Home > HP > Printer > HP 5500 Ei 5500 Si Switch Series Configuration Guide

HP 5500 Ei 5500 Si Switch Series Configuration Guide

    Download as PDF Print this page Share this page

    Have a look at the manual HP 5500 Ei 5500 Si Switch Series Configuration Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 2513
    							ii 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 20 
    Defining a traffic behavior ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ··················\
    ····· 21 
    Defining a policy ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ···········  22 
    Configuration restrictions and guidelines ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ···· 22 
    Configuration  procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 22 
    Applying the QoS policy  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·················  22 
    Applying the QoS policy to an interface ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    ··· 23 
    Applying the QoS policy  to online users ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    ··· 23 
    Applying the QoS policy to a VLAN  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·······  24 
    Applying the QoS policy globally ·················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ······· 24 
    Applying the QoS policy  to the control plane··················\
    ··················\
    ··················\
    ··················\
    ··········· ················· 25 
    Displaying and mainta ining QoS policies ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    ········· 25 
    Configuring prio rity mapping ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········ ··················\
    ··············· 27 
    Overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··················\
    ······  27 
    Types of priorities ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················· ··················\
    ··················\
    ··· 27 
    Priority mapping tables  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···········  27 
    Priority trust mode on a port ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···  28 
    Priority mapping procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·········· ··················\
    ··········· 28 
    Configuration guidelines ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ··················\
    ····· 29 
    Configuring a priority mapping table  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··············  29 
    Configuring a port to trust packet priority for priority mapping ··················\
    ··················\
    ··················\
    ········ ················· 30 
    Changing the port priori ty of an interface ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ············ 30 
    Displaying priority mappings ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········ ··················\
    ··················\
    · 31 
    Priority trust mode configuration example ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············ 31 
    Network requirements  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············  31 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 32 
    Priority mapping table and priority  marking configuration example ··················\
    ··················\
    ··················\
    ······· ·········· 32 
    Network requirements  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············  32 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 33 
    Configuring traffic policing, tr affic shaping, and line rate ·················\
    ··················\
    ··················\
    ············· ··················\
    · 35 
    Overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··················\
    ······  35 
    Traffic evaluation and token buckets ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······· 35 
    Traffic policing ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·· ··················\
    ··················\
    ····· 36 
    Traffic shaping ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ··················\
    ···· 37 
    Line rate ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ··················\
    ········· 38 
    Configuring traffic policing ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········ ··················\
    ··················\
    ····· 39 
    Configuration restrictions and guidelines ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ···· 39 
    Configuration  procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 39 
    Configuring GTS ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ··················\
    ········· 40 
    Configuring the line rate ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··········· ··················\
    ··················\
    ······ 40 
    Displaying and maintaining traffic  policing, GTS, and line rate ··················\
    ··················\
    ··················\
    ········· ··············· 41 
    Traffic policing conf iguration example ··················\
    ··················\
    ··················\
    ··················\
    ················ ··················\
    ·············· 41 
    Network requirements  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············  41 
    Configuration procedures ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·······  42 
    Configuring congestion management ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ······· 44 
    Overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··················\
    ······  44 
    Congestion management techniques ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ··········· 44 
    SP queuing ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········ ··················\
    ··················\
    ····· 45 
    WRR queuing ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······· ··················\
    ··················\
    ·· 45 
    WFQ queuing ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······· ··················\
    ··················\
    · 47 
    SP+WRR queuing ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ················ 47 
    SP+WFQ queuing ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ··············· 48 
    Configuring SP queuing ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ··················\
    ···· 48  
    						
