Home > HP > Printer > HP 5500 Ei 5500 Si Switch Series Configuration Guide

HP 5500 Ei 5500 Si Switch Series Configuration Guide

    Download as PDF Print this page Share this page

    Have a look at the manual HP 5500 Ei 5500 Si Switch Series Configuration Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 2513
    							8 
    Compared to IPv6 basic ACLs, IPv6 advanced ACLs allow more flexible and accurate filtering.  
    To configure an IPv6 advanced ACL: 
     
    Step Command  Remarks 
    1.  Enter system 
    view.   system-view 
    N/A 
    2.  Create an IPv6 
    advanced ACL 
    and enter its 
    view.   acl ipv6
     number  acl6-number 
    [ name  acl6-name ] 
    [  match-order  { auto | config  } ]
     
    By default, no ACL exists.  
    IPv6 advanced ACLs are numbered in the range of 
    3000 to 3999. 
    You can use the  acl ipv6  name  acl6-name  command 
    to enter the view of a named IPv6 ACL.  
    3.  Configure a 
    description for 
    the IPv6 
    advanced ACL.  description 
    text  Optional. 
    By default, an IPv6 advanced ACL has no ACL 
    description. 
    4.
      Set the rule 
    numbering 
    step.  step
     step-value   Optional. 
    5 by default. 
    5.
      Create or edit a 
    rule.  rule
     [ rule-id  ] { deny |  permit } 
    protocol  [ { { ack ack-value  | fin 
    fin-value  | psh  psh-value |  rst 
    rst-value  | syn  syn-value |  urg 
    urg-value  } * | established  } | 
    counting  | destination  { dest 
    dest-prefix  | dest/dest-prefix  | 
    any  } | destination-port 
    operator port1  [ port2  ] | dscp  
    dscp  | flow-label 
    flow-label-value  | fragment  | 
    icmp6-type  { icmp6-type  
    icmp6-code  | icmp6-message  } 
    |  logging  | routing  [ type 
    routing-type  ] | source {  source 
    source-prefix  | 
    source/source-prefix  | any } | 
    source-port  operator port1 
    [  port2
      ] | time-range  
    time-range-name  | vpn-instance 
    vpn-instance-name  ] * By default IPv6 advanced 
    ACL does not contain any 
    rule. 
    The vpn-instance  vpn-instance-name option is not 
    available on a 5500 SI switch. 
    If an IPv6 advanced ACL is for QoS traffic 
    classification or packet filtering: 
    •  Do not specify the  fragment, routing , or 
    vpn-instance  keyword, or specify  neq for the 
    operator  argument.  
    • Do not specify the  flow-label keyword if the ACL 
    is for outbound QoS traffic classification or 
    outbound packet filtering on a 5500 EI switch. 
    The  logging  and counting  keywords (even if 
    specified) do not take effect for QoS traffic 
    classification. 
    6.   Add or edit a 
    rule comment.  rule
     rule-id  comment  text   Optional. 
    By default, no rule comments are configured.
     
    7.  Add or edit a 
    rule range 
    remark.  rule
     [ rule-id  ] remark  text   Optional. 
    By default, no rule rang
    e remarks are configured. 
    8.  Enable 
    counting ACL 
    rule matches 
    performed in 
    hardware.  hardware-count enable
     Optional. 
    Disabled by default.  
    When the ACL is referenced by a QoS policy, this 
    command does not take effect. 
      
    						
    							9 
    Configuring an Ethernet frame header ACL 
    Ethernet frame header ACLs, also called Layer 2 ACLs, match packets based on Layer 2 protocol 
    header fields, such as source MAC address, destination MAC address, 802.1p priority (VLAN priority), 
    and link layer protocol type.  
    To configure an Ethernet frame header ACL: 
     
