Configuring ACLs. ACL overview. ACL categories. ACL numbering and naming

Size: px
Start display at page:

Download "Configuring ACLs. ACL overview. ACL categories. ACL numbering and naming"

Transcription

1 Contents Configuring ACLs 1 ACL overview 1 ACL categories 1 ACL numbering and naming 1 Match order 2 ACL rule numbering 3 Implementing time-based ACL rules 3 IPv4 fragments filtering with ACLs 3 Flow templates 4 ACL application 4 ACL configuration task list 5 Configuring an ACL 5 Configuring a time range 5 Configuring a basic ACL 6 Configuring an advanced ACL 8 Configuring an Ethernet frame header ACL 10 Configuring a user-defined ACL 10 Copying an ACL 11 Configuring a flow template 12 Configuring an ACL rule length limit mode 13 Displaying and maintaining ACLs 13 ACL configuration examples 14 IPv4 ACL configuration example 14 IPv6 ACL configuration example 16 Flow template configuration example 17 ACL rule length limit mode configuration example 17 i

2 Configuring ACLs NOTE: Unless otherwise stated, ACLs refer to both IPv4 and IPv6 ACLs throughout this document. In this documentation, SPC cards refer to the cards prefixed with SPC, for example, SPC-GT48L. SPE cards refer to the cards prefixed with SPE, for example, SPE-1020-E-II. ACL overview An access control list (ACL) is a set of rules (or permit or deny statements) for identifying traffic based on criteria such as source IP address, destination IP address, and port number. ACLs are primarily used for packet filtering. A packet filter drops packets that match a deny rule and permits packets that match a permit rule. ACLs are also used by many modules, for example, QoS and IP routing, for traffic identification. ACL categories Category ACL number IP version Match criteria Basic ACLs 2000 to 2999 Advanced ACLs 3000 to 3999 IPv4 IPv6 IPv4 IPv6 Source IPv4 address Source IPv6 address Source IPv4 address, destination IPv4 address, protocols over IPv4, and other Layer 3 and Layer 4 header fields Source IPv6 address, destination IPv6 address, protocols over IPv6, and other Layer 3 and Layer 4 header fields Ethernet frame header ACLs 4000 to 4999 IPv4 and IPv6 Layer 2 header fields, such as source and destination MAC addresses, 802.1p priority, and link layer protocol type User-defined ACLs 5000 to 5999 IPv4 and IPv6 User specified matching patterns in protocol (for example, IP and MPLS) headers ACL numbering and naming Each ACL category has a unique range of ACL numbers. When creating an ACL, you must assign it a number for identification. In addition, you can assign the ACL a name for the ease of identification. After creating an ACL with a name, you cannot rename it or delete its name. For an Ethernet frame header, or user-defined ACL, the ACL number and name must be globally unique. For an IPv4 basic or advanced ACL, its ACL number and name must be unique among all IPv4 ACLs, and 1

3 for an IPv6 basic or advanced ACL, among all IPv6 ACLs. You can assign an IPv4 ACL the same number and name as an IPv6 ACL. Match order The rules in an ACL are sorted in certain order. When a packet matches a rule, the device stops the match process and performs the action defined in the rule. If an ACL contains overlapping or conflicting rules, the matching result and action to take depend on the rule order. The following ACL match orders are available: config Sorts ACL rules in ascending order of rule ID. A rule with a lower ID is matched before a rule with a higher ID. If you use this approach, check the rule content and order carefully. auto Sorts ACL rules in depth-first order. Depth-first ordering guarantees that any subset of a rule is always matched before the rule. Table 1 lists the sequence of tie breakers that depth-first ordering uses to sort rules for each type of ACL. NOTE: The match order of user-defined ACLs can only be config. Table 1 Sort ACL rules in depth-first order ACL category IPv4 basic ACL IPv4 advanced ACL IPv6 basic ACL IPv6 advanced ACL Ethernet frame header ACL Sequence of tie breakers 1. VPN instance 2. More 0s in the source IP address wildcard (more 0s means a narrower IP address range) 3. Smaller rule ID 1. VPN instance 2. Specific protocol type rather than IP (IP represents any protocol over IP) 3. More 0s in the source IP address wildcard mask 4. More 0s in the destination IP address wildcard 5. Narrower TCP/UDP service port number range 6. Smaller ID 7. VPN instance 8. Longer prefix for the source IP address (a longer prefix means a narrower IP address range) 9. Smaller ID 1. VPN instance 2. Specific protocol type rather than IP (IP represents any protocol over IPv6) 3. Longer prefix for the source IPv6 address 4. Longer prefix for the destination IPv6 address 5. Narrower TCP/UDP service port number range 6. Smaller ID 1. More 1s in the source MAC address mask (more 1s means a smaller MAC address) 2. More 1s in the destination MAC address mask 3. Smaller ID 2

4 NOTE: A wildcard mask, also called an inverse mask, is a 32-bit binary and represented in dotted decimal notation. In contrast to a network mask, the 0 bits in a wildcard mask represent 'do care' bits, and the 1 bits represent 'don t care' bits. If the 'do care' bits in an IP address are identical to the 'do care' bits in an IP address criterion, the IP address matches the criterion. All 'don t care' bits are ignored. The 0s and 1s in a wildcard mask can be noncontiguous. For example, is a valid wildcard mask. ACL rule numbering What is the ACL rule numbering step If you do not assign an ID to the rule you are creating, the system automatically assigns it a rule ID. The rule numbering step sets the increment by which the system automatically numbers rules. For example, the default ACL rule numbering step is 5. If you do not assign IDs to rules you are creating, they are numbered 0, 5, 10, 15, and so on. The wider the numbering step, the more rules you can insert between two rules. By introducing a gap between rules rather than contiguously numbering rules, you have the flexibility of inserting rules in an ACL. This feature is important for a config order ACL, where ACL rules are matched in ascending order of rule ID. Automatic rule numbering and renumbering The ID automatically assigned to an ACL rule takes the nearest higher multiple of the numbering step to the current highest rule ID, starting with 0. For example, if the numbering step is 5 (the default), and there are five ACL rules numbered 0, 5, 9, 10, and 12, the newly defined rule will be numbered 15. If the ACL does not contain any rule, the first rule will be numbered 0. Whenever the step changes, the rules are renumbered, starting from 0. For example, if there are five rules numbered 5, 10, 13, 15, and 20, changing the step from 5 to 2 causes the rules to be renumbered 0, 2, 4, 6 and 8. Implementing time-based ACL rules You can implement ACL rules based on the time of day by applying a time range to them. A time-based ACL rule takes effect only in any time periods specified by the time range. The following basic types of time range are available: Periodic time range Recurs periodically on a day or days of the week. Absolute time range Represents only a period of time and does not recur. You may apply a time range to ACL rules before or after you create it. However, the rules using the time range can take effect only after you define the time range. IPv4 fragments filtering with ACLs Traditional packet filtering matches only first fragments of IPv4 packets, and allows all subsequent non-first fragments to pass through. Attackers can fabricate non-first fragments to attack networks. To avoids the risks, the H3C ACL implementation: Filters all fragments by default, including non-first fragments. 3

