No part of this manual may be reproduced or transmitted in any form or by any means without prior written
consent of New H3C Technologies Co., Ltd.
Trademarks
H3C, , H3CS, H3CIE, H3CNE, Aolynk, , H
3
Care, , IRF, NetPilot, Netflow, SecEngine,
SecPath, SecCenter, SecBlade, Comware, ITCMM and HUASAN are trademarks of New H3C Technologies
Co., Ltd.
All other trademarks that may be mentioned in this manual are the property of their respective owners
Notice
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Preface
Hardware series
Model
Product version
The H3C access controllers documentation set describes the software features for the H3C access
controllers and guide you through the software configuration procedures. These guides also provide
configuration examples to help you apply software features to different network scenarios.
The ACL and QoS Configuration Guide describes ACL, QoS, and time range configurations.
This preface includes the following topics about the documentation:
• Hardware and software compatibility matrix
• Audience
• Conventions
• Obtaining documentation
• Technical support
• Documentation feedback
Hardware and software compatibility matrix
Table 1 Hardware and software compatibility matrix
WX1800H series
WX2500H series
WX3000H series
WX3500H series
WX5500E series
WX5500H series
Access controller modules
• WX1804H
• WX1810H
• WX1820H
• WX2510H
• WX2540H
• WX2560H
• WX3010H
• WX3010H-L
• WX3010H-X
• WX3024H
• WX3024H-L
• WX3508H
• WX3510H
• WX3520H
• WX3540H
• WX5510E
• WX5540E
• WX5540H
• WX5560H
• WX5580H
• EWPXM1MAC0F
• EWPXM1WCME0
• EWPXM2WCMD0F
• LSQM1WCMX20
• LSQM1WCMX40
• LSUM1WCME0
• LSUM1WCMX20RT
• WX1804H-CMW710-E5208P03
• WX1810H-CMW710-E5215P01
• WX1820H-CMW710-E5208P03
• WX2510H-CMW710-R5215P01
• WX2540H-CMW710-R5215P01
• WX2560H-CMW710-R5215P01
• WX3010H-CMW710-R5215P01
• WX3010HL-CMW710-R5215P01
• WX3010HX-CMW710-R5215P01
• WX3024H-CMW710-R5215P01
• WX3024HL-CMW710-R5215P01
• WX3508H-CMW710-R5215P01
• WX3510H-CMW710-R5215P01
• WX3520H-CMW710-R5215P01
• WX3540H-CMW710-R5215P01
• WX5510E-CMW710-R5215P01
• WX5540E-CMW710-R5215P01
• WX5540H-CMW710-R5215P01
• WX5560H-CMW710-R5215P01
• WX5580H-CMW710-R5215P01
• WCMX40-CMW710-R5215P01
• WCMX40-CMW710-R5215P01
• WCMX20-CMW710-R5215P01
• WCMX20-CMW710-R5215P01
• WCMX40-CMW710-R5215P01
• WCMX40-CMW710-R5215P01
• WCMX20-CMW710-R5215P01
Hardware series
Model
Product version
• LSUM1WCMX40RT
• WCMX40-CMW710-R5215P01
Convention
Description
Convention
Description
Convention
Description
Audience
This documentation is intended for:
• Network planners.
• Field technical support and servicing engineers.
• Network administrators working with the H3C access controllers.
Conventions
The following information describes the conventions used in the documentation.
Command conventions
Boldface Bold
Italic
[ ] Square brackets enclose syntax choices (keywords or arguments) that are optional.
{ x | y | ... }
[ x | y | ... ]
{ x | y | ... } *
[ x | y | ... ] *
&<1-n>
# A line that starts with a pound (#) sign is comments.
GUI conventions
Boldface
text represents commands and keywords that you enter literally as shown.
Italic text represents arguments that you replace with actual values.
Braces enclose a set of required syntax choices separated by vertical bars, from which
you select one.
Square brackets enclose a set of optional syntax choices separated by vertical bars,
from which you select one or none.
Asterisk marked braces enclose a set of required syntax choices separated by vertical
bars, from which you select a minimum of one.
Asterisk marked square brackets enclose optional syntax choices separated by vertical
bars, from which you select one choice, multiple choices, or none.
The argument or keyword and argument combination before the ampersand (&) sign
can be entered 1 to n times.
Window names, button names, field names, and menu items are in Boldface. For
example, the
New User
window opens; click OK.
