Summary of Contents for Huawei Quidway S2700 Series
Page 1
Quidway S2700 Series Ethernet Switches V100R006C00 Configuration Guide - Security Issue Date 2011-07-15 HUAWEI TECHNOLOGIES CO., LTD.
Page 2
All other trademarks and trade names mentioned in this document are the property of their respective holders. Notice The purchased products, services and features are stipulated by the contract made between Huawei and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security About This Document About This Document Intended Audience This document provides the basic concepts, configuration procedures, and configuration examples in different application scenarios of the security feature supported by the S2700.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security About This Document Command Conventions The command conventions that may be found in this document are defined as follows. Convention Description Boldface The keywords of a command line are in boldface.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security Contents Contents About This Document........................ii 1 AAA and User Management Configuration................1 1.1 Introduction to AAA and User Management.....................2 1.2 AAA and User Management Features Supported by the S2700................2 1.3 Configuring AAA Schemes..........................4 1.3.1 Establishing the Configuration Task......................4...
Page 6
Quidway S2700 Series Ethernet Switches Configuration Guide - Security Contents 1.5.10 (Optional) Setting HWTACACS Timers....................23 1.5.11 (Optional) Configuring Retransmission of Accounting-Stop Packet............23 1.5.12 Checking the Configuration........................24 1.6 Configuring a Service Scheme.........................24 1.6.1 Establishing the Configuration Task.......................25 1.6.2 Creating a Service Scheme........................25 1.6.3 Setting the Administrator Level......................26...
Page 7
Quidway S2700 Series Ethernet Switches Configuration Guide - Security Contents 2.3.1 Establishing the Configuration Task.......................50 2.3.2 Enabling Global 802.1x Authentication....................51 2.3.3 Enabling 802.1x Authentication on an Interface..................51 2.3.4 (Optional) Enabling MAC Bypass Authentication..................52 2.3.5 Setting the Authentication Method for the 802.1x User................53 2.3.6 (Optional) Configuring the Interface Access Mode................54...
Page 8
Quidway S2700 Series Ethernet Switches Configuration Guide - Security Contents 3.4 Preventing the DoS Attack by Changing the CHADDR Field.................81 3.4.1 Establishing the Configuration Task.......................81 3.4.2 Enabling DHCP Snooping........................82 3.4.3 Checking the CHADDR Field in DHCP Request Messages..............83 3.4.4 Checking the Configuration........................84 3.5 Preventing the Attacker from Sending Bogus DHCP Messages for Extending IP Address Leases....84...
Page 9
Quidway S2700 Series Ethernet Switches Configuration Guide - Security Contents 4.3 Configuring IP Source Guard.........................122 4.3.1 Establishing the Configuration Task.....................122 4.3.2 (Optional) Configuring a Static User Binding Entry................123 4.3.3 Enabling IP Source Guard........................123 4.3.4 Configuring the Check Items of IP Packets...................124 4.3.5 (Optional) Configuring the Alarm Function of IP Source Guard............125...
Page 10
Quidway S2700 Series Ethernet Switches Configuration Guide - Security Contents 7.4.1 Example for Configuring MFF......................147 8 Traffic Suppression Configuration..................151 8.1 Introduction to Traffic Suppression........................152 8.2 Traffic Suppression Features Supported by the S2700..................152 8.3 Configuring Traffic Suppression........................152 8.3.1 Establishing the Configuration Task.....................152 8.3.2 Configuring Traffic Suppression on an Interface..................153...
Page 11
Quidway S2700 Series Ethernet Switches Configuration Guide - Security Contents 10.3.3 Configuring an Interface as the Trusted Interface................184 10.3.4 (Optional) Configuring the Aging Function of the ND Dynamic Binding Table.......185 10.3.5 Checking the Configuration.........................186 10.4 Maintaining ND Snooping..........................187 10.4.1 Clearing the Prefix Management Table....................187 10.4.2 Resetting the ND Dynamic Binding Table..................187...
This chapter describes the principle and configuration of Authentication, Authorization, and Accounting (AAA), local user management, Remote Authentication Dial in User Service (RADIUS), HUAWEI Terminal Access Controller Access Control System (HWTACACS), and domain. 1.1 Introduction to AAA and User Management This section describes the knowledge of AAA and user management.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 1 AAA and User Management Configuration 1.1 Introduction to AAA and User Management This section describes the knowledge of AAA and user management. AAA provides the following types of services: Authentication: determines if the certain users can access the network.
The domain name delimiter can be @,|, or %.. For example, the user of "user@huawei" belongs to the domain "huawei". If there is no "@" in the user name, the user belongs to the domain default.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 1 AAA and User Management Configuration The S2700 supports up to 32 domains, including the two default domains. The priority of authorization configured in a domain is lower than the priority configured on an AAA server.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 1 AAA and User Management Configuration Data Name of the authentication scheme and authentication mode Name of the authorization scheme, authorization mode, (optional) user level in command-line-based authorization mode on the HWTACACS server, and (optional)
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 1 AAA and User Management Configuration authentication-mode { hwtacacs | radius | local } [ none ] The authentication mode is set. none indicates the non-authentication mode. By default, the local authentication mode is used.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 1 AAA and User Management Configuration By default, an authorization scheme named default exists on the S2700. This scheme can be modified but cannot be deleted. Step 4 Run: authorization-mode [ hwtacacs ] { if-authenticated | local | none } The authorization mode is set.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 1 AAA and User Management Configuration The accounting mode is set. By default, the accounting mode is none. If the accounting mode is set to RADIUS or HWTACACS, you must configure the RADIUS or HWTACACS server template and apply the template to the corresponding user domain.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 1 AAA and User Management Configuration Procedure Step 1 Run: system-view The system view is displayed. Step 2 Run: hwtacacs-server template The HWTACACS server template is created. Step 3 Run: The AAA view is displayed.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 1 AAA and User Management Configuration Prerequisite The configurations of AAA schemes are complete. Procedure Run the display aaa configuration command to check the summary of AAA. Run the display authentication-scheme [ authentication-scheme-name ] command to check the configuration of the authentication scheme.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 1 AAA and User Management Configuration Data IP address of the RADIUS authentication server IP address of the RADIUS accounting server (Optional) Shared key of the RADIUS server (Optional) User name format supported by...