    							iii 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 48 
    Configuration example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    ·············· 48 
    Configuring WRR queuing ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··················\
    · 49 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 49 
    Configuration example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    ·············· 49 
    Configuring WFQ queuing ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··················\
     50 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 50 
    Configuration example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    ·············· 51 
    Configuring SP+WRR queuing ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·········· ··················\
    ··············· 52 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 52 
    Configuration example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    ·············· 52 
    Configuring SP+WFQ queuing ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·········· ··················\
    ·············· 53 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 53 
    Configuration example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    ·············· 54 
    Configuring congestion avoidance  (available only on the 5500 EI) ··················\
    ··················\
    ··················\
    ········ ······· 55 
    Overview  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··················\
    ······  55 
    Tail drop ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···························\
    ··················\
    ········ 55 
    RED and WRED ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ················· 55 
    Introduction to WRED configuration ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·· ··················\
    ·············· 56 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 56 
    Configuration examples··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    ············· 57 
    Displaying and maintaining WRED ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ············ 57 
    Configuring traffic filtering ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······· ··················\
    ··················\
    ··· 58 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··················\
    ···· 58 
    Traffic filtering configuration example ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    ················ 59 
    Network requirements  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············  59 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 59 
    Configuring priority marking  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·······  60 
    Color-based priority marking ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········ ··················\
    ··················\
    ·· 60 
    Coloring a packet ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    · ··················\
    ··················\
     60 
    Marking packets based on their colors  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···  60 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··················\
    ···· 61 
    Local precedence re-marking  configuration example ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    · 62 
    Network requirements  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············  62 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 62 
    Configuring traffic redirecting ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ··················\
     65 
    Configuration restrictio ns and guidelines ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 65 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··················\
    ···· 65 
    Redirect-to-next hop configuration example ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ·········· 66 
    Network requirements  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············  66 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 67 
    Configuring class-based accounting  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············  69 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··················\
    ···· 69 
    Displaying and maintainin g traffic accounting ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ········ 69 
    Class-based accounting  configuration example ··················\
    ··················\
    ··················\
    ··················\
    ·········· ··················\
    ····· 70 
    Network requirements  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············  70 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 70 
    Configuring the data bu ffer ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ··················\
     72 
    Overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··················\
    ······  72 
    Data buffer ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·························\
    ··················\
    ······ 72 
    Data buffer allocation ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ················· 72  
    						
    							iv 
    Data buffer configuration approaches ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············  73 
    Using the burst function to configure the data buffer setup ··················\
    ··················\
    ··················\
    ············· ··················\
    ·· 74 
    Manually configuring th e data buffer setup ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ·········· 74 
    Manually configurin g the data buffer ··················\
    ··················\
    ··················\
    ··················\
    ··················\
     ··················\
    ····· 74 
    Configuring the  cell resource ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······· ··················\
    ············ 74 
    Configuring the packet resource··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ········ 76 
    Applying the data buffer settings  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············  76 
    Appendix A Default priority mapping tables ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ····· 77 
    Uncolored priority mapping tables ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ··············· 77 
    Appendix B Packet precedences ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······· ··················\
    ··········· 78 
    IP precedence and DSCP values ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······· ··················\
    ··············· 78 
    802.1p priority ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ··················\
    ··········· 79 
    Index ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··················\
    ·············· 81 
      
    						
    							1 
    Configuring ACLs 
    •  Unless otherwise stated, ACLs refer to both IP v4 and IPv6 ACLs throughout this document. 
    •   The term  interface i n  t h e  ro u t i n g  f e a t u r e s  r e f e r s  t o  V L A N  i n t e r f a c e s ,  b r i d g e  m o d e  ( L a ye r  2 )  a n d  r o u t e  
    mode (Layer 3) Ethernet ports. You can set an Ethernet port to operate in route mode by using the 
    port  link-mode  route  command (see  Layer 2—LAN Switching Configuration Guide ). 5500 SI 
    Switch Series does not support Layer 3 Ethernet ports.  
    Overview 
    An access control list (ACL) is a set of rules (or perm it or deny statements) for identifying traffic based on 
    criteria such as source IP address, destination IP address, and port number.  
    ACLs are primarily used for packet filtering. A packet filter drops packets that match a deny rule and 
    permits packets that match a permit rule. ACLs are also used by many modules, QoS and IP routing for 
    example, for traffic classification and identification. 
    Applications on the switch 
    An ACL is implemented in hardware or software, depend ing on the module that uses it. If the module, the 
    packet filter or QoS module for example, is implem ented in hardware, the ACL is applied to hardware 
    to process traffic. If the module, the routing or user interface access control module (Telnet, SNMP, or web) 
    for example, is implemented in software, the ACL is applied to software to process traffic.  
    The user interface access control module denies packe ts that do not match any ACL. Some modules, QoS 
    for example, ignore the permit or deny action in  ACL rules and do not base their drop or forwarding 
    decisions on the action set in ACL rules. See the specified module for information about ACL application.   
    ACL categories  
    Category ACL number IP version Match criteria 
    Basic ACLs  2000 to 
    2999 IPv4  Source IPv4 address IPv6  Source IPv6 address 
    Advanced ACLs 
    3000 to 
    3999 IPv4 
    Source IPv4 address, destinat
    ion IPv4 address, packet 
    priority, protocols over IPv4, and other Layer 3 and Layer 4 
    header fields 
    IPv6  Source IPv6 address, destinat
    ion IPv6 address, packet 
    priority, protocols over IPv6, and other Layer 3 and Layer 4 
    header fields 
    Ethernet frame 
    header ACLs  4000 to 
    4999 IPv4 and 
    IPv6 Layer 2 header fields, such as source and destination MAC 
    addresses, 802.1p priority, and link layer protocol type 
      
