Page 2
, H3CS, H3CIE, H3CNE, Aolynk, Care, , IRF, NetPilot, Netflow, SecEngine, SecPath, SecCenter, SecBlade, Comware, ITCMM and HUASAN are trademarks of New H3C Technologies Co., Ltd. All other trademarks that may be mentioned in this manual are the property of their respective owners Notice The information in this document is subject to change without notice.
Page 3
This documentation is intended for: • Network planners. • Field technical support and servicing engineers. • Network administrators working with the H3C MSR Router series. Conventions The following information describes the conventions used in the documentation. Command conventions Convention Description Boldface Bold text represents commands and keywords that you enter literally as shown.
Page 4
Convention Description Multi-level menus are separated by angle brackets. For > example, File > Create > Folder. Symbols Convention Description An alert that calls attention to important information that if not understood or followed WARNING! can result in personal injury. An alert that calls attention to important information that if not understood or followed CAUTION: can result in data loss, data corruption, or damage to hardware or software.
Obtaining documentation To access the most up-to-date H3C product documentation, go to the H3C website at http://www.h3c.com.hk To obtain information about installation, configuration, and maintenance, click http://www.h3c.com.hk/Technical_Documents...
AAA commands The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features, commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about FIPS mode, see Security Configuration Guide. IPv6-related parameters are not supported on the following routers: •...
aaa session-limit Use aaa session-limit to set the maximum number of concurrent users that can log on to the device through the specified method. Use undo aaa session-limit to restore the default maximum number of concurrent users for the specified login method. Syntax In non-FIPS mode: aaa session-limit { ftp | http | https | ssh | telnet } max-sessions...
Page 26
Syntax In non-FIPS mode: accounting advpn { local [ none ] | none | radius-scheme radius-scheme-name [ local ] [ none ] } undo accounting advpn In FIPS mode: accounting advpn { local | radius-scheme radius-scheme-name [ local ] } undo accounting advpn Default The default accounting methods of the ISP domain are used for ADVPN users.
accounting command Use accounting command to specify the command line accounting method. Use undo accounting command to restore the default. Syntax accounting command hwtacacs-scheme hwtacacs-scheme-name undo accounting command Default The default accounting methods of the ISP domain are used for command line accounting. Views ISP domain view Predefined user roles...
[Sysname] domain test [Sysname-isp-test] accounting ipoe local # In ISP domain test, perform RADIUS accounting for IPoE users based on scheme rd and use local accounting as the backup. <Sysname> system-view [Sysname] domain test [Sysname-isp-test] accounting ipoe radius-scheme rd local # In ISP domain test, broadcast accounting requests of IPoE users to RADIUS servers in schemes rd1 and rd2, and use local accounting as the backup.
local: Performs local accounting. none: Does not perform accounting. radius-scheme radius-scheme-name: Specifies a RADIUS scheme by its name, a case-insensitive string of 1 to 32 characters. Usage guidelines You can specify one primary accounting method and multiple backup accounting methods. When the primary method is invalid, the device attempts to use the backup methods in sequence.
Page 32
Syntax In non-FIPS mode: accounting login hwtacacs-scheme hwtacacs-scheme-name radius-scheme radius-scheme-name ] [ local ] [ none ] | local [ none ] | none | radius-scheme radius-scheme-name [ hwtacacs-scheme hwtacacs-scheme-name ] [ local ] [ none ] } undo accounting login In FIPS mode: accounting login...
accounting when the RADIUS server is invalid. The device does not perform accounting when both of the previous methods are invalid. The following guidelines apply to broadcast accounting: • The device sends accounting requests to the primary accounting servers in the specified broadcast RADIUS schemes at the same time.
Page 35
undo accounting ppp Default The default accounting methods of the ISP domain are used for PPP users. Views ISP domain view Predefined user roles network-admin Parameters broadcast: Broadcasts accounting requests to servers in RADIUS schemes. radius-scheme radius-scheme-name1: Specifies the primary broadcast RADIUS scheme by its name, a case-insensitive string of 1 to 32 characters.
# In ISP domain test, broadcast accounting requests of PPP users to RADIUS servers in schemes rd1 and rd2, and use local accounting as the backup. <Sysname> system-view [Sysname] domain test [Sysname-isp-test] accounting ppp broadcast radius-scheme rd1 radius-scheme rd2 local Related commands accounting default hwtacacs scheme...
undo accounting sslvpn In FIPS mode: accounting sslvpn { local | radius-scheme radius-scheme-name [ local ] } undo accounting sslvpn Default The default accounting methods of the ISP domain are used for SSL VPN users. Views ISP domain view Predefined user roles network-admin Parameters local: Performs local accounting.
Syntax accounting start-fail { offline | online } undo accounting start-fail Default The device does not perform actions on users that encounter accounting-start failures. Views ISP domain view Predefined user roles network-admin Parameters offline: Logs off users that encounter accounting-start failures. online: Does not perform actions on users that encounter accounting-start failures.
<Sysname> system-view [Sysname] domain test [Sysname-isp-test] accounting update-fail online authentication advpn Use authentication advpn to specify authentication methods for ADVPN users. Use undo authentication advpn to restore the default. Syntax In non-FIPS mode: authentication advpn { local [ none ] | none | radius-scheme radius-scheme-name [ local ] [ none ] } undo authentication advpn In FIPS mode:...
[Sysname-isp-test] authentication advpn radius-scheme rd local Related commands authentication default local-user radius scheme authentication default Use authentication default to specify default authentication methods for an ISP domain. Use undo authentication default to restore the default. Syntax In non-FIPS mode: authentication default hwtacacs-scheme hwtacacs-scheme-name...
When the primary method is invalid, the device attempts to use the backup methods in sequence. For example, the authentication default radius-scheme radius-scheme-name local none command specifies a primary default RADIUS authentication method and two backup methods (local authentication and no authentication). The device performs RADIUS authentication by default and performs local authentication when the RADIUS server is invalid.
When the primary method is invalid, the device attempts to use the backup methods in sequence. For example, the authentication ike radius-scheme radius-scheme-name local none command specifies a primary RADIUS authentication method and two backup methods (local authentication and no authentication). The device performs RADIUS authentication by default and performs local authentication when the RADIUS server is invalid.
radius-scheme radius-scheme-name: Specifies a RADIUS scheme by its name, a case-insensitive string of 1 to 32 characters. Usage guidelines You can specify one primary authentication method and multiple backup authentication methods. When the primary method is invalid, the device attempts to use the backup methods in sequence. For example, the authentication ipoe radius-scheme radius-scheme-name local none command specifies a primary RADIUS authentication method and two backup methods (local authentication and no authentication).
Parameters ldap-scheme ldap-scheme-name: Specifies an LDAP scheme by its name, a case-insensitive string of 1 to 32 characters. local: Performs local authentication. none: Does not perform authentication. radius-scheme radius-scheme-name: Specifies a RADIUS scheme by its name, a case-insensitive string of 1 to 32 characters. Usage guidelines You can specify one primary authentication method and multiple backup authentication methods.
Page 45
authentication login hwtacacs-scheme hwtacacs-scheme-name radius-scheme radius-scheme-name ] [ local ] | ldap-scheme ldap-scheme-name [ local ] | local | radius-scheme radius-scheme-name [ hwtacacs-scheme hwtacacs-scheme-name ] [ local ] } undo authentication login Default The default authentication methods of the ISP domain are used for login users. Views ISP domain view Predefined user roles...
authentication portal Use authentication portal to specify authentication methods for portal users. Use undo authentication portal to restore the default. Syntax In non-FIPS mode: authentication portal { ldap-scheme ldap-scheme-name [ local ] [ none ] | local [ none ] | none | radius-scheme radius-scheme-name [ local ] [ none ] } undo authentication portal In FIPS mode:...
[Sysname-isp-test] authentication portal radius-scheme rd local Related commands authentication default ldap scheme local-user radius scheme authentication ppp Use authentication ppp to specify authentication methods for PPP users. Use undo authentication ppp to restore the default. Syntax In non-FIPS mode: authentication hwtacacs-scheme hwtacacs-scheme-name radius-scheme...
Examples # In ISP domain test, perform local authentication for PPP users. <Sysname> system-view [Sysname] domain test [Sysname-isp-test] authentication ppp local # In ISP domain test, perform RADIUS authentication for PPP users based on scheme rd and use local authentication as the backup. <Sysname>...
Usage guidelines You can specify one primary authentication method and multiple backup authentication methods. When the primary method is invalid, the device attempts to use the backup methods in sequence. For example, the authentication sslvpn radius-scheme radius-scheme-name local none command specifies a primary RADIUS authentication method and two backup methods (local authentication and no authentication).
Usage guidelines You can specify one authentication method and one backup authentication method to use in case that the previous authentication method is invalid. If you specify a scheme to provide the method for user role authentication, the following rules apply: •...
Parameters local: Performs local authorization. none: Does not perform authorization. radius-scheme radius-scheme-name: Specifies a RADIUS scheme by its name, a case-insensitive string of 1 to 32 characters. Usage guidelines The RADIUS authorization configuration takes effect only when authentication and authorization methods of the ISP domain use the same RADIUS scheme.
Page 52
Views ISP domain view Predefined user roles network-admin Parameters hwtacacs-scheme hwtacacs-scheme-name: Specifies an HWTACACS scheme by its name, a case-insensitive string of 1 to 32 characters. local: Performs local authorization. none: Does not perform authorization. The authorization server does not verify whether the entered commands are permitted by the user role.
authorization by default and performs local authorization when the RADIUS server is invalid. The device does not perform authorization when both of the previous methods are invalid. Examples # In ISP domain test, use RADIUS scheme rd as the primary default authorization method and use local authorization as the backup.
Examples # In ISP domain test, perform local authorization for IKE extended authentication. <Sysname> system-view [Sysname] domain test [Sysname-isp-test] authorization ike local Related commands authorization default local-user authorization ipoe Use authorization ipoe to specify authorization methods for IPoE users. Use undo authorization ipoe to restore the default. Syntax In non-FIPS mode: authorization ipoe { local [ none ] | none | radius-scheme radius-scheme-name [ local ] [ none ] }...
Examples # In ISP domain test, perform local authorization for IPoE users. <Sysname> system-view [Sysname] domain test [Sysname-isp-test] authorization ipoe local # In ISP domain test, perform RADIUS authorization for IPoE users based on scheme rd and use local authorization as the backup. <Sysname>...
When the primary method is invalid, the device attempts to use the backup methods in sequence. For example, the authorization lan-access radius-scheme radius-scheme-name local none command specifies a primary RADIUS authorization method and two backup methods (local authorization and no authorization). The device performs RADIUS authorization by default and performs local authorization when the RADIUS server is invalid.
Parameters hwtacacs-scheme hwtacacs-scheme-name: Specifies an HWTACACS scheme by its name, a case-insensitive string of 1 to 32 characters. local: Performs local authorization. none: Does not perform authorization. The following default authorization information applies after users pass authentication: • Login users obtain the level-0 user role. For more information about the level-0 user role, see RBAC configuration in Fundamentals Configuration Guide.
Page 59
authorization portal { local [ none ] | none | radius-scheme radius-scheme-name [ local ] [ none ] } undo authorization portal In FIPS mode: authorization portal { local | radius-scheme radius-scheme-name [ local ] } undo authorization portal Default The default authorization methods of the ISP domain are used for portal users.
Examples # In ISP domain test, perform local authorization for SSL VPN users. <Sysname> system-view [Sysname] domain test [Sysname-isp-test] authorization sslvpn local # In ISP domain test, perform LDAP authorization for SSL VPN users based on scheme ldp and use local authorization as the backup.
Page 63
inbound: Specifies the upload rate of users. outbound: Specifies the download rate of users. cir committed-information-rate: Specifies the committed information rate in kbps, in the range of 1 to 4194303. pir peak-information-rate: Specifies the peak information rate in kbps, in the range of 1 to 4194303. If you do not specify this option, the CAR action does not restrict users by peak information rate.
you configure the attribute in a portal preauthentication domain, the user profile applies before portal authentication. This option is applicable only to IPoE, LAN, portal, and PPP users. vpn-instance vpn-instance-name: Specifies an MPLS L3VPN instance to which the users belong. The vpn-instance-name argument is a case-sensitive string of 1 to 31 characters.
Usage guidelines This command takes effect only when the device acts as a PPPoE server or L2TP LNS. A PPPoE or L2TP user might request multiple services of different IP address types. By default, the device logs off the user if the user does not obtain an IPv4 address. This command enables the device to allow the user to come online if the user has obtained IP addresses of all the specified types for the basic services.
Examples # In ISP domain test, set the DHCPv6 request timeout timer to 90 seconds for PPPoE and L2TP users. <Sysname> system-view [Sysname] domain test [Sysname-isp-test] dhcpv6-follow-ipv6cp timeout 90 Related commands basic-service-ip-type display domain Use display domain to display ISP domain configuration. Syntax display domain [ isp-name ] Views...
Page 68
Field Description Default authentication scheme Default authentication method. Default authorization scheme Default authorization method. Default accounting scheme Default accounting method. Access control for users that encounter accounting-start failures: • Accounting start failure action Online—Does not perform actions on the users. •...
Page 69
Field Description User profile Name of the authorization user profile. Authorized inbound CAR: • Inbound CAR CIR—Committed information rate in bps. • PIR—Peak information rate in bps. Authorized outbound CAR: • Outbound CAR CIR—Committed information rate in bps. • PIR—Peak information rate in bps. ACL number Authorization ACL for users.
Use short domain names to ensure that user names containing a domain name do not exceed the maximum name length required by different types of users. Examples # Create an ISP domain named test and enter ISP domain view. <Sysname> system-view [Sysname] domain test [Sysname-isp-test] Related commands...
domain domain if-unknown Use domain if-unknown to specify an ISP domain that accommodates users that are assigned to nonexistent domains. Use undo domain if-unknown to restore the default. Syntax domain if-unknown isp-domain-name undo domain if-unknown Default No ISP domain is specified to accommodate users that are assigned to nonexistent domains. Views System view Predefined user roles...
nas-id bind vlan Use nas-id bind vlan to bind a NAS-ID with a VLAN. Use undo nas-id bind vlan to remove a NAS-ID and VLAN binding. Syntax nas-id nas-identifier bind vlan vlan-id undo nas-id nas-identifier bind vlan vlan-id Default No NAS-ID and VLAN bindings exist. Views NAS-ID profile view Predefined user roles...
Predefined user roles network-admin Parameters hsi: Specifies the High-Speed Internet (HSI) service. This service is applicable to PPP, 802.1X, and IPoE leased line users. stb: Specifies the Set Top Box (STB) service. This service is applicable to STB users. voip: Specifies the Voice over IP (VoIP) service. This service is applicable to IP phone users. Usage guidelines You can configure only one service type for one ISP domain.
• If the session-time include-idle-time command is configured, the device adds the idle cut period or user online detection interval to the actual online duration. The user online detection period is supported only by portal authentication. The online duration sent to the server is longer than the actual online duration of the user.
user-address-type Use user-address-type to specify the user address type in the ISP domain. Use undo user-address-type to restore the default. Syntax user-address-type { ds-lite | ipv6 | nat64 | private-ds | private-ipv4 | public-ds | public-ipv4 } undo user-address-type Default No user address type is specified for the ISP domain.