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 1 AAA and User Management Configuration radius-server authentication ip-address port [ source loopback interface-number ] The primary RADIUS authentication server is configured. By default, the IP address of the primary RADIUS authentication server is 0.0.0.0 and the port number is 0.
Step 3 Run: radius-server shared-key [ cipher | simple ] key-string The shared key is set for a RADIUS server. By default, the shared key of a RADIUS server is huawei. ----End 1.4.7 (Optional) Setting the User Name Format Supported by a...
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 1 AAA and User Management Configuration Procedure Step 1 Run: system-view The system view is displayed. Step 2 Run: radius-server template template-name The RADIUS server template view is displayed. Step 3 Run: radius-server user-name domain-included The user name format supported by a RADIUS server is set.
1.4.10 (Optional) Setting the NAS Port Format of a RADIUS Server Context The NAS port format and the NAS port ID format are developed by Huawei, which are used to maintain connectivity and service cooperation among devices of Huawei. The NAS port format and NAS port ID format have new and old forms respectively.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 1 AAA and User Management Configuration NAS port format: slot number (4 bits) + subslot number (2 bits) + port number (2 bits) + VPI (8 bits) + VCI (16 bits).
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 1 AAA and User Management Configuration Example After completing the configurations of the RADIUS server template, you can run the display radius-server configuration command to check the configuration of all templates.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 1 AAA and User Management Configuration 1.5.1 Establishing the Configuration Task Applicable Environment In remote authentication or authorization mode, you need to configure a server template as required. You need to configure an HWTACACS server template if HWTACACS is used in an authentication or an authorization scheme.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 1 AAA and User Management Configuration The system view is displayed. Step 2 Run: hwtacacs-server template template-name An HWTACACS server template is created and the HWTACACS server template view is displayed.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 1 AAA and User Management Configuration Step 3 Run: hwtacacs-server authorization ip-address [ port ] [ public-net | vpn-instance vpn- instance-name ] The IP address of the primary HWTACACS authorization server is configured.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 1 AAA and User Management Configuration Procedure Step 1 Run: system-view The system view is displayed. Step 2 Run: hwtacacs-server template template-name The HWTACACS server template view is displayed. Step 3 Run: hwtacacs-server source-ip ip-address The source IP address of HWTACACS packets is configured.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 1 AAA and User Management Configuration 1.5.8 (Optional) Setting the User Name Format for an HWTACACS Server Context NOTE A user name is in the user name@domain name format and the character string after "@" refers to the domain name.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 1 AAA and User Management Configuration By default, the traffic is expressed in bytes on the S2700. ----End 1.5.10 (Optional) Setting HWTACACS Timers Procedure Step 1 Run: system-view The system view is displayed.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 1 AAA and User Management Configuration The system view is displayed. Step 2 Run: hwtacacs-server accounting-stop-packet resend { disable | enable number } The function of retransmitting the Accounting-Stop packet is configured.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 1 AAA and User Management Configuration 1.6.1 Establishing the Configuration Task Applicable Environment Access users must acquire authorization information before getting online. Authorization information about users can be managed through the service scheme.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 1 AAA and User Management Configuration Step 3 Run: service-scheme service-scheme-name A service scheme is created. service-scheme-name is a string of 1 to 32 characters, excluding / \ : * ? " < > | @ ' %.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 1 AAA and User Management Configuration The service scheme view is displayed. Step 4 Run: dns ip-address The IP address of the primary DNS server is configured. Step 5 Run: (Optional)dns ip-address secondary The IP address of the secondary DNS server is configured.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 1 AAA and User Management Configuration NOTE The modification of a domain takes effect next time a user logs in. Pre-configuration Tasks Before configuring a domain, complete the following tasks: Configuring authentication and authorization schemes...
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 1 AAA and User Management Configuration The S2700 supports up to 32 domains, including the two default domains. ----End Follow-up Procedure After creating a domain, you can run the domain domain-name [ admin ] command in the system view to configure the domain as the global default domain.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 1 AAA and User Management Configuration 1.7.4 Configuring a RADIUS Server Template for a Domain Context If a remote RADIUS authentication scheme is used in a domain, you must apply a RADIUS server template to the domain.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 1 AAA and User Management Configuration The domain view is displayed. Step 4 Run: hwtacacs-server template-name An HWTACACS server template is configured for the domain. By default, no HWTACACS server template is configured for a domain.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 1 AAA and User Management Configuration Step 2 Run: The AAA view is displayed. Step 3 Run: domain domain-name The domain view is displayed. Step 4 Run: state { active | block } The status of the domain is set.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 1 AAA and User Management Configuration Procedure Run the display domain [ name domain-name ] command to check the configuration of the domain. ----End Example After the configuration, you can run the display domain command to view the summary of all domains.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 1 AAA and User Management Configuration Data User name and password Access type of the local user Name of the FTP directory that the local user can access Status of the local user...
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 1 AAA and User Management Configuration The system view is displayed. Step 2 Run: The AAA view is displayed. Step 3 Run: local-user user-name service-type { 8021x | bind | ftp | http | ppp | ssh | telnet | terminal | web | x25-pad } The access type of the local user is set.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 1 AAA and User Management Configuration The system view is displayed. Step 2 Run: The AAA view is displayed. Step 3 Run: local-user user-name state { active | block } The status of a local user is set.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 1 AAA and User Management Configuration Procedure Step 1 Run: system-view The system view is displayed. Step 2 Run: The AAA view is displayed. Step 3 Run: local-user user-name access-limit max-number The maximum number of online local users is set.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 1 AAA and User Management Configuration 1.9 Maintaining AAA and User Management This section describes how to maintain AAA and user management. 1.9.1 Clearing the Statistics Context CAUTION Statistics cannot be restored after you clear them. So, confirm the action before you use the command.
