No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


Configuration Guide - Security

S1720, S2700, S5700, and S6720 V200R011C10

This document describes the configurations of Security, including ACL, local attack defense, MFF, attack defense, traffic suppression and storm control, ARP security, Port security, DHCP snooping, ND snooping, PPPoE+, IPSG, SAVI, URPF, keychain, MPAC, separating the management plane from the service plane, security risks, PKI.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Applying a Layer 2 ACL

Applying a Layer 2 ACL


After an ACL is configured, it must be applied to a service module so that the ACL rules can be delivered and take effect.

Usually, an ACL is applied to a traffic policy or simplified traffic policy so that the device can deliver ACL rules globally, in a VLAN, or on an interface to filter packets to be forwarded. In addition, an ACL can be applied to the service modules such as local attack defense.


  1. Apply a Layer 2 ACL.

    Table 2-21 describes the application of a Layer 2 ACL.

    Table 2-21  Applying a Layer 2 ACL
    Service Category Usage Scenario How ACLs Are Used

    Filtering packets to be forwarded

    The device filters received packets globally, on an interface, or in a VLAN, and then discards, modifies priorities of, or redirects the filtered packets.

    For example, you can use ACL to reduce the service level for the bandwidth-consuming services, such as P2P downloading and online video. When network congestion occurs, these packets are discarded first.

    • Simplified traffic policy: See ACL-based Simplified Traffic Policy Configuration in the S1720, S2700, S5700, and S6720 V200R011C10 Configuration Guide - QoS.

    • Traffic policy: See MQC Configuration in the S1720, S2700, S5700, and S6720 V200R011C10 Configuration Guide - QoS.

    Filtering packets to be sent to the CPU

    If too many protocol packets are sent to the CPU, the CPU usage increases and CPU performance degrades. The device restricts the packets to be sent to the CPU.

    For example, when a user sends a large number of ARP attack packets to the device, the CPU is busy and service is interrupted. You can apply an ACL to the local attack defense service, and add the user to the blacklist so that the CPU discards the packets from this user.

    Blacklist: See Configuring a Blacklist in Local Attack Defense Configuration.

Updated: 2019-09-23

Document ID: EDOC1000178177

Views: 232870

Downloads: 750

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Previous Next