5 Provides ACL-based firewalls with standard and exact match modes for matching ACLs that contain advanced attributes such as TCP/UDP port number and ICMP type. Standard match is the default mode. It considers only Layer 3 attributes. Exact match considers all header attributes defined in IPv4 ACL rules. For more information, see Security Configuration Guide. Flow templates Flow templates are sets of criteria based on header fields such as source IP address, destination IP address, source TCP port, and destination TCP port. Flow templates apply only to hardware-based ACLs. You use a flow template to limit the match criteria that can be applied to an interface. ACL rules that contain any criterion beyond the flow template on an interface cannot be assigned to hardware. There are default flow templates and user-defined templates, where a user-defined template can be basic or extended. By default, an interface uses the default flow template. ACL application You can use ACLs in QoS, packet-filter firewall, routing, and other technologies for identifying traffic. For examples of ACL application, see ACL configuration examples. 1. The inbound packet-filter firewall, policy-based routing (PBR), and QoS policy on an interface process an incoming packet as shown in Figure 1. Figure 1 Incoming packet processing procedure An incoming packet arrives Packet-filter firewall Match a deny rule? Yes Drop No PBR Match an ACL rule? No Yes Process the packet QoS policy 2. The outbound packet-filter firewall and QoS policy on an interface process an outgoing packet as shown in Figure 2. 4

6 Figure 2 Outgoing packet processing procedure An outgoing packet arrives Packet-filter firewall Drop deny rule Find a match? permit rule Forward No QoS policy For information about packet-filter firewall configuration, see Security Configuration Guide. For information about policy-based routing, see Layer 3 IP Routing Configuration Guide. For information about and QoS policy configuration, see the chapter " Configuring a QoS policy." ACL configuration task list Complete the following tasks to configure an ACL: Task Configuring a time range Configuring a basic ACL Configuring an advanced ACL Configuring an Ethernet frame header ACL Configuring a user-defined ACL Copying an IPv4 ACL Configuring a flow template Remarks Optional Applicable to IPv4 and IPv6 ACLs. Required Configure at least one task. Applicable to IPv4 and IPv6 ACLs. Optional Applicable to IPv4 and IPv6 ACLs. Optional Applicable to IPv4 and IPv6 ACLs. Configuring an ACL Configuring a time range To configure a time range: Step Command Remarks 1. Enter system view. system-view N/A 5

7 Step Command Remarks 2. Configure a time range. time-range time-range-name { start-time to end-time days [ from time1 date1 ] [ to time2 date2 ] from time1 date1 [ to time2 date2 ] to time2 date2 } By default, no time range exists. Repeat this command with the same time range name to create multiple statements for a time range. You can create multiple statements in a time range. The active period of a time range is calculated as follows: 1. Combining all periodic statements 2. Combining all absolute statements 3. Taking the intersection of the two statement sets as the active period of the time range You can create a maximum of 256 time ranges, each with a maximum of 32 periodic statements and 12 absolute statements. Configuring a basic ACL Configuring an IPv4 basic ACL IPv4 basic ACLs match packets based only on source IP addresses. To configure an IPv4 basic ACL: Step Command Remarks 1. Enter system view. system-view N/A 2. Create an IPv4 basic ACL and enter its view. 3. Configure a description for the IPv4 basic ACL. 4. Set the rule numbering step. 5. Create or edit a rule. 6. Configure or edit a rule description. acl number acl-number [ name acl-name ] [ match-order { auto config } ] description text step step-value rule [ rule-id ] { deny permit } [ counting fragment logging source { sour-addr sour-wildcard any } time-range time-range-name vpn-instance vpn-instance-name ] * rule rule-id comment text By default, no ACL exists. IPv4 basic ACLs are numbered in the range 2000 to You can use the acl name acl-name command to enter the view of a named IPv4 ACL. By default, an IPv4 basic ACL has no ACL description. The default setting is 5. By default, an IPv4 basic ACL does not contain any rule. To create or edit multiple rules, repeat this step. The logging keyword takes effect only when the module (for example, a packet-filter firewall) that uses the ACL supports logging. By default, an IPv4 ACL rule has no rule description. 6

8 Step Command Remarks 7. Enable rule match counting for the IPv4 basic ACL. hardware-count enable By default, rule match counting is disabled. Configuring an IPv6 basic ACL To configure an IPv6 basic ACL: Step Command Remarks 1. Enter system view. system-view N/A 2. Create an IPv6 basic ACL view and enter its view. 3. Configure a description for the IPv6 basic ACL. acl ipv6 number acl6-number [ name acl6-name ] [ match-order { auto config } ] description text By default, no ACL exists. IPv6 basic ACLs are numbered in the range 2000 to You can use the acl ipv6 name acl6-name command to enter the view of a named IPv6 ACL. By default, an IPv6 basic ACL has no ACL description. 4. Set the rule numbering step. step step-value The default setting is Create or edit a rule. 6. Configure or edit a rule description. 7. Enable rule match counting for the IPv6 basic ACL. rule [ rule-id ] { deny permit } [ counting fragment logging source { ipv6-address prefix-length ipv6-address/prefix-length any } time-range time-range-name vpn-instance vpn-instance-name ] * rule rule-id comment text hardware-count enable By default, an IPv6 basic ACL does not contain any rule. To create or edit multiple rules, repeat this step. The logging keyword takes effect only when the module (for example, a packet-filter firewall) using the ACL supports logging. By default, an IPv6 basic ACL rule has no rule description. By default, rule match counting is disabled. NOTE: When configuring IPv6 basic ACLs for a QoS policy that is to be applied to an SPC card, you must set the ACL rule length limit to 80 bytes. For more information about the ACL rule length limit, see ACL and QoS Command Reference. 7

9 Configuring an advanced ACL Configuring an IPv4 advanced ACL IPv4 advanced ACLs match packets based on source and destination IP addresses, protocols over IP, and other protocol header information, such as TCP/UDP source and destination port numbers, TCP flags, ICMP message types, and ICMP message codes. IPv4 advanced ACLs also allow you to filter packets based on these priority criteria: type of service (ToS), IP precedence, and differentiated services codepoint (DSCP) priority. Compared to IPv4 basic ACLs, IPv4 advanced ACLs allow more flexible and accurate filtering. To configure an IPv4 advanced ACL: Step Command Remarks 1. Enter system view. system-view N/A 2. Create an IPv4 advanced ACL and enter its view. 3. Configure a description for the IPv4 advanced ACL. acl number acl-number [ name acl-name ] [ match-order { auto config } ] description text By default, no ACL exists. IPv4 advanced ACLs are numbered in the range 3000 to You can use the acl name acl-name command to enter the view of a named IPv4 ACL. By default, an IPv4 advanced ACL has no ACL description. 4. Set the rule numbering step. step step-value The default setting is Create or edit a rule. 6. Configure or edit a rule description. rule [ rule-id ] { deny permit } protocol [ { { ack ack-value fin fin-value psh psh-value rst rst-value syn syn-value urg urg-value } * established } counting destination { dest-addr dest-wildcard any } destination-port operator port1 [ port2 ] dscp dscp fragment icmp-type { icmp-type [ icmp-code ] icmp-message } logging precedence precedence reflective source { sour-addr sour-wildcard any } source-port operator port1 [ port2 ] time-range time-range-name tos tos vpn-instance vpn-instance-name ] * rule rule-id comment text By default, an IPv4 advanced ACL does not contain any rule. To create or edit multiple rules, repeat this step. The logging keyword takes effect only when the module (for example, a packet-filter firewall) using the ACL supports logging. By default, an IPv4 advanced ACL rule has no rule description. 8

