当前位置:网站首页>Huawei ENSP simulator configures ACL access control list
Huawei ENSP simulator configures ACL access control list
2022-07-04 21:13:00 【Python Pegasus】
Catalog
1、acl type ( Here is the basis acl And advanced acl The difference between types ):
3、 stay acl Write rules in ( be based on IP Address to reject )
1、 The interface necessary for entering data :
3、 Check whether the rule is invoked successfully :
Experimental environment :
First, configure the layer 3 switch , It was explained in detail in the last article , Configuring a three-layer switch is to isolate viruses but connect communications . Realize different networks , Different vlan Your machine can communicate , these pc Computers cannot communicate directly through the middle switch , The packet must be transferred to the layer 3 switch , The three-layer switch realizes data forwarding to communicate , That is, when the layer 3 switch pc Gateway of computer .
In this environment ,pc Machine can be different from any gateway vlan Of pc Machine communication . We configure ACL Access control lists are designed to achieve pc The machine can only access vlan 20 Inside pc machine , Give him no access vlan 30 Of pc machine .
pc The gateway of the machine is in the three-layer switch , each vlan Of IP Address .
You can see PC Machine can be different from vlan Different network segments pc Machine communication , It's because of the three-layer switch .
The experimental steps :
Step one : Create an access control rule
Step two : Call this rule
Step one :
1、acl type ( Here is the basis acl And advanced acl The difference between types ):
Basics acl(Basic ACL): When doing access control, only look at the source address , I won't check the target address , Only the source address will be checked
senior acl(Advanced ACL): When doing access control, the target address will be checked .( This experiment needs to check the target address acl)
2、 establish acl:
Create a test Of acl:( It is not recommended to directly create )
acl name test
Correct creation method :
establish acl Name and enter acl type : senior (advance)、 Basics (basic)
# Create a file called test Advanced acl
acl name test advance
# Command usage
acl name name acl type
3、 stay acl Write rules in ( be based on IP Address to reject )
Writing acl The mask needs to be written backwards ,acl Set the rules ( Regulations ) for example :
The original :255.255,255,0
Reverse writing :0.0.0.255 # take 255 Switch to 0,0 Switch to 255
#rule deny ip Reject rule ip agreement
# source source address
#destination Destination
Deny access rules :
# The rejection source address is 192.168.10.0 Network segment 、 Access target ( Destination ) by 192.168.30.0 Communication of network segment
rule deny ip source 192.168.10.0 0.0.0.255 destination 192.168.30.0 0.0.0.255
# Command usage :
rule deny ip source Source address network segment Subnet mask ( Reverse writing ) destination Target geosyncline segment Subnet mask ( Reverse writing )
Allow access to rules :
Rules allow ip The source address is arbitrary , Access any packet communication of the target
rule permit ip source any destination any
That is, reject the network segment as 10 Of pc Machine access network segment is 30 Of pc machine . Other access is not restricted
View customized rules :
dis this
Step two : Call rules
The calling rule needs to be in the interface that the packet must pass , That is, it must be called on the interface , Only in this way can we manage the passage of data .
1、 The interface necessary for entering data :
int g0/0/1
2、 Call rules :
Filter the incoming data in this interface , according to acl be known as test Rule filtering for .
traffic-filter inbound acl name test
3、 Check whether the rule is invoked successfully :
Discovery use 10 The network segment pc machine ping no 30 The network segment pc machine , Prove that the calling rule swims , Next, check whether the rule affects other network segments pc Machine communication
Discovery visit 20 The network segment pc Machine has no effect , Achieve the final experimental effect .
边栏推荐
- What if the brightness of win11 is locked? Solution to win11 brightness locking
- shp数据制作3DTiles白膜
- How to solve the problem that win11 cannot write the value to the registry key?
- 杰理之AD 系列 MIDI 功能说明【篇】
- WinCC7.5 SP1如何通过交叉索引来寻找变量及其位置?
- 记一次重复造轮子(Obsidian 插件设置说明汉化)
- Play the music of youth
- 偷窃他人漏洞报告变卖成副业,漏洞赏金平台出“内鬼”
- LeetCode 7. Integer inversion
- Record the online bug solving list (unfinished to be continued 7/4)
猜你喜欢
D3.js+Three.js数据可视化3d地球js特效
Idea configuration standard notes
How to solve the problem that win11 cannot write the value to the registry key?
shp数据制作3DTiles白膜
Flet tutorial 04 basic introduction to filledtonalbutton (tutorial includes source code)
What if the brightness of win11 is locked? Solution to win11 brightness locking
B站视频 声音很小——解决办法
RFID仓储管理系统解决方案的优点
阿里测试师用UI自动化测试实现元素定位
FastDfs的快速入门,三分钟带你上传下载文件到云服务器
随机推荐
多模输入事件分发机制详解
Why is TCP three handshakes and four waves
Day24:文件系统
Idea configuration standard notes
嵌入式TC 测试用例
Gobang go to work fishing tools can be LAN / man-machine
After inserting a picture into word, there is a blank line above the picture, and the layout changes after deletion
Après l'insertion de l'image dans le mot, il y a une ligne vide au - dessus de l'image, et la disposition est désordonnée après la suppression
torch.tensor和torch.Tensor的区别
async await 在map中使用
企业数字化转型最佳实践案例:基于云的数字化平台系统安全措施简介与参考
【服务器数据恢复】某品牌服务器存储raid5数据恢复案例
LeetCode+ 81 - 85 单调栈专题
黄金k线图中的三角形有几种?
RFID仓储管理系统解决方案的优点
网络命名空间
Vue cleans up the keepalive cache scheme in a timely manner
6月“墨力原创作者计划”获奖名单公布!邀您共话国产数据库
PermissionError: [Errno 13] Permission denied: ‘data.csv‘
Jmeter 之压测入门