Filter GTP/SCTP/VXLAN Message Header

Procedure

  1. Configure the ingress group with the required ingress ports.
  2. Configure the required IP/IPv6 ACL settings to filter GTP, SCTP, or VXLAN message headers.
    Use the L4 port 132 to filter SCTP packets.
  3. Set ACL filtering in the route-map.
  4. Apply the route-map policy to the ingress group.
  5. Send traffic flows to the DUT.
    • The configured GTP, SCTP, or VXLAN message header is dropped based on ACL configured in the route-map.
    • The non-filtered traffic is forwarded to the egress port/egress group.
  6. Verify the CLI statistics of ingress group to determine the number of packets or flows received and dropped.
  7. Verify the CLI statistics of egress port or egress group to determine the number of non-filtered packets or flows forwarded.
  8. Verify the CLI statistics of UDA ACL matches the number of packets/flows dropped.
  9. Verify that the packets matching the UDA ACL are not forwarded in egress groups and only non-filtered packets are received by validating or capturing the wired PCAP collected in the analytical tools.