    Step Command  Remarks 
    1.  Enter system 
    view.   system-view N/A 
    2.
      Create an 
    Ethernet frame 
    header ACL 
    and enter its 
    view.   acl number
     acl-number 
    [ name  acl-name  ] 
    [ match-order  { auto | 
    config  } ]  By default, no ACL exists. 
    Ethernet frame header ACLs are numbered in the 
    range of 4000 to 4999. 
    You can use the 
    acl name  acl-name  command to enter 
    the view of a named Ethernet frame header ACL.  
    3.  Configure a 
    description for 
    the Ethernet 
    frame header 
    ACL.   description 
    text  Optional. 
    By default, an Ethernet frame header ACL has no ACL 
    description. 
    4.
      Set the rule 
    numbering 
    step.  step
     step-value   Optional. 
    The default setting is 5. 
    5.
      Create or edit a 
    rule.   rule 
    [ rule-id  ] { deny | 
    permit  } [ cos vlan-pri | 
    counting  | dest-mac  
    dest-addr  dest-mask  | { lsap 
    lsap-type  lsap-type-mask  | 
    type  protocol-type  
    protocol-type-mask  } | 
    source-mac  sour-addr  
    source-mask  | time-range  
    time-range-name  ] * By default
    , an Ethernet frame header ACL does not 
    contain any rule. 
    If the ACL is for QoS traffic classification or packet 
    filtering, to use the  lsap keyword, the lsap-type 
    argument must be AAAA, and the  lasp-type-mask 
    argument must be FFFF. Otherwise, the ACL cannot be 
    function normally. 
    6.   Add or edit a 
    rule comment.  rule
     rule-id  comment  text   Optional. 
    By default, no rule comments are configured.
     
    7.  Add or edit a 
    rule range 
    remark.  rule
     [ rule-id  ] remark  text   Optional. 
    By default, no rule rang
    e remarks are configured. 
    8.  Enable 
    counting ACL 
    rule matches 
    performed in 
    hardware.  hardware-count enable
     Optional. 
    Disabled by default.  
    When the ACL is referenced by a QoS policy, this 
    command does not take effect. 
     
    Copying an ACL 
    You can create an ACL by copying an existing ACL (source ACL) . The new ACL (destination ACL) has the 
    same properties and content as the source AC
    L, but not the same ACL number and name.   
    						
    							10 
    To successfully copy an ACL, make sure that: 
    •  The destination ACL number is from the same category as the source ACL number.  
    •   The source ACL already exists but the destination ACL does not.  
    Copying an IPv4 ACL  
    Step Command 
    1.  Enter system view. 
    system-view 
    2.  Copy an existing IPv4 ACL to create a 
    new IPv4 ACL.  acl copy 
    { source-acl-number  | name  source-acl-name  } to  
    {  dest-acl-number |  name dest-acl-name  } 
     
    Copying an IPv6 ACL  
    Step Command 
    1.  Enter system view. 
    system-view 
    2.  Copy an existing IPv6 ACL to generate a 
    new one of the same category.  acl ipv6 copy { 
    source-acl6-number |  name 
    source-acl6-name }  to { dest-acl6-number  | name 
    dest-acl6-name  } 
     
    Packet filtering with ACLs 
    Yo u  c a n  u s e  a n  A C L  t o  f i l t e r  i n c o m i n g  o r  o u t g o i n g  I P v 4  o r  I P v 6  p a c k e t s .  Yo u  c a n  a p p l y  o n e  I P v 4  A C L ,  o n e  
    IPv6 AL, and one Ethernet frame header ACL most to filter packets in the same direction of an interface. 
    W i t h  a  b a s i c  o r  a d v a n c e d  AC L ,  y o u  c a n  l o g  f i l t e r i n g  e v e n t s  b y  s p e c i f yi n g  t h e   logging keyword in the ACL 
    rules and enabling the counting function. To enable counting for rule matches performed in hardware, 
    configure the  hardware-count enable  command for the ACL or specify the  counting keyword in the ACL 
    rules. 
    You can set the packet filter to periodically send  packet filtering logs to the information center as 
    informational messages. The interval for generating an d outputting packet filtering logs is configurable. 
    The log information includes the number of matching  packets and the ACL rules used in an interval. For 
    more information about the information center, see Network Management and Monitoring 
    Configuration Guide . 
     