10 Step Command Remarks 7. Enable rule match counting for the IPv4 advanced ACL. hardware-count enable By default, rule match counting is disabled. Configuring an IPv6 advanced ACL IPv6 advanced ACLs match packets based on the source IPv6 address, destination IPv6 address, protocol carried over IPv6, and other protocol header fields such as the TCP/UDP source port number, TCP/UDP destination port number, ICMP message type, and ICMP message code. Compared to IPv6 basic ACLs, IPv6 advanced ACLs allow more flexible and accurate filtering. To configure an IPv6 advanced ACL: Step Command Remarks 1. Enter system view. system-view N/A 2. Create an IPv6 advanced ACL and enter its view. 3. Configure a description for the IPv6 advanced ACL. 4. Set the rule numbering step. 5. Create or edit a rule. 6. Configure or edit a rule description. 7. Enable rule match counting for the IPv6 advanced ACL. acl ipv6 number acl6-number [ name acl6-name ] [ match-order { auto config } ] description text step step-value rule [ rule-id ] { deny permit } protocol [ { { ack ack-value fin fin-value psh psh-value rst rst-value syn syn-value urg urg-value } * established } counting destination { dest dest-prefix dest/dest-prefix any } destination-port operator port1 [ port2 ] dscp dscp flow-label flow-label-value fragment icmp6-type { icmp6-type icmp6-code icmp6-message } logging source { source source-prefix source/source-prefix any } source-port operator port1 [ port2 ] time-range time-range-name vpn-instance vpn-instance-name ] * rule rule-id comment text hardware-count enable By default, no ACL exists. IPv6 advanced ACLs are numbered in the range 3000 to You can use the acl ipv6 name acl6-name command to enter the view of a named IPv6 ACL. By default, an IPv6 advanced ACL has no ACL description. The default setting is 5. By default IPv6 advanced ACL does not contain any rule. To create or edit multiple rules, repeat this step. The logging keyword takes effect only when the module (for example, a packet-filter firewall) using the ACL supports logging. By default, an IPv6 advanced ACL rule has no rule description. By default, rule match counting is disabled. 9

11 NOTE: When configuring IPv6 advanced ACLs for a QoS policy that is to be applied to an SPC card, you must set the ACL rule length limit to 80 bytes. For more information about the ACL rule length limit, see ACL and QoS Command Reference. Configuring an Ethernet frame header ACL Ethernet frame header ACLs, also called "Layer 2 ACLs," match packets based on Layer 2 protocol header fields such as source MAC address, destination MAC address, 802.1p priority (VLAN priority), and link layer protocol type. To configure an Ethernet frame header ACL: Step Command Remarks 1. Enter system view. system-view N/A 2. Create an Ethernet frame header ACL and enter its view. 3. Configure a description for the Ethernet frame header ACL. acl number acl-number [ name acl-name ] [ match-order { auto config } ] description text By default, no ACL exists. Ethernet frame header ACLs are numbered in the range 4000 to You can use the acl name acl-name command to enter the view of a named Ethernet frame header ACL. By default, an Ethernet frame header ACL has no ACL description. 4. Set the rule numbering step. step step-value The default setting is Create or edit a rule. 6. Configure or edit a rule description. 7. Enable rule match counting for the Ethernet frame header ACL. rule [ rule-id ] { deny permit } [ cos vlan-pri counting dest-mac dest-addr dest-mask { lsap lsap-type lsap-type-mask type protocol-type protocol-type-mask } source-mac sour-addr source-mask time-range time-range-name ] * rule rule-id comment text hardware-count enable By default, an Ethernet frame header ACL does not contain any rule. To create or edit multiple rules, repeat this step. By default, an Ethernet frame header ACL rule has no rule description. By default, rule match counting is disabled. Configuring a user-defined ACL 10

12 NOTE: This feature is available only on SPC cards. User-defined ACLs allow you to customize rules based on information in protocol headers such as the IP header. You can define a user-defined ACL to deny or permit packets in which a specific number of bytes after the specified offset (relative to the specified header), matches the specified match pattern after being ANDed with a match pattern mask. To configure a user-defined ACL: Step Command Remarks 1. Enter system view. system-view N/A 2. Set the ACL rule length limit acl mode { 3 4 } The default setting is 2. mode. 3. Create a user-defined ACL and enter its view. acl number acl-number [ name acl-name ] By default, no ACL exists, and the match order of a user-defined ACL is config. User-defined ACLs are numbered in the range 5000 to You can use the acl name acl-name command to enter the view of a user-defined ACL. 4. Configure a description for the user-defined ACL. 5. Create or edit a rule. 6. Configure or edit a rule description. 7. Enable rule match counting for the user-defined ACL. description text rule [ rule-id ] { deny permit } [ { { ipv4 ipv6 l2 l4 } rule-string rule-mask offset }&<1-8> ] [ counting time-range time-range-name ] * rule rule-id comment text hardware-count enable By default, a user-defined ACL has no ACL description. By default, a user-defined ACL does not contain any rule. To create or edit multiple rules, repeat this step. By default, a user-defined ACL rule has no rule description. By default, rule match counting is disabled. Copying an ACL You can create an ACL by copying an existing ACL. The new ACL has the same properties and content as the source ACL, but not the same ACL number and name. To successfully copy an ACL, make sure that: The destination ACL number is from the same category as the source ACL number. The source ACL already exists but the destination ACL does not. Copying an IPv4 ACL To copy an IPv4 ACL: 11

13 Step Command 1. Enter system view. system-view 2. Copy an existing IPv4 ACL to create a new IPv4 ACL. acl copy { source-acl-number name source-acl-name } to { dest-acl-number name dest-acl-name } Copying an IPv6 ACL To copy an IPv6 ACL: Step Command 1. Enter system view. system-view 2. Copy an existing IPv6 ACL to generate a new one of the same category. acl ipv6 copy { source-acl6-number name source-acl6-name } to { dest-acl6-number name dest-acl6-name } Configuring a flow template NOTE: This feature is available only on SPE cards. To create a flow template and apply it to an interface: Step Command Remarks 1. Enter system view. system-view N/A 2. Create a flow template. 3. Enter interface view or port group view. 4. Apply the flow template to the interface or port group. flow-template flow-template-name basic { customer-vlan-id dip dmac dport dscp ethernet-protocol fragments icmp-code icmp-type ip-precedence ip-protocol mpls-exp service-cos sip smac sport tcp-flag tos } * Enter interface view: interface interface-type interface-number Enter port group view: port-group manual port-group-name flow-template flow-template-name N/A N/A The default one applies by default. 12

14 NOTE: The user-defined flow template you are applying to an interface must already exist. You can apply only one user-defined flow template on an interface. The default flow template defines five fields: the source IP address, destination IP address, source port number, destination port number, and protocol type. When the length limit for the match criteria in an ACL rule is 18 bytes for an SPE card, available parameters of the default flow template are sip, dip, ip-protocol, sport, and dport. When the length limit for the match criteria in an ACL rule is 36 bytes for an SPE card, available parameters of the default flow template are sip, dip, ip-protocol, sport, dport, icmp-code, icmp-type, tos, dscp, ip-precedence, mpls-exp, tcp-flag, and fragment. Configuring an ACL rule length limit mode The ACL rule length limit mode defines the length of the fields available for an ACL flow template. When a large number of ACL rules are required on the router, you may need to change this mode. To configure an ACL rule length limit mode: Step Command Remarks 1. Enter system view. system-view N/A 2. Set the ACL rule length limit mode. acl mode { } The default setting is 2. NOTE: The limit mode setting is saved automatically, but it takes effect only after you restart your router. The limit mode setting does not take effect on an SPE card with an ATM subcard. The limit mode setting does not take effect for IPv6 ACLs on an SPE card. When configuring IPv6 ACLs for a QoS policy that is to be applied to an SPC card, you must set the ACL rule length limit to 80 bytes. For more information about the ACL rule length limit, see ACL and QoS Command Reference. Displaying and maintaining ACLs Task Command Remarks Display configuration and match statistics for one or all IPv4 ACLs. Display configuration and match statistics for one or all IPv6 ACLs. Display the ACL rule length limit mode. display acl { acl-number all name acl-name } [ { begin exclude include } regular-expression ] display acl ipv6 { acl6-number all name acl6-name } [ { begin exclude include } regular-expression ] display acl mode [ { begin exclude include } regular-expression ] Available in any view Available in any view Available in any view 13