    						
    							2 
    Numbering and naming ACLs 
    Each ACL category has a unique range of ACL numbers. When creating an ACL, you must assign it a 
    number. In addition, you can assign the ACL a name for ease of identification. After creating an ACL with 
    a name, you cannot rename it or delete its name. 
    For an Ethernet frame header ACL, the ACL number and name must be globally unique. For an IPv4 basic 
    or advanced ACLs, its ACL number and name must be unique among all IPv4 ACLs, and for an IPv6 
    basic or advanced ACL, its ACL number and name must be unique among all IPv6 ACLs. You can assign 
    an IPv4 ACL and an IPv6 ACL the same number and name.  
    Match order 
    The rules in an ACL are sorted in a specific order. When a packet matches a rule, the device stops the 
    match process and performs the action defined in the rule. If an ACL contains overlapping or conflicting 
    rules, the matching result and action to take depend on the rule order.  
    The following ACL match orders are available: 
    •   config —Sorts ACL rules in ascending order of rule ID. A rule with a lower ID is matched before a 
    rule with a higher ID. If you use this approach, carefully check the rules and their order. 
    •   auto —Sorts ACL rules in depth-first order. Depth-first ordering guarantees that any subset of a rule 
    is always matched before the rule.  Tabl e  1 lists the 
     sequence of tie breakers that depth-first ordering 
    uses to sort rules for each type of ACL.  
    Table 1  Sort ACL rules in depth-first order 
    ACL cate
    gory Sequence of tie breakers 
    IPv4 basic ACL  1.
      VPN instance 
    2.   More 0s in the source IP address wildcard (more 0s means a narrower IP 
    address range) 
    3.   Rule configured earlier 
    IPv4 advanced ACL  1.
      VPN instance 
    2.   Specific protocol type rather than IP (IP represents any protocol over IP) 
    3.   More 0s in the source IP address wildcard mask 
    4.   More 0s in the destination IP address wildcard 
    5.   Narrower TCP/UDP service port number range 
    6.   Rule configured earlier 
    IPv6 basic ACL  1.
      VPN instance 
    2.   Longer prefix for the source IP address (a longer prefix means a narrower IP 
    address range) 
    3.   Rule configured earlier 
    IPv6 advanced ACL  1.
      VPN instance 
    2.   Specific protocol type rather than IP (IP represents any protocol over IPv6) 
     
    3.  Longer prefix for the source IPv6 address 
    4.   Longer prefix for the destination IPv6 address 
    5.   Narrower TCP/UDP service port number range 
    6.   Rule configured earlier  
    						
    							3 
    ACL category Sequence of tie breakers 
    Ethernet frame header ACL 7.
      More 1s in the source MAC address mask (more 1s means a smaller MAC 
    address) 
    8.   More 1s in the destination MAC address mask 
    9.   Rule configured earlier 
     
    A wildcard mask, also called an inverse mask, is a 32-bit binary and represented in dotted decimal 
    notation. In contrast to a network mask, the 0 bits in a wildcard mask represent do care bits, and the 
    1 bits represent don’t care bits. If the do care bits in an IP address are identical to the do care bits 
    in an IP address criterion, the IP address matches the criterion. All don’t care bits are ignored. The 0s 
    and 1s in a wildcard mask can be noncontiguous. For example, 0.255.0.255 is a valid wildcard mask 
     
      NOTE:  
    Only 5500 EI Switch Series supports VPN  instance configuration in an ACL rule. . 
     
