No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

ACL Used by NE80 to Filter Packet Floods and not be Valid because the Configuration is False

Publication Date:  2012-07-27 Views:  44 Downloads:  0
Issue Description
NE80 configures ACL. After it floods the interface, ACL does not take effect. It is applied to versions based on VRP5.10.
Earlier configuration is as follows:
acl number 10012 
 rule tcp destination 59.45.172.16 0.0.0.7 destination-port eq 7000          
 acl number 10013                                                        
 rule udp destination 59.45.172.16 0.0.0.7 destination-port eq 7000  
traffic classifier fbd1                   
if-match acl 10001                                                     
traffic classifier fbd2                                       
if-match acl 10002                
traffic behavior fangbingdu   deny  
traffic policy fangbingdu                                     
classifier fbd1 behavior fangbingdu precedence 0                              
classifier fbd2 behavior fangbingdu precedence 1      
interface Ethernet1/0/0                                                           
traffic-policy fanbingdu inbound
      
Alarm Information
Null
      
Handling Process
Configure command under system mode: traffic-policy commit slot slot_number and the problem is solved.
      
Root Cause
ACL used by NE80 to filter packet is flooded through traffic policy. Flood or change traffic policy, and then configure command under system mode: traffic-policy commit slot slot_number. It can take effect. Otherwise it will not take effect and the command will not display in the configuration.
Suggestions
Null
      

END