Skip to content

Security and Policy

Security features in netverdict are modelled around packet and control-plane outcomes: whether traffic is permitted, denied, translated, encrypted, marked, or routed differently after policy. The engine favours deterministic policy reasoning over appliance emulation.

For narrow deep dives, see ACL, NAT, Route Policy, IPsec, Zone-Based Firewall, and QoS.

AreaLevelWhat this means
IPv4 standard ACLsSupportedNumbered and named standard ACLs match source IPv4 prefixes and can bind to interfaces.
IPv4 extended ACLsSupportedIP, ICMP, TCP, UDP, protocol, port, operator, range, host, and subnet matches.
IPv6 ACLsSupportedNamed IPv6 ACLs and interface traffic filters.
Object groupsSupportedNetwork and service object groups participate in ACL evaluation.
Time rangesSupportedACL entries can be gated by simulation date/time.
ACL analysisSupportedShadowing, malformed-entry checks, and flow-search surfaces.
Prefix-listsSupportedRoute-policy matching for BGP, redistribution, and import/export analysis.
AS-path ACLsSupportedRegex-like AS_PATH matching for BGP route-maps.
Community-listsSupportedStandard exact matching and expanded regex matching.
Route-mapsSupportedMatch/set model shared by BGP, redistribution, and policy checks.
Static NATSupportedInside/outside static IPv4 translations.
Dynamic NAT / PATSupportedPool/list translation and overload PAT on interface or pool.
ASA twice NATBehaviour modelParser/runtime coverage for modelled ASA-style NAT scenarios.
Zone-based firewallBehaviour modelZones, zone-pairs, class-maps, policy-maps, inspect/drop/pass.
GRE tunnelsSupportedIPv4 GRE tunnel encapsulation and forwarding.
IPsec tunnel modeBehaviour modelIKE/IPsec configuration, SA solver, ESP datapath, and selector reasoning.
IKEv2Behaviour modelSelected profile/keyring/proposal surface for tunnel establishment labs.
QoS classificationBehaviour modelClass maps match ACLs/protocols where implemented.
QoS markingSupportedDSCP/precedence metadata can be set on packets.
QoS schedulingNot modelledQueue timing, WRED, shaping rate behaviour, and hardware queues are out of scope.
Standard / feature familyCoverageNotes
Cisco ACL semanticsSupportedStandard/extended ACL ordering, implicit deny, wildcard masks, ports, and interface binding.
IPv6 ACL semanticsSupportedNamed IPv6 ACLs with deterministic permit/deny evaluation.
RFC 3022SupportedTraditional NAT behaviour for static and overload translation outcomes.
Cisco ASA twice NAT styleBehaviour modelOrdered NAT rule matching and translation outcome for supported cases.
RFC 2784SupportedGRE tunnel forwarding behaviour.
IKEv2 / IPsec tunnel modeBehaviour modelTunnel selectors, SA state, and ESP forwarding outcome; no real crypto negotiation.
DSCP / RFC 2474 styleBehaviour modelDSCP field marking and policy metadata.
Cisco MQCBehaviour modelClass-map, policy-map, and service-policy structure.
Cisco ZBFW styleBehaviour modelZone membership, zone-pair direction, class matching, and actions.
BGP policy familiesSupportedPrefix-list, route-map, AS-path ACL, and community-list semantics used by BGP.
FeatureStatusNotes
ACL first-match orderSupportedEntries are evaluated in order with implicit deny.
Wildcard masksSupportedCisco wildcard semantics are used for IPv4 ACLs.
TCP/UDP port operatorsSupportedeq, neq, lt, gt, and range style matches where parsed.
ICMP type matchingSupportedICMP permit/deny rules affect ping and flow checks.
Interface ACL bindingSupportedInbound/outbound filters participate in packet evaluation.
