Policy Management
You can configure the following features only when the tunnel mode is set to EVPN on the
page.If SAC, IPS and NAT are configured on the same interface, SAC and IPS do not take effect for multi-channel applications, for example, FTP. That is, SAC cannot identify multi-channel applications, and IPS cannot filter files transferred using multi-channel protocols.
- Configuring Applications and Application Groups
- Configuring a Traffic Policy Template
- Configuring an Internet Access Policy for a Site
- Configuring a Mutual-Access Policy for Traditional Sites
- Configuring a Traffic Policy
- Creating an ACL Policy for the Underlay Network
- Creating an ACL Policy for the Overlay Network
- Creating a NAT Policy for the Underlay Network
- Creating a NAT Policy for the Overlay Network
- Creating an Intelligent Traffic Steering Policy for the Overlay Network
- Creating a QoS Policy for the Overlay Network
- Configuring the VAS Connection
- Creating a QoS Policy (General Configuration)
- Configuring NAT ALG
- Connecting to a Third-Party Secure Cloud Gateway Policy
- Configuring VN Traffic Distribution
- Configuring a Security Policy
- Checking the Policy Deployment Result
Configuring Applications and Application Groups
Users can configure block, redirection, intelligent traffic steering, and QoS policies, or application link detection by application group. iMaster NCE-Campus predefines some common applications. If the predefined applications do not meet requirements, you can customize applications and group the predefined and customized applications so that iMaster NCE-Campus can identify more applications.
Configuring SAC
Smart Application Control (SAC) is used to identify applications. By default, it is disabled in EVPN mode.
You can choose whether to enable SAC as needed. After SAC is enabled, the device forwarding performance will be greatly affected if there are old devices on the network.
Context
The SAC configuration includes application identification and FPI.
- The application identification function identifies an application based on Layer 4 to Layer 7 information (such as RTP) in packets, and implements refined QoS policy control based on the classification results.
- The First Packet Identification (FPI) function identifies an application based on the first packet of an application.
The differences between application identification and FPI are as follows: SA identifies an application based on multiple packets of the application, while FPI identifies an application based on the first packet of the application.
Procedure
- Choose from the main menu.
- Click the SAC Configuration tab to view the SAC configuration.
- Click
next to Application identification or FPI in the Operation column to update the application identification or FPI configuration.
The operations for updating the application identification and FPI configurations are the same. The following configuration uses application identification as an example.
- Set Configuration to enable or disable application identification as needed.
- Set Application scope. This parameter specifies the sites where the application identification setting takes effect.
- When Application scope is set to All, the application identification setting takes effect at all sites, including the currently activated sites and sites that will be activated subsequently.
- If Application scope is set to Customized, the application identification setting takes effect only at the activated sites in the Selected Sites area.
EVPN mode:
- Click OK.
Checking Predefined Applications
iMaster NCE-Campus can identify common predefined applications using the built-in application signature database. To view applications predefined on iMaster NCE-Campus, perform the following operations:
Procedure
- Choose from the main menu.
- In the navigation pane, select an SA signature database, and click a category. All predefined applications in the category are displayed on the right of the page.
- The SA_H30071000 (6000+) or SA_H30071002 (500+) applications in SA signature database can be delivered to all devices.
- Predefined applications include two types: SA and FPI.
(Optional) Creating a Customized Application
Context
When predefined applications cannot meet the requirement, you can define a new application according to characteristics of the application.
The types of customized applications include first packet identification and service awareness identification, among which the former one is preferred. If an application cannot be identified through first packet identification, service awareness identification is used. Table 6-397 lists the methods of identifying customized applications.
Customized Application Type |
Method of Identifying Applications |
---|---|
Application that is identified based on the first packet |
3-tuple information: An application is identified based on the server address, protocol type, and fixed port number. |
Application that is identified by service awareness |
Keyword: An application is identified based on the server address, protocol type, and unfixed port number. |
3-tuple information and keyword: An application is identified through the server using the same port number to provide two or more services. |
- The number of customized applications cannot exceed the minimum number of customized applications supported by any device on the tenant network.
- If an application packet matches rules of multiple customized applications, the customized application that is delivered first takes effect. That is, the application configured first takes effect.
- In predefined applications, the application signature database does not include applications of enterprises' self-built servers, such as Outlook and Office365 deployed on enterprise self-built servers. If such applications need to be identified, customized applications need to be configured.
Procedure
- Choose from the main menu.
- Click Create to create a customized application.
- Set Name to a customized application name.
- Select the application group to which the customized application belongs.
- Click Create and configure rules for the customized application.
- Click OK. The matching rule is configured.
- Click OK. The customized application is configured.
Follow-up Procedure
Function |
Operation Scenario and Constraint |
Procedure |
---|---|---|
Viewing details about a customized application |
You can view detailed information about a customized application. |
|
Modifying a customized application |
You cannot modify Application Name of a customized application that is being referenced by an application group. |
|
Cloning a customized application |
You can quickly create a customized application by simply modifying an existing customized application. |
|
Deleting a customized application |
You cannot delete a customized application that is being referenced by an application group. |
|
Parameter Description
Parameter |
Description |
||
---|---|---|---|
Name |
Name of a user-defined application. |
||
Description |
Description of a user-defined application's function. |
||
Application group |
Application group. You can define an application and add it to an existing application group, or define an application group and add applications to it. |
||
Rule |
Name |
Name of a rule defined for identifying application packets. A rule contains the protocol number and port number used by an application, and other basic attributes. |
|
Description |
Description of a rule. |
||
Destination IP |
Destination IP address of an application packet. In most cases, the IP address of an application server is a fixed public IP address. This allows the system to identify the application packets based on a specified destination IP address. |
||
Port number |
Destination port number of an application packet. |
||
Protocol |
Transport layer protocol type of a user-defined application rule, which can be All, TCP, or UDP. |
||
Signature |
Signature |
Signature information. Data packets of some applications contain the same character string, which is regarded as a signature. |
|
Context |
You can select the packet- or flow-based mode for signature identification:
|
||
Direction |
Direction of packets to be identified. You can configure a rule to identify the signatures only in request or response packets, or in both of them. |
||
Plain-text String |
Signature string, which is case-sensitive. |
Creating a Customized Application Group
When configuring policies, you need to select an application group before selecting an application. When creating an application group, you need to add predefined or customized applications to the customized application group.
Prerequisites
A customized application has been created. For details, see (Optional) Creating a Customized Application.
Procedure
- Choose from the main menu.
- Click Create.
- On the Applications Group page, set parameters for the customized application group.
Set the name of the application group, select the SA signature database, and add predefined or customized applications to the application group.
- The SA_H30071000 (6000+) or SA_H30071002 (500+) applications in SA signature database can be delivered to corresponding devices. For details, see the description of Related Product Versions in the release notes released with the product.
- Predefined applications include two types: SA and FPI.
- When configuring an application group, ensure that the signature database of the same version is deployed on devices under a tenant. Otherwise, the application group configuration may fail to be delivered.
- After the signature database of iMaster NCE-Campus is upgraded, discarded pre-defined applications will be deleted from application groups. When the signature database on devices at a site is upgraded, not only discarded pre-defined applications will be deleted from application groups, but also the changes will synchronized to all devices of the tenant.
- Click OK.
Follow-up Procedure
Function |
Operation Scenario and Constraint |
Procedure |
---|---|---|
Viewing details about an application group |
You can view detailed information about an application group. |
|
Modifying an application group |
You cannot modify the name of a customized application that is being referenced by a traffic classifier template or application quality monitoring. |
|
Deleting an application group |
You cannot delete a customized application that is being referenced by a traffic classifier template or application quality monitoring. |
|
Parameter Description
Parameter |
Description |
||
---|---|---|---|
Name |
Name of an application group. |
||
Description |
Description of an application, for example, video application software or social application software. |
||
Applications |
Predefined applications |
SA signature database |
SA signature database. Before selecting applications for FPI and SA, you need to select an SA signature database. There are two available signature databases: SA_H30071000 (6000+) and SA_H30071002 (500+). The numbers in parentheses represent the numbers of applications contained in the database. For example, SA_H30071000 (6000+) contains more than 6000 applications, while SA_H30071002 (500+) contains more than 500 applications. The options for FPI and SA vary according to the signature database. |
FPI |
Predefined applications for FPI. You can click Edit, select predefined applications, and add them to an application group. |
||
SA |
Predefined applications for SA. You can click Edit, select predefined applications, and add them to an application group. FPI has higher requirements on packets than SA, so SA can identify more application. Against this backdrop. FPI applications are a subset of SA applications. |
||
Customized Applications |
User-defined application. You need to click Edit and select a configured user-defined application. |
Configuring a Traffic Policy Template
When configuring a traffic policy, you need to use the created traffic classifier template and effective time template.
Creating a Traffic Classifier Template
A traffic classifier defines a group of traffic matching rules to classify packets.
You can configure a traffic classifier template to classify packets. This ensures that the device processes packets matching the same rules in the same way.
Prerequisites
If an application group is configured in the traffic classifier, you need to create the application group in advance. For details, see Creating a Customized Application Group.
Procedure
- Choose from the main menu.
- Click Traffic Classifier Template, and click Create to create a traffic classifier template.
- Enter a traffic classifier name.
- In the Operator area, set the relationship between L3 ACL, Application groups, and Advance settings rules to And or Or.
- In the L3 ACL area, click Create to define multiple ACL rules.
- In the Application groups area, select the application to which data flows belong.
- In the Advanced settings area, set VLAN ID, 802.1P, Source MAC address, Destination MAC address, and L2 protocol to classify data flows.
- Click OK.
Follow-up Procedure
Function |
Operation Scenario and Constraint |
Procedure |
---|---|---|
Modifying a traffic classifier template |
The traffic classifier template referenced by a policy cannot be modified. Before modifying a traffic classifier template, you need to delete the traffic policy that is applied to the traffic classifier template or unbind the traffic classifier template from the traffic policy. |
On the Traffic Classifier Template page, click |
Deleting a traffic classifier template |
The traffic classifier template referenced by a policy cannot be deleted. Before deleting a traffic classifier template, you need to delete the traffic policy that is applied to the traffic classifier template or unbind the traffic classifier template from the traffic policy. |
On the Traffic Classifier Template page, select the traffic classifier template to be deleted, and click |
Cloning a traffic classifier template |
You can quickly create a traffic classifier template by modifying an existing template. After you clone a traffic classifier template, the template exists only on iMaster NCE-Campus. To deliver the new policy to devices, you need to perform the Commit operation. |
On the Traffic Classifier Template page, select the traffic classifier template to be cloned, and click |
Parameter Description
Parameter |
Description |
||
---|---|---|---|
Traffic classifier name |
Name of a traffic classifier template |
||
Operator |
By default, the relationship between rules in a traffic classifier is AND. |
||
L3 ACL |
Priority |
ACL rule priority. Multiple Layer 3 ACL rules can be configured. Packets match the Layer 3 ACL rule with a higher priority first. |
|
Source IP |
Source IP address of the packet to be matched. If this parameter is not specified, packets with any source IP address are matched. |
||
Destination IP |
Destination IP address of the packet to be matched. If this parameter is not specified, packets with any destination IP address are matched. |
||
DSCP |
Differentiated Services Code Point (DSCP) value. The DSCP is a field in the IP header of a packet. It identifies the service class and priority of the packet to ensure the QoS level of the communication. |
||
Protocol |
Layer 3 protocol type of the packet to be matched.
|
||
Source Port |
Source port number of the packet to be matched. If this parameter is not specified, packets with any source port are matched. |
||
Destination Port |
Destination port number of the packet to be matched. If this parameter is not specified, packets with any destination port are matched. |
||
Application groups |
Application to which matched packets belong. Only an application group can be selected. Applications that are not added to an application group are not displayed, and you cannot select only some applications in an application group. Therefore, you need to plan application groups properly. You need to plan application groups properly. |
||
Advance |
VLAN ID |
Start VLAN lD |
Start VLAN ID in the outer tag of the VLAN packet to be matched. |
End VLAN lD |
End VLAN ID in the outer tag of the VLAN packet to be matched. End Vlan lD must be greater than Start Vlan lD. If End Vlan lD is not specified, only the packets carrying Start Vlan lD are matched. |
||
802.1P |
802.1P priority of the VLAN packet to be matched. |
||
Source MAC |
Source MAC address of the VLAN packet to be matched. |
||
Destination MAC |
Destination MAC address of the VLAN packet to be matched. |
||
L2-Protocol |
Layer 2 protocol type of the VLAN packet to be matched. Currently, ARP/IP/MPLS/RARP protocols and protocols with customized protocol numbers are supported. |
(Optional) Creating an Effective Time Template
By default, a traffic policy takes effect immediately after it is applied to a service module. If you want a traffic policy to take effect only in a certain period, you can define a time range and associate the time range with the traffic policy. Define and associate time ranges with traffic policies so that you can use time-based traffic policies to control services. For example, using a time-based traffic policy, enterprises can limit employees' access to the Internet during working hours and restrict the bandwidth for services such as P2P and downloading services in peak hours to avoid network congestion. The purpose of creating an effective time template is to define a time range during which a policy takes effect.