     NOTE: 
    ACLs on VLAN interfaces filter only packets forwarded at Layer 3.  
    Applying an IPv4 or Ethern et frame header ACL for packet 
    filtering 
     
    Step Command Remarks 
    1.   Enter system view. 
    system-view N/A  
    						
    							11 
    Step Command Remarks 
    2.  Enter interface view.  interface 
    interface-type 
    interface-number N/A 
    3.   Apply an IPv4 basic, IPv4 
    advanced, or Ethernet frame 
    header ACL to the interface to 
    filter packets.  packet-filter { acl-number
     | 
    name  acl-name } { inbound  
    |  outbound  }  By default, no ACL is applied to any 
    interface. 
    4.
      Exit to system view. 
    quit N/A 
    5.  Set the interval for generating 
    and outputting IPv4 packet 
    filtering logs.  acl logging frequence
     
    frequence   By default, the interval is 0. No IPv4 
    packet filtering logs are generated. 
     
    Applying an IPv6 ACL for packet filtering  
    Step Command Remarks 
    1.
      Enter system view. 
    system-view  N/A 
    2.  Enter interface view.  interface 
    interface-type 
    interface-number N/A 
    3.   Apply an IPv6 basic or IPv6 
    advanced ACL to the interface 
    to filter IPv6 packets.  packet-filter ipv6
     { acl6-number | 
    name  acl6-name } { inbound  | 
    outbound  }  By default, no IPv6 ACL is applied 
    to the interface. 
    4.
      Exit to system view. 
    quit  N/A 
    5.  Set the interval for generating 
    and outputting IPv6 packet 
    filtering logs.  acl ipv6 logging frequence 
    frequence
      The default interval is 0. No IPv6 
    packet filtering logs are generated.
     
     
    Displaying and maintaining ACLs 
     
    Task Command Remarks 
    Display configuration and match 
    statistics for one or all IPv4 ACLs.  display
     acl { acl-number  | all |  name  
    acl-name } [ slot  slot-number ] [ | { begin | 
    exclude  | include  } regular-expression ]  Available in any view 
    Display configuration and match 
    statistics for one or all IPv6 ACLs.  display
     acl  ipv6 { acl6-number  | all |  name  
    acl6-name  } [ slot slot-number  ] [ | { begin | 
    exclude  | include  } regular-expression ]  Available in any view 
    Display the usage of ACL rules.  display acl resource
     [ slot slot-number  ] [ | 
    {  begin |  exclude | include  } 
    regular-expression  ]  Available in any view  
    Display the application status of 
    packet filtering ACLs on interfaces.  display
     packet-filter { { all  | interface  
    interface-type  interface-number  } [ inbound | 
    outbound  ] | interface  vlan-interface 
    vlan-interface-number  [ inbound | outbound  ] 
    [ slot  slot-number  ] } [ | { begin  | exclude | 
    include  } regular-expression ]  Available in any view  
    						
    							12 
    Task Command Remarks 
    Display the configuration and 
    status of one or all time ranges. display time-range 
    { time-range-name  | all } 
    [ |  { begin |  exclude | include } 
    regular-expression  ]  Available in any view
     
    Clear statistics for one or all IPv4 
    ACLs.
      reset
     acl  counter { acl-number  | all |  name  
    acl-name }   Available in user view 
    Clear statistics for one or all IPv6 
    basic and advanced ACLs. reset
     acl  ipv6  counter { acl6-number  | all  | 
    name  acl6-name }   Available in user view 
     
    Configuration example of using ACL for device 
    management 
    Network requirements 
    As shown in 
    Figure 1, configure ACLs so that: 
    •   Host A  c an telnet to  the  swi tch only du ri ng the  work i ng  time  ( 8 :30  to  18 : 0 0  of  ever y worki ng  day) .  
    •   As a TFTP client, the switch can get files from only the server 1 1.1.1.1 0 0 .  T h i s  m a k e s  s u r e  t h a t  t h e  
    switch saves only authorized files.  
    •   As an FTP server, the switch accepts the login requests from only the NMS.  
    Figure 1  Network diagram 
     
     
    Configuration procedure 
    1. Limit the telnet login requests.  
    # Create a time range named  telnet to cover 8:30 to 18:00 of every working day.  
     system-view 
    Servers
    R&D dept. Admin dept.Host A
    10.1.3.1
    Switch
    10.1.3.254
    10.1.3.0/24
    TFTP server11.1.1.100 
    						
