No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

CLI-based Configuration Guide - Security

AR100, AR120, AR150, AR160, AR200, AR1200, AR2200, AR3200, and AR3600 V200R010

This document provides the basic concepts, configuration procedures, and configuration examples in different application scenarios of the network management feature supported by the device.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Configuring and Applying an Advanced ACL6

Configuring and Applying an Advanced ACL6

(Optional) Creating a Time Range in Which an ACL6 Takes Effect

Context

The time range configurations of ACL6 and ACL are the same. For details, see (Optional) Creating a Time Range in Which an ACL Takes Effect in Configuring and Applying a Basic ACL.

Configuring an Advanced ACL6

Prerequisites

If you need to configure a time-based ACL6, create a time range and associate the time range with the ACL6 rules. For details, see (Optional) Creating a Time Range in Which an ACL6 Takes Effect.

Context

An advanced ACL6 defines rules to filter IPv6 packets based on source IPv6 addresses, destination IPv6 addresses, IPv6 protocol types, TCP source/destination port numbers, UDP source/destination port numbers, fragment information, and time ranges.

Compared with a basic ACL6, an advanced ACL6 is more accurate, flexible, and provides more functions. For example, if you want to filter packets based on source and destination IPv6 addresses, configure an advanced ACL6.

Procedure

  1. Run system-view

    The system view is displayed.

  2. Create an advanced ACL6. You can create a numbered or named ACL.

    • Run the acl ipv6 [ number ] acl6-number [ match-order { auto | config } ] command to create a numbered advanced ACL6 (3000-3999) and enter the advanced ACL6 view.

    • Run the acl ipv6 name acl6-name { advance | acl6-number } [ match-order { auto | config } ] command to create a named advanced ACL6 and enter the advanced ACL6 view.

    By default, no ACL exists on the device.

    The functions of numbered and named ACL6 are the same as the functions of numbered and named ACL. For details, see ACL Classification.

    If the match-order parameter is not specified when you create an ACL6, the default match order config is used. The match order of ACL6 is the same as that of ACL. For details, see Matching Order.

    To delete an ACL that has taken effect, see Deleting an ACL in Configuring a Basic ACL6.

  3. Configure rules for the advanced ACL6.

    You can configure advanced ACL6 rules according to the protocols carried by IP. The parameters vary according to the protocol types.

    • When the TCP protocol is used, run:

      rule [ rule-id ] { deny | permit } { protocol-number | tcp } [ destination { [ pd prefix ] destination-ipv6-address prefix-length | [ pd prefix ] destination-ipv6-address/prefix-length | any | pd destination-dhcpv6-prefix } | destination-port { eq port | gt port | lt port | range port-start port-end } | dscp dscp | precedence precedence | source { [ pd prefix ] source-ipv6-address prefix-length | [ pd prefix ] source-ipv6-address/prefix-length | any | pd source-dhcpv6-prefix } | source-port { eq port | gt port | lt port | range port-start port-end } | tcp-flag { ack | fin | psh | rst | syn | urg | established } * | logging | time-range time-name | tos tos ] *

    • When the UDP protocol is used, run:

      rule [ rule-id ] { deny | permit } { protocol-number | udp } [ destination { [ pd prefix ] destination-ipv6-address prefix-length | [ pd prefix ] destination-ipv6-address/prefix-length | any | pd destination-dhcpv6-prefix } | destination-port { eq port | gt port | lt port | range port-start port-end } | dscp dscp | precedence precedence | source { [ pd prefix ] source-ipv6-address prefix-length | [ pd prefix ] source-ipv6-address/prefix-length | any | pd source-dhcpv6-prefix } | source-port { eq port | gt port | lt port | range port-start port-end } | logging | time-range time-name | tos tos ] *

    • When the ICMPv6 protocol is used, run:

      rule [ rule-id ] { deny | permit } { protocol-number | icmpv6 } [ destination { destination-ipv6-address prefix-length | destination-ipv6-address/prefix-length | any } | dscp dscp | icmp6-type { icmp6-type-name | icmp6-type icmp6-code } | precedence precedence | source { source-ipv6-address prefix-length | source-ipv6-address/prefix-length | any } | logging | time-range time-name | tos tos ] *

    • When the IPv6 protocol is used, run:

      rule [ rule-id ] { deny | permit } { protocol-number | ipv6 } [ destination { [ pd prefix ] destination-ipv6-address prefix-length | [ pd prefix ] destination-ipv6-address/prefix-length | any | pd destination-dhcpv6-prefix } | dscp dscp | [ fragment | none-first-fragment ] | precedence precedence | source { [ pd prefix ] source-ipv6-address prefix-length | [ pd prefix ] source-ipv6-address/prefix-length | any | pd source-dhcpv6-prefix } | logging | time-range time-name | tos tos ] *

    • When other protocols are used, run:

      rule [ rule-id ] { deny | permit } { protocol-number | gre | ospf } [ destination { destination-ipv6-address prefix-length | destination-ipv6-address/prefix-length | any } | dscp dscp | precedence precedence | source { source-ipv6-address prefix-length | source-ipv6-address/prefix-length | any } | logging | time-range time-name | tos tos ] *

    In this example, only one permit or deny rule is configured. In actual configuration, you can configure multiple rules and decide the match order of the rules according to service requirements.

    Configuring rules for the advanced ACL6 provides a rule configuration example.

  4. (Optional) Run:

    rule rule-id description description

    A description is configured for the ACL rules.

    By default, an ACL rule does not have a description.

    The ACL rule description helps you understand and remember the functions or purpose of an ACL rule.

