H3C 标准ACL

 

 

网络之间开启RIP协议!

[R1]rip            

[R1-rip-1]ver 2

[R1-rip-1]undo summary

[R1-rip-1]net 192.168.1.0

[R1-rip-1]net 1.0.0.0

[R1-rip-1]q

 

[R2]rip

[R2-rip-1]ver 2

[R2-rip-1]undo summary

[R2-rip-1]net 192.168.1.0

[R2-rip-1]net 192.168.2.0

[R2-rip-1]q

 

[R3]rip

[R3-rip-1]ver 2

[R3-rip-1]net 192.168.2.0

[R3-rip-1]net 3.0.0.0

[R3-rip-1]q

 

配置好动态路由后,测试能R1ping通3.3.3.3

配置ACL访问控制列表

 
 

[R2]firewall enable

[R2]firewall default permit

[R2]acl number ?

  INTEGER<2000-2999>  Specify a basic acl

  INTEGER<3000-3999>  Specify an advanced acl

  INTEGER<4000-4999>  Specify an ethernet frame header acl

  INTEGER<5000-5999>  Specify an acl about user-defined frame or packet head

[R2]acl number 2000

[R2-acl-basic-2000]rule ?   

  INTEGER<0-65534>  ID of acl rule

  deny              Specify matched packet deny

  permit            Specify matched packet permit

[R2-acl-basic-2000]rule deny source 1.1.1.1 ?

  0        Wildcard bits : 0.0.0.0 ( a host )

  X.X.X.X  Wildcard of source

[R2-acl-basic-2000]rule deny source 1.1.1.1 0

 

[R2]int s0/2/0

[R2-Serial0/2/0]firewall packet-filter 2000 ?

  inbound   Apply the acl to filter in-bound packets

  outbound  Apply the acl to filter out-bound packets

[R2-Serial0/2/0]firewall packet-filter 2000 inbound

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

显示配置的访问控制列表的规则

[R2]display acl all

Basic ACL  2000, named -none-, 1 rule,

ACL's step is 5

 rule 0 deny source 1.1.1.1 0 (5 times matched)

 

 

[R2]display firewall-statistics all

  Firewall is enable, default filtering method is 'permit'. 

 

  Interface: Serial0/2/0       

  In-bound Policy: acl 2000

  Fragments matched normally

  From 2010-12-17 11:07:09 to 2010-12-17 11:16:29

     0 packets, 0 bytes, 0% permitted,

     5 packets, 420 bytes, 20% denied,

     20 packets, 1072 bytes, 80% permitted default,

     0 packets, 0 bytes, 0% denied default,

  Totally 20 packets, 1072 bytes, 80% permitted,

  Totally 5 packets, 420 bytes, 20% denied.

 

ACL查看命令

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

配置完事ping不通的

[R1]ping -a 1.1.1.1 3.3.3.3

  PING 3.3.3.3: 56  data bytes, press CTRL_C to break

    Request time out

    Request time out

    Request time out

    Request time out

    Request time out

 

  --- 3.3.3.3 ping statistics ---

    5 packet(s) transmitted

    0 packet(s) received

    100.00% packet loss

 

 

 

在1上配置出站ACL  ,把方法一在R2上的配置去掉!

[R1]firewall enable

[R1-acl-basic-2000]rule 20 deny source 1.1.1.1 0

[R1-Serial0/2/0]firewall packet-filter 2000 outbound

[R1]int s0/2/0

 

 

[R1]ping -a 1.1.1.1 3.3.3.3

  PING 3.3.3.3: 56  data bytes, press CTRL_C to break

    Request time out

    Request time out

    Request time out

    Request time out

    Request time out

 

  --- 3.3.3.3 ping statistics ---

    5 packet(s) transmitted

    0 packet(s) received

100.00% packet loss

注意:标准的acl在应用的时候

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

原文地址:https://www.cnblogs.com/niezhongle/p/11213583.html