1-1, users access the network through Switch A and are located in the domain huawei. Switch B acts as the network access server of the destination network. The access request of the user needs to pass the network of Switch A and Switch B to reach the authentication server.
Page 51
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 1 AAA and User Management Configuration Figure 1-1 Networking diagram of RADIUS authentication and accounting Domain Huawei SwitchB SwitchA 129.7.66.66/24 Network 129.7.66.67/24 Destination Network Configuration Roadmap The configuration roadmap is as follows: Configure a RADIUS server template.
Page 52
[Quidway-aaa] accounting-scheme 1 Info: Create a new accounting scheme [Quidway-aaa-accounting-1] accounting-mode radius [Quidway-aaa-accounting-1] quit Step 3 Configure the domain huawei and apply authentication scheme1, accounting scheme1, and RADIUS template shiva to the domain. [Quidway-aaa] domain huawei [Quidway-aaa-domain-huawei] authentication-scheme 1 [Quidway-aaa-domain-huawei] accounting-scheme 1 [Quidway-aaa-domain-huawei] radius-server shiva Step 4 Verify the configuration.
Page 54
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 1 AAA and User Management Configuration Figure 1-2 Networking diagram of HWTACACS authentication, accounting, and authorization Domain Huawei SwitchB SwitchA 129.7.66.66/24 Network 129.7.66.67/24 Destination Network Configuration Roadmap The configuration roadmap is as follows: Configure an HWTACACS server template.
Page 55
# Set the interval of interim accounting to 3 minutes. [Quidway-aaa-accounting-hwtacacs] accounting realtime 3 [Quidway-aaa-accounting-hwtacacs] quit Step 3 Create a domain Huawei and apply the authentication scheme 1-h, the HWTACACS authentication scheme, the HWTACACS accounting scheme, and the HWTACACS template of ht to the domain.
Page 56
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 1 AAA and User Management Configuration Run the display hwtacacs-server template command on Switch B, and you can see that the configuration of the HWTACACS server template meets the requirements. <Quidway> display hwtacacs-server template ht...
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 2 NAC Configuration NAC Configuration About This Chapter This chapter describes the working principle and configuration of network access control (NAC). Context NOTE S2700SI does not support NAC. 2.1 Introduction to NAC This section describes the working principle of NAC.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 2 NAC Configuration 2.1 Introduction to NAC This section describes the working principle of NAC. Traditional network security technologies focus on the threat brought by external computers, rather than the threat brought by internal computers. In addition, the current network devices cannot prevent the attacks initiated by the internal devices on the network.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 2 NAC Configuration user or no user accesses the network, the interface is closed. The authentication result is reflected by the status of the interface. The IP address negotiation and allocation that are considered in common authentication technologies are not involved.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 2 NAC Configuration The S2700 automatically specifies the VLAN for users after users pass 802.1x authentication, MAC address authentication, or MAC address bypass authentication. When passing 802.1x authentication, MAC address authentication, or MAC bypass...
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 2 NAC Configuration Data Number of the interface on which 802.1x authentication is enabled 2.3.2 Enabling Global 802.1x Authentication Context Before the configuration of 802.1x authentication, 802.1x needs to be globally enabled first.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 2 NAC Configuration Run: dot1x enable interface { interface-type interface-number1 [ to interface- number2 ] } &<1-10> 802.1x authentication is enabled on interfaces. You can enable 802.1x authentication on interfaces in batches by specifying the interface list in the dot1x enable command in the system view.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 2 NAC Configuration In the interface view: Run: system-view The system view is displayed. Run: interface interface-type interface-number The interface view is displayed. Run: dot1x mac-bypass MAC address bypass authentication is enabled on the interface.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 2 NAC Configuration compared with PAP authentication, CHAP authentication is more secure and reliable and protects user privacy better. l In Extensible Authentication Protocol (EAP) authentication, the S2700 sends the authentication information of an 802.1x user to the RADIUS server through EAP packets without converting EAP packets into RADIUS packets.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 2 NAC Configuration interface interface-type interface-number The interface view is displayed. Run: dot1x port-method { mac | port } The access mode of the interface is configured. By default, the access mode of an interface is MAC mode.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 2 NAC Configuration Run: dot1x port-control { auto | authorized-force | unauthorized-force } The authorization status of the interface is configured. By default, the authorization status of an interface is auto.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 2 NAC Configuration Run: dot1x max-user user-number The maximum number of concurrent access users is set on the interface. By default, each interface allows up to 8 concurrent access users. This command only takes effect for the interface where users are authenticated based on MAC addresses.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 2 NAC Configuration To adjust the exchange process, you can run some commands to change values of some timers, but some timers cannot be adjusted. It may be necessary in certain cases or in poor networking environment.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 2 NAC Configuration The system view is displayed. Step 2 Run: dot1x quiet-period The quiet timer function is enabled. By default, the quiet timer function is disabled. During the quite period, the S2700 discards the 802.1x authentication request packets from the user.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 2 NAC Configuration The interface view is displayed. Run: dot1x reauthenticate Re-authentication is enabled on the interface. By default, 802.1x re-authentication is disabled on an interface. You can run the dot1x timer command to set the timeout interval of re-authentication. For details, see 2.3.10 (Optional) Configuring 802.1x...