15 Task Command Remarks Display the usage of ACL rules. Display information about flow templates applied to interfaces. Display the configuration of one or all user-defined flow templates. Display the configuration and status of one or all time ranges. Clear statistics for one or all IPv4 ACLs. Clear statistics for one or all IPv6 basic and advanced ACLs. display acl resource [ { begin exclude include } regular-expression ] display flow-template interface [ interface-type interface-number ] [ { begin exclude include } regular-expression ] display flow-template user-defined [ flow-template-name ] [ { begin exclude include } regular-expression ] display time-range { time-range-name all } [ { begin exclude include } regular-expression ] reset acl counter { acl-number all name acl-name } reset acl ipv6 counter { acl6-number all name acl6-name } Available in any view Available in any view Available in any view Available in any view Available in user view Available in user view ACL configuration examples IPv4 ACL configuration example Network requirements A company interconnects its departments through Device A. Configure an ACL to: Permit access from the President's office at any time to the salary server. Deny access from any other department to the salary server from 8:00 to 18:00. Figure 3 Network diagram Configuration procedure 1. Create a time range for office hours: 14

16 # Create a periodic time range spanning 8:00 to 18:00 in working days. <Device> system-view [Device] time-range trname 8:00 to 18:00 working-day 2. Configure an ACL to control accesses to the salary server: # Create and enter the view of advanced IPv4 ACL [Device] acl number 3000 # Create a rule to control access of the President s Office to the salary server. [Device-acl-adv-3000] rule 1 permit ip source destination [Device-acl-adv-3000] quit # Create and enter the view of advanced IPv4 ACL [Device] acl number 3100 # Create a rule to control accesses of other departments to the salary server. [Device-acl-adv-3100] rule 2 permit ip source any destination time-range trname [Device-acl-adv-3100] quit 3. Apply the ACL: # Configure traffic classification. [Device] traffic classifier c1 [Device-classifier-c1] if-match acl 3000 [Device-classifier-c1] quit [Device] traffic classifier c2 [Device-classifier-c2] if-match acl 3100 [Device-classifier-c2] quit 4. Configure traffic behavior: # Configure traffic behavior. [Device] traffic behavior b1 [Device-behavior-b1] filter permit [Device-behavior-b1] quit [Device] traffic behavior b2 [Device-behavior-b2] filter deny [Device-behavior-b2] quit 5. Associate classification rules and actions: # Configure a QoS policy. [Device] qos policy p1 [Device-qospolicy-p1] classifier c1 behavior b1 [Device-qospolicy-p1] classifier c2 behavior b2 [Device-qospolicy-p1] quit 6. Apply the QoS policy: # Apply the QoS policy to the outbound direction of interface GigabitEthernet 2/1/1. [Device] interface GigabitEthernet 2/1/1 [Device-GigabitEthernet2/1/1] qos apply policy p1 outbound 15

17 IPv6 ACL configuration example Network requirements Perform packet filtering in the inbound direction of interface GigabitEthernet 2/1/1 to deny all IPv6 packets but those with source addresses in the range 4050::9000 to 4050::90FF. Configuration procedure 1. Create ACLs: # Create an IPv6 ACL <Sysname> system-view [Sysname] acl ipv6 number 2000 [Sysname-acl6-basic-2000] rule permit source 4050::9000/120 # Create an IPv6 ACL [Sysname] acl ipv6 number 2100 [Sysname-acl6-basic-2100] rule permit source any [Sysname-acl6-basic-2000] quit 2. Apply the ACL: # Configure traffic classification. [Sysname] traffic classifier c1 [Sysname-classifier-c1] if-match acl ipv [Sysname-classifier-c1] quit [Sysname] traffic classifier c2 [Sysname-classifier-c2] if-match acl ipv [Sysname-classifier-c2] quit 3. Configure traffic behaviors: # Configure traffic behavior. [Sysname] traffic behavior b1 [Sysname-behavior-b1] filter permit [Sysname-behavior-b1] quit [Sysname] traffic behavior b2 [Sysname-behavior-b2] filter deny [Sysname-behavior-b2] quit 4. Associate traffic classification rules and actions: # Configure a QoS policy. [Sysname] qos policy p1 [Sysname-qospolicy-p1] classifier c1 behavior b1 [Sysname-qospolicy-p1] classifier c2 behavior b2 [Sysname-qospolicy-p1] quit 5. Apply the QoS policy: # Apply QoS policy to the outbound direction of interface GigabitEthernet2/1/1. [Sysname] interface GigabitEthernet 2/1/1 [Sysname-GigabitEthernet2/1/1] qos apply policy p1 outbound 16

18 Flow template configuration example Network requirements Create flow templates and apply them to interfaces. Configuration procedure # Create basic user-defined flow template aaa. <Sysname> system-view [Sysname] flow-template aaa basic smac customer-vlan-id # Reference user-defined flow template aaa on interface GigabitEthernet 2/1/1. [Sysname] interface Gigabitethernet 2/1/1 [Sysname-GigabitEthernet2/1/1] flow-template aaa # Display information about user-defined flow template aaa. [Sysname] display flow-template user-defined aaa user-defined flow template: basic name:aaa, index:1, total reference counts:1 fields: smac customer-vlan-id # Display information about all user-defined flow templates. [Sysname] display flow-template user-defined user-defined flow template: basic name:aaa, index:1, total reference counts:1 fields: smac customer-vlan-id user-defined flow template: basic name:1, index:2, total reference counts:0 fields: service-cos user-defined flow template: basic name:2, index:3, total reference counts:0 fields: ip-protocol dscp # Display information about the user-defined flow templates referenced to interfaces. [Sysname] display flow-template interface Interface: GigabitEthernet2/1/1 user-defined flow template: basic name:aaa, index:1, total reference counts:1 fields: smac customer-vlan-id # Delete user-defined flow template aaa. As it is being referenced by interface Gigabitethernet 2/1/1, remove it from the interface first. [Sysname] interface Gigabitethernet 2/1/1 [Sysname-GigabitEthernet2/1/1] undo flow-template [Sysname-GigabitEthernet2/1/1] quit [Sysname] undo flow-template name aaa ACL rule length limit mode configuration example Network requirements Configure the ACL rule length limit for an SPE card to 18 bytes and that for an SPC card to 80 bytes. 17

19 Configuration procedure # Set the ACL rule length limit mode to 3. <Sysname> system-view [Sysname] acl mode 3 ACL has been set to mode 3, and will take effect after the next system reboot. # Display the ACL rule length limit mode. [Sysname] display acl mode Current ACL mode : mode 2 (SPE ACL key long, SPC ACL key short) Acl mode after system restart : mode 3 (SPE ACL key short, SPC ACL key long) Notice: Changing ACL mode will take effect only after system restart. # Restart the router. [Sysname] return <Sysname> reboot 18

HP 3100 v2 Switch Series

HP 3100 v2 Switch Series HP 3100 v2 Switch Series ACL and QoS Configuration Guide HP 3100-8 v2 SI Switch (JG221A) HP 3100-16 v2 SI Switch (JG222A) HP 3100-24 v2 SI Switch (JG223A) HP 3100-8 v2 EI Switch (JD318B) HP 3100-16 v2