You can associate a time range with a traffic policy in either of the following modes:
- Periodic time range: defines a periodic time range based on days or weeks. The associated traffic policy takes effect at an interval of one week. For example, if the time range of a traffic policy is 8:00-12:00 per day or on Monday, the traffic policy takes effect at 8:00-12:00 per day or on every Monday.
- Absolute time range: defines a time range from YYYY/MM/DD hh:mm to YYYY/MM/DD hh:mm. The associated traffic policy takes effect only in this period.
Procedure
- Choose from the main menu.
- Click Effective Time Template, and click Create to create an effective time template.
- Set Template name to the name of the effective time template.
- Set Time type.
- If you set Time type to Weekly, set Every Week to a day on which the policy takes effect. Otherwise, skip this step.
- Set Start time and End time for the policy to take effect.
- Click OK.
Follow-up Procedure
Function |
Operation Scenario and Constraint |
Procedure |
---|---|---|
Modifying an effective time template |
Before modifying an effective time template, you need to delete the associated traffic policy or unbind the effective time template from the traffic policy. Otherwise, the effective time template cannot be modified. |
On the Validity Period Template page, click |
Deleting an effective time template |
Before deleting an effective time template, you need to delete the associated traffic policy or unbind the effective time template from the traffic policy. Otherwise, the effective time template cannot be deleted. |
On the Validity Period Template page, select the effective time template to be deleted, and click |
Parameter Description
Parameter |
Description |
---|---|
Template name |
Time range name. |
Time type |
|
Weekly |
Date on which the time range takes effect. This parameter is available only when Time type is set to Weekly. The value can be one day (Monday to Sunday) or any day-of-week combinations. |
Start time |
Start time when a traffic policy takes effect. |
End time |
End time when a traffic policy takes effect. |
Configuring an Internet Access Policy for a Site
If a site needs to access the Internet, you need to configure an Internet access policy for the site. Currently, two Internet access modes are supported: centralized and distributed. (That is, sites can be configured to access the Internet centrally or locally.) If both the centralized and distributed Internet access modes are configured for a site, the distributed Internet access mode (namely, local Internet access mode) is used preferentially.
Context
In EVPN tunnel mode, if the overlay topology is hierarchical, you can specify a global centralized Internet gateway and a regional centralized Internet gateway when configuring sites requiring centralized Internet access. If users require that Internet access traffic meet these requirements:
- Internet access traffic in an area is preferentially routed through the regional centralized Internet gateway.
- Internet access traffic across areas is preferentially routed through the global centralized Internet gateway.
Consider the following guidelines:
- It is recommended that the topology of an area be set to full-mesh mode.
As shown in the following figure, Area1 is in hub-spoke mode, Hub1 is a global centralized Internet gateway, and Spoke2 is a regional centralized Internet gateway. In this case, the Internet access traffic of Spoke1 is not forwarded to the Internet through Spoke2. Instead, the traffic passes through Hub1 and is directly routed to the Internet.
- It is recommended that an inter-area interconnection site be configured as a global centralized Internet gateway.
As shown in the following figure, Hub1 is an inter-area interconnection site and also the regional centralized Internet gateway of Area1. Spoke2 is a global centralized Internet gateway. The Internet access traffic of Spoke3 does not pass through Spoke2. Instead, the traffic is forwarded from Hub2 to Hub1 and then routed to the Internet directly.
Prerequisites
- Sites have been added. For details, see "Creating a Site" in Network Design.
- If a local Internet access policy is used by a site, WAN links must have been activated. For details, see "Configuring the Network Access Mode for a Site" in Network Design.
- A VN has been created and associated with a site. For details, see "Creating VNs in LAN-WAN Interconnection Scenario" in Virtual Network Management.
- An overlay topology has been configured. For details, see "Configuring an Overlay Topology" in Virtual Network Management.
- Traffic policy templates have been configured. For details, see Creating a Traffic Classifier Template.
Procedure
- Choose from the main menu.
- Click the Overlay tab.
- Set VN to the department that needs to access the Internet.
- Click the Site-to-Internet tab and configure an Internet access policy for the site.
- If centralized Internet access is required, perform the following operations:
In EVPN tunnel mode:
- Set Centralized Internet access to
.
- Click Create and configure a gateway for centralized Internet access.
- Set Area, Active Internet GW, and Standby Internet GW, and click
in the Operation column.
- Click Apply.
- Set Centralized Internet access to
- If local Internet access is required, perform the following operations:
- Set Local Internet Access to
.
- Click Create.
- On the Create page, select the site to which a local Internet access policy needs to be delivered.
You can select one or more sites for local Internet access.
- Click Next.
- Configure a local Internet access policy.
- Select a local Internet access policy.
If All is selected, the system does not create a PBR policy and applications access the Internet using default routes.
If By Application is selected, the system creates a PBR policy and delivers it to devices. Applications access the Internet according to the PBR policy.
- To activate a link, click
next to the link in the Operation column. The configured local Internet access policy takes effect only after a link is activated.
- If NAT is required for WAN links, enable NAT.
- Configure the priorities of WAN links.
- The local Internet access service and the overlay network share the bandwidth. They consume bandwidth randomly by default. To guarantee rated bandwidth for the local Internet access service, enable Bandwidth Allocation and set a bandwidth percentage.
- Configure Shared track IP address.
This parameter is configurable only when By Application is selected for the Internet access policy.
All sites use the shared track IP address. After Shared track IP address is enabled, the track IP addresses of site links do not take effect.
- Configure a track IP address for links.
The track IP address of links can be configured only when Shared track IP address is disabled. All links of a device need to be configured with the same track IP address.
- Select a traffic classifier template. The system will match application traffic and execute the PBR policy according to the selected template.
- Click Finish.
- Select a local Internet access policy.
- Click Apply.
- Set Local Internet Access to
Parameter Description
Parameter |
Description |
|||
---|---|---|---|---|
Centralized Internet access |
Centralized Internet access |
Centralized Internet access mode. The Internet access traffic from a branch site is diverted to the hub site, implementing Internet accesses through a unified egress. This Internet access mode helps you deploy an independent firewall and configure comprehensive security policies, facilitating security audit and access control. |
||
Internet GW (In EVPN tunnel mode) |
Area |
Area where the Internet gateway resides. There are two default areas: ALL and default.
|
||
Active Internet GW |
Active gateway for centralized Internet access in an area. |
|||
Standby Internet GW |
Standby gateway for centralized Internet access in an area. |
|||
Local Internet access |
Local Internet access |
Local Internet access mode. Traffic from a site is routed out of the local underlay network to quickly access the Internet. Compared with the Internet access in centralized mode, this mode has lower latency and provides better service experience. Therefore, this mode is suitable for sites with rich Internet connection resources (with large bandwidth and low latency) to access SaaS application services. |
||
Select Site |
Select Site |
Site that supports Internet access in local mode. NOTE:
For example, a tenant network has a hub site Hub1 and two branch sites Spoke1 and Spoke2. Hub1 is configured with the centralized Internet access mode, Spoke1 is configured with the local Internet access mode, and Spoke2 is not configured with any Internet access mode. The Internet access traffic from Hub1 is locally routed out. The Internet access traffic from Spoke1 is preferentially routed out from the local site. If the traffic fails to be routed out locally, the traffic is routed out through Hub1. The Internet access traffic from Spoke2 is routed out through Hub1. |
||
Configure Policy |
Policy |
Local Internet access policy:
|
||
Shared track IP address |
Destination IP address of an NQA test instance. This parameter is configurable only when Policy is set to Application. You can create an NQA test instance to send ICMP packets to check whether the destination IP address of a WAN link is reachable. A shared track IP address can be used by multiple sites. If a shared track IP is specified, the link track IP of a site does not take effect. |
|||
Site Template |
Template of the selected site. This parameter is just for display and does not need to be set. |
|||
WAN Link |
WAN link of the selected site. This parameter is just for display and does not need to be set. |
|||
NAT |
Whether to enable NAT on the WAN-side interface. If Internet access packets use private IP addresses, the gateway needs to translate the private IP addresses into public ones before forwarding these packets to the Internet. By default, Easy-IP is used. That is, source IP addresses of all Internet access packets are replaced with the IP address of the WAN-side interface, and the source port number is mapped to different ones. This ensures that the quintuple information about a port before NAT is in one-to-one mapping with that after NAT. |
|||
Link Priority |
Priority configured for a WAN link of a site. Service traffic is transmitted along WAN links selected in descending order of priority. PBRs support only primary and secondary links. If a site has three WAN links and Policy is set to by Application, only two WAN links with higher priorities take effect. If Policy is set to All, all of the three WAN links take effect. |
|||
Bandwidth Allocation |
Percentage of bandwidth permitted for a VPN to access the Internet over a WAN link. The base value is the total available bandwidth of the VPN on an interface. You can set this value under WAN Policy > Traffic Distribution. For example, the Internet access bandwidth of a site is 100 Mbit/s. After bandwidth allocation, VPN1 occupies 10% of the bandwidth, that is, 10 Mbit/s. If the percentage value is set to 40%, the bandwidth allocated for VPN1 to access the Internet is 4 Mbit/s, and the remaining 6 Mbit/s is used for mutual access between WAN sites. Note that mutual access traffic between WAN sites and traditional sites shares the bandwidth with the Internet access traffic. On the site mutual access page, the allocated bandwidth percentage is automatically changed to 40%. In addition, Internet access traffic is forwarded through Assured Forwarding (AF) queues by default. This ensures that, if the traffic requires more than the allocated bandwidth, it can occupy the remaining bandwidth. |
|||
Operation |
Operation for enabling or disabling a WAN link as the Internet access path. At least one WAN link must be enabled at a site. |
|||
Traffic Classifier Template (configured only when Policy is set to Application) |
Traffic classifier template. Packets matching the specified traffic classifier template access the Internet via a PBR. |
Configuring a Mutual-Access Policy for Traditional Sites
Prerequisites
- Sites have been added. For details, see "Creating a Site" in Network Design.
- Sites have been activated. For details, see "Configuring the Network Access Mode for a Site" in Network Design.
- A VN has been created and associated with a site. For details, see "Creating VNs in LAN-WAN Interconnection Scenario" in Virtual Network Management.
- An overlay topology has been configured. For details, see "Configuring an Overlay Topology" in Virtual Network Management.
- Traffic policy templates have been configured. For details, see Creating a Traffic Classifier Template.
Procedure
- Choose from the main menu.
- Click the Overlay tab.
- Set VN to the department that requires mutual access between traditional sites.
- Click the Site-to-Legacy Site tab.
- If centralized mutual access is required between traditional sites, perform the following operations:
- Set Centralized access to
.
- Click Create.