Online Users Context The S2700 can send handshake packets to a Huawei client to detect whether the user is online. If the client does not support the handshake function, the S2700 will not receive handshake response packets within the handshake interval. In this case, you need to disable the user handshake function to prevent the S2700 from disconnecting users by mistake.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 2 NAC Configuration authentication request has been sent for the maximum number of times, the S2700 does not retransmit the authentication request to the user. Procedure Step 1 Run: system-view The system view is displayed.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 2 NAC Configuration EAPOL LogOff Packets EAPOL Response/Identity Packets : 1 EAPOL Response/Challenge Packets: 1 View information about the MAC address used in 802.1x authentication or MAC address authentication. <Quidway> display mac-address authen...
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 2 NAC Configuration Data Preparation To configure MAC address authentication, you need the following data. Data Number of the interface on which MAC address authentication is enabled 2.4.2 Enabling Global MAC Address Authentication...
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 2 NAC Configuration Procedure In the system view: Run: system-view The system view is displayed. Run: mac-authen interface { interface-type interface-number1 [ to interface- number2 ] } &<1-10> MAC address authentication is enabled on the interfaces.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 2 NAC Configuration There are two formats for a MAC address used as the user name, that is, the MAC address with hyphens (such as 0010-8300-0011) and the MAC address without hyphens (such as 001083000011).
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 2 NAC Configuration l guest-vlan reauthenticate-period: Interval for re-authenticating users in a guest VLAN. By default, the re-authentication interval is 60s. l offline-detect: Offline-detect timer used to set the interval for the S2700 to check whether a user goes offline.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 2 NAC Configuration The interface view is displayed. Run: mac-authen guest-vlan vlan-id The guest VLAN of the interface is configured. By default, no guest VLAN is configured on an interface. ----End 2.4.8 (Optional) Setting the Maximum Number of Access Users...
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 2 NAC Configuration By default, the maximum number of access users who adopt MAC address authentication on an interface of the S2700 is 8. The maximum number of NAC access users is 128.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 2 NAC Configuration Procedure Run the display mac-authen [ interface { interface-type interface-number1 [ to interface- number2 ] } &<1-10> ] command to view the configuration of MAC address authentication. Run the display mac-address { authen | guest } [ vlan vlan-id ] command to check the configuration of 802.1x authentication and MAC address authentication or information...
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 2 NAC Configuration Procedure Run the reset mac-authen statistics [ interface { interface-type interface-number1 [ to interface-number2 ] } ] command to clear the statistics about MAC address authentication. ----End 2.6 Configuration Examples This section provides several configuration examples of NAC.
Page 83
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 2 NAC Configuration Configure 802.1x authentication. Data Preparation To complete the configuration, you need the following data: IP address of the RADIUS authentication server: 100.1.1.1; authentication port number: 1812 RADIUS server template: rd1...
Page 84
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 2 NAC Configuration [Quidway] dot1x enable Step 6 Verify the configuration. After the user goes online successfully, ping the HTTP server from the PC to check whether ACL 3000 takes effect.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 3 DHCP Snooping Configuration DHCP Snooping Configuration About This Chapter This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP) snooping on the S2700 to defend against DHCP attacks. Context NOTE S2700SI does not support DHCP Snooping.
Page 86
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 3 DHCP Snooping Configuration An alarm is generated when the number of discarded packets exceeds the threshold. 3.9 Maintaining DHCP Snooping This section describes how to maintain DHCP snooping. 3.10 Configuration Examples This section provides several configuration examples of DHCP snooping.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 3 DHCP Snooping Configuration 3.1 Introduction to DHCP Snooping This section describes the principle of DHCP snooping. DHCP snooping intercepts and analyzes DHCP messages transmitted between DHCP clients and a DHCP server. In this manner, DHCP snooping creates and maintains a DHCP snooping binding table, and filters untrusted DHCP messages according to the table.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 3 DHCP Snooping Configuration 3.3 Preventing the Bogus DHCP Server Attack To prevent the attack from the pseudo DHCP server, use the trusted/untrusted working mode of DHCP snooping. 3.3.1 Establishing the Configuration Task Establishing the Configuration Task of Preventing the Bogus DHCP Server Attack.
Page 90
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 3 DHCP Snooping Configuration Enable DHCP snooping globally. Enable DHCP snooping on an interface or in a VLAN. Procedure Enabling DHCP snooping in the VLAN view Run: system-view The system view is displayed.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 3 DHCP Snooping Configuration DHCP snooping is enabled globally. Run: interface interface-type interface-number The interface view is displayed. Run: dhcp snooping enableDHCP snooping is enabled on an interface. ----End 3.3.3 Configuring an Interface as a Trusted Interface Generally, the interface connected to the DHCP server is configured as trusted and other interfaces are configured as untrusted.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 3 DHCP Snooping Configuration Procedure Step 1 Run: system-view The system view is displayed. Step 2 Run: dhcp server detect Detection of bogus DHCP servers is enabled. By default, detection of bogus DHCP servers is disabled on the S2700.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 3 DHCP Snooping Configuration Applicable Environment The attacker may change the client hardware address (CHADDR) carried in DHCP messages instead of the source MAC address in the frame header to apply for IP addresses continuously.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 3 DHCP Snooping Configuration Procedure Step 1 Run: system-view The system view is displayed. Step 2 Run: interface interface-type interface-number The interface view is displayed. The interface is the user-side interface.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 3 DHCP Snooping Configuration Applicable Environment The attacker pretends to be a valid user and continuously sends DHCP Request messages intending to extend the IP address lease. As a result, certain expired IP addresses cannot be reused.
Page 97
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 3 DHCP Snooping Configuration Context To enable DHCP snooping, you need to comply with the following sequence: Enable DHCP globally. Enable DHCP snooping globally. Enable DHCP snooping on an interface or in a VLAN.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 3 DHCP Snooping Configuration DHCP is enabled globally. Run: dhcp snooping enable DHCP snooping is enabled globally. Run: interface interface-type interface-number The interface view is displayed. Run: dhcp snooping enableDHCP snooping is enabled on an interface.