More information

IPv4 ACLs, identified by ACL numbers, fall into four categories, as shown in Table 1. Table 1 IPv4 ACL categories

IPv4 ACLs, identified by ACL numbers, fall into four categories, as shown in Table 1. Table 1 IPv4 ACL categories Table of Contents ACL Configuration 1 ACL Overview 1 IPv4 ACL Classification 1 IPv4 ACL Rule Order 1 Rule Numbering Step with IPv4 ACLs 3 Effective Time Period of an IPv4 ACL 3 IP Fragments Filtering with

More information

H3C S9500E Series Routing Switches

H3C S9500E Series Routing Switches H3C S9500E Series Routing Switches ACL and QoS Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: S9500E-CMW520-R1728 Document version: 6W170-20120306 Copyright

More information

HP High-End Firewalls

HP High-End Firewalls HP High-End Firewalls Access Control Configuration Guide Part number: 5998-2648 Software version: F1000-A-EI&F1000-S-EI: R3721 F5000: F3210 F1000-E: F3171 Firewall module: F3171 Document version: 6PW101-20120719

More information

HP 3600 v2 Switch Series

HP 3600 v2 Switch Series HP 3600 v2 Switch Series ACL and QoS Configuration Guide Part number: 5998-2354 Software version: Release 2101 Document version: 6W101-20130930 Legal and notice information Copyright 2013 Hewlett-Packard

More information

H3C S5120-SI Switch Series

H3C S5120-SI Switch Series H3C S5120-SI Switch Series ACL and QoS Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: Release 1513 Document version: 6W100-20130425 Copyright 2013, Hangzhou

More information

HP 5130 EI Switch Series

HP 5130 EI Switch Series HP 5130 EI Switch Series ACL and QoS Configuration Guide Part number: 5998-5471a Software version: Release 31xx Document version: 6W100-20150731 Legal and notice information Copyright 2015 Hewlett-Packard

More information

HP 5920 & 5900 Switch Series

HP 5920 & 5900 Switch Series HP 5920 & 5900 Switch Series ACL and QoS Configuration Guide Part number: 5998-2897 Software version: Release2207 Document version: 6W100-20121130 Legal and notice information Copyright 2012 Hewlett-Packard

More information

HP Switch Series

HP Switch Series HP 10500 Switch Series ACL and QoS Configuration Guide Part number: 5998-5230 Software version: Release 2111P01 and later Document version: 6W101-20140331 Legal and notice information Copyright 2014 Hewlett-Packard

More information

H3C S5120-EI Series Ethernet Switches. ACL and QoS. Configuration Guide. Hangzhou H3C Technologies Co., Ltd.

H3C S5120-EI Series Ethernet Switches. ACL and QoS. Configuration Guide. Hangzhou H3C Technologies Co., Ltd. H3C S5120-EI Series Ethernet Switches ACL and QoS Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Document Version: 6W102-20100722 Product Version: Release 2202 Copyright 2009-2010,

More information

H3C S10500 Switch Series

H3C S10500 Switch Series H3C S10500 Switch Series ACL and QoS Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: Release 1126 and Later Document version: 20111130-C-1.01 Copyright 2011,

More information

HP FlexFabric 5930 Switch Series

HP FlexFabric 5930 Switch Series HP FlexFabric 5930 Switch Series ACL and QoS Configuration Guide Part number: 5998-7761a Software version: Release 241x Document version: 6W102-20151210 Legal and notice information Copyright 2015 Hewlett-Packard

More information

H3C WA Series WLAN Access Points. ACL and QoS Configuration Guide. Hangzhou H3C Technologies Co., Ltd.

H3C WA Series WLAN Access Points. ACL and QoS Configuration Guide. Hangzhou H3C Technologies Co., Ltd. H3C WA Series WLAN Access Points ACL and QoS Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Document Version: 6W100-20100910 Copyright 2010, Hangzhou H3C Technologies Co., Ltd.

More information

H3C SR6600 Routers. ACL and QoS Configuration Guide. Hangzhou H3C Technologies Co., Ltd.

H3C SR6600 Routers. ACL and QoS Configuration Guide. Hangzhou H3C Technologies Co., Ltd. H3C SR6600 Routers ACL and QoS Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: SR6600-CMW520-R2603 Document version: 20110627-C-1.11 Copyright 2007-2011, Hangzhou

More information

H3C SR G Core Routers

H3C SR G Core Routers H3C SR8800 10G Core Routers ACL and QoS Command Reference Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: SR8800-CMW520-R3347 Document version: 6W103-20120224 Copyright 2011-2012,

More information

H3C S9800 Switch Series

H3C S9800 Switch Series H3C S9800 Switch Series ACL and QoS Configuration Guide New H3C Technologies Co., Ltd. http://www.h3c.com.hk Software version: Release 2150 and later Document version: 6W101-20170608 Copyright 2016-2017,

More information

H3C S12500-X Switch Series

H3C S12500-X Switch Series H3C S12500-X Switch Series ACL and QoS Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: R1003 and later Document version: 6W101-20150515 Copyright 2014-2015,

More information

H3C MSR Series Routers

H3C MSR Series Routers H3C MSR Series Routers ACL and QoS Configuration Guide(V7) Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: MSR-CMW710-R0007 Document version: 6W100-20140320 Copyright 2014, Hangzhou

More information

H3C S5500-HI Switch Series

H3C S5500-HI Switch Series H3C S5500-HI Switch Series ACL and QoS Command Reference Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: Release 5501 Document version: 6W100-20140103 Copyright 2014, Hangzhou

More information

H3C S5130-HI Switch Series

H3C S5130-HI Switch Series H3C S5130-HI Switch Series ACL and QoS Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: Release 1111 Document version: 6W100-20150615 Copyright 2015, Hangzhou

More information

H3C S5120-SI Series Ethernet Switches ACL and QoS Command Reference

H3C S5120-SI Series Ethernet Switches ACL and QoS Command Reference H3C S5120-SI Series Ethernet Switches ACL and QoS Command Reference Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Copyright 2003-2010, Hangzhou H3C Technologies Co., Ltd. and its licensors All

More information

H3C S5120-HI Switch Series

H3C S5120-HI Switch Series H3C S5120-HI Switch Series ACL and QoS Command Reference Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: Release 5101 Document version: 6W101-20120427 Copyright 2011-2012, Hangzhou

More information

H3C SR6600/SR6600-X Routers

H3C SR6600/SR6600-X Routers H3C SR6600/SR6600-X Routers Comware 7 ACL and QoS Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: SR6600_SR6600X-CMW710-R7607 Document version: 20170401-6W100

More information

Configuring IPv6 ACLs

Configuring IPv6 ACLs CHAPTER 37 When the Cisco ME 3400 Ethernet Access switch is running the metro IP access image, you can filter IP Version 6 (IPv6) traffic by creating IPv6 access control lists (ACLs) and applying them

More information

HP Firewalls and UTM Devices

HP Firewalls and UTM Devices HP Firewalls and UTM Devices Access Control Command Reference Part number: 5998-4175 Software version: F1000-A-EI: Feature 3722 F1000-S-EI: Feature 3722 F5000: Feature 3211 F1000-E: Feature 3174 Firewall

More information

H3C MSR Router Series

H3C MSR Router Series H3C MSR Router Series Comware 5 ACL and QoS Command Reference New H3C Technologies Co., Ltd. http://www.h3c.com Software version: MSR-CMW520-R2516 Document version: 20180820-C-1.13 Copyright 2006-2018,

More information

Configuring an IP ACL

Configuring an IP ACL 9 CHAPTER This chapter describes how to configure IP access control lists (ACLs). This chapter includes the following sections: Information About ACLs, page 9-1 Prerequisites for IP ACLs, page 9-5 Guidelines