>
Symbols
WARNING!
File
Multi-level menus are separated by angle brackets. For example,
Folder
.
An alert that calls attention to important information that if not understood or followed
can result in personal injury.
>
Create
>
Convention
Description
CAUTION:
IMPORTANT:
NOTE:
TIP:
Convention
Description
T
T
T
T
Network topology icons
An alert that calls attention to important information that if not understood or followed
can result in data loss, data corruption, or damage to hardware or software.
An alert that calls attention to essential information.
An alert that contains additional or supplementary information.
An alert that provides helpful information.
Represents a generic network device, such as a router, switch, or firewall.
Represents a routing-capable device, such as a router or Layer 3 switch.
Represents a generic switch, such as a Layer 2 or Layer 3 switch, or a router that
supports Layer 2 forwarding and other Layer 2 features.
Represents an access controller, a unified wired-WLAN module, or the access
controller engine on a unified wired-WLAN switch.
Represents an access point.
Wireless terminator unit.
Wireless terminator.
Represents a mesh access point.
Represents omnidirectional signals.
Represents directional signals.
Represents a security product, such as a firewall, UTM, multiservice security
gateway, or load balancing device.
Represents a security module, such as a firewall, load balancing, NetStream, SSL
VPN, IPS, or ACG module.
Examples provided in this document
Examples in this document might use devices that differ from your device in hardware model,
configuration, or software version. It is normal that the port numbers, sample output, screenshots,
and other information in the examples differ from what you have on your device.
Obtaining documentation
To a ccess the most up-to-date H3C product documentation, go to the H3C website at
http://www.h3c.com.hk
To obtain information about installation, configuration, and maintenance, click
http://www.h3c.com.hk/Technical_Documents
To obtain software version information such as release notes, click
http://www.h3c.com.hk/Software_Download
Technical support
service@h3c.com
http://www.h3c.com.hk
Documentation feedback
You can e-mail your comments about product documentation to info@h3c.com.
Compatibility information ··········································································································· 16
Feature and hardware compatibility ······················································································· 16
Command and hardware compatibility ··················································································· 17
QoS service models ················································································································· 17
Best-effort service model ···································································································· 17
IntServ model ··················································································································· 17
DiffServ model ·················································································································· 17
QoS techniques overview ·········································································································· 17
Deploying QoS in a network ································································································ 18
QoS processing flow in a device ··························································································· 18
Configuring a QoS policy ································································· 19
Non-MQC approach ················································································································· 19
MQC approach ························································································································ 19
Configuration procedure diagram ································································································ 19
Defining a traffic class ··············································································································· 19
Defining a traffic behavior ·········································································································· 20
Defining a QoS policy ··············································································································· 20
Applying the QoS policy ············································································································ 20
Applying the QoS policy to an interface ·················································································· 21
Applying the QoS policy to a user profile ················································································ 21
Displaying and maintaining QoS policies ······················································································· 22
Introduction to priorities ······································································································ 23
Priority maps ···················································································································· 23
Priority mapping configuration tasks ····························································································· 23
Configuring a priority map ·········································································································· 24
Configuring a port to trust packet priority for priority mapping ····························································· 24
Changing the port priority of an interface ······················································································· 25
Displaying and maintaining priority mapping ·················································································· 25
Priority mapping configuration examples ······················································································· 25
Configuring traffic policing by using the MQC approach ····························································· 28
Configuring traffic policing for a user profile by using the non-MQC approach ································· 29
Displaying and maintaining traffic policing ····················································································· 30
Appendix A Acronym ················································································································ 36
Appendix B Default priority maps ································································································· 36
Appendix C Introduction to packet precedences ············································································· 38
IP precedence and DSCP values ·························································································· 38
Configuring time ranges ··································································· 41
Feature and hardware compatibility ····························································································· 41
Configuration procedure ············································································································ 42
Displaying and maintaining time ranges ························································································ 42
Time range configuration example ······························································································· 42
Index ··························································································· 44
ii
Configuring ACLs
Type
ACL number
IP version
Match criteria
Overview
An access control list (ACL) is a set of rules for identifying traffic based on criteria such as source IP
address, destination IP address, and por t number. The rules are also called permit or deny
statements.