Page 99
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 3 DHCP Snooping Configuration Procedure In the interface view: Run: system-view The system view is displayed. Run: interface interface-type interface-number The interface view is displayed. The interface is the user-side interface.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 3 DHCP Snooping Configuration The prerequisites for the upper commands to take effect are the interfaces are added to the VLAN in step 2. – After the dhcp option82 insert enable interface { interface-name | interface-...
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 3 DHCP Snooping Configuration The format of the Option 82 field is set. NOTE If the customized format of the Option 82 field is used (that is, user-defined is specified), it is recommended that you specify the interface type, slot ID, and interface number in text.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 3 DHCP Snooping Configuration 3.6.2 Enabling DHCP Snooping After DHCP snooping is enabled globally, it must be enabled on an interface or in a VLAN. Otherwise, DHCP snooping does not take effect.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 3 DHCP Snooping Configuration 3.6.4 (Optional) Configuring MAC Address Security on an Interface MAC addresses of DHCP users in the dynamic binding table can be converted to static MAC addresses, and packets of these users can be forwarded. MAC addresses of static users in the static binding table cannot be converted to static MAC addresses.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 3 DHCP Snooping Configuration 3.6.5 Checking the Configuration This section describes how to check the configuration of the maximum number of DHCP snooping users. Prerequisite The configurations of setting the maximum number of users are complete.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 3 DHCP Snooping Configuration Data Rate at which DHCP messages are sent to the protocol stack 3.7.2 Enabling DHCP Snooping After DHCP snooping is enabled globally, it must be enabled on an interface or in a VLAN.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 3 DHCP Snooping Configuration DHCP snooping is disabled on the specified interface in the VLAN. To disable DHCP snooping on a specified interface in a VLAN, perform steps 6 and Enabling DHCP snooping in the interface view...
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 3 DHCP Snooping Configuration Setting the maximum rate of sending DHCP messages in the VLAN view Run: system-view The system view is displayed. Run: vlan vlan-id The VLAN view is displayed.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 3 DHCP Snooping Configuration Prerequisite The configurations of limiting the rate of sending DHCP messages are complete. Procedure Run the display dhcp snooping global command to check information about global DHCP snooping.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 3 DHCP Snooping Configuration Configuring the checking of DHCP messages Configuring the checking of the CHADDR field in DHCP Request messages Configuring the checking of the rate of sending DHCP messages Data Preparation To configure the packet discarding alarm function, you need the following data.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 3 DHCP Snooping Configuration quit Return to the system view. (Optional) Run: interface interface-type interface-number The interface view is displayed. (Optional) Run: dhcp snooping disable DHCP snooping is disabled on the specified interface in the VLAN.
Page 113
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 3 DHCP Snooping Configuration The system view is displayed. Run: dhcp snooping alarm threshold threshold The alarm threshold of the number of globally discarded packets is set. By default, the global alarm threshold of the number of discarded DHCP messages is 100 pps.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 3 DHCP Snooping Configuration – DHCP Request messages whose source MAC address does not match the CHADDR field ----End 3.8.4 Checking the Configuration Checking the Configuration of Packet Discarding Alarm Function.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 3 DHCP Snooping Configuration Context NOTE After the networking environment changes, DHCP snooping binding entries do not age immediately. However, the following information in DHCP snooping binding entries may change, causing packet...
Page 116
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 3 DHCP Snooping Configuration Figure 3-2 Networking diagram for preventing bogus DHCP server attacks ISP network L3 network DHCP relay L2 network GE0/0/1 DHCP Switch server GE0/0/2 User network Configuration Roadmap The configuration roadmap is as follows: (Assume that the DHCP server has been configured.)
Page 117
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 3 DHCP Snooping Configuration # Enable bogus DHCP server detection. [Quidway] dhcp server detect # Enable DHCP snooping on the user-side interface. [Quidway] interface gigabitethernet 0/0/2 [Quidway-GigabitEthernet0/0/2] dhcp snooping enable [Quidway-GigabitEthernet0/0/2] quit Step 2 Configure the interface as the trusted interface or an untrusted interface.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 3 DHCP Snooping Configuration Configuration Files dhcp enable dhcp snooping enable dhcp server detect interface GigabitEthernet0/0/1 dhcp snooping trusted interface GigabitEthernet0/0/2 dhcp snooping enable dhcp snooping alarm dhcp-reply enable threshold 120 return 3.10.2 Example for Preventing DoS Attacks by Changing the...
Page 119
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 3 DHCP Snooping Configuration Configuration Roadmap The configuration roadmap is as follows: Enable DHCP snooping globally and on the interface. Configure the interface connected to the DHCP server as the trusted interface.
Page 124
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 3 DHCP Snooping Configuration Enable DHCP snooping globally and in the interface view. Configure the interface connected to the DHCP server as the trusted interface. Set the rate of sending DHCP Request messages to the protocol stack on interfaces.
Page 125
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 3 DHCP Snooping Configuration Run the display dhcp snooping global command on the Switch, and you can view that DHCP snooping is enabled globally or in interface view. [Quidway] display dhcp snooping global...
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 3 DHCP Snooping Configuration 3.10.5 Example for Applying DHCP Snooping on a Layer 2 Network This section describes the configuration of DHCP snooping on a Layer 2 network, including the configuration of the trusted interface, the function of checking DHCP messages, the function of limiting the rate of sending DHCP messages, and the Option 82 function.
Page 127
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 3 DHCP Snooping Configuration Set the rate of sending DHCP Request messages to the protocol stack to prevent attackers from sending a large number of DHCP Request messages. Configure the Option 82 function.
