No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Configuration Guide - Security

S1720, S2700, S5700, and S6720 V200R011C10

This document describes the configurations of Security, including ACL, local attack defense, MFF, attack defense, traffic suppression and storm control, ARP security, Port security, DHCP snooping, ND snooping, PPPoE+, IPSG, SAVI, URPF, keychain, MPAC, separating the management plane from the service plane, security risks, PKI.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Applying a Basic ACL

Applying a Basic ACL

Context

After an ACL is configured, it must be applied to a service module so that the ACL rules can be delivered and take effect.

Usually, an ACL is applied to a traffic policy or simplified traffic policy. This enables the device to deliver ACL rules globally, in a VLAN, or on an interface to filter packets to be forwarded. In addition, an ACL can be applied to the service modules such as Telnet, FTP, and routing.

Procedure

  1. Apply a basic ACL

    Table 2-19 describes the application of a basic ACL.

    Table 2-19  Applying a basic ACL
    Service Category Usage Scenario How ACLs Are Used

    Filtering packets to be forwarded

    The device filters received packets globally, on an interface, or in a VLAN, and then discards, modifies priorities of, or redirects the filtered packets.

    For example, you can use ACL to reduce the service level for the bandwidth-consuming services, such as P2P downloading and online video. When network congestion occurs, these packets are discarded first.

    • Simplified traffic policy: See ACL-based Simplified Traffic Policy Configuration in the S1720, S2700, S5700, and S6720 V200R011C10 Configuration Guide - QoS.

    • Traffic policy: See MQC Configuration in the S1720, S2700, S5700, and S6720 V200R011C10 Configuration Guide - QoS.

    Filtering packets to be sent to the CPU

    If too many protocol packets are sent to the CPU, the CPU usage increases and CPU performance degrades. The device restricts the packets to be sent to the CPU.

    For example, when a user sends a large number of ARP attack packets to the device, the CPU is busy and service is interrupted. You can apply an ACL to the local attack defense service, and add the user to the blacklist so that the CPU discards the packets from this user.

    Login control

    The device controls access permission of users. Only authorized users can log in to the device, and other users cannot log in without permission. This ensures network security.

    • Telnet: See Enabling the Telnet Server Function in "CLI Login Configuration" in the S1720, S2700, S5700, and S6720 V200R011C10 Configuration Guide - Basic Configuration.

    • FTP: See Managing Files When the Device Functions as an FTP Server in "File Management" in the S1720, S2700, S5700, and S6720 V200R011C10 Configuration Guide - Basic Configuration.

    • SFTP: See Managing Files When the Device Functions as an SFTP Server in "File Management" in the S1720, S2700, S5700, and S6720 V200R011C10 Configuration Guide - Basic Configuration.

    • HTTP: See Configuring Access Control on Web Users in "Web System Login Configuration" in the S1720, S2700, S5700, and S6720 V200R011C10 Configuration Guide - Basic Configuration.

    • SNMP: See (Optional) Restricting Management Rights of the NMS (SNMPv1 and SNMPv2c) and (Optional) Restricting Management Rights of the NMS (SNMPv3) in "SNMP Configuration" in the S1720, S2700, S5700, and S6720 V200R011C10 Configuration Guide - Network Management and Monitoring.

    Route filtering

    ACLs can be applied to various dynamic routing protocols to filter advertised and received routes and multicast groups.

    For example, you can apply an ACL to a routing policy to prevent the device from sending routes of a network segment to the neighboring router.

    • BGP: See Controlling the Advertisement of BGP Routes and Controlling the Receiving of BGP Routes in "BGP Configuration" in the S1720, S2700, S5700, and S6720 V200R011C10 Configuration Guide - IP Unicast routing.

    • IS-IS (IPv4): See Configuring IS-IS to Advertise Specified External Routes to an IS-IS Routing Domain and Adding Specified IS-IS Routes to the IP Routing Table in "IPv4 IS-IS Configuration" in the S1720, S2700, S5700, and S6720 V200R011C10 Configuration Guide - IP Unicast routing.

    • OSPF: See Configuring OSPF to Filter Received Routes and Configuring OSPF to Filter the Routes to Be Advertised in "OSPF Configuration" in the S1720, S2700, S5700, and S6720 V200R011C10 Configuration Guide - IP Unicast routing.

    • RIP: See Configuring RIP to Import Routes and Configuring RIP to Filter Received Routes in "RIP Configuration" in the S1720, S2700, S5700, and S6720 V200R011C10 Configuration Guide - IP Unicast routing.

    • Multicast: See Filtering IGMP Messages Based on Source IP Addresses in "IGMP Configuration", Configuring a Multicast Group Policy and (Optional) Configuring an SSM Group Policy in "IGMP Snooping Configuration" in the S1720, S2700, S5700, and S6720 V200R011C10 Configuration Guide - IP Multicast.

Translation
Download
Updated: 2019-09-23

Document ID: EDOC1000178177

Views: 223395

Downloads: 722

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next