ACLs are primarily used for packet filtering. "Configuring packet filtering with ACLs" provides an
example. You can use ACLs in QoS, security, routing, and other modules for identifying traffic. The
packet drop or forwarding decisions depend on the modules that use ACLs.
ACL types
WLAN client ACL 100 to 199 IPv4 and IPv6 SSID.
WLAN AP ACL 200 to 299 IPv4 and IPv6 AP MAC address and AP serial ID.
Basic ACLs 2000 to 2999
IPv4 Source IPv4 address.
IPv6 Source IPv6 address.
IPv4
Advanced ACLs 3000 to 3999
IPv6
Layer 2 ACLs 4000 to 4999 IPv4 and IPv6
Numbering and naming ACLs
When creating an ACL, you must assign it a number or name for identification. You can specify an
existing ACL by its number or name. Each ACL type has a unique range of ACL numbers.
For an IPv4 basic or advanced ACL, its ACL number or name must be unique in IPv4. For an IPv6
basic or advanced ACL, its ACL number and name must be unique in IPv6. For a Layer 2, WLAN
client, or WLAN AP ACL, its number or name must be globally unique.
Match order
Source IPv4 address, destination IPv4
address, packet priority, protocol number, and
other Layer 3 and Layer 4 header fields.
Source IPv6 address, destination IPv6
address, packet priority, protocol number, and
other Layer 3 and Layer 4 header fields.
Layer 2 header fields, such as source and
destination MAC addresses, 802.1p priority,
and link layer protocol type.
The rules in an ACL are sorted in a specific order. When a packet matches a rule, the device stops
the match process and performs the action defined in the rule. If an ACL contains overlapping or
conflicting rules, the matching result and action to take depend on the rule order.
The following ACL match orders are available:
•config—Sorts ACL rules in ascending order of rule ID. A rule with a lower ID is matched before
a rule with a higher ID. If you use this method, check the rules and their order carefully.
1
The match order of WLAN client ACLs and WLAN AP ACLs can only be config.
ACL type
Sequence of tie breakers
NOTE:
•auto—Sorts ACL rules in depth-first order. Depth-first ordering makes sure any subset of a rule
is always matched before the rule. Table 1lists the sequence of tie breakers that depth-first
ordering uses to sort rules for each type of ACL.
Table 1 Sort ACL rules in depth-first order
1. VPN instance.
IPv4 basic ACL
IPv4 advanced ACL
IPv6 basic ACL
IPv6 advanced ACL
Layer 2 ACL
2. More 0s in the source IPv4 address wildcard (more 0s means a
narrower IPv4 address range).
3. Rule configured earlier.
1. VPN instance.
2. Specific protocol number.
3. More 0s in the source IPv4 address wildcard mask.
4. More 0s in the destination IPv4 address wildcard.
5. Narrower TCP/UDP service port number range.
6. Rule configured earlier.
1. VPN instance.
2. Longer prefix for the source IPv6 address (a longer prefix means a
narrower IPv6 address range).
3. Rule configured earlier.
1. VPN instance.
2. Specific protocol number.
3. Longer prefix for the source IPv6 address.
4. Longer prefix for the destination IPv6 address.
5. Narrower TCP/UDP service port number range.
6. Rule configured earlier.
1. More 1s in the source MAC address mask (more 1s means a smaller
MAC address).
2. More 1s in the destination MAC address mask.
3. Rule configured earlier.
A wildcard mask, also called an i nverse mask, is a 32 -bit binary number represented in dotted
decimal notation. In contrast to a network mask, the 0 bits in a wildcard mask represent "do care"
bits, and the 1 bits represent "don't care" bits. If the "do care" bits in an IP address are identical to the
"do care" bits in an IP address criterion, the IP address matches the criterion. All "don't care" bits are
ignored. The 0s and 1s in a wildcard mask can be noncontiguous. For example, 0.255.0.255 is a
valid wildcard mask.
Rule numbering
ACL rules can be m anually numbered or automatically numbered. This section describes how
automatic ACL rule numbering works.
Rule numbering step
If you do not assign an ID to the rule you are creating, the system automatically assigns it a rule ID.
The rule numbering step sets the increment by which the system automatically numbers rules. For
example, the default ACL rule numbering step is 5. If you do not assign IDs to rules you are creating,
they are automatically numbered 0, 5, 10, 15, and so on. The wider the numbering step, the more
rules you can insert between two rules.