Default The number of concurrent logins using the local user name is not limited. Views Local user view Predefined user roles network-admin Parameters max-user-number: Specifies the maximum number of concurrent logins, in the range of 1 to 1024. Usage guidelines This command takes effect only when local accounting is configured for the local user.
Page 78
Predefined user roles network-admin Parameters acl acl-number: Specifies an authorization ACL. The value range for the acl-number argument is 2000 to 5999. After passing authentication, a local user can access the network resources specified by this ACL. callback-number callback-number: Specifies an authorized PPP callback number. The callback-number argument is a case-sensitive string of 1 to 64 characters.
Page 79
work-directory directory-name: Specifies an FTP, SFTP, or SCP working directory. The directory-name argument is a case-insensitive string of 1 to 255 characters. The directory must already exist. Usage guidelines Configure authorization attributes according to the application environments and purposes. Support for authorization attributes depends on the service types of users.
[Sysname] local-user abc class network [Sysname-luser-network-abc] authorization-attribute vlan 2 # Configure the authorized VLAN of user group abc as VLAN 3. <Sysname> system-view [Sysname] user-group abc [Sysname-ugroup-abc] authorization-attribute vlan 3 # Assign the security-audit user role to device management user xyz as the authorized user role. <Sysname>...
Usage guidelines To perform local authentication of a user, the device matches the actual user attributes with the configured binding attributes. If the user has a non-matching attribute or lacks a required attribute, the user will fail authentication. Binding attribute check takes effect on all access services. Configure the binding attributes for a user based on the access services and make sure the device can obtain all attributes to be checked from the user's packet.
[Sysname] local-user abc class network guest [Sysname-luser-network(guest)-abc] company yyy Related commands display local-user description Use description to configure a description for a network access user. Use undo description to restore the default. Syntax description text undo description Default No description is configured for a network access user. Views Network access user view Predefined user roles...
Parameters user-name user-name: Specifies a local guest by the user name, a case-sensitive string of 1 to 55 characters. The name cannot contain a domain name. If you do not specify a guest, this command displays pending registration requests for all local guests. Usage guidelines On the Web registration page, users submit local guest registration requests for approval.
Page 84
network-operator Parameters class: Specifies the local user type. manage: Device management user. network: Network access user. guest: Guest user account. idle-cut { disable | enable }: Specifies local users with the idle cut feature disabled or enabled. service-type: Specifies the local users that use a specific type of service. •...
Page 85
Password control configurations: Password aging: Enabled (3 days) Network access user jj: State: Active Service type: Lan-access User group: system Bind attributes: IP address: 2.2.2.2 Location bound: GigabitEthernet1/0/1 MAC address: 0001-0001-0001 VLAN ID: Calling number: Authorization attributes: Idle timeout: 33 minutes Work directory: flash: ACL number:...
Page 86
Field Description IP address IP address of the local user. Location bound Binding port of the local user. MAC address MAC address of the local user. VLAN ID Binding VLAN of the local user. Calling number Calling number of the ISDN user. Authorization attributes Authorization attributes of the local user.
Field Description This field appears only when password complexity checking is enabled. The field also displays the following information in parentheses: • Password complexity Whether the password can contain the username or the reverse of the username. • Whether the password can contain any character repeated consecutively three or more times.
Page 88
User group: system Authorization attributes: Work directory: flash: User group: jj Authorization attributes: Idle timeout: 2 minutes Callback number: Work directory: flash:/ ACL number: 2000 VLAN ID: User profile: SSL VPN policy group: policygroup1 Password control configurations: Password aging: Enabled (2 days) Table 4 Command output Field Description...
Field Description This field appears only when password composition checking is enabled. The field also displays the following information in parentheses: Password composition • Minimum number of character types that the password must contain. • Minimum number of characters from each type in the password. This field appears only when password complexity checking is enabled.
full-name Use full-name to configure the name of a local guest. Use undo full-name to restore the default. Syntax full-name name-string undo full-name Default No name is configured for a local guest. Views Local guest view Predefined user roles network-admin Parameters name-string: Specifies the local guest name, a case-sensitive string of 1 to 255 characters.
<Sysname> system-view [Sysname] local-user 111 class manage [Sysname-luser-manage-111] group abc Related commands display local-user local-guest auto-delete enable Use local-guest auto-delete enable to enable the guest auto-delete feature. Use undo local-guest auto-delete enable to restore the default. Syntax local-guest auto-delete enable undo local-guest auto-delete enable Default The guest auto-delete feature is disabled.
Predefined user roles network-admin Parameters to: Specifies the email recipient. guest: Specifies the local guest. manager: Specifies the guest manager. sponsor: Specifies the guest sponsor. body body-string: Configures the body content. The body-string argument is a case-sensitive string of 1 to 255 characters. subject sub-string: Configures the email subject.
Predefined user roles network-admin Parameters email-address: Specifies the email sender address, a case-sensitive string of 1 to 255 characters. Usage guidelines If you do not specify the email sender address, the device cannot send email notifications. The device supports only one email sender address. If you execute this command multiple times, the most recent configuration takes effect.
expiration-time: Specifies the expiration time in the format of hh:mm:ss. The value range for the hh argument is 0 to 23. The value range for the mm and ss arguments is 0 to 59. The mm and ss arguments are optional. For example, enter 1 to indicate 1:00:00. A value of 0 indicates 00:00:00. Usage guidelines Account names of batch created local guests start with the same string specified by the name prefix, and end with a different number as the suffix.
Examples # Configure the email address of the guest manager as xyz@yyy.com. <Sysname> system-view [Sysname] local-guest manager-email xyz@yyy.com Related commands local-guest email format local-guest email sender local-guest email smtp-server local-guest send-email local-guest send-email Use local-guest send-email to send emails to a local guest or guest sponsor. Syntax local-guest send-email user-name user-name to { guest | sponsor } Views...
Default The setting is 24 hours. Views System view Predefined user roles network-admin Parameters time-value: Sets the waiting-approval timeout timer in the range of 1 to 720, in hours. Usage guidelines The waiting-approval timeout timer starts when the registration request of a local guest is sent for approval.
all: Specifies all users. service-type: Specifies the local users that use a specific type of service. • advpn: ADVPN tunnel users. • ftp: FTP users. • http: HTTP users. • https: HTTPS users. • ike: IKE users that access the network through IKE extended authenticatio n. •...
Views System view Predefined user roles network-admin Parameters url url-string: Specifies the URL of the destination file, a case-insensitive string of 1 to 255 characters. Usage guidelines You can import the user account information back to the device or to other devices that support the local-user-import class network guest command.
Page 100
Parameters url url-string: Specifies the source file path. The url-string argument is a case-insensitive string of 1 to 255 characters. validity-datetime: Specifies the guest validity period of the local guests. The expiration date and time must be later than the start date and time. start-date: Specifies the start date of the validity period, in the format of MM/DD/YYYY or YYYY/MM/DD.
Jack,abc,visit,Jack Chen,ETP,jack@etp.com,1399899,"The manager of ETP, come from TP.",Sam Wang,Ministry of personnel,Sam@yy.com The device supports TFTP and FTP file transfer modes. Table 6 describes the valid URL formats of the .csv file. Table 6 URL formats Protocol URL format Description Specify a TFTP server by IP address or TFTP tftp://server/path/filename hostname.
Predefined user roles network-admin Parameters cipher: Specifies a password in encrypted form. hash: Specifies a password encrypted by the hash algorithm. simple: Specifies a password in plaintext form. For security purposes, the password specified in plaintext form will be stored in encrypted form. string: Specifies the password string.
Syntax phone phone-number undo phone Default No phone number is specified for a local guest. Views Local guest view Predefined user roles network-admin Parameters phone-number: Specifies the phone number, a string of 1 to 32 characters that can contain only digits and hyphens (-).
Page 104
Use undo service-type to delete service types configured for a local user. Syntax In non-FIPS mode: service-type { advpn | ftp | ike | ipoe | lan-access | { http | https | pad | ssh | telnet | terminal } * | portal | ppp | sslvpn } undo service-type { advpn | ftp | ike | ipoe | lan-access | { http | https | pad | ssh | telnet | terminal } * | portal | ppp | sslvpn }...
[Sysname] local-user user1 class manage [Sysname-luser-manage-user1] service-type telnet [Sysname-luser-manage-user1] service-type ftp Related commands display local-user sponsor-department Use sponsor-department to specify the department of the guest sponsor for a local guest. Use undo sponsor-department to restore the default. Syntax sponsor-department department-string undo sponsor-department Default No department is specified for the guest sponsor.
Predefined user roles network-admin Parameters email-string: Specifies the email address, a case-sensitive string of 1 to 255 characters. The address must comply with RFC 822. Examples # Specify the email address as Sam@a.com for the guest sponsor of local guest abc. <Sysname>...
undo state Default A local user is in active state. Views Local user view Predefined user roles network-admin Parameters active: Places the local user in active state to allow the local user to request network services. block: Places the local user in blocked state to prevent the local user from requesting network services.
You can modify settings for the system-defined user group system, but you cannot delete the user group. Examples # Create a user group named abc and enter user group view. <Sysname> system-view [Sysname] user-group abc [Sysname-ugroup-abc] Related commands display user-group validity-datetime Use validity-datetime to specify the validity period for a network access user.
<Sysname> system-view [Sysname] local-user abc class network [Sysname-luser-network-abc] validity-datetime 2014/10/01 00:00:00 to 2015/10/02 12:00:00 Related commands display local-user RADIUS commands aaa device-id Use aaa device-id to configure the device ID. Use undo aaa device-id to restore the default. Syntax aaa device-id device-id undo aaa device-id Default The device ID is 0.
Default The accounting-on feature is disabled. Views RADIUS scheme view Predefined user roles network-admin Parameters interval interval: Specifies the time interval for retransmitting an accounting-on packet in seconds. The value range for the interval argument is 1 to 15, and the default setting is 3 seconds. send send-times: Specifies the maximum number of accounting-on packet transmission attempts.
Usage guidelines The extended accounting-on feature enhances the accounting-on feature by applying to the scenario that an SPU reboots but the device does not reboot. For the extended accounting-on feature to take effect, you must enable the accounting-on feature. The extended accounting-on feature enables the device to automatically send an accounting-on packet to the RADIUS server after an SPU reboot.
Usage guidelines Use the loose check method only when the server does not issue Login-Service attribute values 50, 51, and 52 for SSH, FTP, and terminal users. Examples # Configure the Login-Service attribute check method as loose for SSH, FTP, and terminal users in RADIUS scheme radius1.
Syntax attribute remanent-volume unit { byte | giga-byte | kilo-byte | mega-byte } undo attribute remanent-volume unit Default The data measurement unit is kilobyte for the Remanent_Volume attribute. Views RADIUS scheme view Predefined user roles network-admin network-operator Parameters byte: Specifies the unit as byte. giga-byte: Specifies the unit as gigabyte.
Parameters ip ipv4-address: Specifies a DAC by its IPv4 address. ipv6 ipv6-address: Specifies a DAC by its IPv6 address. key: Specifies the shared key for secure communication between the RADIUS DAC and DAS. Make sure the shared key is the same as the key configured on the RADIUS DAC. If the RADIUS DAC does not have any shared key, do not specify this option.
Predefined user roles network-admin Parameters data { byte | giga-byte | kilo-byte | mega-byte }: Specifies the unit for data flows, which can be byte, kilobyte, megabyte, or gigabyte. packet { giga-packet | kilo-packet | mega-packet | one-packet }: Specifies the unit for data packets, which can be one-packet, kilo-packet, mega-packet, or giga-packet.
Page 116
State: Active Test profile: 132 Probe username: test Probe interval: 60 minutes Primary accounting server: IP : 1.1.1.1 Port: 1813 VPN : Not configured State: Active Second authentication server: IP : 3.3.3.3 Port: 1812 VPN : Not configured State: Block Test profile: Not configured Second accounting server: IP : 3.3.3.3...
Page 117
Field Description Service port number of the server. If no port number is specified, this field Port displays the default port number. MPLS L3VPN instance to which the server belongs. If no VPN instance is specified for the server, this field displays Not configured. Status of the server: •...
Field Description Attribute Remanent-Volume Data measurement unit for the RADIUS Remanent_Volume attribute. unit display radius statistics Use display radius statistics to display RADIUS packet statistics. Syntax display radius statistics Views Any view Predefined user roles network-admin network-operator Examples # Display RADIUS packet statistics. <Sysname>...
Field Description Account Start Number of start-accounting packets. Account Update Number of accounting update packets. Account Stop Number of stop-accounting packets. Terminate Request Number of packets for logging off users forcibly. Set Policy Number of packets for updating user authorization information. Packet With Response Number of packets for which responses were received.
Usage guidelines The shared keys configured by using this command apply to all servers in the scheme. Make sure the settings match the shared keys configured on the RADIUS servers. The shared keys specified for specific RADIUS servers take precedence over the shared key specified with this command.
As a best practice to avoid RADIUS packet loss caused by physical port errors, specify a loopback interface address as the source IP address for outgoing RADIUS packets. If you use both the nas-ip command and radius nas-ip command, the following guidelines apply: •...
The shared key configured by using this command takes precedence over the shared key configured with the key accounting command. If the specified server resides on an MPLS L3VPN, specify the VPN instance by using the vpn-instance vpn-instance-name option. The VPN instance specified by this command takes precedence over the VPN instance specified for the RADIUS scheme.
Page 124
key: Specifies the shared key for secure communication with the primary RADIUS authentication server. cipher: Specifies the key in encrypted form. simple: Specifies the key in plaintext form. For security purposes, the key specified in plaintext form will be stored in encrypted form. string: Specifies the key.
radius dscp Use radius dscp to change the DSCP priority of RADIUS packets. Use undo radius dscp to restore the default. Syntax radius [ ipv6 ] dscp dscp-value undo radius [ ipv6 ] dscp Default The DSCP priority of RADIUS packets is 0. Views System view Predefined user roles...
Usage guidelines When you enable the RADIUS DAS feature, the device listens to UDP port 3799 to receive DAE packets from specified DACs. Examples # Enable the RADIUS DAS feature and enter RADIUS DAS view. <Sysname> system-view [Sysname] radius dynamic-author server [Sysname-radius-da-server] Related commands client...
If you use both the nas-ip command and radius nas-ip command, the following guidelines apply: • The setting configured by the nas-ip command in RADIUS scheme view applies only to the RADIUS scheme. • The setting configured by the radius nas-ip command in system view applies to all RADIUS schemes.
The IP, VPN instance, and shared key settings of the session-control client must be the same as the settings of the RADIUS server. The system supports multiple RADIUS session-control clients. Examples # Specify a session-control client with IP address 10.110.1.2 and shared key 12345 in plaintext form. <Sysname>...
Predefined user roles network-admin Parameters profile-name: Specifies the name of the test profile, which is a case-sensitive string of 1 to 31 characters. username name: Specifies the username in the detection packets. The name argument is a case-sensitive string of 1 to 253 characters. interval interval: Specifies the interval for sending a detection packet, in minutes.
retry Use retry to set the maximum number of attempts for transmitting a RADIUS packet to a single RADIUS server. Use undo retry to restore the default. Syntax retry retries undo retry Default The maximum number of RADIUS packet transmission attempts is 3. Views RADIUS scheme view Predefined user roles...
retry realtime-accounting Use retry realtime-accounting to set the maximum number of accounting attempts. Use undo retry realtime-accounting to restore the default. Syntax retry realtime-accounting retries undo retry realtime-accounting Default The maximum number of accounting attempts is 5. Views RADIUS scheme view Predefined user roles network-admin Parameters...