Page 128
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 3 DHCP Snooping Configuration [Quidway] interface ethernet 0/0/1 [Quidway-Ethernet0/0/1] dhcp snooping check dhcp-request enable alarm dhcp-request enable threshold 120 # Enable the checking of the CHADDR field and alarm function on the interfaces on the DHCP client side to prevent attackers from changing the CHADDR field in DHCP Request messages.
Page 129
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 3 DHCP Snooping Configuration Dhcp snooping enable is configured at these interface : Ethernet0/0/1 Ethernet0/0/2 Dhcp snooping trusted is configured at these interface : GigabitEthernet0/0/1 Dhcp option82 insert is configured at these interface :...
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 4 Source IP Attack Defense Configuration Source IP Attack Defense Configuration About This Chapter This chapter describes the principle and configuration of attacking IP source addresses. Context NOTE The source IP attack defense function cannot be used on the S2700SI.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 4 Source IP Attack Defense Configuration 4.1 Overview of IP Source Guard This section describes the principle of the IP source Guard. The source IP address spoofing is a common attack on the network, for example, the attacker forges a valid user and sends IP packets to the server or forges the source IP address of users for communication.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 4 Source IP Attack Defense Configuration IP Source Guard The IP Source Guard feature is used to check the IP packets according to the binding table, including source IP addresses, source MAC addresses, interface, and VLAN. For example, in...
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 4 Source IP Attack Defense Configuration Data (Optional) User information in a static binding entry, including the IPv4 or IPv6 address, MAC address, VLAN ID, and interface number of the user...
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 4 Source IP Attack Defense Configuration Or, run: vlan vlan-id The VLAN view is displayed. Step 3 Run: ip source check user-bind enable The IP source guard function is enabled on the interface.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 4 Source IP Attack Defense Configuration NOTE This command is valid only for dynamic binding entries. ----End 4.3.5 (Optional) Configuring the Alarm Function of IP Source Guard When the alarm function of IP source guard is enabled, the S2700 counts the number of received IP packets whose rate exceeds the threshold.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 4 Source IP Attack Defense Configuration The system view is displayed. Step 2 Run: ip anti-attack source-ip equals destination-ip drop The function of discarding IP packets with the same source and destination IP addresses is enabled.
Page 138
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 4 Source IP Attack Defense Configuration Figure 4-2 Networking diagram for configuring IP source guard Server Switch Ethernet0/0/1 Ethernet0/0/2 Packets: SIP:10.0.0.1/24 SMAC:2-2-2 Host A Host B (Attacker) IP:10.0.0.1/24 IP:10.0.0.2/24 MAC:1-1-1 MAC:2-2-2 Configuration Roadmap Assume that the user obtains an IP address through DHCP.
Page 139
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 4 Source IP Attack Defense Configuration # Enable the IP source guard function on Ethernet 0/0/2 connected to Host B. [Quidway] interface ethernet 0/0/2 [Quidway-Ethernet0/0/2] ip source check user-bind enable [Quidway-Ethernet0/0/2] quit # Enable the alarm function for checking the received IP packets on Ethernet 0/0/2 connected to Host B.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 5 Local Attack Defense Configuration Local Attack Defense Configuration About This Chapter This chapter describes the principle and configuration of local attack defense. 5.1 Configuring the Attack Defense Policy This section describes how to configure the attack defense policy.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 5 Local Attack Defense Configuration 5.1 Configuring the Attack Defense Policy This section describes how to configure the attack defense policy. 5.1.1 Establishing the Configuration Task This section describes how to establish the configuration task of an attack defense policy.
Page 142
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 5 Local Attack Defense Configuration The maximum rate of packets sent to the CPU is set. (S2700SI) NOTE The maximum rate of packets in a queue sent to the CPU cannot be set on the S2700SI.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 6 PPPoE+ Configuration PPPoE+ Configuration About This Chapter This chapter describes how to configure PPPoE+. NOTE S2700SI does not support PPPOE+. 6.1 PPPoE+ Overview This section describes the principle of PPPoE+.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 6 PPPoE+ Configuration 6.1 PPPoE+ Overview This section describes the principle of PPPoE+. Currently, PPPoE provides good authentication and security mechanism, but still has certain disadvantages, for example, account embezzlement. In common PPPoE dialup mode, when users dial up through PPPoE from different interfaces of devices, they can access the newtork as long as their accounts are authenticated successfully on the same RADIUS server.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 6 PPPoE+ Configuration 6.3.2 Enabling PPPoE+ Globally Procedure Step 1 Run: system-view The system view is displayed. Step 2 Run: pppoe intermediate-agent information enable PPPoE+ is enabled globally. After the pppoe intermediate-agent information enable command is run in the system view, PPPoE+ is enabled on all the interfaces.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 6 PPPoE+ Configuration adopt a different action on an interface, run the pppoe intermediate-agent information policy command in the interface view. In this case, the action for processing packets on the interface depends on the configuration of the interface.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 6 PPPoE+ Configuration Procedure Step 1 Run: system-view The system view is displayed. Step 2 Run: interface interface-type interface-number The Ethernet interface view is displayed. Step 3 Run: pppoe uplink-port trusted The interface is configured as the trusted interface.
Page 148
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 6 PPPoE+ Configuration Figure 6-1 Networking diagram for configuring PPPoE+ IP network PPPoE server GE0/0/1 PPPoE+ Switch Ethernet Ethernet 0/0/2 0/0/1 PPPoE client PPPoE client Configuration Roadmap The configuration roadmap is as follows: Enable PPPoE+ globally.