More information

ACL Configuration FSOS

ACL Configuration FSOS FSOS ACL Configuration 1 Contents 1. ACL Configuring...3 1.1 Brief Introduction to ACL... 3 1.1.1 Configuring Match Order... 3 1.1.2 Switch Support ACL... 4 1.2 Configuring Time Range...4 1.2.1 Configuration

More information

Router and ACL ACL Filter traffic ACL: The Three Ps One ACL per protocol One ACL per direction One ACL per interface

Router and ACL ACL Filter traffic ACL: The Three Ps One ACL per protocol One ACL per direction One ACL per interface CCNA4 Chapter 5 * Router and ACL By default, a router does not have any ACLs configured and therefore does not filter traffic. Traffic that enters the router is routed according to the routing table. *

More information

Configuring IP ACLs. About ACLs

Configuring IP ACLs. About ACLs This chapter describes how to configure IP access control lists (ACLs) on Cisco NX-OS devices. Unless otherwise specified, the term IP ACL refers to IPv4 and IPv6 ACLs. This chapter includes the following

More information

Information about Network Security with ACLs

Information about Network Security with ACLs This chapter describes how to configure network security on the switch by using access control lists (ACLs), which in commands and tables are also referred to as access lists. Finding Feature Information,

More information

Access List Commands

Access List Commands This chapter describes the Cisco IOS XR software commands used to configure IP Version 4 (IPv4) and IP Version 6 (IPv6) access lists on Cisco ASR 9000 Series Aggregation Services Routers. An access control

More information

Configuring Firewall Filters (J-Web Procedure)

Configuring Firewall Filters (J-Web Procedure) Configuring Firewall Filters (J-Web Procedure) You configure firewall filters on EX Series switches to control traffic that enters ports on the switch or enters and exits VLANs on the network and Layer

More information

CBQ configuration example 7

CBQ configuration example 7 Contents QoS overview 1 Introduction to QoS 1 Networks without QoS guarantee 1 QoS requirements of new applications 1 Congestion: causes, impacts, and countermeasures 2 Causes 2 Impacts 2 Countermeasures

More information

Aruba 8320 Configuring ACLs and Classifier Policies Guide for ArubaOS- CX 10.00

Aruba 8320 Configuring ACLs and Classifier Policies Guide for ArubaOS- CX 10.00 Aruba 8320 Configuring ACLs and Classifier Policies Guide for ArubaOS- CX 10.00 Part Number: 5200-4710a Published: April 2018 Edition: 2 Copyright 2018 Hewlett Packard Enterprise Development LP Notices

More information

Access List Commands

Access List Commands Access List Commands This module describes the Cisco IOS XR software commands used to configure IP Version 4 (IPv4) and IP Version 6 (IPv6) access lists. An access control list (ACL) consists of one or

More information

Implementing Access Lists and Prefix Lists

Implementing Access Lists and Prefix Lists An access control list (ACL) consists of one or more access control entries (ACE) that collectively define the network traffic profile. This profile can then be referenced by Cisco IOS XR softwarefeatures

More information

Access List Commands

Access List Commands Access List Commands This module describes the Cisco IOS XR software commands used to configure IP Version 4 (IPv4) and IP Version 6 (IPv6) access lists. An access control list (ACL) consists of one or

More information

Contents. QoS overview 1

Contents. QoS overview 1 Contents QoS overview 1 QoS service models 1 Best-effort service model 1 IntServ model 1 DiffServ model 1 QoS techniques overview 1 Deploying QoS in a network 2 QoS processing flow in a device 2 Configuring

More information

H3C S9500 QoS Technology White Paper

H3C S9500 QoS Technology White Paper H3C Key words: QoS, quality of service Abstract: The Ethernet technology is widely applied currently. At present, Ethernet is the leading technology in various independent local area networks (LANs), and

More information

Configuring IP ACLs. About ACLs

Configuring IP ACLs. About ACLs About ACLs This chapter describes how to configure IP access control lists (ACLs) on Cisco NX-OS devices. Unless otherwise specified, the term IP ACL refers to IPv4 and IPv6 ACLs. This chapter includes

More information

Configuring global CAR 73 Overview 73 Configuring aggregate CAR 73 Configuration procedure 73 Configuration example 73

Configuring global CAR 73 Overview 73 Configuring aggregate CAR 73 Configuration procedure 73 Configuration example 73 Contents QoS overview 1 Introduction to QoS 1 QoS service models 1 Best-effort service model 1 IntServ model 1 DiffServ model 2 QoS techniques overview 2 Deploying QoS in a network 2 QoS processing flow

More information

IPv6 Access Control Lists

IPv6 Access Control Lists Access lists determine what traffic is blocked and what traffic is forwarded at device interfaces and allow filtering of traffic based on source and destination addresses, and inbound and outbound traffic

More information

H3C SecPath Series High-End Firewalls

H3C SecPath Series High-End Firewalls H3C SecPath Series High-End Firewalls NAT and ALG Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: SECPATHF1000SAI&F1000AEI&F1000ESI-CMW520-R3721 SECPATH5000FA-CMW520-F3210

More information

Antonio Cianfrani. Access Control List (ACL) Part I

Antonio Cianfrani. Access Control List (ACL) Part I Antonio Cianfrani Access Control List (ACL) Part I Index ACL? How to configure Standard ACL Extended ACL Named ACL Limiting the vty access ACL (1/3) Control lists applied to traffic incoming in / outgoing

More information

HP A-F1000-A-EI_A-F1000-S-EI VPN Firewalls

HP A-F1000-A-EI_A-F1000-S-EI VPN Firewalls HP A-F1000-A-EI_A-F1000-S-EI VPN Firewalls NAT Configuration Guide Part number:5998-2649 Document version: 6PW100-20110909 Legal and notice information Copyright 2011 Hewlett-Packard Development Company,

More information

Chapter 6 Global CONFIG Commands

Chapter 6 Global CONFIG Commands Chapter 6 Global CONFIG Commands aaa accounting Configures RADIUS or TACACS+ accounting for recording information about user activity and system events. When you configure accounting on an HP device, information

More information

How to Create an IP Access List to Filter IP Options TCP Flags Noncontiguous Ports or TTL Values,

How to Create an IP Access List to Filter IP Options TCP Flags Noncontiguous Ports or TTL Values, Creating an IP Access List to Filter IP Options TCP Flags Noncontiguous Ports or TTL Values This module describes how to use an IP access list to filter IP packets that contain certain IP Options, TCP

More information

Prerequisites for Creating an IP Access List to Filter IP Options TCP Flags Noncontiguous Ports

Prerequisites for Creating an IP Access List to Filter IP Options TCP Flags Noncontiguous Ports Creating an IP Access List to Filter IP Options, TCP Flags, Noncontiguous Ports This module describes how to use an IP access list to filter IP packets that contain certain IP Options, TCP flags, noncontiguous

More information

Configuring priority marking 63 Priority marking overview 63 Configuring priority marking 63 Priority marking configuration example 64

Configuring priority marking 63 Priority marking overview 63 Configuring priority marking 63 Priority marking configuration example 64 Contents QoS overview 1 Introduction to QoS 1 QoS service models 1 Best-effort service model 1 IntServ model 1 DiffServ model 2 QoS techniques overview 2 Deploying QoS in a network 2 QoS processing flow

More information

Creating an IP Access List to Filter IP Options, TCP Flags, Noncontiguous Ports

Creating an IP Access List to Filter IP Options, TCP Flags, Noncontiguous Ports Creating an IP Access List to Filter IP Options, TCP Flags, Noncontiguous Ports This module describes how to use an IP access list to filter IP packets that contain certain IP Options, TCP flags, noncontiguous