- On the Create page, select the sites that mutual-access traffic between traditional sites needs to pass through.
EVPN mode:
- Click Next. Specifies whether to enable the IGW function for the sites and set the role to Active or Standby.
- Click Next. In the Operation column, click
. Set a link priority and allocated bandwidth.
The local mutual access service and the overlay network share the bandwidth. They consume bandwidth randomly by default. To guarantee rated bandwidth for the local mutual access service, enable Bandwidth Allocation and set a bandwidth percentage.
- Click Finish.
- Set Centralized access to
- If distributed (local) mutual access is required between traditional sites, perform the following operations:
- Set Local Access to
.
- Click Create.
- On the Create page, select the sites that mutual-access traffic between traditional sites needs to pass through.
EVPN mode:
The selected sites requiring distributed mutual access can be different types.
- Click Next. Specifies whether to enable the IGW function for the sites.
- Click Next. To activate a link, click
next to the link in the Operation column. The configured local mutual access policy takes effect only after a link is activated.
- Set a link priority and allocated bandwidth.
The local mutual access service and the overlay network share the bandwidth. They consume bandwidth randomly by default. To guarantee rated bandwidth for the local mutual access service, enable Bandwidth Allocation and set a bandwidth percentage.
- Click Finish.
A site cannot be enabled with both centralized access and local access.
- Set Local Access to
- Click Apply Changes.
Parameter Description
Parameter |
Description |
||
---|---|---|---|
Centralized access |
Centralized access |
On the live network of enterprises, a large number of legacy devices and third-party devices do not support the WAN capability. Legacy branches need to be interconnected with the WAN sites for smooth evolution. Central access mode: All access traffic between WAN sites and legacy sites is transmitted to the central access site and then routed out in a unified manner. |
|
Select Site |
Select Site |
Site that supports centralized access. When you set this parameter, pay attention to the following constraints:
|
|
IGW |
Whether a site gateway functions as the gateway for legacy sites to access the Internet. That is, the Internet access traffic from legacy sites is transmitted to the Internet through WAN sites. |
||
Role |
Role of a site enabled with centralized access. The value can be Active or Standby. You can select a maximum of two sites enabled with centralized access, and at least one of them assumes the active role. If you select two sites, deploy them in active/standby mode. |
||
Configure Policy |
Site Template |
Template of the selected site. This parameter is just for display and does not need to be set. |
|
WAN Link |
WAN link of the selected site. This parameter is just for display and does not need to be set. |
||
Link Priority |
Priority configured for a WAN link of a site. The data traffic from WAN sites to legacy sites is transmitted along WAN links selected in descending order of priority. If the same priority is configured for different WAN links of a site, traffic is load balanced among the selected egress interfaces. NOTE:
You need to set the priority of routes advertised by the WAN-side links based on the link priority to ensure that the traffic from legacy sites to WAN sites is preferentially transmitted along high-priority links. |
||
Bandwidth Allocation |
Mutual access traffic and Internet access traffic share the bandwidth. For details, refer to the description about Bandwidth Allocation in Site-to-Internet. |
||
Operation |
Enable or disable a WAN link as the mutual access path. At least one WAN link must be enabled at a site. |
||
Local access |
Local access |
In local access mode, traffic from WAN sites is directly routed to legacy sites. |
|
Select Site |
Select Site |
Site that supports local access. NOTE:
By default, traffic between a WAN site and a legacy site is directly routed out from the local WAN site. If the link to the legacy network is faulty, the traffic traverses the overlay tunnel and then is routed out through the centralized access site. This improves the reliability of access between WAN sites and legacy sites. You can configure a routing policy on the WAN-side interface of the centralized access site so that the priority of the LAN-side routes of the WAN site advertised by the centralized access site is lower than that of the LAN-side routes advertised by the local site. In this way, the traffic from a legacy site to a WAN site is preferentially sent to the local site. |
|
IGW |
Whether a site gateway functions as the gateway for legacy sites to access the Internet. That is, the Internet access traffic from legacy sites is transmitted to the Internet through WAN sites. NOTE:
If both the central access gateway and local site are enabled as IGWs, configure a routing policy on the WAN-side interface of the centralized access site so that the default priority of routes advertised by the centralized access site is lower than that of routes advertised by the local site. In this way, the Internet access traffic from legacy sites is preferentially sent to the local site. |
||
Configure Policy |
Site Template |
The meaning of this parameter is the same as that of Configure Policy in Centralized access. For details, see the preceding description. |
|
WAN Link |
|||
Link Priority |
|||
Bandwidth Allocation |
|||
Operation |
Configuring a Traffic Policy
You can configure a traffic policy to control traffic on overlay and underlay networks based on requirements.
Before configuring a traffic policy, configure the SA signature database server and update the SA signature database file if the SAC function needs to be enabled. Otherwise, applications cannot be properly identified and services are affected. For details, see Configuring the Signature Server as the System Administrator and Upgrading the Signature Database on Devices Managed by the Tenant Administrator.
Creating an ACL Policy for the Underlay Network
An ACL policy can be configured on the WAN side to prevent specific traffic from an external network from entering the CPE and internal network. If service packets on a WAN-side inbound interface at a site need to be blocked, configure an ACL policy for the underlay network.
Prerequisites
- Sites have been added. For details, see "Creating a Site" in Network Design.
- Sites have been activated. For details, see "Configuring the Network Access Mode for a Site" in Network Design.
- Traffic classifier templates have been configured. For details, see Creating a Traffic Classifier Template.
Procedure
- Choose from the main menu.
- Click the Underlay tab, and click ACL. The Policy Settings page is displayed by default.
- Click Create and configure an ACL-based blocking policy.
- Set Policy name to the name of the blocking policy to be configured.
- Select a traffic matching rule from the Traffic classifier template drop-down list.
- Under Policy Priority, configure a policy priority.
- Under Traffic filter, configure a traffic filter policy.
- Configure whether to apply the ACL policy in the interface's inbound or outbound direction next to Traffic direction.
- If you want the policy to take effect within a specified time range, select an effective time range template from the Effective time template drop-down list. If you want the policy to always take effect, skip this step.
- Click OK.
- Apply the ACL policy to sites.
- In the Operation column of the ACL policy, click
.
- On the Attach Sites page, select the sites to which the policy needs to be applied.
- Click Finish.
- In the Operation column of the ACL policy, click
- Deliver the ACL policy to the sites and set the execution start time of the policy.
- Select the ACL policy to be delivered.
- Click Commit and select Commit Selected or Commit All.
- On the Commit page, set the execution start time of the policy to Immediately or Schedule.
- Click OK.
Follow-up Procedure
After performing any of the following operations, you need to perform the Commit operation for them to take effect at the sites.
Function |
Operation Scenario and Constraint |
Procedure |
---|---|---|
Revoking the last operation on an ACL policy |
You can revoke the operation performed on a policy that is not delivered to sites, namely, a policy on which the Commit operation is not performed (Committed not displayed in the Status column). You cannot revoke the operation performed on a committed policy. The revoke function can only revoke the last operation performed on a policy. For example, you can use this function to revoke the modification, creation, and deletion of a policy. After you revoke the last operation performed on a policy, only the configuration of the policy is rolled back. That is, the operation takes effect only on iMaster NCE-Campus, and does not take effect on devices. |
On the ACL tab page, select the policy for which the last operation needs to be revoked, click Revoke, and select Revoke Selected. |
Deleting an ACL policy |
You can delete a policy regardless of whether it is delivered to sites. After you delete a policy, the policy is deleted only from iMaster NCE-Campus. To delete the policy from devices, you need to perform the Commit operation. |
On the ACL tab page, select the ACL policy to be deleted and click Delete. |
Modifying an ACL policy |
You can modify a policy regardless of whether it is delivered to sites. After you modify a policy, the modification takes effect only on iMaster NCE-Campus. To modify the policy on devices, you need to perform the Commit operation. |
|
Cloning an ACL policy |
You can clone an ACL policy. That is, you can quickly create a policy by modifying an existing policy. After you clone a policy, the policy exists only on iMaster NCE-Campus. To deliver the new policy to devices, you need to perform the Commit operation. |
|
Disabling/Enabling an ACL policy |
|
|
Binding an ACL policy in a site view |
You can bind a new policy to a site. |
|
Configuring policies in batches in a site view |
You can bind the policy that has been bound to a site to other sites to which no policy is bound so that different sites share the same policy. |
|
Committing all the data in a site view |
You can commit all the policies of a site. |
|
Revoking all the data in a site view |
You can revoke all the policies of a site. |
|
Parameter Description
Parameter |
Description |
|
---|---|---|
Policy name |
ACL name. |
|
Traffic classifier template |
Traffic classifier template. The ACL specified by Policy name is applied to packets that match the traffic classifier template. The traffic classifier template that contains the application group cannot be selected for the Underlay ACL policy. Any traffic classifier template can be selected for an ACL on the overlay network. |
|
Policy priority |
ACL priority. When a packet is received, the CPE matches it against traffic classifier templates corresponding to ACLs in descending order of priorities. If a match is found, the action (traffic filtering) defined in the ACL is executed. If a mismatch is found, the CPE continues to match the packet against the traffic classifier template of the next ACL. |
|
Interface |
LAN |
LAN interfaces exist only on the overlay network. All LAN-side Layer 3 interfaces for which the ACL is enabled, including Layer 3 interfaces, sub-interfaces, and VLANIF interfaces. For LAN-side interfaces, inbound traffic is sent from the intranet user to the CPE, and outbound traffic is sent from the CPE to the intranet user. |
WAN |
WAN interfaces exist only on the underlay network. All WAN-side interfaces for which the ACL is enabled. For WAN-side interfaces, inbound traffic is sent from the WAN to the CPE, and outbound traffic is sent from the CPE to the WAN. |
|
Traffic filter |
|
|
Traffic direction |
Traffic direction. This parameter is set to Inbound by default. Traffic direction to which an ACL policy takes effect:
|
|
Effective time template |
Time range defined in the template. The ACL takes effect only in the defined time range. NOTE:
The relationship between all conditions is AND. That is, for the underlay network, an ACL takes effect as follows: For packets entering the specified interface of a specified site within the specified time range, the ACL denies the packets matching the traffic classifier template or permits only packets matching the traffic classifier template. |
Creating an ACL Policy for the Overlay Network
ACL policies can be configured on the LAN side to block specific traffic from external networks. If service packets on a LAN-side inbound interface at a site need to be blocked, configure an ACL policy for the overlay network.
Prerequisites
- Sites have been added. For details, see "Creating a Site" in Network Design.
- Sites have been activated. For details, see "Configuring the Network Access Mode for a Site" in Network Design.
- A VN has been created and associated with a site. For details, see "Creating VNs in LAN-WAN Interconnection Scenario" in Virtual Network Management.
- LAN information has been configured.
- Traffic policy templates have been configured. For details, see Creating a Traffic Classifier Template.
Procedure
- Choose from the main menu.
- Click the Overlay tab.
- Set VN to the department for which a traffic blocking policy needs to be configured.
- Click the ACL tab. The Policy Settings page is displayed by default.
- Click Create and configure an ACL-based blocking policy.
- Set Policy name to the name of the blocking policy to be configured.
- Select a traffic matching rule from the Traffic classifier template drop-down list.
- Under Policy Priority, configure a policy priority.
- Under Traffic filter, configure a traffic filter policy.
- Configure whether to apply the ACL policy in the interface's inbound or outbound direction next to Traffic direction.
- If you want the policy to take effect within a specified time range, select an effective time range template from the Effective time template drop-down list. If you want the policy to always take effect, skip this step.
- Click OK.
- Apply the ACL policy to sites.
- In the Operation column of the ACL policy, click
to add sites to which the policy needs to be applied.
- On the Attach Sites page, select the sites to which the policy needs to be applied.
- Click OK.
- In the Operation column of the ACL policy, click
- Deliver the ACL policy to the sites and set the execution start time of the policy.