    You can configure descriptions for only the rules existing on the device. That is, you cannot configure a description for a rule before creating the rule. If an ACL rule for which a description has been configured is deleted, the description is also deleted.

Configuration Tips
Configuring rules for the advanced ACL6
  • Configuring a packet filtering rule for ICMPv6 protocol packets based on source IPv6 address (host address) and destination IPv6 address segment

    Configure a rule in ACL6 3001 to allow the ICMPv6 packets from fc00:1::1 and destined for network segment fc00:2::/64 to pass.
    <Huawei> system-view
    [Huawei] acl ipv6 3001
    [Huawei-acl6-adv-3001] rule permit icmpv6 source fc00:1::1 128 destination fc00:2:: 64
  • Configuring a packet filtering rule for TCP protocol packets based on the TCP destination port number, source IPv6 address (host address), and destination IPv6 address segment

    Configure a rule in the advanced ACL6 deny-telnet to forbid Telnet connections between the host fc00:1::3 and hosts on network segment fc00:2::/64.
    <Huawei> system-view
    [Huawei] acl ipv6 name deny-telnet
    [Huawei-acl6-adv-deny-telnet] rule deny tcp destination-port eq telnet source fc00:1::3 128 destination fc00:2:: 64
    Configure a rule in the advanced ACL6 no-web to forbid hosts fc00:1::3 and fc00:1::4 from accessing web pages (HTTP is used to access web pages, and TCP port number is 80).
    <Huawei> system-view
    [Huawei] acl ipv6 name no-web
    [Huawei-acl6-adv-no-web] rule deny tcp destination-port eq 80 source fc00:1::3 128
    [Huawei-acl6-adv-no-web] rule deny tcp destination-port eq 80 source fc00:1::4 128
  • Configuring a time-based ACL6 rule

    For details, see Configuring a time-based ACL rule in Configuring a Basic ACL.

  • Configuring a packet filtering rule based on the IP fragment information and source IP address segment

    For details, see Configuring a packet filtering rule based on the IP fragment information and source IP address segment in Configuring a Basic ACL.

Applying an Advanced ACL6

Context

After an ACL6 is configured, it must be applied to a service module so that the ACL6 rules can be delivered and take effect.

Usually, an ACL6 is applied to a traffic policy or simplified traffic policy so that the device can deliver ACL rules globally, or on an interface to filter packets to be forwarded. In addition, an ACL6 can be applied to the service modules such as FTP and multicast.

Procedure

  1. Apply an advanced ACL6.

    Table 5-20 describes the application of an advanced ACL6.

    Table 5-20  Applying an advanced ACL6
    Service Category Usage Scenario How ACLs Are Used

    Filtering packets to be forwarded

    The device filters received packets globally, or on an interface, and then discards, modifies priorities of, or redirects the filtered packets.

    For example, you can use ACL6 to reduce the service level for the bandwidth-consuming services, such as P2P downloading and online video. When network congestion occurs, these packets are discarded first.

    • Simplified traffic policy: See ACL-based Simplified Traffic Policy Configuration in Huawei AR Series Access Routers Configuration Guide - QoS.

    • Traffic policy: See MQC Configuration in Huawei AR Series Access Routers Configuration Guide - QoS.

    • Packet filtering firewall: See Configuring the Packet Filtering Firewall in Huawei AR Series Access Routers Configuration Guide - Firewall.
    • Dynamic NAT: See Configuring Dynamic NAT in the Huawei AR Series Access Routers Configuration Guide - IP Services.
    • NAT server: See Configuring an Internal NAT Server in the Huawei AR Series Access Routers Configuration Guide - IP Services.
    NOTE:

    Only the packet filtering firewall service supports the rule (advanced ACL6 view) command to configure ACL6 rules to match the IPv6 address, which is assigned based on the IPv6 address prefix obtained by a DHCPv6 client, as the source or destination IP address of packets. In the same ACL6 rule, destination pd destination-dhcpv6-prefix and source pd source-dhcpv6-prefix parameters cannot be configured simultaneously.

    Login control

    The device controls access permission of users. Only authorized users can log in to the device, and other users cannot log in without permission. This ensures network security.

    For example, only the administrator is allowed to log in to the device. You can apply an ACL6 to the Telnet service and specify the hosts that are allowed to log in to the device.

    • Telnet: See Enabling the Telnet Server Function in Huawei AR Series Access Routers Configuration Guide - Basic Configuration.

    • FTP: See Managing Files When the Device Functions as an FTP Server in Huawei AR Series Access Routers Configuration Guide - Basic Configuration.

    • SFTP: See Managing Files When the Device Functions as an SFTP Server in Huawei AR Series Access Routers Configuration Guide - Basic Configuration.

    Route filtering

    An ACL6 can be applied to the multicast protocol to filter multicast groups.

    For example, the ACL6 and MLD snooping functions can be used together to prevent hosts in a VLAN from joining a multicast group.

    Multicast: See Configuring a Multicast Group Policy in Configuring the MLD Snooping Policy, Configuring a Multicast Group Policy in Configuring the IGMP Snooping Policy, Filtering IGMP Messages Based on Source IP Addresses and (Optional) Configuring the Range of Multicast Groups That an Interface Can Join in Huawei AR Series Access Routers Configuration Guide - IP Multicast.

Verifying an Advanced ACL6 Configuration

Procedure

  • Run the display acl ipv6 { acl6-number | name acl6-name | all } command to check ACL6 configuration.
  • Run the display time-range { all | time-name } command to view information about the time range.
Translation
Download
Updated: 2019-08-07

Document ID: EDOC1100034077

Views: 127871

Downloads: 231

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next