Object-group expansionSupportedNetwork/service groups are resolved during ACL evaluation.
Time-range gatesSupportedTime-scoped ACL entries depend on simulation clock.
Prefix-list sequence orderSupportedOrdered prefix policy with permit/deny outcomes.
Route-map match/setSupportedMatch prefix/community/AS-path and set attributes/next-hop/metric where implemented.
Community-list matchingSupportedStandard exact and expanded regex forms.
Static inside NATSupportedOne-to-one translation.
PAT overloadSupportedMany-to-one translation with port state.
NAT inside/outside interfacesSupportedTranslation only applies across configured NAT domains.
NAT orderBehaviour modelSupported NAT rules are evaluated deterministically.
ZBFW zone membershipSupportedInterfaces can be assigned to zones.
ZBFW inspect/pass/dropBehaviour modelMatching traffic can create return-state or be allowed/dropped statelessly.
GRE tunnel interfacesSupportedTunnel source/destination and overlay addressing.
IPsec crypto map / profile surfaceBehaviour modelSupported fields feed tunnel establishment and selectors.
ESP datapathBehaviour modelProtected traffic can traverse the tunnel outcome.
QoS class-map / policy-mapSupportedClassification and action containers.
DSCP set actionSupportedPacket metadata can be marked.
Policing/shaping syntaxConfig modelStored/emitted where parsed; no queue scheduler.
CommandIOS-styleASA-styleJunos-styleVyOS-styleNotes
access-list 10 permit 10.0.0.0 0.0.0.255SupportedPartialn/aPartialStandard IPv4 ACL.
ip access-list extended WEB-INSupportedPartialn/aPartialExtended ACL container.
permit tcp host 10.0.10.10 any eq 443SupportedSupportedPartialPartialTCP/port match.
ipv6 access-list V6-INSupportedn/aPartialPartialIPv6 ACL.
object-group network SERVERSSupportedSupportedn/an/aNetwork object group.
time-range BUSINESS-HOURSSupportedn/an/an/aTime-gated ACL entry.
ip access-group WEB-IN inSupportedn/aPartialPartialInterface ACL binding.
ip prefix-list PL seq 10 permit 10.0.0.0/8 le 24SupportedPartialSupportedSupportedPrefix policy.
ip as-path access-list 10 permit ^65001_Supportedn/aPartialPartialAS_PATH policy.
ip community-list standard CUST permit 65000:10Supportedn/aPartialPartialCommunity policy.
route-map RM permit 10SupportedPartialPartialSupportedRoute-policy container.
set local-preference 200Supportedn/aSupportedSupportedBGP route-map action.
ip nat inside source static ...Supportedn/aPartialSupportedStatic NAT.
ip nat inside source list 10 interface ... overloadSupportedn/aPartialSupportedPAT overload.
nat (inside,outside) source static ...n/aBehaviour modeln/an/aASA twice NAT form.
zone security INSIDESupportedn/an/an/aZBFW zone.
zone-pair security ZP source INSIDE destination OUTSIDESupportedn/an/an/aZBFW direction.
class-map type inspectSupportedn/an/an/aZBFW/MQC class.
policy-map type inspectSupportedn/an/an/aZBFW policy.
interface Tunnel0 / tunnel mode gre ipSupportedn/aPartialSupportedGRE tunnel.
crypto ikev2 proposalPartialPartialn/aPartialIKEv2 config surface.
crypto map VPN 10 ipsec-isakmpBehaviour modelBehaviour modeln/aPartialIPsec tunnel selector.
class-map match-any VOICESupportedn/aPartialPartialQoS classification.
policy-map WAN-OUTSupportedn/aPartialPartialQoS policy.
set dscp efSupportedn/aPartialPartialMarking action.
show access-listsSupportedPartialPartialPartialACL state.
show ip nat translationsSupportedn/aPartialPartialNAT table.
show policy-map interfaceSupportedn/aPartialPartialQoS policy view.
show crypto ipsec saBehaviour modelBehaviour modeln/aPartialIPsec SA view.

