No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

CLI-based Configuration Guide - Security

AR500, AR510, AR531, AR550, AR1500, and AR2500 V200R010

This document provides the basic concepts, configuration procedures, and configuration examples in different application scenarios of the network management feature supported by the device.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Configuring and Applying a Basic ACL6

Configuring and Applying a Basic ACL6

(Optional) Creating a Time Range in Which an ACL6 Takes Effect

Context

The time range configurations of ACL6 and ACL are the same. For details, see (Optional) Creating a Time Range in Which an ACL Takes Effect in Configuring and Applying a Basic ACL.

Configuring a Basic ACL6

Pre-configuration Tasks

If you need to configure a time-based ACL6, create a time range and associate the time range with the ACL6 rules. For details, see (Optional) Creating a Time Range in Which an ACL6 Takes Effect.

Context

A basic ACL6 defines rules to filter IPv6 packets based on information such as source IPv6 addresses, fragment information, and time ranges.

If you only need to filter packets based on source IPv6 addresses, you can configure a basic ACL6.

Procedure

  1. Run system-view

    The system view is displayed.

  2. Create a basic ACL6. You can create a numbered or named ACL.

    • Run the acl ipv6 [ number ] acl6-number [ match-order { auto | config } ] command to create a numbered basic ACL6 (2000-2999) and enter the basic ACL6 view.

    • Run the acl ipv6 name acl6-name { basic | acl6-number } [ match-order { auto | config } ] command to create a named basic ACL6 and enter the basic ACL6 view.

    By default, no ACL6 exists on the device.

    The functions of numbered and named ACL6 are the same as the functions of numbered and named ACL. For details, see ACL Classification.

    If the match-order parameter is not specified when you create an ACL6, the default match order config is used. The match order of ACL6 is the same as that of ACL. For details, see Matching Order.

    To delete an ACL6 that has taken effect, see Deleting ACL6.

  3. Run rule [ rule-id ] { deny | permit } [ [ fragment | none-first-fragment ] | source { source-ipv6-address prefix-length | source-ipv6-address/prefix-length | any } | logging | time-range time-name ] *

    Rules are configured in the basic ACL6.

    In this example, only one permit or deny rule is configured. In actual configuration, you can configure multiple rules and decide the match order of the rules according to service requirements.

    Configuring rules for the basic ACL6 provides a rule configuration example.

  4. (Optional) Run:

    rule rule-id description description

    A description is configured for the ACL rules.

    By default, an ACL rule does not have a description.

    The ACL rule description helps you understand and remember the functions or purpose of an ACL rule.

    You can configure descriptions for only the rules existing on the device. That is, you cannot configure a description for a rule before creating the rule. If an ACL rule for which a description has been configured is deleted, the description is also deleted.

Configuration Tips
Deleting ACL6

Run the undo acl ipv6 { all | [ number ] acl6-number } or undo acl ipv6 name acl6-name command in the system view to delete an ACL6. This command can delete an ACL6.

Configuring rules for the basic ACL6
  • Configuring a packet filtering rule based on the source IPv6 address (host address)

    Configure a rule in ACL6 2001 to allow the packets from host fc00:1::1/128 to pass.
    <Huawei> system-view
    [Huawei] acl ipv6 2001
    [Huawei-acl6-basic-2001] rule permit source fc00:1::1 128
    
  • Configuring a packet filtering rule based on the source IPv6 address segment

    Configure a rule in ACL6 2001 to allow the packets from host fc00:1::1/128 to pass and reject the packets from other hosts on network segment fc00:1::/64.
    <Huawei> system-view
    [Huawei] acl ipv6 2001
    [Huawei-acl6-basic-2001] rule permit source fc00:1::1 128
    [Huawei-acl6-basic-2001] rule deny source fc00:1:: 64
    
  • Configuring a time-based ACL6 rule

    For details, see Configuring a time-based ACL rule in Configuring a Basic ACL.

  • Configuring a packet filtering rule based on the IP fragment information and source IP address segment

    For details, see Configuring a packet filtering rule based on the IP fragment information and source IP address segment in Configuring a Basic ACL.