If you use the secondary accounting command to modify or delete a secondary accounting server to which the device is sending a start-accounting request, communication with the secondary server times out. The device tries to communicate with an active server that has the highest priority for accounting.
Page 135
port-number: Sets the service port number of the secondary RADIUS authentication server. The value range for the UDP port number is 1 to 65535. The default setting is 1812. key: Specifies the shared key for secure communication with the secondary RADIUS authentication server.
• RADIUS server reachable notification—The RADIUS server can be reached. RADIUS generates this notification for a previously blocked RADIUS server after the quiet timer expires. • Excessive authentication failures notification—RADIUS generates this notification when the number of authentication failures to the total number of authentication attempts exceeds the specified threshold.
Examples # In RADIUS scheme radius1, set the primary authentication server to the blocked state. <Sysname> system-view [Sysname] radius scheme radius1 [Sysname-radius-radius1] state primary authentication block Related commands display radius scheme radius-server test-profile state secondary state secondary Use state secondary to set the status of a secondary RADIUS server. Syntax state secondary { accounting | authentication } [ { ipv4-address | ipv6 ipv6-address } [ port-number | vpn-instance vpn-instance-name ] * ] { active | block }...
When the quiet timer of a server times out, the status of the server automatically changes to active. If you set the server status to blocked before the quiet timer times out, the server status cannot change back to active unless you manually set the status to active. If all configured secondary servers are unreachable, the device considers the authentication or accounting attempt a failure.
[Sysname] radius scheme radius1 [Sysname-radius-radius1] timer quiet 10 Related commands display radius scheme timer realtime-accounting (RADIUS scheme view) Use timer realtime-accounting to set the real-time accounting interval. Use undo timer realtime-accounting to restore the default. Syntax timer realtime-accounting interval [ second ] undo timer realtime-accounting Default The real-time accounting interval is 12 minutes.
Related commands retry realtime-accounting timer response-timeout (RADIUS scheme view) Use timer response-timeout to set the RADIUS server response timeout timer. Use undo timer response-timeout to restore the default. Syntax timer response-timeout seconds undo timer response-timeout Default The RADIUS server response timeout period is 3 seconds. Views RADIUS scheme view Predefined user roles...
user-name-format (RADIUS scheme view) Use user-name-format to specify the format of the username to be sent to a RADIUS server. Use undo user-name-format to restore the default. Syntax user-name-format { keep-original | with-domain | without-domain } undo user-name-format Default The ISP domain name is included in the usernames sent to the RADIUS servers. Views RADIUS scheme view Predefined user roles...
Use undo vpn-instance to restore the default. Syntax vpn-instance vpn-instance-name undo vpn-instance Default The RADIUS scheme belongs to the public network. Views RADIUS scheme view Predefined user roles network-admin Parameters vpn-instance-name: Specifies an MPLS L3VPN instance by the name, a case-sensitive string of 1 to 31 characters.
Parameters data { byte | giga-byte | kilo-byte | mega-byte }: Specifies the unit for data flows, which can be byte, kilobyte, megabyte, or gigabyte. packet { giga-packet | kilo-packet | mega-packet | one-packet }: Specifies the unit for data packets, which can be one-packet, kilo-packet, mega-packet, or giga-packet.
Page 145
Single-connection: Enabled Primary Author Server: : 2.2.2.2 Port: 49 State: Active VPN Instance: 2 Single-connection: Disabled Primary Acct Server: : Not Configured Port: 49 State: Block VPN Instance: Not configured Single-connection: Disabled VPN Instance NAS IP Address : 2.2.2.3 Server Quiet Period(minutes) Realtime Accounting Interval(minutes) : 12 Response Timeout Interval(seconds) Username Format...
Field Description Response Timeout Interval(seconds) HWTACACS server response timeout period, in seconds. Format for the usernames sent to the HWTACACS server. Possible values include: • with-domain—Includes the domain name. Username Format • without-domain—Excludes the domain name. • keep-original—Forwards the username as the username is entered.
As a best practice to avoid HWTACACS packet loss caused by physical port errors, specify a loopback interface address as the source IP address for outgoing HWTACACS packets. If you use both the nas-ip command and hwtacacs nas-ip command, the following guidelines apply: •...
Examples # Create an HWTACACS scheme named hwt1 and enter HWTACACS scheme view. <Sysname> system-view [Sysname] hwtacacs scheme hwt1 [Sysname-hwtacacs-hwt1] Related commands display hwtacacs scheme key (HWTACACS scheme view) Use key to set the shared key for secure HWTACACS authentication, authorization, or accounting communication.
[Sysname] hwtacacs scheme hwt1 [Sysname-hwtacacs-hwt1] key authentication simple 123456TESTauth&! # Set the shared key to 123456TESTautr&! in plaintext form for secure HWTACACS authorization communication. [Sysname-hwtacacs-hwt1] key authorization simple 123456TESTautr&! # Set the shared key to 123456TESTacct&! in plaintext form for secure HWTACACS accounting communication.
• The setting configured by using the nas-ip command in HWTACACS scheme view applies only to the HWTACACS scheme. • The setting configured by using the hwtacacs nas-ip command in system view applies to all HWTACACS schemes. • The setting in HWTACACS scheme view takes precedence over the setting in system view. You can specify only one source IPv4 address and one source IPv6 address for an HWTACACS scheme.
• In non-FIPS mode, the encrypted form of the key is a string of 1 to 373 characters. The plaintext form of the key is a string of 1 to 255 characters. • In FIPS mode, the encrypted form of the key is a string of 15 to 373 characters. The plaintext form of the key is a string of 15 to 255 characters.
Page 152
Views HWTACACS scheme view Predefined user roles network-admin Parameters ipv4-address: Specifies the IPv4 address of the primary HWTACACS authentication server. ipv6 ipv6-address: Specifies the IPv6 address of the primary HWTACACS authentication server. port-number: Specifies the service port number of the primary HWTACACS authentication server. The value range for the TCP port number is 1 to 65535.
vpn-instance vpn-instance-name: Specifies an MPLS L3VPN instance to which the primary HWTACACS authorization server belongs. The vpn-instance-name argument is a case-sensitive string of 1 to 31 characters. If the server is on the public network, do not specify this option. Usage guidelines Make sure that the port number and shared key settings of the primary HWTACACS authorization server are the same as those configured on the server.
Usage guidelines Make sure that the port number and shared key settings of the secondary HWTACACS accounting server are the same as those configured on the server. An HWTACACS scheme supports a maximum of 16 secondary HWTACACS accounting servers. If the primary server fails, the device tries to communicate with a secondary server in active state.
Page 157
ipv6 ipv6-address: Specifies the IPv6 address of the secondary HWTACACS authentication server. port-number: Specifies the service port number of the secondary HWTACACS authentication server. The value range for the TCP port number is 1 to 65535. The default setting is 49. key: Specifies the shared key for secure communication with the secondary HWTACACS authentication server.
Usage guidelines Make sure that the port number and shared key settings of the secondary HWTACACS authorization server are the same as those configured on the server. An HWTACACS scheme supports a maximum of 16 secondary HWTACACS authorization servers. If the primary server fails, the device tries to communicate with a secondary server in active state.
Examples # In HWTACACS scheme hwt1, set the server quiet timer to 10 minutes. <Sysname> system-view [Sysname] hwtacacs scheme hwt1 [Sysname-hwtacacs-hwt1] timer quiet 10 Related commands display hwtacacs scheme timer realtime-accounting (HWTACACS scheme view) Use timer realtime-accounting to set the real-time accounting interval. Use undo timer realtime-accounting to restore the default.
Related commands display hwtacacs scheme timer response-timeout (HWTACACS scheme view) Use timer response-timeout to set the HWTACACS server response timeout timer. Use undo timer response-timeout to restore the default. Syntax timer response-timeout seconds undo timer response-timeout Default The HWTACACS server response timeout time is 5 seconds. Views HWTACACS scheme view Predefined user roles...
Views HWTACACS scheme view Predefined user roles network-admin Parameters keep-original: Sends the username to the HWTACACS server as the username is entered. with-domain: Includes the ISP domain name in the username sent to the HWTACACS server. without-domain: Excludes the ISP domain name from the username sent to the HWTACACS server.
Parameters vpn-instance-name: Specifies an MPLS L3VPN instance by the name, a case-sensitive string of 1 to 31 characters. Usage guidelines The VPN instance specified for an HWTACACS scheme applies to all servers in that scheme. If a VPN instance is also configured for an individual HWTACACS server, the VPN instance specified for the HWTACACS scheme does not take effect on that server.
<Sysname> system-view [Sysname] ldap scheme test [Sysname-ldap-test] attribute-map map1 Related commands display ldap-scheme ldap attribute-map authentication-server Use authentication-server to specify the LDAP authentication server for an LDAP scheme. Use undo authentication-server to restore the default. Syntax authentication-server server-name undo authentication-server Default No LDAP authentication server is specified.
Default No LDAP authorization server is specified. Views LDAP scheme view Predefined user roles network-admin Parameters server-name: Specifies the name of an existing LDAP server, a case-insensitive string of 1 to 64 characters. Usage guidelines You can specify only one LDAP authorization server in an LDAP scheme. If you execute this command multiple times, the most recent configuration takes effect.
Page 166
: 1.1.1.1 Port : 111 VPN instance : Not configured LDAP protocol version : LDAPv3 Server timeout interval : 10 seconds Login account DN : Not configured Base DN : Not configured Search scope : all-level User searching parameters: User object class : Not configured Username attribute : cn...
Page 167
Field Description User DN search scope, including: • all-level—All subdirectories. Search scope • single-level—Next lower level of subdirectories under the base User searching parameters User search parameters. User object class for user DN search. If no user object class is User object class configured, this field displays Not configured.
Related commands ldap server ipv6 Use ipv6 to configure the IPv6 address and port number of the LDAP server. Use undo ipv6 to restore the default. Syntax ipv6 ipv6-address [ port port-number ] [ vpn-instance vpn-instance-name ] undo ipv6 Default An LDAP server does not have an IPv6 address or port number.
undo ldap attribute-map map-name Default No LDAP attribute maps exist. Views System view Predefined user roles network-admin Parameters map-name: Specifies the name of the LDAP attribute map, a case-insensitive string of 1 to 31 characters. Usage guidelines Execute this command multiple times to create multiple LDAP attribute maps. You can add multiple mapping entries to an LDAP attribute map.
Usage guidelines An LDAP scheme can be used by more than one ISP domain at the same time. You can configure a maximum of 16 LDAP schemes. Examples # Create an LDAP scheme named ldap1 and enter LDAP scheme view. <Sysname>...
Default No administrator DN is specified. Views LDAP server view Predefined user roles network-admin Parameters dn-string: Specifies the administrator DN for binding with the server, a case-insensitive string of 1 to 255 characters. Usage guidelines The administrator DN specified on the device must be consistent with the administrator DN configured on the LDAP server.
Usage guidelines This command is effective only after the login-dn command is configured. Examples # Specify the administrator password as abcdefg in plaintext form for LDAP server ccc. <Sysname> system-view [Sysname] ldap server ccc [Sysname-ldap-server-ccc] login-password simple abcdefg Related commands display ldap scheme login-dn Use map to configure mapping entries in an LDAP attribute map.
Examples # In LDAP attribute map map1, map a partial value string of the LDAP attribute named memberof to AAA attribute named user-group. <Sysname> system-view [Sysname] ldap attribute-map map1 [Sysname-ldap-map-map1] map ldap-attribute memberof prefix cn= delimiter , aaa-attribute user-group Related commands ldap attribute-map user-group user-profile...
search-base-dn Use search-base-dn to specify the base DN for user search. Use undo search-base-dn to restore the default. Syntax search-base-dn base-dn undo search-base-dn Default No base DN is specified for user search. Views LDAP server view Predefined user roles network-admin Parameters base-dn: Specifies the base DN for user search, a case-insensitive string of 1 to 255 characters.
single-level: Specifies that the search goes through only the next lower level of subdirectories under the base DN. Examples # Specify the search scope for the LDAP authentication as all subdirectories of the base DN for LDAP server ccc. <Sysname> system-view [Sysname] ldap server ccc [Sysname-ldap-server-ccc] search-scope all-level Related commands...
Page 176
Use undo user-parameters to restore the default of an LDAP user attribute. Syntax user-parameters { user-name-attribute { name-attribute | cn | uid } | user-name-format { with-domain | without-domain } | user-object-class object-class-name } undo user-parameters { user-name-attribute | user-name-format | user-object-class } Default The LDAP username attribute is cn and the username format is without-domain.
802.1X commands This feature is supported only on the following ports: • Layer 2 Ethernet ports on Ethernet switching modules. • Fixed Layer 2 Ethernet ports of the following routers: MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-LM-HK/810-W-LM-HK/810-10-PoE/81 0-LMS/810-LUS. MSR2600-10-X1. MSR3600-28/3600-51. MSR3600-28-SI/3600-51-SI. Commands and descriptions for centralized devices apply to the following routers: •...
Page 178
Predefined user roles network-admin network-operator Parameters sessions: Displays 802.1X session information. statistics: Displays 802.1X statistics. ap ap-name: Specifies an AP by its name, a case-insensitive string of 1 to 64 characters. The string can contain letters, digits, underscores (_), left brackets ([), right brackets (]), forward slashes (/), and hyphens (-).
Page 179
Handshake : Enabled Handshake reply : Disabled Handshake security : Disabled Unicast trigger : Disabled Periodic reauth : Disabled Port role : Authenticator Authorization mode : Auto Port access control : Port-based Multicast trigger : Enabled Mandatory auth domain : Not configured Guest VLAN Auth-Fail VLAN : Not configured...
Page 180
Error packets: 0 Online 802.1X users: 1 MAC address Auth state 0001-0000-0002 Authenticated Table 13 Command output Field Description Global 802.1X parameters Global 802.1X configuration. 802.1X authentication Whether 802.1X is enabled globally. Performs EAP termination and uses CHAP to communicate with the RADIUS server.
Page 181
Field Description 802.1X authentication Whether 802.1X is enabled on the port. Handshake Whether the online user handshake feature is enabled on the port. Whether the online user handshake reply feature is enabled on the Handshake reply port. Whether the online user handshake security feature is enabled on the Handshake security port.
Field Description MAC address MAC addresses of the online 802.1X users. Auth state Authentication status of the online 802.1X users. AP name Name of the AP with which users are associated. Radio ID ID of the radio with which users are associated. SSID SSID with which users are associated.
Page 183
# (Centralized devices in standalone mode.) Display information about all online 802.1X users. <Sysname> display dot1x connection Total connections: 1 User MAC address: 0015-e9a6-7cfe Access interface: GigabitEthernet1/0/1 Username: ias Authentication domain: h3c IPv4 address: 192.168.1.1 IPv6 address: 2000:0:0:0:1:2345:6789:abcd Authentication method: CHAP Initial VLAN: 1 Authorization untagged VLAN: 6...