Page 149
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 6 PPPoE+ Configuration Step 3 Configure the action for processing original fields in PPPoE packets. Configure all the interfaces to replace original fields in PPPoE packets with the circuit ID of the Switch.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 7 MFF Configuration MFF Configuration About This Chapter This section describes the principle and configuration of the MAC-Forced Forwarding (MFF) function. Context NOTE S2700SI does not support MFF function. 7.1 MFF Overview This section describes the principle of the MFF function.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 7 MFF Configuration 7.1 MFF Overview This section describes the principle of the MFF function. Background In traditional Ethernet solutions, VLANs are usually configured on switches to implement Layer 2 isolation and Layer 3 interconnection between clients. When many users need to be isolated on Layer 2, a large number of VLANs are required.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 7 MFF Configuration 7.2 MFF Features Supported by the S2700 This section describes the MFF features supported by the S2700. Static Gateway The static gateway is applicable to the scenario where the IP addresses are set statically. When users are assigned IP addresses statically, the users cannot obtain the gateway information through the DHCP packets.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 7 MFF Configuration Transparently Transmitting User Status Detection Packets If the gateway provides accounting function, the gateway needs to detect whether users are online. The MFF-enabled S2700 can transparently transmit user status detection packets so that it is aware of user status changes immediately.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 7 MFF Configuration Context You can perform other MFF configurations only after enabling the global MFF. Procedure Step 1 Run: system-view The system view is displayed. Step 2 Run: mac-forced-forwarding enable The global MFF is enabled.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 7 MFF Configuration Context If an MFF-enabled network has multiple S2700s, at least one Network-to-Network Interface (NNI) must reside in the VLAN configured with MFF. Procedure Step 1 Run: system-view The system view is displayed.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 7 MFF Configuration Step 2 Run: vlan vlan-id The VLAN view is displayed. Step 3 Run: mac-forced-forwarding gateway-detect The timed gateway address detection is enabled. After the timed gateway address detection is enabled, the S2700 sends ARP packets periodically to detect the gateway.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 7 MFF Configuration The gateway is allowed to detect online users by sending ARP request packets. ----End 7.3.9 (Optional) Discarding IPv6 Packets Sent from Users Procedure Step 1 Run: system-view The system view is displayed.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 7 MFF Configuration 192.168.1.3 -------------------------------------------------------------------- User IP User MAC Gateway IP Gateway MAC -------------------------------------------------------------------- 192.168.1.10 00-01-00-01-00-01 192.168.1.254 00-02-00-02-00-01 192.168.1.11 00-01-00-01-00-02 192.168.1.254 00-02-00-02-00-01 192.168.1.12 00-01-00-01-00-03 192.168.1.252 00-02-00-02-00-03 -------------------------------------------------------------------- [Vlan 100] MFF host total count = 3 7.4 Configuration Examples...
Page 159
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 7 MFF Configuration Enable global MFF. Configure the MFF network interfaces. Enable MFF for the VLAN. (Optional) Enable the function of timed gateway address detection. (Optional) Configure the server. Data Preparation...
Page 160
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 7 MFF Configuration # Enable global MFF on Switch A. [SwitchA] mac-forced-forwarding enable # Enable global MFF on Switch B. [SwitchB] mac-forced-forwarding enable Step 3 Configure the MFF network interfaces. # Configure GE 0/0/1 of Switch A as the network interface.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 8 Traffic Suppression Configuration Traffic Suppression Configuration About This Chapter This chapter describes the principle and configuration of traffic suppression . 8.1 Introduction to Traffic Suppression This section describes the principle of traffic suppression.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 8 Traffic Suppression Configuration 8.1 Introduction to Traffic Suppression This section describes the principle of traffic suppression. Broadcast packets, multicast packets and unknown unicast packets entering the S2700 are forwarded on all the interfaces in a VLAN. These three types of packets consume great bandwidth, reduces available bandwidth of the system, and affects normal forwarding and processing capabilities.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 8 Traffic Suppression Configuration Data Type of traffic (broadcast, multicast, or unknown unicast traffic) that needs to be suppressed Mode in which traffic is suppressed (rate percentage on a physical interface) Limited rate, including bandwidth percentage.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 8 Traffic Suppression Configuration Procedure Run the display flow-suppression interface interface-type interface-number command to check the configuration of traffic suppression. ----End Example Run the display flow-suppression interface interface-type interface-number command, and you can view the configuration of traffic suppression on a specified interface.
Page 166
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 8 Traffic Suppression Configuration Traffic suppression for broadcast, unknown unicast and multicast packets based on the rate percentage Maximum rate of broadcast, unknown unicast and multicast packets being 80 percent of...
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 9 ACL Configuration ACL Configuration About This Chapter The ACL classifies packets according to the rules. After these rules are applied to the interfaces on the S2700, the S2700 can determine packets that are received and rejected.
ACL is set to be in permit mode, the packets matching the ACL are processed by the S2700 according to the action defined by the traffic behavior in QoS. For details on the traffic behavior, see the Quidway S2700 Series Ethernet Switches Configuration Guide - QoS.
When the ACL is imported by the upper-layer software, the packets matching the ACL are processed by the S2700 according to the action deny or permit defined in the ACL. For details on login user control, see the Quidway S2700 Series Ethernet Switches Configuration Guide - Basic Configurations.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 9 ACL Configuration Data Number of ACL rule and the rule that identifies the type of packets, including protocol, source address, source port, destination address, destination port, the type and code of Internet Control Message Protocol (ICMP), IP precedence, and Type of...
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 9 ACL Configuration If the number of a named ACL is not specified, the S2700 automatically allocates a number to the named ACL. The following situations are involved: – If the type of a named ACL is specified, the number of the named ACL allocated by the S2700 is the maximum value of the named ACL of the type.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 9 ACL Configuration acl name acl-name The ACL view is displayed. Step 3 Run: description description The description of the ACL is configured. The description of an ACL is a string of up to 127 characters, describing the usage of the ACL.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 9 ACL Configuration acl [ number ] acl-number An advanced ACL is created based on the number. Or, run: acl name acl-name [ advance | acl-number ] An advanced ACL is created based on the name.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 9 ACL Configuration The system view is displayed. Step 2 Run: acl [ number ] acl-number A layer 2 ACL is created based on the number. Or, run: acl name acl-name [ link | acl-number ] A layer 2 ACL is created based on the name.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 9 ACL Configuration 9.3.9 Checking the Configuration Checking the Configuration of ACL. Prerequisite The configurations of the ACL are complete. Procedure Run the display acl { acl-number | all } command to check the ACL rule based on the number.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 9 ACL Configuration Configuring policy-based routing Configuring a routing policy Pre-configuration Tasks None Data Preparation To configure an ACL6, you need the following data. Data Number or name of the ACL6...