    ACL rule comments and rule range remarks 
    You can add a comment about an ACL rule to make it easy to understand. The rule comment appears 
    below the rule statement.  
    You can also add a rule range remark to indicate the start or end of a range of rules created for the same 
    purpose. A rule range remark always appears above the specified ACL rule. If the specified rule has not 
    been created yet, the position of the comment in the ACL is as follows:  
    •  If the match order is config, the remark is inserted into the ACL in descending order of rule ID. 
    •   If the match order is auto, the remark is placed at the end of the ACL. After you create the rule, the 
    remark appears above the rule.  
    For more information about how to use rule range remarks, see the  rule remark command in  ACL and 
    QoS Command Reference  for your device.  
    ACL rule numbering 
    What is the ACL rule numbering step 
    If you do not assign an ID to the rule you are creating, the system automatically assigns it a rule ID. The 
    rule numbering step sets the increment by which the system automatically numbers rules. For example, the 
    default ACL rule numbering step is 5. If you do not assign IDs to rules you are creating, they are 
    automatically numbered 0, 5, 10, 15, and so on. The wider the numbering step, the more rules you can 
    insert between two rules.  
    By introducing a gap between rules rather than contiguously numbering rules, you have the flexibility of 
    inserting rules in an ACL. This feature is importan t for a config order ACL, where ACL rules are matched 
    in ascending order of rule ID.  
    Automatic rule numbering and renumbering 
    The ID automatically assigned to an ACL rule takes th e nearest higher multiple of the numbering step to 
    the current highest rule ID, starting with 0. 
    For example, if the numbering step is 5 (the default) , and there are five ACL rules numbered 0, 5, 9, 10, 
    and 12, the newly defined rule is numbered 15. If th e ACL does not contain any rule, the first rule is 
    numbered 0.   
    						
    							4 
    Whenever the step changes, the rules are renumbered, starting from 0. For example, if there are five rules 
    numbered 5, 10, 13, 15, and 20, changing the step from 5 to 2 causes the rules to be renumbered 0, 2, 
    4, 6, and 8.  
    Fragments filtering with ACLs 
    Traditional packet filtering matches only first fragments of packets, and allows all subsequent non-first 
    fragments to pass through. Attackers can fabricate non-first fragments to attack networks.  
    To avoids the risks, the HP ACL implementation: 
    •  Filters all fragments by default, including non-first fragments. 
    •   Allows for matching criteria modification, for example, filters non-first fragments only. 
    ACL configuration task list 
     
    Task Remarks 
    Configuring a time range  Optional 
    Applicable to IPv4 and IPv6 ACLs. 
    Configuring a basic ACL 
    Required 
    Configure at least one task. 
    Applicable to IPv4 and IPv6 except that simple ACLs 
    are for IPv6. 
    Configuring an advanced ACL 
    Configuring an Ethernet frame header ACL 
    Copying an ACL Optional 
    Applicable to IPv4 and IPv6. 
    Packet filtering with ACLs Optional 
    Applicable to IPv4 and IPv6. 
     
    Configuring a time range 
    You can implement ACL rules based on the time of day by applying a time range to them. A time-based 
    ACL rule only takes effect in any time periods specified by the time range.  
    The following basic types of time range are available: 
    •
      Pe riodic tim e  rang e —Recurs periodically on a day or days of the week. 
    •   Absolute time range —Represents only a period of time and does not recur. 
    You can create a maximum of 256 time ranges, each with a maximum of 32 periodic statements and 12 
    absolute statements. The active period of  a time range is calculated as follows: 
    1. Combining all periodic statements. 
    2. Combining all absolute statements. 
    3. Taking the intersection of the two statement se ts as the active period of the time range. 
    To configure a time range: 
     
    Step Command Remarks 
    1.   Enter system view. 
    system-view  N/A  
    						
    							5 
    Step Command Remarks 
    2.  Configure a time 
    range.   time-range
     time-range-name  
    {  start-time  to  end-time  days  [ from  
    time1 date1  ] [ to time2 date2  ] | 
    from  time1 date1  [ to time2 date2  ] 
    |  to time2 date2  }  By default, no time range exists. 
    Repeat this command with the same time 
    range name to create multiple statements for 
    a time range. 
     