More information

Prerequisites for Creating an IP Access List to Filter IP Options TCP Flags Noncontiguous Ports

Prerequisites for Creating an IP Access List to Filter IP Options TCP Flags Noncontiguous Ports Creating an IP Access List to Filter IP Options, TCP Flags, Noncontiguous Ports This module describes how to use an IP access list to filter IP packets that contain certain IP Options, TCP flags, noncontiguous

More information

Portal configuration commands

Portal configuration commands Contents Portal configuration commands 1 display portal acl 1 display portal connection statistics 5 display portal free-rule 7 display portal interface 9 display portal-roaming 11 display portal server

More information

DHCP Configuration Examples H3C S7500 Series Ethernet Switches Release Table of Contents

DHCP Configuration Examples H3C S7500 Series Ethernet Switches Release Table of Contents DHCP Configuration Examples Table of Contents Table of Contents Chapter 1 DHCP Functions Overview... 1-1 1.1 Supported DHCP Functions... 1-1 1.2 Configuration Guide... 1-2 1.2.1 Configuring the DHCP Server...

More information

Creating an IP Access List to Filter IP Options, TCP Flags, or Noncontiguous Ports

Creating an IP Access List to Filter IP Options, TCP Flags, or Noncontiguous Ports Creating an IP Access List to Filter IP Options, TCP Flags, or Noncontiguous Ports First Published: August 18, 2006 Last Updated: July 31, 2009 This module describes how to use an IP access list to filter

More information

Table of Contents 1 QoS Overview QoS Policy Configuration Priority Mapping Configuration 3-1

Table of Contents 1 QoS Overview QoS Policy Configuration Priority Mapping Configuration 3-1 Table of Contents 1 QoS Overview 1-1 Introduction to QoS 1-1 Networks Without QoS Guarantee 1-1 QoS Requirements of New Applications 1-1 Congestion: Causes, Impacts, and Countermeasures 1-2 Causes 1-2

More information

IP Access List Overview

IP Access List Overview Access control lists (ACLs) perform packet filtering to control which packets move through a network and to where. The packet filtering provides security by helping to limit the network traffic, restrict

More information

Table of Contents 1 QoS Overview QoS Policy Configuration Priority Mapping Configuration 3-1

Table of Contents 1 QoS Overview QoS Policy Configuration Priority Mapping Configuration 3-1 Table of Contents 1 QoS Overview 1-1 Introduction to QoS 1-1 Introduction to QoS Service Models 1-1 Best-Effort Service Model 1-1 IntServ Service Model 1-2 DiffServ Service Model 1-2 QoS Techniques Overview

More information

Modular Policy Framework. Class Maps SECTION 4. Advanced Configuration

Modular Policy Framework. Class Maps SECTION 4. Advanced Configuration [ 59 ] Section 4: We have now covered the basic configuration and delved into AAA services on the ASA. In this section, we cover some of the more advanced features of the ASA that break it away from a

More information

Access Control List Overview

Access Control List Overview Access lists filter network traffic by controlling the forwarding or blocking of packets at the interface of a device. A device examines each packet to determine whether to forward or drop that packet,

More information

Quality of Service. Understanding Quality of Service

Quality of Service. Understanding Quality of Service The following sections describe support for features on the Cisco ASR 920 Series Router. Understanding, page 1 Configuring, page 2 Global QoS Limitations, page 2 Classification, page 3 Marking, page 6

More information

Configuring MPLS L2VPN

Configuring MPLS L2VPN Contents Configuring MPLS L2VPN 1 MPLS L2VPN overview 1 Basic concepts of MPLS L2VPN 2 Implementation of MPLS L2VPN 2 MPLS L2VPN configuration task list 4 Configuring MPLS L2VPN 5 Configuring CCC MPLS

More information

Appendix B Policies and Filters

Appendix B Policies and Filters Appendix B Policies and Filters NOTE: This appendix does not describe Access Control Lists (ACLs) or IPX SAP ACLs, which are additional methods for filtering packets. See Software-Based IP Access Control

More information

Sections Describing Standard Software Features

Sections Describing Standard Software Features 27 CHAPTER This chapter describes how to configure quality of service (QoS) by using automatic-qos (auto-qos) commands or by using standard QoS commands. With QoS, you can give preferential treatment to

More information

ACL & QoS Configuration Commands

ACL & QoS Configuration Commands ACL & QoS s 1. ACL s 2. QoS s Reference ACL s 1 ACL s 1.1 ID table For IDs used in the following commands, refer to the command ID table below: ID ID name sn start-sn inc-sn deny permit port interface

More information

Creating an IP Access List to Filter IP Options TCP Flags Noncontiguous Ports or TTL Values

Creating an IP Access List to Filter IP Options TCP Flags Noncontiguous Ports or TTL Values Creating an IP Access List to Filter IP Options TCP Flags Noncontiguous Ports or TTL Values Last Updated: January 18, 2012 This module describes how to use an IP access list to filter IP packets that contain

More information

DHCP H3C Low-End Ethernet Switches Configuration Examples. Table of Contents

DHCP H3C Low-End Ethernet Switches Configuration Examples. Table of Contents DHCP Table of Contents Table of Contents Chapter 1 DHCP Functions Overview... 1-1 1.1 Supported DHCP Functions... 1-1 1.1.1 DHCP Functions Supported by the H3C Low-End Ethernet Switches... 1-1 1.2 Configuration

More information

Object Groups for ACLs

Object Groups for ACLs The feature lets you classify users, devices, or protocols into groups and apply these groups to access control lists (ACLs) to create access control policies for these groups. This feature lets you use

More information

Command Manual Network Protocol. Table of Contents

Command Manual Network Protocol. Table of Contents Table of Contents Table of Contents Chapter 1 IP Address Configuration Commands... 1-1 1.1 IP Address Configuration Commands... 1-1 1.1.1 display ip host... 1-1 1.1.2 display ip interface... 1-1 1.1.3

More information

Implementing Access Lists and Prefix Lists on Cisco ASR 9000 Series Routers

Implementing Access Lists and Prefix Lists on Cisco ASR 9000 Series Routers Implementing Access Lists and Prefix Lists on Cisco ASR 9000 Series Routers An access control list (ACL) consists of one me access control entries (ACE) that collectively define the netwk traffic profile.

More information

Understanding Access Lists

Understanding Access Lists Access lists perform packet filtering to control which packets move through the network and where. Such controls help to limit network traffic and restrict the access of users and devices to the network.

