No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


Configuration Guide - Security

S1720, S2700, S5700, and S6720 V200R011C10

This document describes the configurations of Security, including ACL, local attack defense, MFF, attack defense, traffic suppression and storm control, ARP security, Port security, DHCP snooping, ND snooping, PPPoE+, IPSG, SAVI, URPF, keychain, MPAC, separating the management plane from the service plane, security risks, PKI.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Applying a User ACL

Applying a User ACL


After an ACL is configured, it must be applied to a service module so that the ACL rules can be delivered and take effect.

Currently, the user ACL can only be applied to the UCL groups of the NAC feature. To control the network access rights of users based on user groups, you can perform the following operations: configure a UCL group, associate user ACL rules with the UCL group so that the ACL rules apply to all users in the user group, configure packet filtering based on user ACL to make the ACL take effect, and then apply the UCL group to the AAA service scheme.


  1. Apply a user ACL.

    Table 2-23 describes the application of a user ACL.

    Table 2-23  Applying a user ACL
    Service Category Usage Scenario How ACLs Are Used

    Filtering packets to be forwarded

    The device binds a user ACL to a UCL group to filter incoming packets on all interfaces, thus controlling the network access rights of users based on user groups.

    For example, if too many users need to access the network and ACL resources on the device are insufficient, you can configure UCL groups and user ACLs. Users are added to different user groups and the ACL rules applying to a user group are valid to all users in the user group. This method conserves ACL resources on the device and you do not need to configure network access control policy for each user.

    NAC: See (Optional) Configuring Authentication Event Authorization Information in "NAC Configuration (Unified Mode)" in the S1720, S2700, S5700, and S6720 V200R011C10 Configuration Guide - User Access and Authentication.

Updated: 2019-09-23

Document ID: EDOC1000178177

Views: 223370

Downloads: 722

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Previous Next