    							13 
    [Switch] time-range telnet 8:30 to 18:00 working-day 
    # Create IPv4 basic ACL 2000, and configure a rule for the ACL to permit the packets sourced 
    from 10.1.3.1 during only the time specified by time range  telnet.  
    [Switch] acl number 2000 
    [Switch-acl-basic-2000] rule permit source 10.1.3.1 0 time-range telnet \
    [Switch-acl-basic-2000] quit 
    # Apply ACL 2000 to the inbound traffic of all telnet user interfaces to limit the telnet login 
    requests.  
    [Switch] user-interface vty 0 4 
    [Switch-ui-vty0-4] acl 2000 inbound 
    2.  Limit the access to the TFTP server.  
    # Create IPv4 basic ACL 2001, and configure a rule  for the ACL to permit only the packets sourced 
    from 11.1.1.100.  
    [Switch] acl number 2001 
    [Switch-acl-basic-2001] rule permit source 11.1.1.100 0  
    [Switch-acl-basic-2001] quit 
    # Use ACL 2001 to control the switchs access to a specific TFTP server.  
    [Switch] tftp-server acl 2001 
    3.  Limit the FTP login requests.  
    # Create IPv4 basic ACL 2002, and configure a rule  for the ACL to permit only the packets sourced 
    from 10.1.3.1.  
    [Switch] acl number 2002 
    [Switch-acl-basic-2001] rule permit source 10.1.3.1 0 
    [Switch-acl-basic-2001] quit 
    # Enable the FTP server on the switch.  
    [Switch] ftp server enable 
    # Use ACL 2001 to control FTP clients access to the FTP server.  
    [Switch] ftp server acl 2002 
    IPv4 packet filtering configuration example 
    Network requirements 
    As shown in  Figure 2, apply an ACL to the inbound direction of interface GigabitEthernet 1/0/1 on 
    Device A so that every day from 08:00 to 18:00 the interface allows only packets sourced from Host A 
    to pass. Configure Device A to output IPv4 packet fi ltering logs to the console at 10-minute intervals. 
    Figure 2  Network diagram 
     
      
    						
    							14 
    Configuration procedure 
    # Create a time range from 08:00 to 18:00 every day. 
     system-view 
    [DeviceA] time-range study 8:00 to 18:00 daily 
    # Create IPv4 ACL 2009, and configure two rules in the ACL. One rule permits packets sourced from 
    Host A and the other denies packets sourced from any other host during the time range study. Enable 
    logging for the permit rule. 
    [DeviceA] acl number 2009 
    [DeviceA-acl-basic-2009] rule permit source 192.168.1.2 0 time-range stu\
    dy logging 
    [DeviceA-acl-basic-2009] rule deny source any time-range study  
    [DeviceA-acl-basic-2009] quit 
    # Enable the device to generate and output IPv4 packet filtering logs at 10-minute intervals. 
    [DeviceA] acl logging frequence 10 
    # Configure the device to output inform ational log messages to the console. 
    [DeviceA] info-center source default channel 0 log level informational 
    # Apply IPv4 ACL 2009 to filter incoming packets on GigabitEthernet 1/0/1.  
    [DeviceA] interface gigabitethernet 1/0/1 
    [DeviceA-GigabitEthernet1/0/1] packet-filter 2009 inbound 
    [DeviceA-GigabitEthernet1/0/1] quit 
    IPv6 packet filtering configuration example 
    Network requirements 
    As shown in Figure 3, apply an IPv6 ACL to the incoming traffic of GigabitEthernet 1/0/1 on Device A 
    so that every day from 08:00 to 18:00 the interface allows only packets from Host A to pass through. 
    Configure Device A to output IPv4 packet filtering logs to the console at 10-minute intervals. 
    Figure 3  Network diagram 
     
     
    Configuration procedure 
    # Create a time range from 08:00 to 18:00 every day. 
     system-view 
    [DeviceA] time-range study 8:0 to 18:0 daily  
    						