Applying a Basic ACL6

Context

After an ACL6 is configured, it must be applied to a service module so that the ACL6 rules can be delivered and take effect.

Usually, an ACL6 is applied to a traffic policy or simplified traffic policy so that the device can deliver ACL rules globally, or on an interface to filter packets to be forwarded. In addition, an ACL6 can be applied to the service modules such as Telnet, FTP, and routing.

Procedure

  1. Apply a basic ACL6.

    Table 4-19 describes the application of a basic ACL6.

    Table 4-19  Applying a basic ACL6
    Service Category Usage Scenario How ACLs Are Used

    Filtering packets to be forwarded

    The device filters received packets globally, or on an interface, and then discards, modifies priorities of, or redirects the filtered packets.

    For example, you can use ACL6 to reduce the service level for the bandwidth-consuming services, such as P2P downloading and online video. When network congestion occurs, these packets are discarded first.

    • Simplified traffic policy: See ACL-based Simplified Traffic Policy Configuration in Huawei AR Series IOT Gateway Configuration Guide - QoS.

    • Traffic policy: See MQC Configuration in Huawei AR Series IOT Gateway Configuration Guide - QoS.

    • Packet filtering firewall: See Configuring the Packet Filtering Firewall in Huawei AR Series IOT Gateway Configuration Guide - Firewall.
    • Dynamic NAT: See Configuring Dynamic NAT in the Huawei AR Series IOT Gateway Configuration Guide - IP Services.
    • NAT server: See Configuring an Internal NAT Server in the Huawei AR Series IOT Gateway Configuration Guide - IP Services.

    Login control

    The device controls access permission of users. Only authorized users can log in to the device, and other users cannot log in without permission. This ensures network security.

    For example, only the administrator is allowed to log in to the device. You can apply an ACL6 to the Telnet service and specify the hosts that are allowed to log in to the device.

    • Telnet: See Enabling the Telnet Server Function in Huawei AR Series IOT Gateway Configuration Guide - Basic Configuration.

    • FTP: See Managing Files When the Device Functions as an FTP Server in Huawei AR Series IOT Gateway Configuration Guide - Basic Configuration.

    • SFTP: See Managing Files When the Device Functions as an SFTP Server in Huawei AR Series IOT Gateway Configuration Guide - Basic Configuration.

    • SNMP: See (Optional) Restricting Management Rights of the NMS (SNMPv1 and SNMPv2c) and (Optional) Restricting Management Rights of the NMS (SNMPv3) in Huawei AR Series IOT Gateway Configuration Guide - Network Management and Monitoring.

    Route filtering

    ACLs can be applied to various dynamic routing protocols to filter advertised and received routes and multicast groups.

    For example, you can apply an ACL to a routing policy to prevent the device from sending routes of a network segment to the neighboring router.

    • IS-IS (IPv6): See Configuring IS-IS to Advertise Specified External Routes to an IS-IS Routing Domain and Adding Specified IS-IS Routes to the IP Routing Table in Huawei AR Series IOT Gateway Configuration Guide - IP Unicast Routing.

    • OSPFv3: See Configuring OSPFv3 to Filter the Received Routes, Configuring OSPFv3 to Import External Routes, and Enabling the Helper of OSPFv3 GR in Huawei AR Series IOT Gateway Configuration Guide - IP Unicast Routing.

    • RIPng: See Configuring a RIPng Process to Import External Routes and Controlling the Receiving of RIPng Routes in Huawei AR Series IOT Gateway Configuration Guide - IP Unicast routing.

    • Multicast: See Filtering IGMP Messages Based on Source IP Addresses, Configuring a Multicast Group Policy, (Optional) Configuring the Range of Multicast Groups That an Interface Can Join, and (Optional) Configuring an SSM Group Policy in Huawei AR Series IOT Gateway Configuration Guide - IP Multicast.

Verifying a Basic ACL6 Configuration

Procedure

  • Run the display acl ipv6 { acl6-number | name acl6-name | all } command to check ACL6 configuration.
  • Run the display time-range { all | time-name } command to view information about the time range.
Translation
Download
Updated: 2019-05-20

Document ID: EDOC1100034236

Views: 95735

Downloads: 58

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next