Page 186
Field Description Access interface Interface through which the user access the device. AP name Name of the AP with which the user is associated. Radio ID ID of the radio with which the user is associated. SSID SSID with which the user is associated. BSSID ID of the BSS with which the user is associated.
dot1x Use dot1x to enable 802.1X globally or on a port. Use undo dot1x to disable 802.1X globally or on a port. Syntax dot1x undo dot1x Default 802.1X is neither enabled globally nor enabled for any port. Views System view Ethernet interface view Predefined user roles network-admin...
PAP transports usernames and passwords in plain text. The authentication method applies to scenarios that do not require high security. To use PAP, the client can be an H3C iNode 802.1X client. CHAP transports username in plaintext and encrypted password over the network. CHAP is ...
Default No 802.1X Auth-Fail VLAN exists. Views Ethernet interface view Predefined user roles network-admin Parameters authfail-vlan-id: Specifies the ID of the 802.1X Auth-Fail VLAN on the port. The value range for the VLAN ID is 1 to 4094. Make sure the VLAN has been created and is not a super VLAN. For more information about super VLANs, see Layer 2—LAN Switching Configuration Guide.
Usage guidelines An 802.1X critical VLAN accommodates users that have failed 802.1X authentication because all the RADIUS servers in their ISP domains are unreachable. To delete a VLAN that has been configured as an 802.1X critical VLAN, you must first use the undo dot1x critical vlan command.
Examples # Specify the at sign (@) and forward slash (/) as domain name delimiters. <Sysname> system-view [Sysname] dot1x domain-delimiter @/ Related commands display dot1x dot1x ead-assistant enable Use dot1x ead-assistant enable to enable the EAD assistant feature. Use undo dot1x ead-assistant enable to disable the EAD assistant feature. Syntax dot1x ead-assistant enable undo dot1x ead-assistant enable...
Execute this command multiple times to configure multiple free IPs. With EAD assistant enabled on the device, unauthenticated 802.1X users can access the network resources in the free IP segments before they pass 802.1X authentication. Examples # Configure 192.168.1.1/16 as a free IP. <Sysname>...
When an unauthenticated user uses a Web browser to access networks other than the free IP, the device redirects the user to the redirect URL. The redirect URL must be on the free IP subnet. If you execute this command multiple times, the most recent configuration takes effect. Examples # Configure the redirect URL as http://test.com.
Related commands display dot1x dot1x handshake Use dot1x handshake to enable the online user handshake feature. Use undo dot1x handshake to disable the online user handshake feature. Syntax dot1x handshake undo dot1x handshake Default The online user handshake feature is enabled. Views Ethernet interface view Predefined user roles...
Views Ethernet interface view Predefined user roles network-admin Usage guidelines This command enables the device to reply to 802.1X clients' EAP-Response/Identity packets with EAP-Success packets during the online handshake process. As a best practice, use this command only if 802.1X clients will go offline without receiving EAP-Success packets from the device.
Related commands display dot1x dot1x handshake dot1x mandatory-domain Use dot1x mandatory-domain to specify a mandatory 802.1X authentication domain on a port. Use undo dot1x mandatory-domain to restore the default. Syntax dot1x mandatory-domain domain-name undo dot1x mandatory-domain Default No mandatory 802.1X authentication domain is specified on a port. Views Ethernet interface view Predefined user roles...
Default The device allows a maximum of 4294967295 concurrent 802.1X users on a port. Views Ethernet interface view Predefined user roles network-admin Parameters max-number: Specifies the maximum number of concurrent 802.1X users on a port. The value range is 1 to 4294967295. Usage guidelines Set the maximum number of concurrent 802.1X users on a port to prevent the system resources from being overused.
Examples # Enable the multicast trigger feature on GigabitEthernet 1/0/1. <Sysname> system-view [Sysname] interface gigabitethernet 1/0/1 [Sysname-GigabitEthernet1/0/1] dot1x multicast-trigger Related commands display dot1x dot1x timer tx-period dot1x unicast-trigger dot1x port-control Use dot1x port-control to set the authorization state for the port. Use undo dot1x port-control to restore the default.
dot1x port-method Use dot1x port-method to specify an access control method for the port. Use undo dot1x port-method to restore the default. Syntax dot1x port-method { macbased | portbased } undo dot1x port-method Default MAC-based access control applies. Views Ethernet interface view Predefined user roles network-admin Parameters...
Syntax dot1x quiet-period undo dot1x quiet-period Default The quiet timer is disabled. Views System view Predefined user roles network-admin Usage guidelines When a client fails 802.1X authentication, the device must wait a period of time before it can process authentication requests from the client. You can use the dot1x timer quiet-period command to set the quiet timer.
Syntax dot1x retry retries undo dot1x retry Default A maximum of two attempts are made to send an authentication request to a client. Views System view Predefined user roles network-admin Parameters retries: Specifies the maximum number of attempts for sending an authentication request to a client. The value range is 1 to 10.
Predefined user roles network-admin Usage guidelines The SmartOn feature and the online user handshake feature are mutually exclusive. When a SmartOn-enabled port receives an EAPOL-Start packet from an 802.1X client, it sends a unicast EAP-Request/Notification packet to the client. The client will respond with an EAP-Response/Notification packet, which contains the SmartOn switch ID and the MD5 digest of the SmartOn password.
If you execute this command multiple times, the most recent configuration takes effect. Examples # Set the SmartOn password to abc in plaintext form. <Sysname> system-view [Sysname] dot1x smarton password simple abc Related commands display dot1x dot1x smarton dot1x smarton switched dot1x smarton retry Use dot1x smarton retry to set the maximum number of attempts for retransmitting an EAP-Request/Notification packet to a client.
dot1x smarton switchid Use dot1x smarton switchid to set a SmartOn switch ID. Use undo dot1x smarton switchid to restore the default. Syntax dot1x smarton switchid switch-string undo dot1x smarton switchid Default No SmartOn switch ID exists. Views System view Predefined user roles network-admin Parameters...
Parameters supp-timeout-value: Specifies the SmartOn client timeout timer in seconds. The value range is 10 to 120. Usage guidelines The SmartOn client timeout timer starts when the device sends an EAP-Request/Notification packet to the client. If the device does not receive any EAP-Response/Notification packets from the client within the timer interval, it retransmits the EAP-Request/Notification packet.
Page 208
Parameters ead-timeout ead-timeout-value: Specifies the EAD rule timer in minutes. The value range for the ead-timeout-value argument is 1 to 1440. The following matrix shows the ead-timeout ead-timeout-value option and hardware compatibility: Hardware Option compatibility MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-10-PoE/810-LM -HK/810-W-LM-HK/810-LMS/810-LUS MSR2600-10-X1 MSR 2630 MSR3600-28/3600-51 MSR3600-28-SI/3600-51-SI MSR3610-X1/3610-X1-DP/3610-X1-DC/3610-X1-DP-DC...
• Quiet timer (quiet-period)—Starts when a client fails authentication. The access device must wait the time period before it can process the authentication attempts from the client. • Periodic reauthentication timer (reauth-period)—Sets the interval at which the network device periodically reauthenticates online 802.1X users. To enable periodic online user reauthentication on a port, use the dot1x re-authenticate command.
Examples # Enable the unicast trigger feature on GigabitEthernet 1/0/1. <Sysname> system-view [Sysname] interface gigabitethernet 1/0/1 [Sysname-GigabitEthernet1/0/1] dot1x unicast-trigger Related commands display dot1x dot1x multicast-trigger dot1x retry dot1x timer reset dot1x guest-vlan Use reset dot1x guest-vlan to remove users from the 802.1X guest VLAN on a port. Syntax reset dot1x guest-vlan interface interface-type interface-number [ mac-address mac-address ] Views...
Page 211
Predefined user roles network-admin Parameters ap ap-name: Specifies an AP by its name, a case-insensitive string of 1 to 64 characters. The string can contain letters, digits, underscores (_), left brackets ([), right brackets (]), forward slashes (/), and hyphens (-).If you do not specify an AP, this command clears statistics of 802.1X users for all APs. radio radio-id: Specifies a radio by its ID.
MAC authentication commands MAC authentication commands are supported only on the following ports: • Layer 2 Ethernet ports on the following modules: HMIM-8GSW. HMIM-24GSW. HMIM-24GSWP. SIC-4GSW. • Fixed Layer 2 Ethernet ports on the following routers: MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-LM-HK/810-W-LM-HK/810-10-PoE/81 ...
Page 213
Wired devices: display mac-authentication [ interface interface-type interface-number ] Views Any view Predefined user roles network-admin network-operator Parameters ap ap-name: Specifies an AP by its name, a case-insensitive string of 1 to 64 characters. The string can contain letters, digits, underscores (_), left brackets ([), right brackets (]), forward slashes (/), and hyphens (-).
Page 214
Authentication attempts : successful 2, failed 3 Current online users MAC address Auth state 0001-0000-0000 Authenticated 0001-0000-0001 Unauthenticated AP name: AP1 Radio ID: 1 SSID: wlan_maca_ssid BSSID : 1111-1111-1111 MAC authentication : Enabled Authentication domain : Not configured Max online users : 256 Authentication attempts : successful 1, failed 0...
Page 215
Field Description Number of wireless online MAC authentication users, including Online MAC-auth wireless users users that have passed MAC authentication and users that are performing MAC authentication. Silent MAC users Information about silent MAC addresses. MAC address Silent MAC address. VLAN ID ID of the VLAN to which the silent MAC address belongs.
Field Description Authorization ACL ID/number ACL authorized to the user. Authorization user profile User profile authorized to the user. Action attribute assigned by the server when the session timeout timer expires. The following server-assigned action attributes are available: • Default—Logs off the online authenticated user when the session Termination action timeout timer expires.
mac-authentication domain Use mac-authentication domain to specify a global or port-specific authentication domain. Use undo mac-authentication domain to restore the default. Syntax mac-authentication domain domain-name undo mac-authentication domain Default The system default authentication domain is used. For more information about the default authentication domain, see the domain default enable command in "AAA commands."...
Syntax mac-authentication host-mode multi-vlan undo mac-authentication host-mode Default MAC authentication multi-VLAN mode is disabled on a port. When the port receives a packet sourced from an authenticated MAC address in a VLAN not matching the existing MAC-VLAN mapping, the device logs off and reauthenticates the user. Views Ethernet interface view Predefined user roles...
Parameters max-number: Specifies the maximum number of concurrent MAC authentication users on the port. The value range for this argument is 1 to 4294967295. Usage guidelines Set the maximum number of concurrent MAC authentication users on a port to prevent the system resources from being overused.
[Sysname-GigabitEthernet1/0/1] mac-authentication re-authenticate server-unreachable keep-online Related commands display mac-authentication mac-authentication timer Use mac-authentication timer to set the MAC authentication timers. Use undo mac-authentication timer to restore the defaults. Syntax mac-authentication timer { offline-detect offline-detect-value | quiet quiet-value | server-timeout server-timeout-value } undo mac-authentication timer { offline-detect | quiet | server-timeout } Default The offline detect timer is 300 seconds, the quiet timer is 60 seconds, and the server timeout timer is...
mac-authentication timer auth-delay Use mac-authentication timer auth-delay to enable MAC authentication delay and set the delay time. Use undo mac-authentication timer auth-delay to restore the default. Syntax mac-authentication timer auth-delay time undo mac-authentication timer auth-delay Default MAC authentication delay is disabled. MAC authentication starts immediately after it is triggered by a user packet.
Page 226
undo mac-authentication user-name-format Default Each user's MAC address is used as the username and password for MAC authentication. A MAC address is in the hexadecimal notation without hyphens, and letters are in lower case. Views System view Predefined user roles network-admin Parameters fixed: Uses a shared account for all MAC authentication users.
Port security commands This feature is supported only on the following ports: • Layer 2 Ethernet ports on Ethernet switching modules. • Fixed Layer 2 Ethernet ports of the following routers: MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-LM-HK/810-W-LM-HK/810-10-PoE/81 0-LMS/810-LUS. MSR2600-10-X1. MSR3600-28/3600-51. MSR3600-28-SI/3600-51-SI. Commands and descriptions for centralized devices apply to the following routers: •...
Page 229
Port security : Enabled AutoLearn aging time : 0 min Disableport timeout : 20 s MAC move : Denied Authorization fail : Online NAS-ID profile : Not configured Dot1x-failure trap : Disabled Dot1x-logon trap : Disabled Dot1x-logoff trap : Enabled Intrusion trap : Disabled Address-learned trap...
Page 230
Field Description Whether SNMP notifications for intrusion protection are enabled. If Intrusion trap they are enabled, the device sends SNMP notifications after illegal packets are detected. Whether SNMP notifications for MAC address learning are Address-learned trap enabled. If they are enabled, the device sends SNMP notifications after it learns a new MAC address.
Field Description Secure MAC address aging type: • Periodical—Timer aging only. Aging type • Inactivity—Inactivity aging feature together with the aging timer. Maximum number of secure MAC addresses (or online users) that Max secure MAC addresses port security allows on the port. Current secure MAC addresses Number of secure MAC addresses stored.
Page 232
# (Distributed devices in standalone mode/centralized devices in IRF mode.) Display information about all blocked MAC addresses. <Sysname> display port-security mac-address block MAC ADDR Port VLAN ID --- On slot 0, no MAC address found --- MAC ADDR Port VLAN ID 000f-3d80-0d2d GE1/0/1 --- On slot 1, 1 MAC address(es) found ---...
Page 233
0002-0002-0002 GE1/0/1 000d-88f8-0577 GE1/0/1 2 mac address(es) found # (Distributed devices in standalone mode/centralized devices in IRF mode.) Display information about all blocked MAC addresses in VLAN 30. <Sysname> display port-security mac-address block vlan 30 MAC ADDR Port VLAN ID --- On slot 0, no MAC address found --- MAC ADDR Port...
Page 234
000f-3d80-0d2d GE1/0/1 --- On slot 1 in chassis 1, 1 MAC address(es) found --- --- 1 mac address(es) found --- # (Centralized devices in standalone mode.) Display information about all blocked MAC addresses of GigabitEthernet 1/0/1 in VLAN 1. <Sysname> display port-security mac-address block interface gigabitethernet 1/0/1 vlan MAC ADDR Port VLAN ID...
<Sysname> display port-security mac-address security interface gigabitethernet 1/0/1 MAC ADDR VLAN ID STATE PORT INDEX AGING TIME 000d-88f8-0577 Security GE1/0/1 NOAGED 1 mac address(es) found # Display information about secure MAC addresses of GigabitEthernet 1/0/1 in VLAN 1. <Sysname> display port-security mac-address security interface gigabitethernet 1/0/1 vlan MAC ADDR VLAN ID STATE...
Usage guidelines After a user passes RADIUS or local authentication, the server performs authorization based on the authorization attributes configured for the user account. For example, the server can assign a VLAN. If you do not want the port to use such authorization attributes for users, use this command to ignore the authorization information from the server.
port-security enable Use port-security enable to enable port security. Use undo port-security enable to disable port security. Syntax port-security enable undo port-security enable Default Port security is disabled. Views System view Predefined user roles network-admin Usage guidelines You must disable global 802.1X and MAC authentication before you enable port security on a port. Enabling or disabling port security resets the following security settings to the default: •...
