Multilink23),
  > len 336, sending
  > *Jul  5 19:44:02.161:     TCP src=80, dst=11004, seq=508283807,
  > ack=237677617, win=3961 ACK PSH FIN
  > *Jul  5 19:44:02.177: IP: s=150.1.3.3 (local), d=174.1.67.7
  (Multilink23),
  > len 40, sending
  > *Jul  5 19:44:02.177:     TCP src=80, dst=11004, seq=508284104,
  > ack=237677618, win=3961 ACK
  >
  >
  >
  > ----- Original Message -----
  > From: "WorkerBee" <ciscobee@gmail.com>
  > To: "Antonio Soares" <amsoares@netcabo.pt>
  > Cc: "Cecil Wilson" <Cecil.Wilson@flextronics.com>; "M S"
  > <michaelgstout@hotmail.com>; <malcolm.salmons@gmail.com>;
  > <ccielab@groupstudy.com>
  > Sent: Friday, June 29, 2007 2:18 AM
  > Subject: Re: NBAR http matching
  >
  >
  >> Read this link, it explicitly mentioned the direction flow of the
  >> requestor and the position on the nbar router doing the protocol
  >> inspection. It is the HTTP response that is being classified.
  >>
  >> Classification of HTTP Traffic by URL, Host, or MIME
  >>
  >>
  http://www.cisco.com/en/US/products/ps6441/products_configuration_guid
  >> e_chapter09186a008064fb35.html#wp1055866
  >
  >
  _______________________________________________________________________
  > Subscription information may be found at:
  > http://www.groupstudy.com/list/CCIELab.html
  _______________________________________________________________________
  Subscription information may be found at:
  http://www.groupstudy.com/list/CCIELab.html
------------------------------------------------------------------------
See what youre getting intobefore you go there
This archive was generated by hypermail 2.1.4 : Sat Aug 18 2007 - 08:17:40 ART