- Select the ACL policy to be delivered.
- Click Commit and select Commit Selected or Commit All.
- On the Commit page, set the execution start time of the policy to Immediately or Schedule.
- Click OK.
Follow-up Procedure
After performing any of the following operations, you need to perform the Commit operation for them to take effect at the sites.
Function |
Operation Scenario and Constraint |
Procedure |
---|---|---|
Revoking the last operation on an ACL policy |
You can revoke the operation performed on a policy that is not delivered to sites, namely, a policy on which the Commit operation is not performed (Committed not displayed in the Status column). You cannot revoke the operation performed on a committed policy. The revoke function can only revoke the last operation perform ed on a policy. For example, you can use this function to revoke the modification, creation, and deletion of a policy. After you revoke the last operation performed on a policy, only the configuration of the policy is rolled back. That is, the operation takes effect only on iMaster NCE-Campus, and does not take effect on devices. |
On the ACL tab page, select the policy for which the last operation needs to be revoked, click Revoke, and select Revoke Selected. |
Deleting an ACL policy |
You can delete a policy regardless of whether it is delivered to sites. After you delete a policy, the policy is deleted only from iMaster NCE-Campus. To delete the policy from devices, you need to perform the Commit operation. |
On the ACL tab page, select the ACL policies to be deleted and click Delete. |
Modifying an ACL policy |
You can modify a policy regardless of whether it is delivered to sites. After you modify a policy, the modification takes effect only on iMaster NCE-Campus. To modify the policy on devices, you need to perform the Commit operation. |
|
Cloning an ACL policy |
You can clone an ACL policy. That is, you can quickly create a policy by modifying an existing policy. After you clone a policy, the policy exists only on iMaster NCE-Campus. To deliver the new policy to devices, you need to perform the Commit operation. |
|
Disabling/Enabling an ACL policy |
|
|
Binding an ACL policy in a site view |
You can bind a new policy to a site. |
|
Configuring policies in batches in a site view |
You can bind the policy that has been bound to a site to other sites to which no policy is bound so that different sites share the same policy. |
|
Committing all the data in a site view |
You can commit all the policies of a site. |
|
Revoking all the data in a site view |
You can revoke all the policies of a site. |
|
Parameter Description
Parameter |
Description |
|
---|---|---|
Policy name |
ACL name. |
|
Traffic classifier template |
Traffic classifier template. The ACL specified by Policy name is applied to packets that match the traffic classifier template. The traffic classifier template that contains the application group cannot be selected for the Underlay ACL policy. Any traffic classifier template can be selected for an ACL on the overlay network. |
|
Policy priority |
ACL priority. When a packet is received, the CPE matches it against traffic classifier templates corresponding to ACLs in descending order of priorities. If a match is found, the action (traffic filtering) defined in the ACL is executed. If a mismatch is found, the CPE continues to match the packet against the traffic classifier template of the next ACL. |
|
Interface |
LAN |
LAN interfaces exist only on the overlay network. All LAN-side Layer 3 interfaces for which the ACL is enabled, including Layer 3 interfaces, sub-interfaces, and VLANIF interfaces. For LAN-side interfaces, inbound traffic is sent from the intranet user to the CPE, and outbound traffic is sent from the CPE to the intranet user. |
WAN |
WAN interfaces exist only on the underlay network. All WAN-side interfaces for which the ACL is enabled. For WAN-side interfaces, inbound traffic is sent from the WAN to the CPE, and outbound traffic is sent from the CPE to the WAN. |
|
Traffic filter |
|
|
Traffic direction |
Traffic direction. This parameter is set to Inbound by default. Traffic direction to which an ACL policy takes effect:
|
|
Effective time template |
Time range defined in the template. The ACL takes effect only in the defined time range. NOTE:
The relationship between all conditions is AND. That is, for the underlay network, an ACL takes effect as follows: For packets entering the specified interface of a specified site within the specified time range, the ACL denies the packets matching the traffic classifier template or permits only packets matching the traffic classifier template. |
Creating a NAT Policy for the Underlay Network
Network Address Translation (NAT) translates the IP address in an IP packet header into another IP address. The NAT policy enables an internal network (private IP address) to access an external network (public IP address).
Context
You can configure a NAT policy on the Underlay tab page in the following scenarios:
- Internet access at sites: For the LAN-side traffic destined to the Internet, an egress device on the underlay translates LAN-side private IP address into a public IP address.
- External network access to intranet servers: A server providing external services, such as the file server, is deployed on the LAN side of a site. An egress device on the underlay translates the private IP address of the server into a public IP address to provide services. For Internet traffic proactively accessing intranet servers, the public address of the servers is translated into the actual private IP address.
- Mutual access between WAN sites and traditional sites: WAN sites and traditional sites may have duplicate addresses. Therefore, a static NAT policy must be configured on both WAN sites and traditional sites to implement mutual access, removing the need to change LAN-side terminal addresses.
If the access traffic is unidirectional, configure static NAT on the accessed party. For example, if a traditional site needs to access a WAN site but the WAN site does not need to communicate with the traditional site, configure static NAT only on the SD-WAN site.
Prerequisites
- Sites have been added. For details, see "Creating a Site" in Network Design.
- Sites have been activated. For details, see "Configuring the Network Access Mode for a Site" in Network Design.
Procedure
- Choose from the main menu.
- Click the Underlay tab.
- Click the NAT tab.
- In the Site area, select the site for which a NAT policy needs to be configured.
- Configure a dynamic NAT policy.
- Click Create.
- Enter information about the dynamic NAT policy to be configured, including the name of the interface to be bound, NAT mode, external IP address group, and match rules.
- Click Create under Match rules to configure a matching rule for the dynamic NAT policy.
- Click OK. The matching rule is configured.
- Click OK. The dynamic NAT policy is configured.
- Configure a static NAT policy.
- Click the Static NAT tab.
- Click Create.
- Enter information about the static NAT policy, including the name of the interface to be bound, internal IP address, and external IP address.
- Click OK.
Follow-up Procedure
Function |
Operation Scenario and Constraint |
Procedure |
---|---|---|
Deleting a NAT policy |
You can delete a NAT policy. |
On the NAT tab page, select the NAT policy to be deleted and click Delete. |
Modifying a NAT policy |
You can modify any NAT policy. |
|
Parameter Description
Parameter |
Description |
|
---|---|---|
Policy name |
Name of a dynamic NAT policy. |
|
Device |
Name of the CPE where the dynamic NAT policy needs to be deployed. |
|
Interface name |
WAN interface name of an underlay NAT policy. |
|
NAT mode |
NAT mode:
|
|
IP address group |
Start IP address |
IP address range after NAT. IP addresses in this range are public IP addresses in most cases. This parameter is configurable only when the NAT mode is set to PAT or No-PAT. The IP address range has the following restraints:
|
End IP address |
||
Match rules |
Match rules |
Matching rule. Multiple ACL rules can be defined in an ACL. For a packet matching an ACL rule, the CPE performs NAT on the source IP address and source port number. NOTE:
If two NAT policies are configured with the same ACL rule but with different IP address groups, the NAT policy configured first takes effect. |
Priority |
Priority of an ACL rule. The ACL rule with a higher priority is matched preferentially, and the action defined by this rule is performed. |
|
Action |
Action:
|
|
Protocol |
Protocol of the packets that can match the ACL rule. |
|
Source IP/Prefix Length |
Source IP address of the packets that can match the ACL rule. |
|
Destination IP/Prefix Length |
Destination IP address of the packets that can match the ACL rule. |
|
Source Port |
Source port number of the packets that can match the ACL rule. This parameter is available only when the protocol is set to TCP or UDP. |
|
Destination Port |
Destination port number of the packets that can match the ACL rule. This parameter is available only when the protocol is set to TCP or UDP. |
Parameter |
Description |
|
---|---|---|
Policy name |
Name of a static NAT policy. |
|
Device |
Name of the CPE where a static NAT policy needs to be deployed. |
|
Interface name |
WAN interface name of an underlay NAT policy. |
|
External IP |
IP address after NAT, which is a public IP address in most cases:
|
|
Internal IP |
IP address before NAT, which is a private IP address in most cases. |
|
Translation type |
|
|
Protocol type |
Protocol type, which is available only when the NAT type is set to protocol translation.
|
|
External port |
Port number after NAT. This parameter is available only when the NAT type is set to protocol translation and the protocol type is set to TCP or UDP. |
|
Internal port |
Port number before NAT. This parameter is available only when the NAT type is set to protocol translation and the protocol type is set to TCP or UDP. |
|
Advanced Settings |
Direction |
The default value is Bidirectional. You can specify whether to perform NAT in the direction of External to Internal or Internal to External as needed. For example, if an file server providing external services is deployed on the LAN side of a site and proactive access from Internet to intranet servers exists, you can set this value to Internal to External. |
Match rules |
Matching rule. If you need to specify the range of packets to be translated using static NAT, for example, if you require that NAT be performed on TCP packets with specified destination ports, you can configure an ACL rule to match the target packets. For details, see matching rules in dynamic NAT. |
Creating a NAT Policy for the Overlay Network
Context
On the Overlay tab page, you can configure a NAT policy for mutual access between WAN sites. Two SD-WAN sites may have duplicate addresses. In this case, static NAT needs to be configured on each WAN site to implement communication between the two WAN sites, removing the need to change LAN-side terminal addresses.
If access traffic is unidirectional, configure static NAT on the accessed party. For example, if site A needs to access site B but site B does not need to communicate with site A, configure static NAT only on site B.
Prerequisites
- Sites have been added. For details, see "Creating a Site" in Network Design.
- Sites have been activated. For details, see "Configuring the Network Access Mode for a Site" in Network Design.
- A VN has been created and associated with a site. For details, see "Creating VNs in LAN-WAN Interconnection Scenario" in Virtual Network Management.
- LAN information has been configured. For details, see "Configuring Network Access Parameters on the LAN Side" in Creating an Overlay Network in Site Configuration.
Procedure
- Choose from the main menu.
- Click the Overlay tab.
- In the VN area, select the department for which the NAT policy needs to be configured.
- Click the NAT tab.
- In the Site area, select the site for which a NAT policy needs to be configured.
- Configure a dynamic NAT policy.
- Click Create.
- Enter information about the dynamic NAT policy to be configured, including the name of the interface to be bound, NAT mode, external IP address group, and match rules.
- Click OK.
- Configure a static NAT policy.
- Click Create.
- Enter information about the static NAT policy, including the name of the interface to be bound, internal IP address, and external IP address.
- Click OK.
- A maximum of eight dynamic NAT policies can be configured on a device.
- The NAT policy on the overlay network does not support dual-gateway site configuration.
