No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Configuration Guide - Security

S7700 and S9700 V200R011C10

This document describes the configurations of Security, including ACL, reflective ACL, local attack defense, MFF, attack defense, traffic suppression and storm control, ARP security, port security, DHCP snooping, ND snooping, PPPoE+, IPSG, SAVI, URPF, keychain, separating the management plane from the service plane, security risks.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
In Which Methods Can ACLs Be Delivered?

In Which Methods Can ACLs Be Delivered?

After an ACL is configured, it must be applied to a service module so that the ACL rules can be delivered and take effect.

Usually, an ACL is applied to a traffic policy or simplified traffic policy. This enables the device to deliver ACL rules globally, in a VLAN, or on an interface to filter packets to be forwarded. In addition, an ACL can be applied to the service modules such as Telnet, FTP, and routing.

Table 1-32 describes the common ACL delivery methods.

Table 1-32  ACL delivery methods
Service Category Usage Scenario How ACLs Are Used

Filtering packets to be forwarded

The device filters received packets globally, on an interface, or in a VLAN, and then discards, modifies priorities of, or redirects the filtered packets.

For example, you can use ACL to reduce the service level for the bandwidth-consuming services, such as P2P downloading and online video. When network congestion occurs, these packets are discarded first.

  • Simplified traffic policy: See "ACL-based Simplified Traffic Policy Configuration" in the Configuration Guide - QoS of the corresponding product version.

  • Traffic policy: See "MQC Configuration" in the Configuration Guide - QoS of the corresponding product version.

Filtering packets to be sent to the CPU

If too many protocol packets are sent to the CPU, the CPU usage increases and CPU performance degrades. The device restricts the packets to be sent to the CPU.

For example, when a user sends a large number of ARP attack packets to the device, the CPU is busy and service is interrupted. You can apply an ACL to the local attack defense service, and add the user to the blacklist so that the CPU discards the packets from this user.

Login control

The device controls access permission of users. Only authorized users can log in to the device, and other users cannot log in without permission. This ensures network security.

  • Telnet: See "Enabling the Telnet Server Function" in the Configuration Guide - Basic Configuration of the corresponding product version.

  • FTP: See "Managing Files When the Device Functions as an FTP Server" in the Configuration Guide - Basic Configuration of the corresponding product version.

  • SFTP: See "Managing Files When the Device Functions as an SFTP Server" in the Configuration Guide - Basic Configuration of the corresponding product version.

  • HTTP: See "Configuring Access Control on Web Users" in the Configuration Guide - Basic Configuration of the corresponding product version.

  • SNMP: See "(Optional) Restricting Management Rights of the NMS" (SNMPv1 and SNMPv2c) and "(Optional) Restricting Management Rights of the NMS" (SNMPv3) in the Configuration Guide - Network Management and Monitoring of the corresponding product version.

Route filtering

ACLs can be applied to various dynamic routing protocols to filter advertised and received routes and multicast groups.

For example, you can apply an ACL to a routing policy to prevent the device from sending routes of a network segment to the neighboring router.

  • BGP: See "Controlling the Advertisement of BGP Routes" and "Controlling the Receiving of BGP Routes" in the Configuration Guide - IP Unicast routing of the corresponding product version.

  • IS-IS (IPv4): See "Configuring IS-IS to Advertise Specified External Routes to an IS-IS Routing Domain" and "Adding Specified IS-IS Routes to the IP Routing Table" in the Configuration Guide - IP Unicast routing of the corresponding product version.

  • OSPF: See "Configuring OSPF to Filter Received Routes" and "Configuring OSPF to Filter the Routes to Be Advertised" in the Configuration Guide - IP Unicast routing of the corresponding product version.

  • RIP: See "Configuring RIP to Import Routes" and "Configuring RIP to Filter Received Routes" in the Configuration Guide - IP Unicast routing of the corresponding product version.

  • Multicast: See "Filtering IGMP Messages Based on Source IP Addresses", "Configuring a Multicast Group Policy" and "(Optional) Configuring an SSM Group Policy" in the Configuration Guide - IP Multicast of the corresponding product version.

Translation
Download
Updated: 2019-10-18

Document ID: EDOC1000178319

Views: 152270

Downloads: 84

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next