ACL and firewall evaluation is deterministic and ordered. ACLs use first-match semantics with an implicit deny. Zone-based firewall adds zone membership and direction before class/action evaluation.

NAT is evaluated as a packet transformation before or after routing according to the supported NAT family. The model tracks translation outcome and return state, not every platform-specific NAT table flag.

Route policy is shared by routing protocols. Prefix-lists, AS-path ACLs, community-lists, and route-maps feed BGP and redistribution-style decisions. This is why security-policy pages and routing-policy pages overlap: the same canonical IR backs both views.

IPsec is intentionally a tunnel-behaviour model. It is useful for selectors, reachability, and ESP path reasoning, but the engine does not perform real cryptography, certificate validation, or vendor-specific negotiation races.

QoS currently changes packet metadata and records policy structure. It does not run a packet scheduler, congestion model, or hardware queue simulator.

Extended ACL protecting a server
configure terminal
ip access-list extended WEB-IN
permit tcp host 10.0.10.10 any eq 443
deny icmp host 10.0.10.10 any
permit ip any any
interface GigabitEthernet0/1
ip access-group WEB-IN in
end
show access-lists

Vendor styles

IOS-style
ip access-list extended WEB-IN
permit tcp host 10.0.10.10 any eq 443
deny icmp host 10.0.10.10 any
permit ip any any
interface GigabitEthernet0/1
ip access-group WEB-IN in
Junos-style
set firewall family inet filter WEB-IN term HTTPS from source-address 10.0.10.10/32
set firewall family inet filter WEB-IN term HTTPS from protocol tcp
set firewall family inet filter WEB-IN term HTTPS from destination-port 443
set firewall family inet filter WEB-IN term HTTPS then accept
set firewall family inet filter WEB-IN term DEFAULT then accept
set interfaces ge-0/0/1 unit 0 family inet filter input WEB-IN
VyOS-style
set firewall ipv4 name WEB-IN rule 10 action accept
set firewall ipv4 name WEB-IN rule 10 source address 10.0.10.10
set firewall ipv4 name WEB-IN rule 10 protocol tcp
set firewall ipv4 name WEB-IN rule 10 destination port 443
set interfaces ethernet eth1 firewall in name WEB-IN
PAT overload
configure terminal
access-list 10 permit 10.0.0.0 0.0.0.255
interface GigabitEthernet0/0
ip nat inside
interface GigabitEthernet0/1
ip nat outside
ip nat inside source list 10 interface GigabitEthernet0/1 overload
end
show ip nat translations
Zone-based firewall inspection
configure terminal
zone security INSIDE
zone security OUTSIDE
class-map type inspect match-any WEB
match protocol http
policy-map type inspect INSIDE-OUT
class type inspect WEB
inspect
zone-pair security ZP source INSIDE destination OUTSIDE
service-policy type inspect INSIDE-OUT
end
show policy-map type inspect zone-pair
GRE tunnel with protected prefix intent
configure terminal
interface Tunnel0
ip address 172.16.0.1 255.255.255.252
tunnel source GigabitEthernet0/0
tunnel destination 203.0.113.2
ip route 10.20.0.0 255.255.0.0 Tunnel0
end
show interfaces Tunnel0
show ip route 10.20.0.0

The security model is not a firewall appliance emulator. Counters, logging formats, inspection protocol parsers, ALG behaviour, and platform-specific fast-path details are intentionally limited.

IPsec does not perform real encryption, certificate-chain validation, NAT-T encapsulation, DPD negotiation, or every IKE proposal mismatch edge case.

QoS does not include queue scheduling, congestion, WRED probability, shaping timers, LLQ starvation behaviour, or platform-specific hardware queues.

ASA twice NAT support is focused on modelled scenarios. Complex real-world NAT rule interactions should be treated as partial unless covered by a specific lab or test.