Follow-up Procedure
Function |
Operation Scenario and Constraint |
Procedure |
---|---|---|
Deleting a NAT policy |
You can delete a NAT policy. |
On the NAT tab page, select the NAT policy to be deleted and click Delete. |
Modifying a NAT policy |
You can modify any NAT policy. |
|
Parameters
Parameter |
Description |
||
---|---|---|---|
Dynamic NAT |
Policy name |
Name of a dynamic NAT policy. |
|
Device |
Name of the CPE where the dynamic NAT policy needs to be deployed. |
||
Interface name |
Interface on which the dynamic NAT policy needs to be enabled: For an overlay NAT policy, interfaces on the overlay tunnel or LAN-side interfaces can be selected. If this policy is configured on the overlay tunnel, NAT is performed on all tunnel interfaces. |
||
NAT mode |
NAT mode:
|
||
IP address group |
Start IP address |
IP address range after NAT. IP addresses in this range are public IP addresses in most cases. This parameter is configurable only when the NAT mode is set to PAT or No-PAT. The IP address range has the following restraints:
|
|
End IP address |
|||
Match rules |
Match rules |
Matching rule. Multiple ACL rules can be defined in an ACL. For a packet matching an ACL rule, the CPE performs NAT on the source IP address and source port number. NOTE:
If two NAT policies are configured with the same ACL rule but with different IP address groups, the NAT policy configured first takes effect. |
|
Priority |
Priority of an ACL rule. The ACL rule with a higher priority is matched preferentially, and the action defined by this rule is performed. |
||
Action |
Action:
|
||
Protocol |
Protocol of the packets that can match the ACL rule. |
||
Source IP address/Prefix length |
Source IP address of the packets that can match the ACL rule. |
||
Destination IP address/Prefix length |
Destination IP address of the packets that can match the ACL rule. |
||
Source port |
Source port number of the packets that can match the ACL rule. This parameter is available only when the protocol is set to TCP or UDP. |
||
Destination port |
Destination port number of the packets that can match the ACL rule. This parameter is available only when the protocol is set to TCP or UDP. |
||
Static NAT |
Policy name |
Name of a static NAT policy. |
|
Device |
Name of the CPE where a static NAT policy needs to be deployed. |
||
Interface name |
Interface on which a static NAT policy needs to be enabled: For an overlay NAT policy, interfaces on the overlay tunnel or LAN-side interfaces can be selected. If this policy is configured on the overlay tunnel, NAT is performed on all tunnel interfaces. |
||
External IP address |
IP address after NAT, which is a public IP address in most cases:
|
||
Internal IP address |
IP address before NAT, which is a private IP address in most cases. |
||
Translation type |
|
||
Protocol type |
Protocol type, which is available only when the NAT type is set to protocol translation.
|
||
External port |
Port number after NAT. This parameter is available only when the NAT type is set to protocol translation and the protocol type is set to TCP or UDP. |
||
Internal port |
Port number before NAT. This parameter is available only when the NAT type is set to protocol translation and the protocol type is set to TCP or UDP. |
||
Advanced Settings |
Direction |
The default value is Bidirectional. You can specify whether to perform NAT in the direction of External to Internal or Internal to External as needed. For example, if an file server providing external services is deployed on the LAN side of a site and proactive access from Internet to intranet servers exists, you can set this value to Internal to External. |
|
Match rules |
Matching rule. If you need to specify the range of packets to be translated using static NAT, for example, if you require that NAT be performed on TCP packets with specified destination ports, you can configure an ACL rule to match the target packets. For details, see matching rules in dynamic NAT. |
Creating an Intelligent Traffic Steering Policy for the Overlay Network
An intelligent traffic steering policy automatically switches traffic between active links if congestion occurs on a link or requirements of a specified application cannot be met. If active links are unavailable, traffic can be switched to the bypass link. This ensures the experience of key applications.
Prerequisites
- Sites have been added. For details, see "Creating a Site" in Network Design.
- Sites have been activated. For details, see "Configuring the Network Access Mode for a Site" in Network Design.
- A VN has been created and associated with a site. For details, see "Creating VNs in LAN-WAN Interconnection Scenario" in Virtual Network Management.
- Traffic policy templates have been configured. For details, see Creating a Traffic Classifier Template.
Procedure
- Choose from the main menu.
- Click the Overlay tab.
- Set VN to a department that requires intelligent traffic steering.
- Click the Intelligent Traffic Steering tab. The Policy Settings page is displayed by default.
- Click Create to configure an intelligent traffic steering policy.
In EVPN tunnel mode, the enhanced function is enabled by default. The configuration page is as follows:
- Set Policy name, Traffic classifier template, and Policy priority.
- In the Switchover condition area, select the four types of switchover conditions predefined in the system, or set Delay, Jitter, and Packet loss rate as needed. The system will evaluate the network health based on the thresholds, then determine whether traffic needs to be switched to another link.
- In the Transport Network Priority area, set the primary and secondary transport networks.
- When a link group contains more than three links, all traffic in the link group may be redistributed if one link changes (connected/disconnected, added, or deleted).
- Burst size of a link = Link bandwidth (kbps) x Maximum bandwidth usage x 12.5 x Application priority. The unit is bytes. A large amount of burst traffic may affect traffic steering.
- Link bandwidth: The value is the same as that of Uplink bandwidth or Downlink bandwidth in Configuring the Network Access Mode for a Site.
- Maximum bandwidth usage: The value is the same as that of Maximum bandwidth utilization in Setting Global Parameters.
- Application priority: The value is the same as that of Priority in 5.d.
- In the Advanced settings area, set Bandwidth conditions list, Priority and other parameters. The system determines whether to switch traffic to another link based on the current bandwidth usage, application priority, and switchover threshold, and then determines the application traffic to be switched based on the application priority.
- If you want the policy to always take effect, skip this step. If you want the policy to take effect within a specified time range, select an effective time range template from the Effective Time Template drop-down list.
- Click OK.
- Set Policy name, Traffic classifier template, and Policy priority.
- Apply the intelligent traffic steering policy to a site. The policy takes effect only at the selected site.
- In the Operation column of the intelligent traffic steering policy, click
to apply the policy to a site.
- On the Attach Sites page, select the sites to which the policy needs to be applied.
- Click OK.
- In the Operation column of the intelligent traffic steering policy, click
- Deliver the intelligent traffic steering policy to the site and set the execution start time of the policy.
- Select the intelligent traffic steering policy to be delivered.
- Click Commit and select Commit Selected or Commit All.
- On the Commit page, set the execution start time of the policy to Immediately or Schedule.
- Click OK.
Follow-up Procedure
After performing any of the following operations, you need to perform the Commit operation for them to take effect at the sites.
Function |
Operation Scenario and Constraint |
Procedure |
---|---|---|
Revoking the last operation performed on an intelligent traffic steering policy |
You can revoke the operation performed on a policy that is not delivered to sites, namely, a policy on which the Commit operation is not performed (Committed not displayed in the Status column). You cannot revoke the operation performed on a committed policy. The revoke function can only revoke the last operation performed on a policy. For example, you can use this function to revoke the modification, creation, and deletion of a policy. After you revoke the last operation performed on a policy, only the configuration of the policy is rolled back. That is, the operation takes effect only on iMaster NCE-Campus, and does not take effect on devices. |
On the Path Strategy tab page, select the intelligent traffic steering policy for which the last operation needs to be revoked, click Revoke, and then click Revoke Selected. |
Deleting an intelligent traffic steering policy |
You can delete a policy regardless of whether it is delivered to sites. After you delete a policy, the policy is deleted only from iMaster NCE-Campus. To delete the policy from devices, you need to perform the Commit operation. |
On the Path Strategy tab page, select the intelligent traffic steering policy to be deleted, and click Delete. |
Modifying an intelligent traffic steering policy |
You can modify a policy regardless of whether it is delivered to sites. After you modify a policy, the modification takes effect only on iMaster NCE-Campus. To modify the policy on devices, you need to perform the Commit operation. |
|
Cloning an intelligent traffic steering policy |
You can clone an intelligent traffic steering policy. That is, you can quickly create a policy by modifying an existing policy. After you clone a policy, the policy exists only on iMaster NCE-Campus. To deliver the new policy to devices, you need to perform the Commit operation. |
|
Disabling/Enabling an intelligent traffic steering policy |
|
|
Binding a new policy in a site view |
You can bind a new policy to a site. |
|
Configuring policies in batches in a site view |
You can bind the policy that has been bound to a site to other sites to which no policy is bound so that different sites share the same policy. |
|
Committing all the data in a site view |
You can commit all the policies of a site. |
|
Revoking all the data in a site view |
You can revoke all the policies of a site. |
|
Parameter Description
Parameter |
Description |
||
---|---|---|---|
Policy name |
Name of the intelligent traffic steering policy. |
||
Traffic classifier template |
Traffic classifier template. The intelligent traffic steering policy specified by Policy name is applied to packets that match the traffic classifier template. |
||
Policy priority |
Priority of the intelligent traffic steering policy. A data flow is matched against intelligent traffic steering policies in descending order of priority. |
||
Switchover condition |
Switchover condition |
Switchover conditions include delay, jitter, and packet loss rate. Different services have different requirements on link quality. For example, voice and real-time-video services have low tolerance for delay and packet loss rate. CPEs use the IP Flow Performance Measurement (IP FPM) to monitor the delay, jitter, and packet loss rate of application traffic in real time. If one of the switchover conditions exceeds the threshold, a link switchover is triggered. The system defines switchover conditions for Voice, Real-time-video, Low-latency-data, and Bulk-data services. You can directly select a service type, or customize switchover conditions based on service requirements. If this parameter value is set to Custom, you can set Delay, Jitter, and Packet loss rate as required. |
|
Delay (ms) |
Delay. |
||
Jitter (ms) |
Jitter. |
||
Packet loss rate (‰) |
Packet loss ratio threshold. |
||
Transport Network Priority |
Primary transport network list |
Priority |
Priority of the primary transport network. A numerically smaller value indicates a higher priority. The same priority can be configured for multiple transport networks. |
Transport Network |
You can configure multiple primary transport networks and specify their priorities. You can define the scheduling mode between different transport networks by setting Policy between TN.
|
||
Secondary transport network list |
Secondary transport network. Secondary transport networks provide escape links. Application traffic is switched to a secondary transport network only when the primary transport network fails. The priority of this application traffic decreases to the lowest on this network. This ensures that the traffic which uses the secondary transport network as the primary transport network is not affected. |
||
Advanced settings |
Switch upper threshold (%) |
In addition to delay, jitter, packet loss rate, you can select links to transmit application traffic based on link bandwidth usages. For example, if the bandwidth usage of a link reaches a specified threshold, new data flows of certain applications cannot be transmitted over this link, preventing application quality deterioration. You can configure a link selection policy by setting Switch upper threshold and Switch lower threshold:
NOTE:
When the route selection policy is load balancing, the switchover threshold must be within the range of the Maximum bandwidth utilization in the global configuration. |
|
Switch lower threshold (%) |
|||
Bandwidth conditions list |
Transport network |
Bandwidth conditions for a transport network. You can configure this parameter in either of the following scenarios:
NOTE:
The application bandwidth usage guides traffic steering based on applications, and the link bandwidth usage guides traffic steering based on links. It is recommended that the two bandwidth conditions be used separately. The way that traffic is steered when the application bandwidth usage exceeds the threshold is the same as that when the link bandwidth usage exceeds the threshold. |
|
Bandwidth upper limit (%) |
Link bandwidth usage. The value is the bandwidth occupied by all applications carried over links to the total bandwidth of the current transport network. |
||
Bandwidth lower limit (%) |
|||
Bandwidth upper limit (Mbit/s) |
Bandwidth upper limit and bandwidth lower limit of the numeral type. |
||
Bandwidth lower limit (Mbit/s) |
|||
Max. bandwidth for application (%) |
Application bandwidth usage. The value is the bandwidth occupied by applications specified in the traffic classifier template to the total bandwidth of the current transport network. |
||
Min. bandwidth for application (%) |
|||
Max. bandwidth for application (Mbit/s) |
Bandwidth upper limit for application and bandwidth lower limit for application of the numeral type. |
||
Min. bandwidth for application (Mbit/s) |
|||
Action when conditions not met |
Way that traffic is steered if the SLA of the primary transport network fails to meet the requirement or the bandwidth usage exceeds the threshold.
|
||
Switchover mode |
Whether traffic can be switched back to the original link if the quality of the original link recovers or the bandwidth usage of the original link decreases. The link switchover consists of the switchover between the primary transport networks with different priorities and the switchover between primary and secondary transport networks. NOTE:
If bandwidth conditions are configured and the bandwidth usage guides traffic steering, it is not recommended to set Switchover mode to pre-emptive. |
||
Inter-TN Policy |
The Prefer scheduling mode is used by default for transport networks with different priorities. You can also select the Load balance scheduling mode. |
||
Priority |
Application priority. A numerically smaller value has a higher priority. If service packets of different types are transmitted over the same link and packet congestion occurs, packets of high-priority applications are preferentially transmitted. This parameter is configurable only when Policy between TN is set to Loadbalance. |
||
Effective time Template |
Time range defined in the template. The intelligent traffic steering policy takes effect only in the defined time range. |
Creating a QoS Policy for the Overlay Network
To limit the bandwidths of applications or traffic, you need to configure a QoS policy.