More information

Object Groups for ACLs

Object Groups for ACLs The feature lets you classify users, devices, or protocols into groups and apply those groups to access control lists (ACLs) to create access control policies for those groups. This feature lets you use

More information

Configuring IP Version 6

Configuring IP Version 6 CHAPTER 24 Configuring IP Version 6 Internet Protocol version 6 (IPv6), formerly called IPng (next generation), is the latest version of IP. IPv6 offers many advantages over the previous version of IP,

More information

CSC 4900 Computer Networks: Network Layer

CSC 4900 Computer Networks: Network Layer CSC 4900 Computer Networks: Network Layer Professor Henry Carter Fall 2017 Chapter 4: Network Layer 4. 1 Introduction 4.2 What s inside a router 4.3 IP: Internet Protocol Datagram format 4.4 Generalized

More information

Packet Header Formats

Packet Header Formats A P P E N D I X C Packet Header Formats S nort rules use the protocol type field to distinguish among different protocols. Different header parts in packets are used to determine the type of protocol used

More information

QoS Configuration. Overview. Introduction to QoS. QoS Policy. Class. Traffic behavior

QoS Configuration. Overview. Introduction to QoS. QoS Policy. Class. Traffic behavior Table of Contents QoS Configuration 1 Overview 1 Introduction to QoS 1 QoS Policy 1 Traffic Policing 2 Congestion Management 3 Line Rate 9 Configuring a QoS Policy 9 Configuration Task List 9 Configuring

More information

Access Control List Enhancements on the Cisco Series Router

Access Control List Enhancements on the Cisco Series Router Access Control List Enhancements on the Cisco 12000 Series Router Part Number, May 30, 2008 The Cisco 12000 series router filters IP packets using access control lists (ACLs) as a fundamental security

More information

Chapter 4 Software-Based IP Access Control Lists (ACLs)

Chapter 4 Software-Based IP Access Control Lists (ACLs) Chapter 4 Software-Based IP Access Control Lists (ACLs) This chapter describes software-based ACLs, which are ACLs that processed traffic in software or CPU. (This type of ACL was also referred to as flow-based

More information

Firewalls. Firewall. means of protecting a local system or network of systems from network-based security threats creates a perimeter of defense

Firewalls. Firewall. means of protecting a local system or network of systems from network-based security threats creates a perimeter of defense FIREWALLS 3 Firewalls Firewall means of protecting a local system or network of systems from network-based security threats creates a perimeter of defense administered network public Internet firewall

More information

ACL Rule Configuration on the WAP371

ACL Rule Configuration on the WAP371 Article ID: 5089 ACL Rule Configuration on the WAP371 Objective A network access control list (ACL) is an optional layer of security that acts as a firewall for controlling traffic in and out of a subnet.

More information

Quality of Service Setup Guide (NB14 Series)

Quality of Service Setup Guide (NB14 Series) Quality of Service Setup Guide (NB14 Series) About This Quality of Service (QoS) Guide Quality of Service refers to the reservation of bandwidth resources on the Nb14 Series router to provide different

More information

Prof. Bill Buchanan Room: C.63

Prof. Bill Buchanan Room: C.63 Wireless LAN CO72047 Unit 7: Filtering Prof. Bill Buchanan Contact: w.buchanan@napier.ac.uk Room: C.63 Telephone: X2759 MSN Messenger: w_j_buchanan@hotmail.com WWW: http://www.dcs.napier.ac.uk/~bill http://buchananweb.co.uk

More information

TCP /IP Fundamentals Mr. Cantu

TCP /IP Fundamentals Mr. Cantu TCP /IP Fundamentals Mr. Cantu OSI Model and TCP/IP Model Comparison TCP / IP Protocols (Application Layer) The TCP/IP subprotocols listed in this layer are services that support a number of network functions:

More information

Committed Access Rate

Committed Access Rate Committed Access Rate Feature Summary The Committed Access Rate (CAR) feature performs the following functions: Limits the input or output transmission rate on an interface or subinterface based on a flexible

More information

VLAN Access Control Lists

VLAN Access Control Lists VLAN access control lists (ACLs) or VLAN maps access-control all packets (bridged and routed). You can use VLAN maps to filter traffic between devices in the same VLAN. VLAN maps are configured to provide

More information

Configuring Classification

Configuring Classification CHAPTER 3 This chapter describes how to configure classification on the Cisco Nexus 7000 Series NX-OS device. This chapter includes the following sections: Information About Classification, page 3-1 Licensing

More information

Configuring QoS CHAPTER

Configuring QoS CHAPTER CHAPTER 34 This chapter describes how to use different methods to configure quality of service (QoS) on the Catalyst 3750 Metro switch. With QoS, you can provide preferential treatment to certain types

More information

VLAN Access Control Lists

VLAN Access Control Lists VLAN access control lists (ACLs) or VLAN maps access-control all packets (bridged and routed). You can use VLAN maps to filter traffic between devices in the same VLAN. VLAN maps are configured to provide

More information

Configuring Tap Aggregation and MPLS Stripping

Configuring Tap Aggregation and MPLS Stripping This chapter contains the following sections: Information About Tap Aggregation, page 1 Information About MPLS Stripping, page 3 Configuring Tap Aggregation, page 4 Verifying the Tap Aggregation Configuration,

More information

ECE 358 Project 3 Encapsulation and Network Utilities

ECE 358 Project 3 Encapsulation and Network Utilities ECE 358 Project 3 Encapsulation and Network Utilities Objective: After this project, students are expected to: i. Understand the format of standard frames and packet headers. ii. Use basic network utilities

More information

Sections Describing Standard Software Features

Sections Describing Standard Software Features 30 CHAPTER This chapter describes how to configure quality of service (QoS) by using automatic-qos (auto-qos) commands or by using standard QoS commands. With QoS, you can give preferential treatment to

More information

ECE4110 Internetwork Programming. Introduction and Overview

ECE4110 Internetwork Programming. Introduction and Overview ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?

More information

HPE FlexFabric 5940 Switch Series

HPE FlexFabric 5940 Switch Series HPE FlexFabric 5940 Switch Series EVPN Configuration Guide Part number: 5200-2002b Software version: Release 25xx Document version: 6W102-20170830 Copyright 2017 Hewlett Packard Enterprise Development

More information

H3C S6800 Switch Series

H3C S6800 Switch Series H3C S6800 Switch Series OpenFlow Command Reference New H3C Technologies Co., Ltd. http://www.h3c.com Software version: Release 2609 and later Document version: 6W103-20190104 Copyright 2019, New H3C Technologies

More information

K2289: Using advanced tcpdump filters

K2289: Using advanced tcpdump filters K2289: Using advanced tcpdump filters Non-Diagnostic Original Publication Date: May 17, 2007 Update Date: Sep 21, 2017 Topic Introduction Filtering for packets using specific TCP flags headers Filtering

More information

Table of Contents 1 QinQ Configuration 1-1

Table of Contents 1 QinQ Configuration 1-1 Table of Contents 1 QinQ Configuration 1-1 Introduction to QinQ 1-1 Background 1-1 QinQ Mechanism and Benefits 1-1 QinQ Frame Structure 1-2 Implementations of QinQ 1-3 Modification of the TPID Value in

More information

Object Groups for ACLs

Object Groups for ACLs The feature lets you classify users, devices, or protocols into groups and apply those groups to access control lists (ACLs) to create access control policies for those groups. This feature lets you use

More information

AlliedView -EMS QoS MANAGER USER S GUIDE

AlliedView -EMS QoS MANAGER USER S GUIDE AlliedView -EMS 4.0.2 QoS MANAGER USER S GUIDE AlliedView -EMS 4.0.2 QoS Manager User s Guide Page 1 of 146 TABLE OF CONTENTS 1 OVERVIEW...5 2 STARTING QOS MANAGER...6 3 MAIN WINDOW...7 3.1 INITIAL WINDOW...8

More information

Configuring QoS. Finding Feature Information. Prerequisites for QoS

Configuring QoS. Finding Feature Information. Prerequisites for QoS Finding Feature Information, page 1 Prerequisites for QoS, page 1 Restrictions for QoS, page 3 Information About QoS, page 4 How to Configure QoS, page 28 Monitoring Standard QoS, page 80 Configuration

More information

Minimum is 128 bytes; maximum depends on the interface medium.

Minimum is 128 bytes; maximum depends on the interface medium. ip mtu ip mtu To set the maximum transmission unit (MTU) size of IP packets sent on an interface, use the ip mtu interface configuration command. To restore the default MTU size, use the no form of this

More information