    							15 
    # Create IPv6 ACL 2009, and configure two rules for the ACL. One permits packets sourced from Host 
    A and the other denies packets sourced from any other host during the time range study. Enable logging 
    for the permit rule. 
    [DeviceA] acl ipv6 number 2009 
    [DeviceA-acl6-basic-2009] rule permit source 1001::2 128 time-range stud\
    y logging 
    [DeviceA-acl6-basic-2009] rule deny source any time-range study  
    [DeviceA-acl6-basic-2009] quit 
    # Configure the device to collect and output IPv6  packet filtering logs at 10-minute intervals.  
    [DeviceA] acl ipv6 logging frequence 10 
    # Configure the device to output informational log messages to the console.  
    [DeviceA] info-center source default channel 0 log level informational 
    # Apply IPv6 ACL 2009 to filter incoming packets on GigabitEthernet 1/0/1.  
    [DeviceA] interface gigabitethernet 1/0/1 
    [DeviceA-GigabitEthernet1/0/1] packet-filter ipv6 2009 inbound 
    [DeviceA-GigabitEthernet1/0/1] quit  
    						
    							 16 
    QoS overview 
    In data communications, Quality of Service (QoS) is a network’s ability to provide differentiated service 
    guarantees for diversified traffic in terms of bandwidth, delay, jitter, and drop rate. 
    Network resources are scarce. The contention for resources requires that QoS prioritize important traffic 
    flows over trivial ones. For example, in the case of fixed bandwidth, if a traffic flow gets more bandwidth, 
    the other traffic flows will get less bandwidth and may be affected. When making a QoS scheme, you 
    must consider the characteristics of various applications to balance the interests of diversified users and 
    to utilize network resources. 
    The following section describes some typical QoS service models and widely used, mature QoS 
    techniques. 
    QoS service models 
    Best-effort service model 
    The best-effort model is a single-service model and also  the simplest service model. In this service model, 
    the network does its best to deliver packets, but  does not guarantee delivery or control delay. 
    The best-effort service model is the default model in the Internet and applies to most network applications. 
    It uses the first in first out (FIFO) queuing mechanism. 
    IntServ model 
    The integrated service (IntServ) model is a multip le-service model that can accommodate diverse QoS 
    requirements. This service model provides the most  granularly differentiated QoS by identifying and 
    guaranteeing definite QoS for each data flow. 
    In the IntServ model, an application must request se rvice from the network before it sends data. IntServ 
    signals the service request with the Resource Reservation Protocol (RSVP). All nodes receiving the request 
    reserve resources as requested and maintain  state information for the application flow. 
    The IntServ model demands high stor age and processing capabilities because it requires all nodes along 
    the transmission path to maintain resource state information for each flow. This model is suitable for 
    small-sized or edge networks, but not large-sized netw orks, for example, the core layer of the Internet, 
    where billions of flows are present.  
    DiffServ model 
    The differentiated service (DiffServ) model is a mu ltiple-service model that can satisfy diverse QoS 
    requirements. It is easy to implement and extend . DiffServ does not signal the network to reserve 
    resources before sending data, as IntServ does. 
    All QoS techniques in this document  are based on the DiffServ model.  
    						
    							 17 
    QoS techniques 
    The QoS techniques include traffic classification, traffic policing, traffic shaping, line rate, congestion 
    management, and congestion avoidance. They address problems that arise at different positions of a 
    network.  
    Figure 4  Placement of the QoS techniques in a network 
     
     
    As shown in Figure 4, traffic classification, traffic shaping, traffic policing, congestion management, and 
    congestion avoidance mainly implement the following functions: 
    •   Traffic classification —Uses certain match criteria to assign packets with the same characteristics to 
    a class. Based on classes, you can provide differentiated services. 
    •   Traf fic policing —Polices flows entering or leaving a device, and imposes penalties on traffic flows 
    that exceed the pre-set threshold to prevent aggressive use of network resources. You can apply 
    traffic policing to both incoming  and outgoing traffic of a port. 
    •   Traffic shaping —Proactively adapts the output rate of traffic to the network resources available on 
    the downstream device to eliminate packet drops. Traffic shaping usually applies to the outgoing 
    traffic of a port. 
    •   Congestion management —Provides a resource scheduling policy to determine the packet 
    forwarding sequence when congestion occurs. Congestion management usually applies to the 
    outgoing traffic of a port. 
    •   Congestion avoidance —Monitors the network resource usage, and is usually applied to the 
    outgoing traffic of a port. When congestion worsens, congestion avoidance reduces the queue 
    length by dropping packets. 
     
      
    						
    All HP manuals Comments (0)

    Related Manuals for HP 5500 Ei 5500 Si Switch Series Configuration Guide