The number of applications supported in a QoS policy varies with the device model.
Prerequisites
- A site has been configured. For details, see "Creating a Site" in Network Design.
- A site has been activated. For details, see "Configuring the Network Access Mode for a Site" in Network Design.
- A VN has been created and associated with a site. For details, see "Creating VNs in LAN-WAN Interconnection Scenario" in Virtual Network Management.
- A traffic policy template has been configured. For details, see Creating a Traffic Classifier Template.
Procedure
- Choose from the main menu.
- Click the Overlay tab.
- Set VN to the department for which a QoS policy needs to be configured.
- Click the QoS tab. The Policy Settings page is displayed by default.
- Click Create and configure a QoS policy.
- Set Policy name to the name of the QoS policy to be configured.
- Select a traffic matching rule from the Traffic Classifier Template drop-down list.
- Set Policy Priority.
- Determine whether to enable LAN-side or WAN-side interfaces.
If LAN-side or WAN-side interfaces need to be enabled, enable Queue priority, Traffic bandwidth limit, Re-mark DSCP, and Queue length, and set related parameters.
- If you want the policy to take effect within a specified time range, select an effective time template from the Effective Time Template drop-down list. If you want the policy to take effect permanently, skip this step.
- Click OK.
- Apply the QoS policy to sites.
- In the Operation column of the QoS policy, click
to add sites.
- On the Attach Sites page, select the sites to which the policy needs to be applied.
The policy can take effect only when branch sites are selected. For example, you can select the combination of hub and branch sites or the combination of aggregation and branch sites.
- Click OK.
- In the Operation column of the QoS policy, click
- Deliver the QoS policy to the sites and set the execution start time of the policy.
- Select the QoS policy to be delivered.
- Click Commit and select Commit Selected or Commit All.
- On the Commit page, set the execution start time of the policy to Immediately or Schedule.
- Click OK.
Follow-up Procedure
After performing any of the following operations, you need to perform the Commit operation for them to take effect at the sites.
Function |
Operation Scenario and Constraint |
Procedure |
---|---|---|
Revoking the last operation on a QoS policy |
You can revoke the operation performed on a policy that is not delivered to sites, namely, a policy on which the Commit operation is not performed (Committed not displayed in the Status column). You cannot revoke the operation performed on a committed policy. The revoke function can only revoke the last operation performed on a policy. For example, you can use this function to revoke the modification, creation, and deletion of a policy. After you revoke the last operation performed on a policy, only the configuration of the policy is rolled back. That is, the operation takes effect only on iMaster NCE-Campus, and does not take effect on devices. |
On the QoS tab page, select the policy for which the last operation needs to be revoked, click Revoke, and select Revoke Selected. |
Deleting a QoS policy |
You can delete a policy regardless of whether it is delivered to sites. After you delete a policy, the policy is deleted only from iMaster NCE-Campus. To delete the policy from devices, you need to perform the Commit operation. |
On the QoS tab page, select the QoS policy to be deleted and click Delete. |
Modifying a QoS policy |
You can modify a policy regardless of whether it is delivered to sites. After you modify a policy, the modification takes effect only on iMaster NCE-Campus. To modify the policy on devices, you need to perform the Commit operation. |
|
Cloning a QoS policy |
You can clone a QoS policy. That is, you can quickly create a policy by modifying an existing policy. After you clone a policy, the policy exists only on iMaster NCE-Campus. To deliver the new policy to devices, you need to perform the Commit operation. |
|
Disabling/Enabling a QoS policy |
|
|
Binding a new policy in a site view |
You can bind a new policy to a site. |
|
Configuring policies in batches in the site view |
You can bind the policy that has been bound to a site to other sites to which no policy is bound so that different sites share the same policy. |
|
Committing all policies in the site view |
You can commit all policies bound to a site. |
|
Revoking all data in the site view |
You can revoke all policies bound to a site. |
|
Parameter Description
Parameter |
Description |
||
---|---|---|---|
Policy name |
QoS policy name. Currently, a QoS policy can be applied only to the outbound direction of a WAN interface. |
||
Traffic Classifier Template |
Traffic classifier template. The QoS policy specified by Policy name is applied to packets that match the traffic classifier template. |
||
Policy Priority |
QoS policy priority. |
||
LAN |
LAN Re-mark DSCP |
DSCP priority of IP packets. The value is in the range from 0 to 63. A larger value indicates a higher priority. If LAN is enabled, the CPE sets the DSCP field in the IP header of packets encapsulated in the overlay tunnel to the value of this parameter. |
|
LAN Statistics |
Enable the traffic statistics function on the LAN port. After traffic statistics collection is enabled, you can view statistics on the CPE. |
||
WAN |
Queue Priority |
Queue Priority |
Queue priority. You are advised to enable Queue Priority for key applications that need to be guaranteed. When Queue Priority is enabled, a CPE automatically sets queue types for identified packets based on the defined queue priorities. |
Priority Level |
QoS priority. When network congestion occurs, the system preferentially transmits packets of higher-priority applications. This parameter is available only when Queue Priority is enabled. The following QoS priorities are supported:
|
||
Guaranteed bandwidth |
Guaranteed bandwidth. This parameter is available only when Queue Priority is enabled. For AF and EF queues, the guaranteed bandwidth is the minimum bandwidth that can be guaranteed. If traffic exceeds the guaranteed bandwidth, the available bandwidth can be preempted. LLQ queues do not preempt the available bandwidth, and the guaranteed bandwidth is the maximum bandwidth that can be guaranteed. As a result, if traffic exceeds the guaranteed bandwidth, the excess traffic is discarded. This parameter can be set to a specific bandwidth value or a percentage to the available bandwidth for a department (VPN) on an interface. If this parameter is set to a specific value, it cannot exceed the available bandwidth for a department. For example, if the bandwidth of a WAN interface is 100 Mbit/s and the bandwidth available to VPN1 is 50 Mbit/s, value 20% of this parameter indicates that packets matching the traffic classifier can occupy 10 Mbit/s bandwidth (50 Mbit/s x 20%). |
||
Traffic bandwidth limit |
Traffic bandwidth limit |
Whether to limit the traffic bandwidth. After Traffic bandwidth limit is enabled, packets matching a certain rule are forwarded at a low delay. |
|
Limit type |
This parameter is available only when Traffic bandwidth limit is enabled. The following types are supported:
NOTE:
If Queue Priority is enabled and the priority is set to Highest or High, only Traffic policing can be selected. Due to restrictions on devices, if the queue ef (high priority) and queue llq (highest priority) commands are configured in a traffic behavior, the gts command for configuring traffic shaping cannot be configured in the traffic behavior. |
||
Bandwidth limit |
Bandwidth limit. When traffic exceeds the limit specified by this parameter, the excess traffic is cached and sent later (if traffic shaping is configured) or directly discarded (if traffic policing is configured). Theoretically, the value of bandwidth limit must be greater than that of Guaranteed bandwidth. This parameter is available only when Traffic bandwidth limit is enabled. |
||
Re-Mark DSCP |
If this option is enabled, you need to specify a value for the DSCP field. The CPE replaces the value of the DSCP field in the outer IP header with the specified value. DSCP priority of IP packets. When a packet arrives at a CPE, the CPE sets the DSCP field in the outer IP header of the packet to the value of this parameter. The value is in the range from 0 to 63. A larger value indicates a higher priority. The DSCP value in the following packets are listed in descending order of priority: voice packets, video packets, and data packets. |
||
Queue length |
Maximum length of a queue. This parameter is configurable only when Queue Priority is set to High or Medium. You can specify the maximum number of bytes that can be stored in a queue, the maximum number of packets that can be stored in a queue, or both of them. If both of them are specified, when the number of packets in a queue reaches the maximum value or the total number of bytes in a queue reaches the maximum value, the queue does not receive packets. |
||
Re-mark 802.1p |
Whether to re-mark the 802.1P priority of VLAN packets. A larger value indicates a higher priority. If a traffic policy is applied to the outbound direction on an interface, the CPE still processes outgoing packets based on the original priority but the downstream Layer 2 device processes the packets based on the re-marked priority. |
||
Statistics collection |
Whether to enable statistics collection. After this function is enabled, you can view traffic statistics on CPEs. |
||
Effective Time Template |
Time range defined in the template. The QoS policy takes effect only in the defined time range. |
Configuring the VAS Connection
Context
The VAS function applies when the centralized Internet access service is used and the centralized Internet access site is connected to the Internet through the WAN-side outbound interface. By default, Internet access traffic is directly routed out through the underlay network. After the VAS is enabled, Internet access traffic is diverted to a third-party security device (for example, a hardware firewall), processed by the firewall, and then routed out through the underlay network. The CPE connects to the firewall through the VAS connection function. The firewall functions as a centralized security gateway to protect traffic of the headquarters and branches, as shown in the following figure.
Traffic from a branch site enters the CPE at the headquarters from the WAN side. The CPE at the headquarters diverts the traffic to the firewall (ingress) according to the configured route. After security protection is performed on the firewall, the traffic is sent back to the CPE (egress) and then forwarded to the Internet through the CPE.
Prerequisites
- Sites have been created. For details, see "Creating a Site" in Network Design.
- Site WAN links have been configured. For details, see "Configuring the Network Access Mode for a Site" in Network Design.
- A VN has been created and associated with a site. For details, see "Creating VNs in LAN-WAN Interconnection Scenario" in Virtual Network Management.
Procedure
- Choose from the main menu.
- Click the Overlay tab.
- Set VN to the department for which a VAS policy needs to be configured.
- Click VAS Connection. In the Site list area, select a site.
- Click Create.
- On the Create VAS Connection page, configure VAS connection information.
- Click OK.
Parameter Description
Parameter |
Description |
|||
---|---|---|---|---|
Device |
Site device. In the single gateway scenario, there is only one site device. You can directly configure VAS connection on this device. In the dual-gateway scenario, the following situations may occur:
|
|||
Direction |
VAS connection direction. In a VPN, two VAS connections need to be configured for a site device. One is in the ingress direction and the other is in the egress direction.
