No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


Configuration Guide - Security

CloudEngine 8800, 7800, 6800, and 5800 V200R005C10

This document describes the configurations of Security, including ACL, local attack defense, MFF, attack defense, traffic suppression and storm control, ARP security, Port security, DHCP snooping, ND snooping, PPPoE+, IPSG, SAVI, separating the management plane from the service plane, security risks.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Example for Using a Layer 2 ACL to Configure a Traffic Classifier

Example for Using a Layer 2 ACL to Configure a Traffic Classifier

Networking Requirements

As shown in Figure 3-6, the Switch that functions as the gateway is connected to the server leased by the tenant. An ACL needs to be configured to prevent the packets with the source MAC address 00e0-f201-0101 and the destination MAC address 0260-e207-0002 from passing through.

Figure 3-6 Using a Layer 2 ACL to configure a traffic classifier

Configuration Roadmap

The configuration roadmap is as follows:

  1. Configure an ACL.
  2. Configure a traffic classifier.
  3. Configure a traffic behavior.
  4. Configure a traffic policy.
  5. Apply the traffic policy to an interface.


  1. Configure an ACL.

    # Configure a Layer 2 ACL.

    <HUAWEI> system-view
    [~HUAWEI] sysname Switch
    [*HUAWEI] commit
    [~Switch] acl 4000
    [*Switch-acl-L2-4000] rule deny source-mac 00e0-f201-0101 ffff-ffff-ffff destination-mac 0260-e207-0002 ffff-ffff-ffff 
    [*Switch-acl-L2-4000] quit

  2. Configure a traffic classifier based on the ACL.

    # Configure the traffic classifier tc1 to classify packets that match ACL 4000.

    [*Switch] traffic classifier tc1
    [*Switch-classifier-tc1] if-match acl 4000
    [*Switch-classifier-tc1] quit

  3. Configure a traffic behavior.

    # Configure the traffic behavior tb1 to reject packets.

    [*Switch] traffic behavior tb1
    [*Switch-behavior-tb1] deny
    [*Switch-behavior-tb1] quit

  4. Configure the traffic policy.

    # Configure the traffic policy tp1, and bind tc1 and tb1 to the traffic policy.

    [*Switch] traffic policy tp1
    [*Switch-trafficpolicy-tp1] classifier tc1 behavior tb1
    [*Switch-trafficpolicy-tp1] quit

  5. Apply the traffic policy.

    # Apply the traffic policy tp1 to 10GE1/0/2.

    [*Switch] interface 10ge 1/0/2
    [*Switch-10GE1/0/2] traffic-policy tp1 inbound
    [*Switch-10GE1/0/2] commit
    [~Switch-10GE1/0/2] quit

  6. Verify the configuration.

    # Check the configuration of the ACL.

    [~Switch] display acl 4000
    L2 ACL 4000, 1 rule                                                             
    ACL's step is 5                                                                 
     rule 5 deny source-mac 00e0-f201-0101 destination-mac 0260-e207-0002 (0 times matched)                                                                         

    # Check the configuration of the traffic classifier.

    [~Switch] display traffic classifier tc1
      Traffic Classifier Information:                                               
        Classifier: tc1                                                             
          Type: OR                                                              
            if-match acl 4000                                                       

    # Check the configuration of the traffic policy.

    [~Switch] display traffic policy tp1
      Traffic Policy Information:                                                   
        Policy: tp1                                                                 
          Classifier: tc1                                                           
            Type: OR                                                            
          Behavior: tb1                                                             
    [~Switch] display traffic-policy applied-record
    Total records : 1                                                                                                                   
    Policy Name                      Apply Parameter           Slot     State                                                           
    tp1                              10GE1/0/2 inbound            1     success                                                         

Configuration Files

# Switch configuration file

sysname Switch
acl number 4000
 rule 5 deny source-mac 00e0-f201-0101 destination-mac 0260-e207-0002           
traffic classifier tc1 type or
 if-match acl 4000
traffic behavior tb1
traffic policy tp1
 classifier tc1 behavior tb1 precedence 5
interface 10GE1/0/2
 traffic-policy tp1 inbound  
Updated: 2019-04-20

Document ID: EDOC1100074765

Views: 23598

Downloads: 93

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Previous Next