Views Layer 2 Ethernet interface view Predefined user roles network-admin Parameters blockmac: Adds the source MAC addresses of illegal frames to the blocked MAC address list and discards frames with blocked source MAC addresses. This action implements illegal traffic filtering on the port.
Syntax port-security mac-address aging-type inactivity undo port-security mac-address aging-type inactivity Default The inactivity aging feature is disabled for secure MAC addresses. Views Layer 2 Ethernet interface view Predefined user roles network-admin Usage guidelines If only the aging timer is configured, the aging timer counts up regardless of whether traffic data has been sent from the sticky MAC addresses.
After you execute this command, you cannot manually configure sticky MAC addresses, and secure MAC addresses learned by a port in autoLearn mode are dynamic. All dynamic MAC addresses are lost at reboot. Use this command when you want to clear all sticky MAC addresses after a device reboot.
Usage guidelines Secure MAC addresses are MAC addresses configured or learned in autoLearn mode, and if saved, can survive a device reboot. You can bind a secure MAC address only to one port in a VLAN. You can add important or frequently used MAC addresses as sticky or static secure MAC addresses to avoid the secure MAC address limit causing authentication failure.
Syntax port-security mac-move permit undo port-security mac-move permit Default MAC move is disabled on the device. Views System view Predefined user roles network-admin Usage guidelines This command takes effect on both 802.1X and MAC authentication users. MAC move allows 802.1X or MAC authenticated users to move between ports on a device. For example, if an 802.1X-authenticated user moves to another 802.1X-enabled port on the device, the authentication session is deleted from the first port.
Usage guidelines For autoLearn mode, this command sets the maximum number of secure MAC addresses (both configured and automatically learned) on the port. In any other mode that enables 802.1X, MAC authentication, or both, this command sets the maximum number of authenticated MAC addresses on the port. The actual maximum number of concurrent users that the port accepts equals the smaller of the following values: •...
The NAS-ID profile applied globally. If no NAS-ID profile is applied or no matching binding is found in the selected profile, the device uses the device name as the NAS-ID. Examples # Apply the NAS-ID profile aaa to GigabitEthernet 1/0/1 for port security. <Sysname>...
MSR2600-10-X1. MSR3600-28/3600-51. MSR3600-28-SI/3600-51-SI. The NTK feature checks the destination MAC addresses in outbound frames. This feature allows frames to be sent only to devices passing authentication, preventing illegal devices from intercepting network traffic. Examples # Set the NTK mode of GigabitEthernet 1/0/1 to ntkonly, allowing the port to forward received packets only to devices passing authentication.
<Sysname> system-view [Sysname] port-security oui index 4 mac-address 000d-2a10-0033 Related commands display port-security port-security port-mode Use port-security port-mode to set the port security mode of a port. Use undo port-security port-mode to restore the default. Syntax port-security port-mode { autolearn | mac-authentication | mac-else-userlogin-secure | mac-else-userlogin-secure-ext | secure | userlogin | userlogin-secure | userlogin-secure-ext | userlogin-secure-or-mac | userlogin-secure-or-mac-ext | userlogin-withoui } undo port-security port-mode...
Page 248
Keyword Security mode Description This mode is the combination of the macAddressWithRadius and userLoginSecure modes, with MAC authentication having a higher priority. In this mode, the port allows one 802.1X authentication user and multiple MAC authentication users to log in. mac-else-userlogin-se macAddressElseUse •...
Usage guidelines The userLogin mode is supported on any Layer Ethernet ports. Other port security modes are supported only on the following ports: • Layer 2 Ethernet ports on the following modules: HMIM-8GSW. HMIM-24GSW. HMIM-24GSWP. SIC-4GSW. •...
Syntax port-security timer autolearn aging time-value undo port-security timer autolearn aging Default Secure MAC addresses do not age out. Views System view Predefined user roles network-admin Parameters time-value: Specifies the aging timer in minutes for secure MAC addresses. The value is in the range of 0 to 129600.
Parameters time-value: Specifies the silence period in seconds during which the port remains disabled. The value is in the range of 20 to 300. Usage guidelines If you configure the intrusion protection action as disabling the port temporarily, use this command to set the silence period.
Page 252
Usage guidelines To report critical port security events to an NMS, enable SNMP notifications for port security. For port security event notifications to be sent correctly, you must also configure SNMP on the device. For more information about SNMP configuration, see the network management and monitoring configuration guide for the device.
Portal commands WLAN is not supported on the following routers: • MSR810-LMS/810-LUS. • MSR3600-28-SI/3600-51-SI. • MSR3610-X1/3610-X1-DP/3610-X1-DC/3610-X1-DP-DC. • MSR5620/5560/5680. Commands and descriptions for centralized devices apply to the following routers: • MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-10-PoE/810-LM-HK/810-W-LM-HK/810-L MS/810-LUS. • MSR2600-10-X1. • MSR 2630. • MSR3600-28/3600-51. • MSR3600-28-SI/3600-51-SI.
Usage guidelines If a portal user fails AAA in MAC-trigger authentication, the user cannot trigger authentication before the MAC-trigger entry of the user ages out. After the MAC-trigger entry ages out, the user triggers MAC-trigger authentication when it accesses the network. After this feature is enabled, the device sets the MAC-trigger entry state for a user to unbound immediately after the user fails AAA in MAC-trigger authentication.
<Sysname> system-view [Sysname] portal mac-trigger-server mts [Sysname-portal-mac-trigger-server-mts] aging-time 300 Related commands display portal mac-trigger-server app-id Use app-id to specify the APP ID for QQ authentication. Use undo app-id to restore the default. Syntax app-id app-id undo app-id Default An APP ID for QQ authentication exists. Views QQ authentication server view Predefined user roles...
app-key Use app-key to specify the APP key for QQ authentication. Use undo app-key to restore the default. Syntax app-key { cipher | simple } app-key undo app-key Default An APP key for QQ authentication exists. Views QQ authentication server view Predefined user roles network-admin Parameters...
authentication-timeout Use authentication-timeout to specify the authentication timeout, which is the maximum amount of time the device waits for portal authentication to complete after receiving the MAC binding query response. Use undo authentication-timeout to restore the default. Syntax authentication-timeout minutes undo authentication-timeout Default The authentication timeout time is 3 minutes.
Predefined user roles network-admin Parameters url-string: Specifies the URL of the QQ authentication server, a case-sensitive string of 1 to 256 characters. Make sure that you specify the actual URL of the QQ authentication server. Examples # Specify http://oauth.qq.com as the URL of the QQ authentication server. <Sysname>...
URL by using this command, and specify a different URL for the portal Web server. In this way, you can use a different portal Web server to provide customized authentication pages to users. Examples # In the view of MAC binding server mts, specify http://lvzhou.h3c.com as the URL of the cloud portal authentication server. <Sysname> system-view...
[Sysname] portal mac-trigger-server mts [Sysname-portal-mac-trigger-server-mts] cloud-server url http://lvzhou.h3c.com Related commands display portal mac-trigger-server default-logon-page Use default-logon-page to specify the default authentication page file for the local portal Web server. Use undo default-logon-page to restore the default. Syntax default-logon-page file-name undo default-logon-page Default No default authentication page file is specified for the local portal Web server.
Page 263
Syntax display portal { ap ap-name [ radio radio-id ] | interface interface-type interface-number } Views Any view Predefined user roles network-admin network-operator Parameters ap ap-name: Specifies an AP by its name, a case-insensitive string of 1 to 64 characters. Valid characters are letters, digits, underscores (_), left brackets ([), right brackets (]), slashes (/), and minus signs (-).
Page 264
Authentication type: Layer3 Portal VSRP status: M_Delay Portal Web server: wbs(active) Secondary portal Web server: wbs sec Portal mac-trigger-server: mts Authentication domain: my-domain Pre-auth domain: abc Extend-auth domain: abc User-dhcp-only: Enabled Pre-auth IP pool: ab Max portal users: Not configured Bas-ip: Not configured User detection: Type: ICMP Interval: 300s...
Page 265
Destination authentication subnet: IP address Prefix length # Display portal configuration and portal running state on AP ap1. (Wireless application.) <Sysname> display portal ap ap1 Portal information of ap1 Radio ID: 1 SSID: portal Authorization : Strict checking : Disable User profile : Disable Dual stack...
Page 266
# Display portal configuration and portal running state on VLAN-interface 30. <Sysname> display portal Vlan-interface 30 Portal information of Vlan-interface30 NAS-ID profile: Not configured Authorization : Strict checking : Disable User profile : Disable Dual stack : Disabled Dual traffic-separate: Disabled IPv4: Portal status: Enabled Authentication type: Direct...
Page 267
Layer3 source network: IP address Prefix length Destination authentication subnet: IP address Prefix length Table 20 Command output Field Description Portal information of interface Portal configuration on the interface. Radio ID ID of the radio. SSID Service set identifier. NAS-ID profile NAS-ID profile on the interface.
Page 268
Field Description Status of the portal VSRP on the interface: • M_Initial—The master device is in initial state. • M_Delay—The master device is in delayed state. (The device will switch to the master state after the delay time.) • M_Alone—The master device is in standalone state. This state occurs when the master device and the backup device cannot communicate with each other.
Field Description Status of the user-dhcp-only feature: • Enabled: Only users with IP addresses obtained through DHCP can User-dhcp-only perform portal authentication. • Disabled: Both users with IP addresses obtained through DHCP and users with static IP addresses can pass authentication to get online. Name of the IP address pool specified for portal users before Pre-auth ip-pool authentication.
Page 270
network-operator Parameters all: Specifies all portal authentication error records. ipv4 ipv4-address: Specifies the IPv4 address of a portal user. ipv6 ipv6-address: Specifies the IPv6 address of a portal user. start-time start-date start-time end-time end-date end-time: Specifies a time range. The start date and end date must be in the format of MM/DD/YYYY or YYYY/MM/DD.
Page 271
<Sysname> display portal auth-error-record ip 192.168.0.188 User MAC : 0016-ecb7-a879 Interface : WLAN-BSS1/0/1 User IP address : 192.168.0.188 : ap1 SSID : byod Auth error time : 2016-03-04 16:49:07 Auth error reason : The maximum number of users already reached. # Display portal authentication error records for the portal user whose IPv6 address is 2000::2.
Field Description Reason for the authentication error: • The maximum number of users already reached. • Failed to obtain user physical information. • Failed to receive the packet because packet length is 0. • Packet source unknown. Server IP:X.X.X.X, VRF index:0. •...
Page 273
Usage guidelines The following matrix shows the command and hardware compatibility: Hardware Command compatibility MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-10-PoE/ 810-LM-HK/810-W-LM-HK/810-LMS/810-LUS MSR2600-10-X1 MSR 2630 MSR3600-28/3600-51 MSR3600-28-SI/3600-51-SI MSR3610-X1/3610-X1-DP/3610-X1-DC/3610-X1-DP-DC MSR 3610/3620/3620-DP/3640/3660 MSR5620/5660/5680 Examples # Display all portal authentication failure records. <Sysname> display portal auth-fail-record all Total authentication fail records: 2 User name : test@abc User MAC...
Page 274
<Sysname> display portal auth-fail-record ipv6 2000::2 User name : test@abc User MAC : 0016-ecb7-a879 Interface : WLAN-BSS1/0/1 User IP address : 2000::2 : ap1 SSID : byod Auth failure time : 2016-03-04 16:49:07 Auth failure reason : Authorization information does not exist. # Display portal authentication failure records for the portal user whose username is chap1.
Table 23 Command output Field Description Type of users: • User type iOS. • Android. Packets Number of portal captive-bypass packets sent to the users. Related commands captive-bypass enable display portal extend-auth-server Use display portal extend-auth-server to display information about third-party authentication servers.
Field Description Redirect URL Redirection URL for QQ authentication success. Mail protocol Protocols supported by the email authentication service. Email domain names supported by the email authentication Mail domain name service. Related commands portal extend-auth-server display portal local-binding mac-address Use display portal local-binding mac-address to display information about local MAC-account binding entries.
Related commands local-binding enable display portal logout-record Use display portal logout-record to display portal user offline records. Syntax display portal logout-record { all | ipv4 ipv4-address | ipv6 ipv6-address | start-time start-date start-time end-time end-date end-time | username username } Views Any view Predefined user roles...
Page 279
Total logout records: 2 User name : test@abc User MAC : 0016-ecb7-a879 Interface : WLAN-BSS1/0/1 User IP address : 192.168.0.8 : ap1 SSID : byod User login time : 2016-03-04 14:20:19 User logout time : 2016-03-04 14:22:05 Logout reason : Admin Reset User name : coco User MAC...
User IP address : 192.168.0.8 : ap1 SSID : byod User login time : 2016-03-04 14:20:19 User logout time : 2016-03-04 14:22:05 Logout reason : Admin Reset Table 26 Command output Field Description Total logout records Total number of portal user offline records. User name Username of the portal user.
Page 281
Views Any view Predefined user roles network-admin network-operator Parameters all: Specifies all MAC binding servers. name server-name: Specifies a MAC binding server by its name, a case-sensitive string of 1 to 32 characters. Examples # Display information about all MAC binding servers. <Sysname>...
Page 282
Type of the MAC binding server: • Server type CMCC—CMCC server. • IMC—H3C IMC server or H3C CAMS server. IP address of the MAC binding server. UDP port number on which the MAC binding server listens for MAC binding Port query packets.
Field Description Maximum amount of time that the device waits for portal authentication to Authentication timeout complete after receiving the MAC binding query response. Excluded attribute list Numbers of attributes excluded from portal protocol packets. Status of local MAC-trigger authentication: •...
Page 284
Hardware Option compatibility MSR3600-28/3600-51 MSR3600-28-SI/3600-51-SI MSR3610-X1/3610-X1-DP/3610-X1-DC/3610-X1-DP-DC MSR 3610/3620 /3620-DP/3640/3660 MSR5620/5660/5680 mac-trigger-server server-name: Specifies a MAC binding server by its name, a case-sensitive string of 1 to 32 characters. server server-name: Specifies a portal authentication server by its name, a case-sensitive string of 1 to 32 characters.
Page 286
Field Description Forced logout notification packet the access device sent to the portal NTF_LOGOUT authentication server. REQ_INFO Information request packet. ACK_INFO Information acknowledgment packet. User discovery notification packet the portal authentication server sent NTF_USERDISCOVER to the access device. User IP change notification packet the access device sent to the portal NTF_USERIPCHANGE authentication server.
Page 287
Field Description Number of packets that timed out of establishing a connection to the Timeout third-party authentication server. Number of packets that failed to establish a connection to the third-party Conn-failure authentication server. Number of packets denied access to the third-party authentication server.
Field Description Cloud user offline packet the access device sent to the third-party authentication server. POST_OFFLINEUSER This field is displayed only if the third-party authentication server is the lvzhou cloud or WeChat authentication server. Cloud user online packet the access device sent to the third-party authentication server.
Parameters slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command displays portal redirect packet statistics for all cards. (Distributed devices in standalone mode.) slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a member device, this command displays portal redirect packet statistics for all member devices.
