No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


CLI-based Configuration Guide - Security

AR500, AR510, and AR530 V200R007

This document describes the configurations of Security, including AAA, DAA,NAC, BRAS Access, ACL, Firewall, Deep Security Defense, Local Attack Defense;Attack Defense, Traffic Suppression, ARP Security, Port Security, DHCP Snooping, IPSG, URPF, PKI, SSL, HTTPS, Keychain, separating the management plane from the service plane, security risks.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).


A blacklist filters packets based on source VPNs and source IP addresses. Compared with ACLs, the blacklist uses simpler matching rules and therefore can filter packets at a higher speed. The blacklist can effectively block the packets sent from specific IP addresses. Blacklist entries can be manually configured or dynamically generated.

As shown in Figure 5-5, the IP address of user B is in the blacklist, so packets from user B are discarded by the firewall.

Figure 5-5  Blacklist

Blacklist Features Supported by the Device

You add entries to the blacklist manually. In addition, if the device detecting an IP sweeping attack or port scanning attack, it adds the attacking IP address or port to the blacklist. Then, all the packets from this IP address or port are rejected within a certain period. You can set an aging time for entries in the blacklist.

The firewall discards all the packets from the blacklisted IP addresses no matter whether the packets are permitted by the ACL.

You can export entries in a blacklist to a file or import entries to a blacklist from a file.

Updated: 2019-05-25

Document ID: EDOC1000097287

Views: 14755

Downloads: 40

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Previous Next