Acl configuration example, Network requirements, Configuration procedure – H3C Technologies H3C SecBlade NetStream Cards User Manual

Page 152

Advertising
background image

137

ACL configuration example

IPv4 packet filtering and NetStream logging configuration
example

Network requirements

Apply an IPv4 ACL to deny the traffic from Host A on GigabitEthernet 1/0/1 of Device, and copy the

traffic to the SecBlade NetStream card on the device. Enable the packet filtering logging function on the

card, and configure the card to output IPv4 packet filtering logs to the console at 30-second intervals.

Figure 45 IPv4 packet filtering and NetStream logging scenario

Configuration procedure

1.

Configure Device

# Create IPv4 ACL 2009, and configure a rule in the ACL to deny packets sourced from Host A.

<Device> system-view
[Device] acl number 2009
[Device-acl-basic-2009] rule deny source 192.168.1.2 0
[Device-acl-basic-2009] quit

# Create VLAN 101 and VLAN 102.

[Device] vlan 101 to 102

# Assign GigabitEthernet 1/0/1 to VLAN 101. Apply ACL 2009 to filter incoming packets on
GigabitEthernet 1/0/1, and copy the matching packets to the SecBlade NetStream card in slot 2.

[Device] interface GigabitEthernet1/0/1
[Device-GigabitEthernet1/0/1] port access vlan 101
[Device-GigabitEthernet1/0/1] packet-filter 2009 inbound logging-slot 2
[Device-GigabitEthernet1/0/1] quit

# Assign GigabitEthernet 1/0/2 to VLAN 102.

[Device] interface GigabitEthernet1/0/2
[Device-GigabitEthernet1/0/2] port access vlan 102
[Device-GigabitEthernet1/0/1] quit

IP network

GE1/0/1

Host A

192.168.1.2/24

Device

Host B

192.168.1.3/24

NSC

XGE0/0

XGE2/0/1

SecBlade

GE1/0/2

Advertising