NOTE:
|
|||
Description |
Description of VAS connection. |
|||
Interface Configuration |
Access type |
Access type of an interface. VLAN and L3 interfaces are supported. Currently, the vFW can be connected to site devices only through VLANs, and the value L3 Interface is reserved. The following parameters for interface configuration need to be configured when Access type is set to VLAN. |
||
VLAN ID |
ID of the VLAN used for Layer 2 communication between the vFW and site devices when Access type is set to VLAN. The system automatically creates VLANIF interfaces based on VLAN IDs. NOTE:
In each VPN, the ID of the VLAN used for communication between the devices at a site and the vFW must be unique. The VLAN ID in the ingress and egress directions cannot be the same. |
|||
Interface |
The options are Ingress and Egress. If this parameter is set to Ingress, you need to configure an ingress interface on the site device to connect to the ingress interface of the vFW in the ingress direction. If this parameter is set to Egress, you need to configure an egress interface on the site device to connect to the egress interface of the vFW in the egress direction. The interface type and port number of the physical interface used by the site device to connect to the vFW need to be the same as those of the interface created on the vFW. |
|||
TAG mode |
Whether to add VLAN tags to egress packets. |
|||
IP address |
IP address of a VLANIF interface. |
|||
Trust mode |
Type of the security domain. The options are Trust and Untrust. This parameter specifies whether the packets received on the interface belong to the trusted domain or untrusted domain. If this parameter is set to Untrust, the packets received on the interface need to be forwarded to the security policy module for processing. Currently, the interface is connected to the vFW created on the uCPE. The trust domain is recommended. |
|||
Route Configuration |
Route protocol |
Route protocol. OSPF and static routes are supported. |
||
Static Route |
Destination address/mask |
Destination network segment in the egress static route. For example, for Internet access traffic, you need to configure a static route in the ingress direction. The destination network segment is 0.0.0.0 and the next hop is the IP address of the ingress interface of the vFW. For the backhaul service traffic, you need to configure a static route in the egress direction. The destination network segment is the address segment of a branch site in a VPN, and the next hop is the IP address of the egress interface of the vFW. NOTE:
You need to configure corresponding static routes on the vFW through the vFW management system. |
||
Next-hop type |
Next-hop type of a static route. Currently, the next hop of a static route can only be set to a value in IP address format. |
|||
IP address |
IP address of the next hop. |
|||
Priority |
Priority of a static route. A smaller value indicates a higher priority. |
|||
Track |
Whether to associate a static route with an NQA test instance. |
|||
Target |
Destination address in a network quality analysis (NQA) test instance. If a static route is associated with an NQA test instance, only Internet Control Message Protocol (ICMP) test instances can be used to check whether there are reachable routes between the source and destination. |
|||
OSPF |
Process ID |
OSPF process ID. The OSPF process ID needs to be in the range from 60000 to 61000 for the OSPF routes planned for VAS connection. |
||
Default route advertisement |
Whether to advertise the default route to a common OSPF area. After this function is enabled, the device constantly advertises the default OSPF route. NOTICE:
By default, this function is disabled in the ingress direction and is enabled in the egress direction. You are advised to retain the default value. If another value is set, traffic may fail to be forwarded. |
|||
Interface Parameters |
Area ID |
OSPF area ID. |
||
Authentication Mode |
Authentication mode. OSPF packets must be authenticated before a neighbor relationship can be established. The authentication modes that can be used in an OSPF area are as follows:
NOTE:
The simple, MD5, and HMAC-MD5 authentication modes may pose potential security risks. As such, the HMAC-SHA256 authentication mode is recommended. |
|||
Encryption mode |
Encryption mode. This parameter is configurable when Authentication mode is set to Cryptographic. The options are MD5, HMAC-MD5, and HMAC-SHA256. MD5, and HMAC-MD5 authentication modes may pose potential security risks. As such, the HMAC-SHA256 authentication mode is recommended. |
|||
Key |
Key for cipher-text authentication on an interface. This parameter is configurable only when Authentication mode is set to Cryptographic. |
|||
Password |
Password for cipher-text authentication. This parameter is configurable only when Authentication mode is set to Simple or Cryptographic. |
Creating a QoS Policy (General Configuration)
To limit the bandwidth of applications or traffic, you need to configure a QoS policy. It is recommended that a QoS policy of the WAN type configured on the Common tab page be applied for service packets sent from LAN to WAN through the underlay network.
The amount of application data and the number of applications supported by QoS policies vary according to the device model.
Prerequisites
- A site has been configured. For details, see "Creating a Site" in Network Design.
- A site has been activated. For details, see "Configuring the Network Access Mode for a Site" in Network Design.
- A traffic policy template has been configured. For details, see Creating a Traffic Classifier Template.
Procedure
- Choose from the main menu.
- Click the Common tab. The QoS tab page is displayed by default.
- Select a site, click Create, and configure a QoS policy.
- For Policy name, set the name of the QoS policy.
- For Traffic classifier template, select a traffic matching rule.
- For Policy priority, configure a policy priority.
- For Device, select the device whose QoS policy needs to be configured.
- For Type, select the type of the interface for which the QoS policy needs to be configured.
- For Interface Name, select the name of the interface for which QoS policy needs to be configured.
- Enable Queue Priority, Traffic bandwidth limit, Re-mark DSCP, and Queue length, and set parameters as needed.
- If you want the policy to take effect within a specified time range, select an effective time template from the Effective time template drop-down list. If you want the policy to take effect permanently, skip this step.
- Click OK.
After the configuration is complete, the system automatically delivers the QoS policy to the device at the desired site.
Follow-up Procedure
Function |
Operation Scenario and Constraint |
Procedure |
---|---|---|
Deleting a QoS policy |
You can delete a policy regardless of whether it is delivered to sites. After you delete a policy, the policy is deleted only from iMaster NCE-Campus. To delete the policy from devices, you need to perform the Commit operation. |
On the QoS tab page, select the QoS policy to be deleted and click Delete. |
Modifying a QoS policy |
You can modify a policy regardless of whether it is delivered to sites. After you modify a policy, the modification takes effect only on iMaster NCE-Campus. To modify the policy on devices, you need to perform the Commit operation. |
|
Parameter Description
Parameter |
Description |
|
---|---|---|
Policy name |
QoS policy name. |
|
Traffic Classifier Template |
Traffic classifier template. The QoS policy specified by Policy name is applied to packets that match the traffic classifier template. |
|
Policy Priority |
QoS policy priority. |
|
Device |
Device to be configured with a QoS policy. |
|
Type |
Interface type. WAN interface and LAN interface are supported.
|
|
Interface Name |
Name of the interface to be configured. Currently, a QoS policy (mainly Queue Priority and Traffic bandwidth limit) can only be applied only to the outbound direction of WAN interfaces, whereas LAN interfaces can only be configured with Re-Mark DSCP. |
|
Traffic Direction |
Direction of traffic. This parameter is automatically set.
|
|
Queue Priority |
Queue Priority |
Queue priority. You are advised to enable Queue Priority for key applications that need to be guaranteed. When Queue Priority is enabled, a CPE automatically sets queue types for identified packets based on the defined queue priorities. This parameter is available only when Type is set to WAN. |
Priority Level |
QoS priority. When network congestion occurs, the system preferentially transmits packets of higher-priority applications. This parameter is available only when Queue Priority is enabled. The following QoS priorities are supported:
|
|
Guaranteed bandwidth |
Guaranteed bandwidth. This parameter is available only when Queue Priority is enabled. For AF and EF queues, the guaranteed bandwidth is the minimum bandwidth that can be guaranteed. If traffic exceeds the guaranteed bandwidth, the available bandwidth can be preempted. LLQ queues do not preempt the available bandwidth, and the guaranteed bandwidth is the maximum bandwidth that can be guaranteed. As a result, if traffic exceeds the guaranteed bandwidth, the excess traffic is discarded. This parameter can be set to a specific bandwidth value or a percentage to the available bandwidth for a department (VPN) on an interface. If this parameter is set to a specific value, it cannot exceed the available bandwidth for a department. For example, if the bandwidth of a WAN interface is 100 Mbit/s and the bandwidth available to VPN1 is 50 Mbit/s, value 20% of this parameter indicates that packets matching the traffic classifier can occupy 10 Mbit/s bandwidth (50 Mbit/s x 20%). |
|
Traffic bandwidth limit |
Traffic bandwidth limit |
Whether to limit the traffic bandwidth. After Traffic bandwidth limit is enabled, packets matching a certain rule are forwarded at a low delay. This parameter is available only when Type is set to WAN. |
Limit type |
This parameter is available only when Traffic bandwidth limit is enabled. The following types are supported:
If Queue Priority is enabled and the priority is set to Highest or High, only Traffic policing can be selected. |
|
Bandwidth limit |
Bandwidth limit. When traffic exceeds the limit specified by this parameter, the excess traffic is cached and sent later (if traffic shaping is configured) or directly discarded (if traffic policing is configured). Theoretically, the value of bandwidth limit must be greater than that of Guaranteed bandwidth. This parameter is available only when Traffic bandwidth limit is enabled. |
|
Re-Mark DSCP |
DSCP priority of IP packets. When a packet arrives at a CPE, the CPE sets the DSCP field in the outer IP header of the packet to the value of this parameter. The value is in the range from 0 to 63. A larger value indicates a higher priority. The DSCP value in the following packets is listed in descending order of priority: voice packets, video packets, and data packets. |
|
Queue length |
Maximum length of a queue. This parameter is available only when Type is set to WAN. This parameter is configurable only when Queue Priority is set to High or Medium. You can specify the maximum number of bytes that can be stored in a queue, the maximum number of packets that can be stored in a queue, or both of them. If both of them are specified, when the number of packets in a queue reaches the maximum value or the total number of bytes in a queue reaches the maximum value, the queue does not receive packets. |
|
Re-mark 802.1p |
Whether to re-mark the 802.1P priority of VLAN packets. This parameter is available only when Type is set to WAN. A larger value indicates a higher priority. If a traffic policy is applied to the outbound direction on an interface, the CPE still processes outgoing packets based on the original priority but the downstream Layer 2 device processes the packets based on the re-marked priority. |
|
Statistics collection |
Whether to enable statistics collection. After this function is enabled, you can view traffic statistics on CPEs. |
|
Effective Time Template |
Time range defined in the template. The QoS policy takes effect only in the defined time range. |
Configuring NAT ALG
You can configure NAT Application Level Gateway (ALG) to translate packet information of a certain application layer protocol. During the translation, specific information inside the payload of an IP packet is translated based on NAT status information, so that the application layer protocol can run across different ranges.
Currently, the NAT ALG function is applicable to the DNS, FTP, SIP, PPTP, and RTSP protocols.
Prerequisites
- Sites have been added. For details, see "Creating a Site" in Network Design.
- Sites have been activated. For details, see "Configuring the Network Access Mode for a Site" in Network Design.
- Traffic policy templates have been configured. For details, see Creating a Traffic Classifier Template.
Procedure
- Choose from the main menu.
- Click the Common tab.
- Click the NAT ALG tab. The NAT ALG tab page is displayed.
- Select a site and set whether to enable the NAT ALG function of each protocol.
- Click Apply.
Parameter Description
Parameter |
Description |
---|---|
dns |
After DNS is enabled, the following elements can be translated: IP and Port fields in a response packet. |
ftp |
After FTP is enabled, the following elements can be translated:
|
rtsp |
After RTSP is enabled, the following elements can be translated: Port field in a setup/reply OK packet. |
sip |
After SIP is enabled, the following elements can be translated:
|
pptp |
After PPTP is enabled, the following elements can be translated: There are two scenarios:
|
Connecting to a Third-Party Secure Cloud Gateway Policy
Context
The third-party secure cloud gateway policy applies to the local Internet access scenario. To enhance Internet access security, CPEs can be interconnected with a third-party secure cloud gateway, such as the Zscaler gateway and ForcePoint gateway, and CPEs through which service traffic specified by traffic classifier templates is transmitted can access the Internet through the gateway.
Currently, CPEs can connect to a third-party secure cloud gateway through GRE tunnels. To connect CPEs to a single gateway and one ISP, deploy two GRE tunnels in active/standby mode. To connect CPEs to dual gateways and dual ISPs, set up two pairs of active/standby GRE tunnels.
Prerequisites
- Sites have been added. For details, see "Creating a Site" in Network Design.
- Sites have been activated. For details, see "Configuring the Network Access Mode for a Site" in Network Design.
- Traffic classifier templates have been configured. For details, see Creating a Traffic Classifier Template.
Procedure
- Choose from the main menu.
- Click the Underlay tab.
- Click the Cloud Security tab.
- In the Site list area, select the site for which a cloud security policy needs to be configured.
- Click Create.
- Enter information about the cloud security policy, including tunnel information and packet fragmentation.
- Click OK.
- Click Apply Changes.