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 9 ACL Configuration Run: acl ipv6 name acl6-name [ advance | basic | acl6-number ] An ACL6 is created based on the name. If the number of a named ACL6 is not specified, the S2700 automatically allocates a number to the named ACL6.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 9 ACL Configuration The system view is displayed. Step 2 Run: acl ipv6 [ number ] acl6-number A basic ACL6 is created based on the number. Or, run: acl ipv6 name acl6-name [ advance | basic | acl6-number ] A basic ACL6 is created based on the name.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 9 ACL Configuration <Quidway> display acl ipv6 name test Advanced IPv6 ACL 3999 name test, 1 rule rule 0 permit udp # Run the display time-range command, and you can see the configuration and status of the current time range.
Page 181
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 9 ACL Configuration Data Preparation To complete the configuration, you need the following data: ACL number IP address of user A Names of traffic classifier, traffic behavior, and traffic policy Interface where the traffic policy is applied Procedure Step 1 Configure the traffic classifier that is based on the ACL rules.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 9 ACL Configuration <Quidway> display traffic policy user-defined tp1 User Defined Traffic Policy Information: Policy: tp1 Classifier: tc1 Operator: AND Behavior: tb1 Deny ----End Configuration Files acl number 2000 rule 5 permit source 10.0.0.0 0.0.0.255...
Page 183
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 9 ACL Configuration Configuration Roadmap The configuration roadmap is as follows: Assign IP addresses to interfaces. Configure the time range. Configure the ACL. Configure the traffic classifier. Configure the traffic behavior.
Page 184
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 9 ACL Configuration <Quidway> system-view [Quidway] time-range satime 8:00 to 17:30 working-day Step 3 Configure ACLs. # Configure the ACL for the personnel of the marketing department to access the salary query server.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 9 ACL Configuration interface GigabitEthernet0/0/1 traffic-policy tp1 inbound return 9.5.4 Example for Configuring an ACL6 to Control FTP User Access Networking Requirements As shown in Figure 9-4, the IP address of the switch that functions as the FTP server is 3002::1/64.
Page 190
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 9 ACL Configuration Step 3 Bind the basic ACL6 to the FTP server. [Quidway] ftp ipv6 acl 2001 Step 4 Verify the configuration. # Connect PC1 to the FTP server. c:\ ftp 3002::1 Connected to 3002::1 220 FTP service ready.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 10 ND Snooping Configuration ND Snooping Configuration About This Chapter This chapter describes the principle and configuration method of neighbor discovery (ND) snooping and provides configuration examples. Context NOTE S2700SI does not support ND Snooping.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 10 ND Snooping Configuration 10.1 ND Snooping Overview This section describes the principle of ND snooping. Neighbor discovery (ND) is a group of messages and processes that identify relationships between neighboring nodes. IPv6 ND corresponds to a combination of the Address Resolution Protocol (ARP), ICMP router discovery, and ICMP Redirect of IPv4.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 10 ND Snooping Configuration Figure 10-1 ND snooping enabled on the S2700 of the Layer 2 network Trusted Switch Untrusted Router network (ND Server) network User network 10.3 Configuring ND Snooping This section describes the basic concepts of ND snooping and the procedure for configuring ND snooping, and provides configuration examples of ND snooping.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 10 ND Snooping Configuration NS messages. The ND dynamic binding table saves information about IPv6 addresses, MAC addresses, and VLAN IDs of clients. The S2700 delivers the ND dynamic binding entries to the ACL that is automatically generated.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 10 ND Snooping Configuration Run: nd snooping enable ND snooping is enabled on the interface. Configuring ND snooping in a VLAN Run: system-view The system view is displayed. Run: dhcp enable DHCP is enabled globally.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 10 ND Snooping Configuration The interface view is displayed. Run: nd snooping trusted The interface is configured as the trusted interface. Configuring ND snooping in a VLAN Run: system-view The system view is displayed.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 10 ND Snooping Configuration By default, the aging function of the ND dynamic binding table is disabled. Step 3 Run: nd user-bind detect retransmit retransmit-times interval retransmit-interval The detection interval and the number of detection times for aging ND dynamic binding entries are set.
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 10 ND Snooping Configuration 3001::E58C:A2E7:AA4C:8E59 00e0-4c7c-af8f 2011.05.06-20:09 -------------------------------------------------------------------------------- print count: total count: Run the display this command in the system view, and you can view the configuration of ND snooping. [Quidway] display this...
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 10 ND Snooping Configuration NOTE After the networking environment changes, ND dynamic binding entries do not age immediately. However, the following information in ND dynamic binding entries may change, causing packet forwarding failure:...
Page 200
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 10 ND Snooping Configuration Configuration Roadmap The configuration roadmap is as follows (assume that the ND server is configured): Enable ND snooping in the system view and interface view. Configure the interface connected to the ND server as the trusted interface.
Page 201
Quidway S2700 Series Ethernet Switches Configuration Guide - Security 10 ND Snooping Configuration Run the display nd snooping prefix command, and you can view the prefix management table of ND users. <Quidway> display nd snooping prefix prefix-table: Prefix Length Valid-Time...
Need help?
Do you have a question about the Quidway S2700 Series and is the answer not in the manual?
Questions and answers