2
By introducing a gap between rules rather than contiguously numbering rules, you have the flexibility
Hardware series
Model
ACL compatibility
of inserting rules in an ACL. This feature is important for a config-order ACL, where ACL rules are
matched in ascending order of rule ID.
Automatic rule numbering and renumbering
The ID automatically assigned to an ACL rule takes the nearest higher multiple of the numbering step
to the current highest rule ID, starting with 0.
For example, if the step is 5, and there are five rules numbered 0, 5, 9, 10, and 12, the newly defined
rule is numbered 15. If the ACL does not contain a rule, the first rule is numbered 0.
Whenever the step changes, the rules are renumbered, starting from 0. For example, changing the
step from 5 to 2 renumbers rules 5, 10, 13, and 15 as rules 0, 2, 4, and 6.
Fragments filtering with ACLs
Traditional packet filtering matches only first fragments of packets, and al lows all subsequent
non-first fragments to pass through. Attackers can fabricate non-first fragments to attack networks.
To avoid the risks, the ACL feature is designed as follows:
• Filters all fragments by default, including non-first fragments.
• Allows for matching criteria modification for efficiency. For example, you can configure the ACL
to filter only non-first fragments.
Compatibility information
Feature and hardware compatibility
WX1804H
WX1800H series
WX2500H series
WX3000H series
WX3500H series
WX1810H
WX1820H
WX2510H
WX2540H
WX2560H
WX3010H
WX3010H-L
WX3010H-X
WX3024H
WX3024H-L
WX3508H
WX3510H
WX3520H
WX3540H
Yes
Yes
Yes:
• WX3010H
• WX3010H-X
• WX3024H
No:
• WX3010H-L
• WX3024H-L
Yes
WX5500E series
WX5500H series WX5540H Yes
WX5510E
WX5540E
Yes
3
Hardware series
Model
ACL compatibility
WX5560H
Tasks at a glance
WX5580H
EWPXM1MAC0F
EWPXM1WCME0
EWPXM2WCMD0F
Access controller modules
LSQM1WCMX20
LSQM1WCMX40
LSUM1WCME0
LSUM1WCMX20RT
LSUM1WCMX40RT
Yes
Command and hardware compatibility
The WX1800H series, WX2500H series, and WX3000H series access controllers do not support the
slot keyword or the slot-number argument.
Configuration restrictions and guidelines
Matching packets are forwarded through slow forwarding if an ACL rule contains match criteria or
has functions enabled in addition to the following match criteria and functions:
• Source and destination IP addresses.
• Source and destination ports.
• Transport layer protocol.
• ICMP or ICMPv6 message type, message code, and message name.
• VPN instance.
• Logging.
• Time range.
Slow forwarding requires packets to be sent to the control plane for forwarding entry calculation,
which affects the device forwarding performance.
Configuration task list
(Required.) Configure ACLs according to the characteristics of the packets to be matched:
•Configuring a basic ACL
Configuring an IPv4 basic ACL
Configuring an IPv6 basic ACL
• Configuring an advanced ACL
Configuring an IPv4 advanced ACL
Configuring an IPv6 advanced ACL
• Configuring a Layer 2 ACL
• Configuring a WLAN client ACL
• Configuring a WLAN AP ACL
(Optional.) Copying an ACL
4
Tasks at a glance
(Optional.) Configuring packet filtering with ACLs
Step
Command
Remarks
Step
Command
Remarks
Configuring a basic ACL
This section describes procedures for configuring IPv4 and IPv6 basic ACLs.
Configuring an IPv4 basic ACL
IPv4 basic ACLs match packets based only on source IP addresses.
To configure an IPv4 basic ACL:
1. Enter system view.
2. Create an IPv4 basic ACL
and enter its view.
3. (Optional.) Configure a
description for the IPv4 basic
ACL.
4. (Optional.) Set the rule
numbering step.
5. Create or edit a rule.
6. (Optional.) Add or edit a rule
comment.
system-view
acl basic
acl-name } [
config
description
step
rule
fragment | source
[
{ source-address source-wildcard
any
|
time-range-name ] *
rule
{ acl-number |
match-order
} ]
text
step-value
[ rule-id ] {
time-range
} |
comment
rule-id
deny
|
text
name
{
permit
auto
}
N/A
By default, no ACL exists.
The value range for a numbered
IPv4 basic ACL is 2000 to 2999.