Follow-up Procedure
Function |
Operation Scenario and Constraint |
Procedure |
---|---|---|
Deleting a cloud security policy |
You can delete a cloud security policy. |
On the Cloud Security tab page, select the security policy to be deleted, and click Delete. |
Modifying a cloud security policy. |
You can modify any cloud security policy. |
|
Parameter Description
Parameter |
Description |
|
---|---|---|
Policy name |
Name of a cloud security policy. This policy enables interconnection between CPEs and cloud access security agents through a GRE tunnel, ensuring the security of accessing network applications. |
|
Traffic classifier template |
Type of a cloud security traffic classifier template. Packets matching this template are forwarded through a GRE tunnel. In the cloud security policy scenario, traffic classifier templates containing application groups cannot be selected. The destination IP address of a traffic classifier template is often set to the IP address of a cloud access security agent. |
|
Tunnel Information |
Device name (ESN) |
Name of a CPE connected to a cloud access security agent. |
WAN link |
WAN link of a CPE. A WAN link can carry an active GRE tunnel and a standby GRE tunnel. If the active GRE tunnel fails, the traffic is switched to the standby GRE tunnel for transmission. |
|
Active Tunnel |
GRE tunnel source IP address |
Source address of the active GRE tunnel. |
GRE tunnel destination IP address |
Destination IP address of the active GRE tunnel. |
|
Cloud gateway IP address |
IP address of the third-party secure cloud gateway connected to the GRE tunnel. |
|
GRE Key |
Key of the active GRE tunnel. You can configure a GRE tunnel key on both ends of a GRE tunnel to enhance security. This ensures that a device accepts packets sent from only valid tunnel interfaces and discards invalid packets. This parameter value must be the same as that of the GRE key of a cloud access security agent. |
|
GRE checksum |
Whether to enable end-to-end verification for encapsulated packets. |
|
Standby Tunnel |
GRE tunnel source IP address |
Source address of the standby GRE tunnel. |
GRE tunnel destination IP address |
Destination IP address of the standby GRE tunnel. |
|
Cloud gateway IP address |
IP address of the third-party secure cloud gateway connected to the GRE tunnel. |
|
GRE Key |
Key of the standby GRE tunnel. |
|
GRE checksum |
Whether to enable end-to-end verification for encapsulated packets. |
|
Packet Fragmentation |
MTU |
MTU on a tunnel interface. This parameter value takes effect on interfaces of both the active and standby GRE tunnels. |
MSS |
MSS of TCP packets on a tunnel interface. This parameter value takes effect on interfaces of both the active and standby GRE tunnels. |
|
Keepalive |
Period(s) |
Interval at which a GRE tunnel sends Keepalive packets. The default value is 5 seconds. The unreachable counter increments by 1 each time a Keepalive packet is sent. If the counter value reaches the configured value of Retry Times, the peer end is considered unreachable. This parameter value takes effect on both the active and standby GRE tunnels. |
Retries Times |
Number of times Keepalive packets are sent, after which the peer end of a GRE tunnel is considered unreachable. The default value is 3. This parameter value takes effect on both the active and standby GRE tunnels. |
Configuring VN Traffic Distribution
Overlay network traffic of departments is allocated at sites. If no traffic volume is specified, iMaster NCE-Campus evenly allocates traffic to each VN.
Context
The overlay network traffic is allocated to each VN based on physical interface bandwidth, that is, the uplink and downlink bandwidth specified for WAN interfaces. Then a certain proportion of bandwidth can be allocated to transmit traffic of each service in each department. For example, users can configure the proportion of bandwidth used to transmit Internet access traffic, and a QoS bandwidth policy is defined based on applications. The bandwidth that can be allocated to transmit service traffic is the department bandwidth.
Prerequisites
- Sites have been created. For details, see "Creating a Site" in Network Design.
- Site WAN links have been configured. For details, see "Configuring the Network Access Mode for a Site" in Network Design.
Procedure
- Choose from the main menu.
- Click Create.
- Set the traffic volume for each VN.
- Click Next.
- Select the target site.
- Click Finish.
Configuring a Security Policy
Creating a Network Security Policy
This section describes how to configure a URL filtering policy, firewall policy, and IPS policy.
Prerequisites
- Site deployment is complete.
- The network has been deployed.
Procedure
- Choose from the main menu.
When users need to access the Internet and a security policy is required, perform the following configurations.
- Click URL tab to create a URL security policy.
- Set VN to a department that requires a security policy.
- Click Create to create a security policy.
- Set the name of the security policy.
Set Policy name to the name of the security policy.
- To enable abnormal HTTP packet detection, configure a URL filtering policy.
- Set Policy Type to Black List or White List as needed.
- In Black list or White List, click Create and configure URLs of target networks.
- Set Enable pre-defined URL category to
.
- Set Predefined URL filter level to the URL filter level for the action.
- Click OK.
- Set the name of the security policy.
- Click Firewall tab to create a firewall policy.
- Set VN to a department that requires a security policy.
- Click Create to create a security policy.
- Set the name of the security policy.
Set Policy name to the name of the security policy.
- Set Internet-to-user default action to specify the default action to be performed on inbound packets. Generally, the default value is used.
- In Internet-to-user flow, configure a policy for filtering inbound packets.
- Set User-to-Internet Default Action to specify the default action for outbound packets. Generally, the default value is used.
- In User-to-Internet flow, configure a policy for filtering outbound packets.
- Set the name of the security policy.
- Click OK.
- Click the IPS tab to create an IPS security policy.Configure an IPS policy to analyze network traffic and detect intrusion behavior.
- Set VN to a department that requires a security policy.
- Click Create to create a security policy.
- Set the name of the security policy.
Set Policy name to the name of the security policy.
- Select the name of the security configuration file from the drop-down list on the right of IPS template. Click Details to view the control policy of the security configuration file.
- Set the name of the security policy.
- Click OK.
- Apply the security policy to sites.
- In the Operation column of the security policy, click
to add sites.
- On the Selected Sites page, select sites to which the policy is applied.
- Click OK.
- In the Operation column of the security policy, click
- Deliver the security policy to the sites and set the execution start time of the policy.
- Select the security policy to be delivered.
- Click Commit and select Commit Selected or Commit All.
- On the Commit page, set the execution start time of the policy to Immediately or Schedule.
- Click OK.
Follow-up Procedure
Function |
Operation Scenario and Constraint |
Procedure |
---|---|---|
Revoking a security policy |
You can revoke the operation performed on a policy that is not delivered to sites, namely, a policy on which the Commit operation is not operated (Committed not displayed in the Status column). You cannot revoke the operation performed on a committed policy. The revoke function can only revoke the last operation performed on a policy. For example, you can use this function to revoke the modification, creation, and deletion of a policy. After you revoke the last operation performed on a policy, only the configuration of the policy is rolled back. That is, the operation takes effect only on iMaster NCE-Campus, and does not take effect on devices. |
On the Security Policy tab page, select the policy on which the last operation performed needs to be revoked, click Revoke, and then click Revoke Selected. |
Deleting a security policy |
You can delete a policy regardless of whether it is delivered to sites. After you delete a policy, the policy is deleted only from iMaster NCE-Campus. To delete the policy from devices, you need to perform the Commit operation. |
On the Security Policy tab page, select the security policy to be deleted, and click Delete. |
Modifying a security policy |
You can modify a policy regardless of whether it is delivered to sites. After you modify a policy, the modification takes effect only on iMaster NCE-Campus. To modify the policy on devices, you need to perform the Commit operation. |
|
Cloning a security policy |
You can clone a security policy. That is, you can quickly create a policy by modifying an existing policy. After you clone a policy, the policy exists only on iMaster NCE-Campus. To deliver the new policy to devices, you need to perform the Commit operation. |
|
Disabling/Enabling a security policy |
|
|
Parameter Description
Parameter |
Description |
|||
---|---|---|---|---|
Policy name |
Name of a security policy. |
|||
Security Policy |
URL policies |
Policy Type |
Action taken after URL filtering. After the device queries a URL category matching an HTTP request, it processes the HTTP request according to the action taken for the URL category. Currently, the following actions are supported:
|
|
Black/White List |
URL filter list.
|
|||
Enable pre-defined URL category |
Whether to use the predefined URL category database to define the block action. A predefined URL category database is preset on CPEs before delivery. It contains more than 40 URL categories, and each category contains multiple URLs. |
|||
Predefined URL filter level |
Filter level. This parameter is available only when Enable pre-defined URL category is enabled. If actions are configured for each type of URL, the workload is heavy. To simplify user configurations, three filter levels are defined: high, medium, and low. If the three default filter levels do not meet your requirements, you can customize an action for each predefined application category. The following filter levels are supported:
|
|||
Firewall policies |
Internet-to-User default action |
Default action performed on inbound packets. The default action is taken for the data packets that do not match the inbound ACL. By default, all inbound packets are rejected. You can set the default action taken for inbound packets to permit. An inbound packet is sent from a low-priority zone to a high-priority zone. |
||
Internet-to-User flow |
Internet-to-User flow |
Inbound ACL. Multiple ACL rules can be defined in the ACL. |
||
Priority |
Priority of an ACL rule. The ACL rule with a higher priority is matched preferentially, and the action defined by this rule is performed. |
|||
Action |
Action:
|
|||
Protocol |
Protocol of the packets that can match the ACL rule. |
|||
Source IP |
Source IP address of the packets that can match an ACL rule. |
|||
Source Port |
Source port number of the packets that can match the ACL rule. |
|||
Destination IP |
Destination IP address of the packets that can match the ACL rule. |
|||
Destination Port |
Destination port number of the packets that can match the ACL rule. |
|||
User-to-Internet default action |
Default action performed on outbound packets. The default action is taken for the data packets that do not match the outbound ACL. By default, all outbound packets are allowed to pass through. You can set the default action taken for inbound packets to deny. An outbound packet is sent from a high-priority zone to a low-priority zone. |
|||
User-to-Internet flow |
User-to-Internet flow |
Outbound ACL. Multiple ACL rules can be defined in the ACL. |
||
Priority |
Priority of an ACL rule. The ACL rule with a higher priority is matched preferentially, and the action defined by this rule is performed. |
|||
Action |
Action:
|
|||
Protocol |
Protocol of the packets that can match the ACL rule. |
|||
Source IP |
Source IP address of the packets that can match the ACL rule. |
|||
Source Port |
Source port number of the packets that can match the ACL rule. |
|||
Destination IP |
Destination IP address of the packets that can match the ACL rule. |
|||
Destination Port |
Destination port number of the packets that can match the ACL rule. |
|||
IPS policies |
Security configuration files |
By default, iMaster NCE-Campus has multiple security configuration files for different application scenarios. The default security configuration files can be viewed or referenced by security policies. The following security configuration files are supported:
|
Checking the Policy Deployment Result
Context
During some operations for site deployment, network deployment, policy deployment, and maintenance, iMaster NCE-Campus needs to deliver configurations to sites. iMaster NCE-Campus needs to generate configurations before delivering them to devices.
Prerequisites
One or more of the following policies have been configured:
- ACL policy of the underlay network. For details, see Creating an ACL Policy for the Underlay Network.
- Traffic policy of the overlay network. For details, see Configuring a Traffic Policy.
- Security policy. For details, see Creating a Network Security Policy.
- Internet access policy of sites. For details, see Configuring an Internet Access Policy for a Site.
- Policy for mutual access between traditional sites. For details, see Configuring a Mutual-Access Policy for Traditional Sites.
Procedure
- Choose from the main menu. Select a site.
- Click the Generate Configuration tab. If Successful is displayed in the Device Configuration Status column for all records, policy deployment is successful.
If the value of Device Configuration Status is not Successful, rectify the fault according to "WAN Service Configuration Delivery Fails" in the Troubleshooting Guide.
Only the current configuration status (success or failure) is displayed, and the status will be displayed after a specified delay.
- Configuring Applications and Application Groups
- Configuring a Traffic Policy Template
- Configuring an Internet Access Policy for a Site
- Configuring a Mutual-Access Policy for Traditional Sites
- Configuring a Traffic Policy
- Creating an ACL Policy for the Underlay Network
- Creating an ACL Policy for the Overlay Network
- Creating a NAT Policy for the Underlay Network
- Creating a NAT Policy for the Overlay Network
- Creating an Intelligent Traffic Steering Policy for the Overlay Network
- Creating a QoS Policy for the Overlay Network
- Configuring the VAS Connection
- Creating a QoS Policy (General Configuration)
- Configuring NAT ALG
- Connecting to a Third-Party Secure Cloud Gateway Policy
- Configuring VN Traffic Distribution
- Configuring a Security Policy
- Checking the Policy Deployment Result