Page 290
Distributed devices in IRF mode: display portal rule { all | dynamic | static } { ap ap-name [ radio radio-id ] | interface interface-type interface-number [ chassis chassis-number slot slot-number ] } Views Any view Predefined user roles network-admin network-operator Parameters all: Displays all portal filtering rules, including dynamic and static portal filtering rules.
Page 291
Examples # (Centralized devices in standalone mode.) Display all portal filtering rules on GigabitEthernet 1/0/1. (Wired application). <Sysname> display portal rule all interface gigabitethernet 1/0/1 IPv4 portal rules on GigabitEthernet1/0/1: Rule 1 Type : Static Action : Permit Protocol : Any Status : Active Source:...
Page 292
Rule 4: Type : Static Action : Deny Status : Active Source: : 0.0.0.0 Mask : 0.0.0.0 Interface : GigabitEthernet1/0/1 VLAN : Any Destination: : 0.0.0.0 Mask : 0.0.0.0 IPv6 portal rules on GigabitEthernet1/0/1: Rule 1 Type : Static Action : Permit Protocol : Any...
Page 293
Source: : :: Prefix length Interface : GigabitEthernet1/0/1 VLAN : Any Protocol : TCP Destination: : :: Prefix length Port : 80 Rule 4: Type : Static Action : Deny Status : Active Source: : :: Prefix length Interface : GigabitEthernet1/0/1 VLAN : Any Destination:...
Page 294
: 0000-0000-0000 Interface : WLAN-BSS1/0/1 VLAN : any Destination: : 192.168.0.111 Mask : 255.255.255.255 Port : Any Rule 2 Type : Dynamic Action : Permit Status : Active Source: : 2.2.2.2 : 000d-88f8-0eab Interface : WLAN-BSS1/0/1 VLAN Author ACL: Number : N/A Rule 3 Type...
Page 295
# (Distributed devices in standalone mode/centralized in IRF mode.) Display all portal filtering rules on GigabitEthernet 1/0/1 for the specified slot. (Wired application.) <Sysname> display portal rule all interface gigabitethernet 1/0/1 slot 1 Slot 1: IPv4 portal rules on GigabitEthernet1/0/1: Rule 1 Type : Static...
Page 296
Rule 4: Type : Static Action : Deny Status : Active Source: : 0.0.0.0 Mask : 0.0.0.0 Interface : GigabitEthernet1/0/1 VLAN : Any Destination: : 0.0.0.0 Mask : 0.0.0.0 IPv6 portal rules on GigabitEthernet1/0/1: Rule 1 Type : Static Action : Permit Protocol : Any...
Page 297
: :: Prefix length Interface : GigabitEthernet1/0/1 VLAN : Any Protocol : TCP Destination: : :: Prefix length Port : 80 Rule 4: Type : Static Action : Deny Status : Active Source: : :: Prefix length Interface : GigabitEthernet1/0/1 VLAN : Any Destination:...
Page 298
Interface : WLAN-BSS1/0/1 VLAN : any Destination: : 192.168.0.111 Mask : 255.255.255.255 Port : Any Rule 2 Type : Dynamic Action : Permit Status : Active Source: : 2.2.2.2 Mask : 255.255.255.255 : 000d-88f8-0eab Interface : WLAN-BSS1/0/1 VLAN Author ACL: Number : N/A Rule 3...
Page 299
Table 30 Command output Field Description Radio ID ID of the radio. SSID Service set identifier. Number of the portal rule. IPv4 portal filtering rules and IPv6 portal filtering Rule rules are numbered separately. Type of the portal rule: • Type Static—Static portal rule.
Table 31 Command output Field Description Success Number of packets redirected successfully. Failure Number of packets failed redirection. Total Total number of packets. Method statistics Statistics of HTTP request methods. Number of packets with the GET request method. Post Number of packets with the POST request method. Other Number of packets with other request methods.
Server detection : Timeout 60s Action: log User synchronization : Timeout 200s Status : Up Exclude-attribute : Not configured Logout notification : Retry 3 interval 5s Table 32 Command output Field Description Portal authentication server type: • CMCC—CMCC server. Type •...
Page 304
Views Any view Predefined user roles network-admin network-operator Parameters all: Displays information about all portal users. ap ap-name: Specifies an AP by its name, a case-insensitive string of 1 to 64 characters. Valid characters are letters, digits, underscores (_), left brackets ([), right brackets (]), slashes (/), and minus signs (-).
Page 305
Hardware Option compatibility MSR 2630 MSR3600-28/3600-51 MSR3600-28-SI/3600-51-SI MSR3610-X1/3610-X1-DP/3610-X1-DC/3610-X1-DP-DC MSR 3610/3620/3620-DP/3640/3660 MSR5620/5660/5680 interface interface-type interface-number: Displays information about portal users on the specified interface. ip ipv4-address: Specifies the IPv4 address of a portal user. ipv6 ipv6-address: Specifies the IPv6 address of a portal user. mac mac-address: Specifies the MAC address of a portal user, in the format of H-H-H.
Page 306
authentication. If you do not specify the pre-auth keyword, this command displays information about authenticated portal users. brief: Displays brief information about portal users. verbose: Displays detailed information about portal users. Usage guidelines If you specify neither the brief nor the verbose keyword, this command displays portal authentication-related information for portal users.
Page 307
User profile: abc (active) Session group profile: cd (inactive) ACL number: N/A Inbound CAR: N/A Outbound CAR: N/A # Display information about the portal user whose MAC address is 000d-88f8-0eab. (Wired application.) <Sysname> display portal user mac 000d-88f8-0eab Username: abc Portal server: pts State: Online VPN instance: N/A...
Page 308
Field Description Total number of portal users whose authentication type is QQ Total QQ users authentication. Total number of portal users whose authentication type is WeChat Total WeChat users authentication. Username Name of the user. Portal server Name of the portal authentication server. Current state of the portal user: •...
Page 309
Current IP address: 50.50.50.3 Original IP address: 30.30.30.2 Username: user1@hrss User ID: 0x28000002 Access interface: eth3/2/2 Service-VLAN/Customer-VLAN: -/- MAC address: 0000-0000-0001 Authentication type: Normal Domain: hrss VPN instance: 123 Status: Online Portal server: test Vendor: Apple Authentication type: Direct AAA: Realtime accounting interval: 60s, retry times: 3 Idle-cut: 180 sec, 10240 bytes Session duration: 500 sec, remaining: 300 sec...
Page 310
Field Description Public VLAN/Private VLAN to which the portal user belongs. If no VLAN is Service-VLAN/Customer-VLAN configured for the portal user, this field displays -/-. MAC address MAC address of the portal user. Type of portal authentication: • Normal—Normal authentication. •...
Page 311
Field Description Authorized outbound CAR: • CIR—Committed information rate in bps. Outbound CAR • PIR—Peak information rate in bps. If no outbound CAR is authorized, this field displays N/A. Authorized ACL: • N/A—The AAA server authorizes no ACL. • ACL number active—The AAA server has authorized the ACL successfully.
Page 312
Radio ID: 1 SSID: portal Portal server: pts State: Online VPN instance: vpn1 VLAN Interface 000d-88f8-0eac 4.4.4.4 Bss1/2 Authorization information: DHCP IP pool: N/A User profile: N/A ACL number: 3000 Inbound CAR: CIR 3072 bps 3072 bps Outbound CAR: CIR 3072 bps 3072 bps # Display information about portal users that perform normal authentication.
Page 313
Portal server: pts State: Online VPN instance: N/A VLAN Interface 000d-88f8-0eab 2.2.2.2 WLAN-BSS1/0/1 Authorization information: DHCP IP pool: N/A User profile: abc (active) Session group profile: cd (inactive) ACL number: N/A Inbound CAR: N/A Outbound CAR: N/A Table 36 Command output Field Description Total portal users...
Page 314
Field Description Name of the authorized IP address pool. If no IP address pool is DHCP IP pool authorized for the portal user, this field displays N/A. Authorized user profile: • N/A—The AAA server authorizes no user profile. • User profile active—The AAA server has authorized the user profile successfully.
Page 316
Field Description Status of the portal user: • Authenticating—The user is being authenticated. • Authorizing—The user is being authorized. • Waiting SetRule—Deploying portal rules to the user. Status • Online—The user is online. • Waiting Traffic—Waiting for traffic from the user. •...
Field Description Authorized user profile: • N/A—The AAA server authorizes no user profile. • User profile active—The AAA server has authorized the user profile successfully. • inactive—The AAA server failed to authorize the user profile or the user profile does not exist on the device. Max multicast addresses Maximum number of multicast groups the portal user can join.
Examples # Display the number of portal users. <Sysname> display portal user count Total number of users: 1 Related commands portal enable portal delete-user display portal web-server Use display portal web-server to display information about portal Web servers. Syntax display portal web-server [ server-name ] Views Any view Predefined user roles...
Table 39 Command output Field Description Portal Web server type: • Type CMCC—CMCC server. • IMC—IMC server. Portal Web server Name of the portal Web server. URL of the portal Web server. URL parameters URL parameters for the portal Web server. VPN instance Name of the MPLS L3VPN where the portal Web server resides.
Page 320
Views Any view Predefined user roles network-admin network-operator Parameters ap ap-name: Specifies an AP by its name, a case-insensitive string of 1 to 64 characters. Valid characters are letters, digits, underscores (_), left brackets ([), right brackets (]), slashes (/), and minus signs (-).
Page 321
VLAN : Any Rule 2: Type : Static Action : Redirect Status : Active Source: VLAN : Any Protocol : TCP Destination: Port : 80 IPv6 web-redirect rules on GigabitEthernet1/0/1: Rule 1: Type : Static Action : Redirect Status : Active Source: VLAN : Any...
Field Description Type of the Web redirect rule: • Static—Static Web redirect rule, generated when the Web redirect Type feature takes effect. • Dynamic—Dynamic Web redirect rule, generated when a user visits a redirect webpage. Action in the Web redirect rule: •...
Page 323
To address this issue, you can configure this command to exclude the unsupported attributes from portal protocol packets sent to the portal authentication server. You can specify multiple excluded attributes. Table 41 describes all attributes of the portal protocol. Table 41 Portal attributes Name Number Description...
[Sysname-portal-mac-trigger-server-123] exclude-attribute 10 exclude-attribute (portal authentication server view) Use exclude-attribute to exclude an attribute from portal protocol packets. Use undo exclude-attribute to not exclude an attribute from portal protocol packets. Syntax exclude-attribute number { ack-auth | ack-logout | ntf-logout } undo exclude-attribute number { ack-auth | ack-logout | ntf-logout } Default No attributes are excluded from portal protocol packets.
Name Number Description UpLinkFlux Uplink (output) traffic of the user, an 8-byte unsigned integer, in KB. DownLinkFlux Downlink (input) traffic of the user, an 8-byte unsigned integer, in KB. Port A string excluding the end character '\0'. This attribute has different meanings in different types of packets. •...
Views MAC binding server view Predefined user roles network-admin Parameters value: Specifies the free-traffic threshold in the range of 0 to 10240000 bytes. If the free-traffic threshold is set to 0, the device immediately triggers MAC-based quick portal authentication for a user once the user's traffic is deleted.
Page 327
Predefined user roles network-admin Parameters original-url url-string: Specifies a URL string to match the URL in HTTP or HTTPS requests of a portal user. The specified URL must be a complete URL starting with http:// or https://, a case-sensitive string of 1 to 256 characters. redirect-url url-string: Specifies the URL to which the user is redirected.
<Sysname> system-view [Sysname] portal web-server wbs [Sysname-portal-websvr-wbs] if-match original-url http://www.abc.com.cn redirect-url http://192.168.0.1 # Configure a match rule to redirect HTTP requests that carry the user agent string 5.0(WindowsNT6.1)AppleWebKit/537.36(KHTML,likeGecko)Chrome/36.0.1985.125Safari/537. 36 to the URL http://192.168.0.1. <Sysname> system-view [Sysname] portal web-server wbs [Sysname-portal-websvr-wbs] if-match user-agent 5.0(WindowsNT6.1)AppleWebKit/537.36(KHTML,likeGecko)Chrome/36.0.1985.125Safari/537.36 redirect-url http://192.168.0.1 Related commands...
Page 329
Usage guidelines The following matrix shows the command and hardware compatibility: Hardware Command compatibility MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-10-PoE/ 810-LM-HK/810-W-LM-HK/810-LMS/810-LUS MSR2600-10-X1 MSR 2630 MSR3600-28/3600-51 MSR3600-28-SI/3600-51-SI MSR3610-X1/3610-X1-DP/3610-X1-DC/3610-X1-DP-DC MSR 3610/3620/3620-DP/3640/3660 MSR5620/5660/5680 A match rule for temporary pass matches Web requests by URL or User-Agent information. Only the matching Web requests are temporarily permitted to pass.
<Sysname> system-view [Sysname] portal web-server wbs [Sysname-portal-websvr-wbs] if-match original-url http://www.123.com.cn user-agent 5.0(WindowsNT6.1)AppleWebKit/537.36(KHTML,likeGecko)Chrome/36.0.1985.125Safari/537.36 temp-pass redirect-url http://192.168.0.1 Related commands display portal web-server portal free-rule portal temp-pass enable url-parameter ip (MAC binding server view) Use ip to specify the IP address of a MAC binding server. Use undo ip to restore the default.
Examples # Specify the IP address of the MAC binding server as 192.168.0.111 and the plaintext key as portal. <Sysname> system-view [Sysname] portal mac-trigger-server mts [Sysname-portal-mac-trigger-server-mts] ip 192.168.0.111 key simple portal Related commands display portal mac-trigger-server ip (portal authentication server view) Use ip to specify the IP address of an IPv4 portal authentication server.
<Sysname> system-view [Sysname] portal server pts [Sysname-portal-server-pts] ip 192.168.0.111 key simple portal Related commands display portal server portal server ipv6 Use ipv6 to specify the IP address of an IPv6 portal authentication server. Use undo ipv6 to restore the default. Syntax ipv6 ipv6-address [ vpn-instance ipv6-vpn-instance-name ] [ key { cipher | simple } string ] undo ipv6...
[Sysname] portal server pts [Sysname-portal-server-pts] ipv6 2000::1 key simple portal Related commands display portal server portal server local-binding aging-time Use local-binding aging-time to set the aging time for local MAC-account binding entries. Use undo local-binding aging-time to restore the default. Syntax local-binding aging-time hours undo local-binding aging-time...
undo local-binding enable Default Local MAC-trigger authentication is disabled. Views MAC binding server view Predefined user roles network-admin Usage guidelines This feature enables the device to act as a local MAC binding server to provide local MAC-trigger authentication for local portal users. After a user passes portal authentication for the first time, the access device (local MAC binding server) generates a local MAC binding entry for the user.
Page 335
device-type: Specifies an endpoint type. computer: Specifies the endpoint type as computer. pad: Specifies the endpoint type as tablet. phone: Specifies the endpoint type as mobile phone. device-name device-name: Specify an endpoint by its name, a case-sensitive string of 1 to 127 characters.
Related commands default-logon-page portal local-web-server logout-notify Use logout-notify to set the maximum number of times and the interval for retransmitting a logout notification packet. Use undo logout-notify to restore the default. Syntax logout-notify retry retries interval interval undo logout-notify Default The device does not retransmit a logout notification packet.