    Configuring a basic ACL 
    Configuring an IPv4 basic ACL 
    IPv4 basic ACLs match packets based only on source IP addresses. 
    To configure an IPv4 basic ACL:  
     
    Step 
    Command  Remarks 
    1.  Enter system view. 
    system-view  N/A 
    2.  Create an IPv4 
    basic ACL and 
    enter its view.  acl number
     acl-number 
    [ name  acl-name  ] 
    [ match-order  { auto | 
    config  } ]  By default, no ACL exists. 
    IPv4 basic ACLs are numbered
     in the range of 2000 to 
    2999. 
    You can use the  acl name  acl-name  command to enter 
    the view of a named IPv4 ACL.   
    3.  Configure a 
    description for the 
    IPv4 basic ACL.  description 
    text  Optional. 
    By default, an IPv4 basic 
    ACL has no ACL description.
     
    4.  Set the rule 
    numbering step.  step
     step-value   Optional. 
    The default setting is 5. 
    5.
      Create or edit a 
    rule.   rule
     [ rule-id  ] { deny | 
    permit  } [ counting  | 
    fragment  | logging |  
    source  { sour-addr 
    sour-wildcard  | any  } | 
    time-range  
    time-range-name  | 
    vpn-instance 
    vpn-instance-name  ] * By default, an IPv4 basic ACL does not contain any rule.
     
    The 
    vpn-instance  vpn-instanced-name  option is not 
    available on a 5500 SI switch. 
    If the ACL is for QoS traffic classification or packet 
    filtering, do not specify the vpn-instance  keyword. This 
    keyword can cause ACL application failure. The 
    logging  and counting  keywords (even if specified) do 
    not take effect for QoS policies. 
    6.   Add or edit a rule 
    comment.   rule
     rule-id  comment  text   Optional. 
    By default, no rule comments are configured.
     
    7.  Add or edit a rule 
    range remark.  rule
     [ rule-id  ] remark  text Optional. 
    By default, no rule rang e remarks are configured. 
    8.  Enable counting 
    ACL rule matches 
    performed in 
    hardware.  hardware-count enable  Optional. 
    Disabled by default.  
    When the ACL is referenced by a QoS policy, this 
    command does not take effect. 
      
    						
    							6 
    Configuring an IPv6 basic ACL 
    To configure an IPv6 basic ACL:  
    Step Command  Remarks 
    1.  Enter system view. 
    system-view  N/A 
    2.  Create an IPv6 
    basic ACL view 
    and enter its view.  acl ipv6 number
     
    acl6-number  [ name 
    acl6-name  ] [ match-order  
    {  auto  | config  } ]  By default, no ACL exists. 
    IPv6 basic ACLs are numbered in the range of 2000 
    to 2999. 
    You can use the 
    acl ipv6  name  acl6-name  command 
    to enter the view of a named IPv6 ACL.  
    3.  Configure a 
    description for the 
    IPv6 basic ACL.  description 
    text  Optional. 
    By default, an IPv6 basic ACL has no ACL 
    description. 
    4.
      Set the rule 
    numbering step.  step
     step-value   Optional. 
    The default setting is 5. 
    5.
      Create or edit a 
    rule.   rule
     [ rule-id  ] { deny | 
    permit  } [ counting  | 
    fragment  | logging | 
    routing  [ type  routing-type  ] 
    |  source {  ipv6-address  
    prefix-length |  
    ipv6-address/ prefix-length 
    |  any  } |  time-range  
    time-range-name  | 
    vpn-instance  
    vpn-instance-name  ] * By default, an IPv6 basic ACL does not contain any 
    rule.  
    The vpn-instance 
    vpn-instance-name option is not 
    available on a 5500 SI switch. 
    If the ACL is for QoS traffic classification or packet 
    filtering, do not specify the fragment , routing, and 
    vpn-instance  keywords. The keywords can cause ACL 
    application failure. 
    The  logging  and counting  keywords (even if 
    specified) do not take effect for QoS.  
    6.   Add or edit a rule 
    comment.   rule
     rule-id  comment  text   Optional. 
    By default, no rule comments are configured.
     