Use the
|
command to enter the view of a
numbered IPv4 basic ACL.
Use the
acl-name command to enter the
view of a named IPv4 basic ACL.
By default, an IPv4 basic ACL
does not have a description.
By default, the rule numbering
step is 5 and the start rule ID is 0.
By default, an IPv4 basic ACL
does not contain any rules.
By default, no rule comment is
configured.
acl basic
acl basic name
acl-number
Configuring an IPv6 basic ACL
IPv6 basic ACLs match packets based only on source IP addresses.
To configure an IPv6 basic ACL:
1. Enter system view.
system-view
5
N/A
Step
Command
Remarks
2. Create an IPv6 basic ACL
Step
Command
Remarks
view and enter its view.
3. (Optional.) Configure a
description for the IPv6 basic
ACL.
4. (Optional.) Set the rule
numbering step.
acl ipv6 basic
name
acl-name } [
auto
{
description
step
config
|
text
step-value
{ acl-number |
match-order
} ]
By default, no ACL exists.
The value range for a numbered
IPv6 basic ACL is 2000 to 2999.
Use the
acl-number command to enter the
view of a numbered IPv6 basic
ACL.
Use the
acl-name command to enter the
view of a named IPv6 basic ACL.
By default, an IPv6 basic ACL
does not have a description.
By default, the rule numbering
step is 5 and the start rule ID is 0.
WLAN client ACLs match packets based on t he SSID that the WLAN clients use to access the
WLAN. You can use WLAN client ACLs to perform access control on WLAN clients.
To configure a WLAN client ACL:
1. Enter system view.
2. Create a WLAN client ACL
and enter its view.
3. (Optional.) Configure a
description for the WLAN
client ACL.
4. (Optional.) Set the rule
numbering step.
system-view N/A
acl wlan client
{ acl-number |
acl-name }
description
step
step-value
name
text
}
By default
not contain any rules.
By default, no rule comment is
configured.
,
a Layer 2 ACL does
By default, no ACL exists.
The value range for a numbered WLAN
client ACL is 100 to 199.
Use the
command to enter the view of a
numbered WLAN client ACL.
Use the
acl-name command to enter the view of
a named WLAN client ACL.
By default, a WLAN client ACL does not
have a description.
By default, the rule numbering step is 5
and the start rule ID is 0.
acl wlan client
acl wlan client name
acl-number
9
Step
Command
Remarks
5. Configure or edit a rule.
Step
Command
Remarks
Step
Command
6. (Optional.) Add or edit a rule
comment.
rule
[ rule-id ] {
permit
rule
rule-id
} [
deny
ssid
ssid-name ]
comment
|
text
Configuring a WLAN AP ACL
WLAN AP ACLs match packets from WLAN APs based on the MAC address or serial ID.
To configure a WLAN AP ACL:
,
By default
contain any rules.
By default, no rule comment is
configured.
a WLAN client ACL does not
1. Enter system view.
2. Create a WLAN AP ACL and
enter its view.
3. (Optional.) Configure a
description for the WLAN AP
ACL.
4. (Optional.) Set the rule
numbering step.
5. Configure or edit a rule.
6. (Optional.) Add or edit a rule
comment.
Copying an ACL
system-view N/A
By default, no ACL exists.
The value range for a numbered
WLAN AP ACL is 200 to 299.
acl wlan ap
acl-name }
description
step
rule
mac
[
serial-id
[
rule
rule-id
{ acl-number |
text
step-value
[ rule-id ] {
mac-address mac-mask ]
deny
serial-id ]
comment
permit
|
text
name
Use the
command to enter the view of a
numbered WLAN AP ACL.
Use the
acl-name command to enter the
view of a named WLAN AP ACL.
By default, a WLAN AP ACL does
not have a description.
By default, the rule numbering
step is 5 and the start rule ID is 0.
}
By default
not contain any rules.
By default, no rule comment is
configured.
acl wlan ap
acl wlan ap name
,
a WLAN AP ACL does
acl-number
You can create an ACL by copying an existing ACL (source ACL). The new ACL (destination ACL)
has the same properties and content as the source ACL, but uses a different number or name than
the source ACL.
To successfully copy an ACL, make sure:
• The destination ACL number is from the same type as the source ACL number.
• The source ACL already exists, but the destination ACL does not.
To copy an ACL:
1. Enter system view.
10
system-view
Loading...
+ 39 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.