Examples # Set the maximum number of times for retransmitting a logout notification packet to 3 and the retry interval to 5 seconds. <Sysname> system-view [Sysname] portal server pt [Sysname-portal-server-pt] logout-notify retry 3 interval 5 Related commands display portal server mail-domain-name Use mail-domain-name to specify an email domain name for email authentication.
Syntax mail-protocol { imap | pop3 } * undo mail-protocol Default No protocols are specified for email authentication. Views Email authentication server view Predefined user roles network-admin Parameters imap: Specifies the Internet Message Access Protocol (IMAP). pop3: Specifies the Post Office Protocol 3 (POP3). Usage guidelines This command specifies email protocols that the device uses to interact with the email authentication server to perform authentication and authorization on portal users who uses email authentication.
Usage guidelines Some MAC binding servers identify MAC-based quick portal authentication by a specific NAS-Port-Type value in received RADIUS requests. To communicate with such a MAC binding server, you must configure the device to use the NAS-Port-Type value required by the MAC binding server.
port (portal authentication server view) Use port to set the destination UDP port number used by the device to send unsolicited portal packets to the portal authentication server. Use undo port to restore the default. Syntax port port-number undo port Default The device uses 50100 as the destination UDP port number for unsolicited portal packets.
You must configure the BAS-IP or BAS-IPv6 attribute on a portal authentication-enabled interface or service template if the following conditions are met: • The portal authentication server is an H3C IMC server or the portal authentication mode is re-DHCP. •...
Use undo portal { ipv4-max-user | ipv6-max-user } to restore the default. Syntax portal { ipv4-max-user | ipv6-max-user } max-number undo portal { ipv4-max-user | ipv6-max-user } Default The maximum number of portal users allowed on an interface or a service template is not limited. Views Interface view Service template view...
Default No MAC binding server is specified. Views Interface view Service template view Predefined user roles network-admin Parameters server-name: Specifies a MAC binding server by its name, a case-sensitive string of 1 to 32 characters. Usage guidelines Only direct portal authentication supports MAC-based quick portal authentication. For MAC-based quick portal authentication to take effect, perform the following tasks: •...
Parameters ipv6: Specifies an IPv6 portal Web server. If the server is an IPv4 portal Web server, do not specify this keyword. secondary: Specifies the backup portal Web server. If you do not specify this keyword, the specified server is the primary portal Web server. server-name: Specifies a portal Web server to be specified on the interface by its name, a case-sensitive string of 1 to 32 characters.
Views System view Predefined user roles network-admin Usage guidelines The following matrix shows the command and hardware compatibility: Hardware Command compatibility MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-10-PoE/ 810-LM-HK/810-W-LM-HK/810-LMS/810-LUS MSR2600-10-X1 MSR 2630 MSR3600-28/3600-51 MSR3600-28-SI/3600-51-SI MSR3610-X1/3610-X1-DP/3610-X1-DC/3610-X1-DP-DC MSR 3610/3620/3620-DP/3640/3660 MSR5620/5660/5680 This feature enables the device to save all portal authentication error records and to periodically send the records to the lvzhou cloud server or other servers.
Page 346
2100. The start time and end time must be in the format of hh:mm. The value range for the start time and end time is 00:00 to 23:59. Usage guidelines The following matrix shows the command and hardware compatibility: Hardware Command compatibility MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-10-PoE/ 810-LM-HK/810-W-LM-HK/810-LMS/810-LUS...
portal auth-error-record enable reset portal auth-error-record portal auth-error-record max Use portal auth-error-record max to set the maximum number of portal authentication error records. Use undo portal auth-error-record max to restore the default. Syntax portal auth-error-record max number undo portal auth-error-record max Default The maximum number of portal authentication error records is 32000.
portal auth-fail-record enable Use portal auth-fail-record enable to enable portal authentication failure recording. Use undo portal auth-fail-record enable to disable portal authentication failure recording. Syntax portal auth-fail-record enable undo portal auth-fail-record enable Default Portal authentication failure recording is disabled. Views System view Predefined user roles network-admin...
Page 349
Views System view Predefined user roles network-admin Parameters url url-string: Specifies the URL to which portal authentication failure records are exported. The URL is a case-insensitive string of 1 to 255 characters. start-time start-date start-time end-time end-date end-time: Specifies a time range. The start date and end date must be in the format of MM/DD/YYYY or YYYY/MM/DD.
Examples # Export all portal authentication failure records to path tftp://1.1.1.1/record/authfail/. <Sysname> system-view [Sysname] portal auth-fail-record export url tftp://1.1.1.1/record/authfail/ # Export portal authentication failure records in the time range from 2016/3/4 14:20 to 2016/3/4 15:00 to path tftp://1.1.1.1/record/authfail/. <Sysname> system-view [Sysname] portal auth-fail-record export tftp://1.1.1.1/record/authfail/ start-time 2016/3/4 14:20 end-time 2016/3/4 15:00 Related commands...
Hardware Command compatibility MSR 3610/3620/3620-DP/3640/3660 MSR5620/5660/5680 When the maximum number of portal authentication failure records is reached, the new record overwrites the oldest one. Examples # Set the maximum number of portal authentication failure records to 50. <Sysname> system-view [Sysname] portal auth-fail-record max 50 Related commands display portal auth-fail-record portal authorization strict-checking...
portal client-gateway interface Use portal client-gateway interface to specify the AC’s interface for portal clients to access during third-party authentication. Use undo portal client-gateway interface to restore the default. Syntax portal client-gateway interface interface-type interface-number undo portal client-gateway interface Default No AC's interface is specified for portal clients to access during third-party authentication.
Usage guidelines Before you execute this command, make sure the client traffic forwarding location is at APs. Examples # Set the interval at which an AP reports traffic statistic to the device to 120 seconds. <Sysname> system-view [Sysname] portal client-traffic-report interval 120 Related commands client forwarding-location (WLAN Command Reference) portal delete-user...
Page 355
Hardware Option compatibility MSR5620/5660/5680 interface interface-type interface-number: Specifies an interface by its type and number. If you specify this option, this command logs out all IPv4 and IPv6 online portal users on the interface. ipv6 ipv6-address: Specifies the IP address of an IPv6 online portal user. mac mac-address: Specifies the MAC address of an online portal user, in the format of H-H-H.
<Sysname> system-view [Sysname] portal delete-user auth-type email # Log out the portal user whose username is abc. <Sysname> system-view [Sysname] portal delete-user username abc Related commands display portal user portal device-id Use portal device-id to specify the device ID. Use undo portal device-id to restore the default. Syntax portal device-id device-id undo portal device-id...
Default No portal authentication domain is configured on an interface or a service template. Views Interface view Service template view Predefined user roles network-admin Parameters ipv6: Specifies an authentication domain for IPv6 portal users. Do not specify this keyword for IPv4 portal users.
Predefined user roles network-admin Usage guidelines The following matrix shows the command and hardware compatibility: Hardware Command compatibility MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-10-PoE/ 810-LM-HK/810-W-LM-HK/810-LMS/810-LUS MSR2600-10-X1 MSR 2630 MSR3600-28/3600-51 MSR3600-28-SI/3600-51-SI MSR3610-X1/3610-X1-DP/3610-X1-DC/3610-X1-DP-DC MSR 3610/3620/3620-DP/3640/3660 MSR5620/5660/5680 The portal dual-stack feature enables portal users to access both IPv4 and IPv6 networks after passing one type (IPv4 or IPv6) of portal authentication.
Views Interface view Service template view Predefined user roles network-admin Usage guidelines The following matrix shows the command and hardware compatibility: Hardware Command compatibility MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-10-PoE/ 810-LM-HK/810-W-LM-HK/810-LMS/810-LUS MSR2600-10-X1 MSR 2630 MSR3600-28/3600-51 MSR3600-28-SI/3600-51-SI MSR3610-X1/3610-X1-DP/3610-X1-DC/3610-X1-DP-DC MSR 3610/3620/3620-DP/3640/3660 MSR5620/5660/5680 This feature enables the device to separately collect IPv4 traffic statistics and IPv6 traffic statistics for a dual-stack portal user.
Page 360
Syntax Interface view: portal enable method { direct | layer3 | redhcp } portal ipv6 enable method { direct | layer3 } undo portal [ ipv6 ] enable Service template: portal [ ipv6 ] enable method direct undo portal [ ipv6 ] enable Default Portal authentication is disabled.
Related commands display portal portal extend-auth domain Use portal extend-auth domain to specify the authentication domain for third-party authentication. Use undo portal extend-auth domain to remove the authentication domain for third-party authentication. Syntax portal extend-auth domain domain-name undo portal extend-auth domain Default No authentication domain is specified for third-party authentication.
undo portal extend-auth-server { qq | mail } Default No third-party authentication servers exist. Views System view Predefined user roles network-admin Parameters qq: Specifies the QQ authentication server. mail: Specifies the email authentication server. Usage guidelines The device supports using the QQ or email authentication server as a third-party portal authentication server for portal authentication.
Views Interface view Predefined user roles network-admin Parameters ipv6: Specifies an IPv6 portal authentication server. Do not specify this keyword for an IPv4 portal authentication server. server-name: Specifies a portal authentication server by its name, a case-sensitive string of 1 to 32 characters.
Predefined user roles network-admin Parameters ipv6: Specifies IPv6 portal Web servers. To specify IPv4 portal Web servers, do not specify this keyword. Usage guidelines The following matrix shows the support of the MSR routers for this command in different views: Hardware Interface view Service template view...
Use undo portal free-all except destination to delete the IPv4 portal authentication destination subnets on the interface. Syntax portal free-all except destination ipv4-network-address { mask-length | mask } undo portal free-all except destination [ ipv4-network-address ] Default No IPv4 portal authentication destination subnet is configured on the interface. Portal users must pass portal authentication to access any subnet.
• Specify the source IP address as 10.10.10.1/24, the destination IP address as 20.20.20.1, and the destination TCP port number as 23. • Specify the interface where the rule is applied as GigabitEthernet 1/0/1. <Sysname> system-view [Sysname] portal free-rule 1 destination ip 20.20.20.1 32 tcp 23 source ip 10.10.10.1 24 interface gigabitethernet 1/0/1 With this rule, users in subnet 10.10.10.1/24 do not need to pass portal authentication through GigabitEthernet 1/0/1 when they access services provided on TCP port 23 of host 20.20.20.1.
# Configure a destination-based portal-free rule: specify the rule number as 4 and host name as www.h3c.com.hk. This rule allows the portal user who sends the HTTP/HTTPS request that carries the host name www.h3c.com.hk to access network resources without authentication.
portal free-rule source Use portal free-rule source to configure a source-based portal-free rule. The filtering criteria include source MAC address, source interface, and source VLAN. Use undo portal free-rule to delete a specific or all portal-free rules. Syntax portal free-rule rule-number source { ap ap-name | { interface interface-type interface-number | mac mac-address | object-group object-group-name | vlan vlan-id } * } undo portal free-rule { rule-number | all } Default...
all: Specifies all portal-free rules. Usage guidelines If you specify both the source VLAN and the source Layer 2 interface, the interface must be in the VLAN. When you specify an object group in a source-based portal-free rule, make sure the specified object rule already exists.
Hardware Command compatibility MSR3600-28-SI/3600-51-SI MSR3610-X1/3610-X1-DP/3610-X1-DC/3610-X1-D P-DC MSR 3610/3620/3620-DP/3640/3660 MSR5620/5660/5680 By default, the device checks wireless portal client validity according to ARP entries only. In wireless networks where the AP forwards client traffic, the AC does not have ARP entries for clients. Therefore, the AC cannot check the validity of portal clients by using ARP entries.
Usage guidelines Portal users on the interface are authenticated when accessing the specified authentication destination subnet (except IP addresses and subnets specified in portal-free rules). The users can access other subnets without portal authentication. You can configure multiple authentication destination subnets. If you do not specify the ipv6-network-address argument in the undo portal ipv6 free-all except destination command, this command deletes all IPv6 portal authentication destination subnets on the interface.
If you do not specify the ipv6-network-address argument in the undo portal ipv6 layer3 source command, this command deletes all IPv6 portal authentication source subnets on the interface. Only cross-subnet authentication supports authentication source subnets. If you configure both an authentication source subnet and an authentication destination subnet on an interface, only the authentication destination subnet takes effect.
If the device receives a reply within the maximum number of detection attempts, it considers that the user is online and stops sending detection packets. Then the device resets the idle timer and repeats the detection process when the timer expires. If the device receives no reply after the maximum number of detection attempts, the device ...
mask: Specifies the subnet mask in dotted decimal format. Usage guidelines With IPv4 authentication source subnets configured, only packets from IPv4 users on the authentication source subnets can trigger portal authentication. If an unauthenticated IPv4 user is not on any authentication source subnet, the access device discards all the user's packets that do not match any portal-free rule.
Usage guidelines After a local portal Web server is configured on the access device, the access device also acts as the portal Web server and the portal authentication server. No external portal Web server and portal authentication server are needed. For an interface to use the local portal Web server, the URL of the portal Web server specified for the interface must meet the following requirements: •...
Predefined user roles network-admin Usage guidelines The following matrix shows the command and hardware compatibility: Hardware Command compatibility MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-10-PoE/ 810-LM-HK/810-W-LM-HK/810-LMS/810-LUS MSR2600-10-X1 MSR 2630 MSR3600-28/3600-51 MSR3600-28-SI/3600-51-SI MSR3610-X1/3610-X1-DP/3610-X1-DC/3610-X1-DP-DC MSR 3610/3620/3620-DP/3640/3660 MSR5620/5660/5680 This feature enables the device to save all portal user offline records and to periodically send the records to the lvzhou cloud server or other servers.
Page 378
Usage guidelines The following matrix shows the command and hardware compatibility: Hardware Command compatibility MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-10-PoE/ 810-LM-HK/810-W-LM-HK/810-LMS/810-LUS MSR2600-10-X1 MSR 2630 MSR3600-28/3600-51 MSR3600-28-SI/3600-51-SI MSR3610-X1/3610-X1-DP/3610-X1-DC/3610-X1-DP-DC MSR 3610/3620/3620-DP/3640/3660 MSR5620/5660/5680 The device supports FTP, TFTP, and HTTP file transfer methods. Table 45 describes the valid URL format for each method.
reset portal logout-record portal logout-record max Use portal logout-record max to set the maximum number of portal user offline records. Use undo portal logout-record max to restore the default. Syntax portal logout-record max number undo portal logout-record max Default The maximum number of portal user offline records is 32000. Views System view Predefined user roles...
portal mac-trigger-server Use portal mac-trigger-server to create a MAC binding server and enter its view, or enter the view of an existing MAC binding server. Use undo portal mac-trigger-server to delete the MAC binding server. Syntax portal mac-trigger-server server-name undo portal mac-trigger-server server-name Default No MAC binding servers exist.
Parameters max-number: Specifies the maximum number of total portal users in the system. The value range for this argument is 1 to 4294967295. Usage guidelines If you configure the maximum total number smaller than the number of current online portal users on the device, this command still takes effect.