    7.  Add or edit a rule 
    range remark.  rule
     [ rule-id  ] remark  text   Optional. 
    By default, no rule rang
    e remarks are configured. 
    8.  Enable counting 
    ACL rule matches 
    performed in 
    hardware.  hardware-count enable  Optional. 
    Disabled by default.  
    When the ACL is referenced by a QoS policy, this 
    command does not take effect. 
     
    Configuring an advanced ACL 
    Configuring an IPv4 advanced ACL 
    IPv4 advanced ACLs match packets based on source
     IP addresses, destination IP addresses, packet 
    priorities, protocols over IP, and other protocol  header information, such as TCP/UDP source and 
    destination port numbers, TCP flags, ICMP message types, and ICMP message codes. 
    Compared to IPv4 basic ACLs, IPv4 advanced ACLs allow more flexible and accurate filtering. 
    To configure an IPv4 advanced ACL:  
    						
    							7 
     
    Step Command  Remarks 
    1.  Enter system view.  
    system-view  N/A 
    2.  Create an IPv4 
    advanced ACL 
    and enter its 
    view.   acl number
     acl-number  [ name 
    acl-name ]  [ match-order  { auto 
    |  config  } ]  By default, no ACL exists. 
    IPv4 advanced ACLs are numbered in the range of 
    3000 to 3999.  
    You can use the 
    acl name  acl-name  command to 
    enter the view of a named IPv4 ACL.  
    3.  Configure a 
    description for 
    the IPv4 
    advanced ACL.  description 
    text  Optional. 
    By default, an IPv4 ad
    vanced ACL has no ACL 
    description. 
    4.   Set the rule 
    numbering step.  step
     step-value   Optional. 
    The default setting is 5. 
    5.
      Create or edit a 
    rule.   rule
     [ rule-id  ] { deny |  permit } 
    protocol  [ { { ack ack-value  | fin 
    fin-value  | psh  psh-value |  rst 
    rst-value  | syn  syn-value |  urg 
    urg-value  } * | established  } | 
    counting  | destination  
    {  dest-addr dest-wildcard  | any } 
    |  destination-port  operator 
    port1  [ port2  ] | dscp  dscp  | 
    fragment |  icmp-type 
    {  icmp-type  [ icmp-code  ] | 
    icmp-message  } | logging |  
    precedence  precedence | 
    source  { sour-addr sour-wildcard  
    |  any  } |  source-port  operator 
    port1  [ port2  ] | time-range  
    time-range-name  | tos  tos  | 
    vpn-instance 
    vp
    
    n-instance-name  ] *  By default, an IPv4 advanced ACL does not 
    contain any rule. 
    The vpn-instance 
    vpn-instance-name  option is not 
    available on a 5500 SI switch. 
    If an IPv4 advanced ACL is for QoS traffic 
    classification or packet filtering, do not specify the 
    vpn-instance  keyword or specify neq  for the 
    operator  argument.  
    The  logging  and counting  keywords (even if 
    specified) do not take effect for QoS traffic 
    classification. 
    6.   Add or edit a 
    rule comment.  rule
     rule-id  comment  text   Optional. 
    By default, no rule comments are configured.
     
    7.  Add or edit a 
    rule range 
    remark.  rule
     [ rule-id  ] remark  text   Optional. 
    By default, no rule range remarks are configured.
     
    8.
      Enable counting 
    ACL rule 
    matches 
    performed in 
    hardware.  hardware-count enable 
    Optional. 
    Disabled by default.  
    When the ACL is referenced by a QoS policy, this 
    command does not take effect. 
     
    Configuring an IPv6 advanced ACL 
    IPv6 advanced ACLs match packets based on the source IPv6 addresses, destination IPv6 addresses, 
    packet priorities, protocols carried over IPv6, and 
    other protocol header fields such as the TCP/UDP 
    source port number, TCP/UDP destination port nu mber, ICMPv6 message type, and ICMPv6 message 
    code.   
    						
    All HP manuals Comments (0)

    Related Manuals for HP 5500 Ei 5500 Si Switch Series Configuration Guide