Examples # Specify the NAS-ID profile aaa for GigabitEthernet 1/0/1. <Sysname> system-view [Sysname] interface gigabitethernet 1/0/1 [Sysname–GigabitEthernet1/0/1] portal nas-id-profile aaa Related commands aaa nas-id profile portal nas-port-id format Use portal nas-port-id format to specify the NAS-Port-Id attribute format. Use undo portal nas-port-id format to restore the default. Syntax portal nas-port-id format { 1 | 2 | 3 | 4 } undo portal nas-port-id format...
Page 383
Field Description NAS_subslot Subslot number of the BRAS, in the range of 0 to 31. NAS_Port Port number of the BRAS, in the range of 0 to 63. For ATM interfaces: • XPI is VPI in the range of 0 to 255. •...
NAS-Port-Id Description The subscriber interface type is an ATM interface. atm 31/31/7:255.65535 The slot number is 31, the BRAS subslot number is 31, the BRAS 0/0/0/0/0/0 port number is 7, the VPI is 255, and the VCI is 65535. The subscriber interface type is an Ethernet interface. eth 31/31/7:1234.2345 0/0/0/0/0/0 The slot number is 31, the subslot number is 31, the port number is 7, the PVLAN is 1234, and the CVLAN is 2345.
Page 385
Default The NAS-Port-Type value carried in RADIUS requests is the user's access interface type value obtained by the access device. Views Interface view Service template view Predefined user roles network-admin Parameters ethernet: Specifies the NAS-Port-Type attribute value as Ethernet (number 15). wireless: Specifies the NAS-Port-Type attribute value as WLAN-IEEE 802.11 (number 19).
Related commands display portal interface portal outbound-filter enable Use portal [ ipv6 ] outbound-filter enable to enable outgoing packets filtering on a portal-enabled interface. Use undo portal [ ipv6 ] outbound-filter enable to disable outgoing packets filtering on a portal-enabled interface. Syntax portal [ ipv6 ] outbound-filter enable undo portal [ ipv6 ] outbound-filter enable...
Page 387
Views Interface view Predefined user roles network-admin Parameters ipv6: Specifies IPv6 portal users. Do not specify this keyword for IPv4 portal users. domain-name: Specifies an existing ISP domain by its name, a case-insensitive string of 1 to 255 characters. The string cannot contain the following characters: slashes (/), backslashes (\), vertical bars (|), quotation marks ("), colons (:), asterisks (*), question marks (?), left angle brackets (<), right angle brackets (>), and at signs (@).
Views Interface view Predefined user roles network-admin Parameters ipv6: Specifies IPv6 portal users. Do not specify this keyword for IPv4 portal users. pool-name: Specifies an IP address pool by its name, a case-insensitive string of 1 to 63 characters. Usage guidelines You must use this command to specify a preauthentication IP address pool on a portal-enabled interface in the following situation: •...
Usage guidelines This feature logs information about portal redirect packets, including the user IP address, MAC address, SSID, BAS IP, and Web server IP address. For portal log messages to be sent correctly, you must also configure the information center on the device. For more information about information center configuration, see Network Management and Monitoring Configuration Guide.
[Sysname] undo portal refresh arp enable portal roaming enable Use portal roaming enable to enable portal roaming. Use undo portal roaming enable to disable portal roaming. Syntax portal roaming enable undo portal roaming enable Default Portal roaming is disabled. An online portal user cannot roam in its VLAN. Views System view Predefined user roles...
Usage guidelines Portal redirects all HTTP requests except HTTP requests that match portal-free rules to the portal Web server, which might overload the server. Portal safe-redirect filters HTTP requests by HTTP request method, browser type (in HTTP User Agent), and destination URL, and redirects only the permitted HTTP requests. As a best practice to avoid server overload and improve security, enable portal safe-redirect on the device.
Default After portal safe-redirect is enabled, the device redirects only HTTP requests with the GET method. Views System view Predefined user roles network-admin Parameters get: Specifies the GET request method. post: Specifies the POST request method. Usage guidelines After you specify HTTP request methods for portal safe-redirect, the device redirects only the HTTP requests with the specified methods to the portal Web server.
Views System view Predefined user roles network-admin Parameters server-name: Specifies a portal authentication server by its name, a case-sensitive string of 1 to 32 characters. Usage guidelines In portal authentication server view, you can configure the following parameters and features for the portal authentication server: •...
Usage guidelines Typically, a portal user cannot access the network before passing portal authentication. This feature allows a user to access the Internet temporarily if the user uses a WeChat account to perform portal authentication. During the temporary pass period, the user provides WeChat authentication information to the WeChat server for the server to interact with the access device to finish portal authentication.
Examples # Enable online detection of IPv4 portal users on GigabitEthernet 1/0/1. Configure the detection type as ICMP, the maximum number of detection attempts as 5, the detection interval as 10 seconds, and the user idle timeout as 300 seconds. <Sysname>...
portal user log enable Use portal user log enable to enable logging for portal user logins and logouts. Use undo portal user log enable to disable logging for portal user logins and logouts. Syntax portal user log enable undo portal user log enable Default Portal user login and logout logging is disabled.
Use redirect-url to specify the redirection URL for QQ authentication success. Use undo redirect-url to restore the default. Syntax redirect-url url-string undo redirect-url Default The redirection URL for QQ authentication success is http://lvzhou.h3c.com/portal/qqlogin.html. Views QQ authentication server view Predefined user roles network-admin Parameters url-string: Specifies the redirection URL for QQ authentication success, a case-sensitive string of 1 to 256 characters.
# Clear portal authentication error records for the portal user whose IPv6 address is 2000::2. <Sysname> reset portal auth-error-record ipv6 2000::2 # Clear portal authentication error records with the error time in the range of 2016/3/4 14:20 to 2016/3/4 16:23. <Sysname>...
Examples # Clear all portal authentication failure records. <Sysname> reset portal auth-fail-record all # Clear portal authentication failure records for the portal user whose IPv4 address is 11.1.0.1. <Sysname> reset portal auth-fail-record ipv4 11.1.0.1 # Clear portal authentication failure records for the portal user whose IPv6 address is 2000::2. <Sysname>...
# Clear offline records for the portal user whose IPv4 address is 11.1.0.1. <Sysname> reset portal logout-record ipv4 11.1.0.1 # Clear offline records for the portal user whose IPv6 address is 2000::2. <Sysname> reset portal logout-record ipv6 2000::2 # Clear offline records for the portal user whose username is abc. <Sysname>...
reset portal safe-redirect statistics [ slot slot-number ] Distributed devices in IRF mode: reset portal safe-redirect statistics [ chassis chassis-number slot slot-number ] Views User view Predefined user roles network-admin Parameters slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command clears statistics for all cards.
log: Enables the device to send a log message when it detects a reachability status change of the portal authentication server. The log message contains the name, the original state, and the current state of the portal authentication server. Usage guidelines The portal authentication server detection feature takes effect only when the device has a portal-enabled interface.
log: Enables the device to send a log message when it detects a reachability status change of the portal Web server. The log message contains the name, the original state, and the current state of the portal Web server. Usage guidelines The access device performs server detection independently.
receives the register packet, it records register information for the access device, including the device name, and the IP address and port number after NAT. The register information is used for subsequent authentication information exchanges between the server and the access device. The access device updates its register information on the server by sending register packets at regular intervals.
undo server-type Default The type of the portal authentication server and portal Web server is IMC. Views Portal authentication server view Portal Web server view Predefined user roles network-admin Parameters cmcc: Specifies the portal server type as CMCC. imc: Specifies the portal server type as IMC. oauth: Specifies the portal server type as Lvzhou.
Parameters port-number: Specifies the listening TCP port number in the range of 1 to 65535. Usage guidelines To use the local portal Web server, make sure the port number in the portal Web server URL and the port number configured in this command are the same. For successful local portal authentication, follow these guidelines: •...
<Sysname> system-view [Sysname] portal web-server wbs [Sysname-portal-websvr-wbs] url http://www.test.com/portal Related commands display portal web-server url-parameter Use url-parameter to configure the parameters carried in the URL of a portal Web server. The access device redirects a portal user by sending the URL with the parameters to the user. Use undo url-parameter to delete the parameters carried in the URL of the portal Web server.
Page 416
Hardware Option compatibility MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-10-Po E/810-LM-HK/810-W-LM-HK/810-LMS/810-LUS MSR2600-10-X1 MSR 2630 MSR3600-28/3600-51 MSR3600-28-SI/3600-51-SI MSR3610-X1/3610-X1-DP/3610-X1-DC/3610-X1-DP-DC MSR 3610/3620/3620-DP/3640/3660 MSR5620/5660/5680 encryption: Specifies the encryption algorithm to encrypt the MAC address of the AP or user. aes: Specifies the AES algorithm. des: Specifies the DES algorithm. key: Specifies a key for encryption. cipher: Specifies a key in encrypted form.
If you specify the encryption algorithm for a parameter, the redirection URL carries the encrypted value for the parameter. Execute the url-parameter usermac source-mac encryption des key simple 12345678 command. Then the access device sends to the user with MAC address 1111-1111-1111 the URL http://www.test.com/portal?usermac=xxxxxxxxx&userip=1.1.1.1&userurl= http://www.test.com/welcome, where xxxxxxxxx represents the encrypted user MAC address.
Examples # In local portal Web server view, enable local portal user password modification. <Sysname> system-view [Sysname] portal local-web-server http [Sysname-portal-local-websvr-http] user-password modify enable Related commands portal local-web-server user-sync Use user-sync to enable portal user synchronization for a portal authentication server. After this feature is enabled, the device replies to and periodically detects the synchronization packets from the portal authentication server.
Examples # Enable portal user synchronization for the portal authentication server pts and set the detection timeout to 600 seconds. If a use has not appeared in the synchronization packets sent by the portal authentication server for 600 seconds, the access device logs out the user. <Sysname>...
Syntax vpn-instance vpn-instance-name undo vpn-instance Default A portal Web server belongs to the public network. Views Portal Web server view Predefined user roles network-admin Parameters vpn-instance-name: Specifies the MPLS L3VPN instance to which the portal Web server belongs. The vpn-instance-name argument represents the VPN instance name, a case-sensitive string of 1 to 31 characters.
• The tracked interface receives 2G signal or no signal. In the current software version, this feature can track signal information only for Etherchannel interfaces. This feature applies only to IPv4 users. This feature requires that the webpage to which the redirect URL points must be configured on the device.
Page 422
• userip=%c—IP address of the user. • usermac=%m—MAC address of the user. • nasid=%n—NAS identifier of the device. • ssid=%E—SSID with which the user associates. • originalurl=%o—Original URL that the user enters in the browser. Make sure arrangement parameters conforms format http://XXXX/index.html?userip=%c&usermac=%m&nasid=%n&ssid=%E&originalurl=%o.
User profile commands The following matrix shows the feature and hardware compatibility: Hardware User profile compatibility MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-10-PoE/810-LM-HK/8 10-W-LM-HK MSR810-LMS/810-LUS MSR2600-10-X1 MSR 2630 MSR3600-28/3600-51 MSR3600-28-SI/3600-51-SI MSR3610-X1/3610-X1-DP/3610-X1-DC/3610-X1-DP-DC MSR 3610/3620/3620-DP/3640/3660 MSR5620/5660/5680 Commands and descriptions for centralized devices apply to the following routers: • MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-10-PoE/810-LM-HK/810-W-LM-HK/810-L MS/810-LUS/810-LMS/810-LUS.
Page 424
Views Any view Predefined user roles network-admin network-operator Parameters name profile-name: Specifies a user profile by its name, a case-sensitive string of 1 to 31 characters. Valid characters include English letters, digits, and underscores (_). The name must start with an English letter and must be unique.
Page 425
# (Distributed device in standalone mode.) Display configuration and online user information for all user profiles in slot 2. <Sysname> display user-profile slot 2 User-Profile: aaa Inbound: CIR 32 (kbps), CBS 2048 (Bytes), EBS 0 (Bytes), PIR 888 (kbps) Policy: p1 Outbound: CIR 32 (kbps), CBS 2048 (Bytes), EBS 0 (Bytes), PIR 888 (kbps) Policy: p2...
Page 426
User user_1: Authentication type: 802.1X Network attributes: Interface : GigabitEthernet1/2/0/1 MAC address : 0000-1111-2222 Failed action list: Inbound: Policy p1 Inbound: CIR 32 (kbps), CBS 2048 (Bytes), EBS 0 (Bytes), PIR 888 (kbps) User user_2: Authentication type: Portal Network attributes: Interface : GigabitEthernet1/2/0/3 IP address...
Field Description Authentication type: • 802.1X—802.1X authentication. • Authentication type Portal—Portal authentication. • PPP—PPP authentication. • MACA—MAC authentication. Network attributes Online user information. Failed action list Actions that failed to be applied to the user. user-profile Use user-profile to create a user profile and enter its view, or enter the view of an existing user profile.
Password control commands The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features, commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about FIPS mode, see Security Configuration Guide. IPv6-related parameters are not supported on the following routers: •...
Password length: Enabled (10 characters) Password composition: Enabled (1 types, 1 characters per type) Table 48 Command output Field Description Password control Whether the password control feature is enabled. Whether password expiration is enabled and, if enabled, the Password aging expiration time.
ipv6 ipv6-address: Specifies the IPv6 address of a user. Usage guidelines If you do not specify any parameters, this command displays information about all users in the password control blacklist. The users' IP addresses and user accounts are added to the password control blacklist when the users fail authentication.
Predefined user roles network-admin Parameters aging: Enables the password expiration feature. composition: Enables the password composition restriction feature. history: Enables the password history feature. length: Enables the minimum password length restriction feature. Usage guidelines For a specific password control feature to take effect, make sure the global password control and the specific password control feature are both enabled.
Page 433
Default A password expires after 90 days. The password expiration time for a user group equals the global setting. The password expiration time for a local user equals that of the user group to which the local user belongs. Views System view User group view Local user view...
password-control alert-before-expire Use password-control alert-before-expire to set the number of days before a user's password expires during which the user is notified of the pending password expiration. Use undo password-control alert-before-expire to restore the default. Syntax password-control alert-before-expire alert-time undo password-control alert-before-expire Default The default is 7 days.
User group view Local user view Predefined user roles network-admin Parameters same-character: Refuses a password that contains any character appearing consecutively three or more times. For example, the password aaabc is not complex enough. user-name: Refuses a password that contains the username or the reverse of the username. For example, if the username is 123, a password such as abc123 or 321df is not complex enough.
Page 436
In FIPS mode: The password using the global composition policy must contain a minimum of four character types and a minimum of one character for each type. In both non-FIPS and FIPS modes: The password composition policy for a user group is the same as the global policy. The password composition policy for a local user is the same as that of the user group to which the local user belongs.
type-length type-length: Specifies the minimum number of characters that are from each type in the password. The value range for the type-length argument is 1 to 63 in non-FIPS mode, and 1 to 15 in FIPS mode. Usage guidelines The password composition policy depends on the view: •...
The password control feature is disabled globally. In FIPS mode: The password control feature is enabled globally and cannot be disabled. Views System view Predefined user roles network-admin Usage guidelines A specific password control feature takes effect only after the global password control feature is enabled.
Usage guidelines This command is effective only on non-FTP login users. An FTP user cannot continue to log in after its password expires. Examples # Allow a user to log in five times within 60 days after the password expires. <Sysname>...
password-control history enable reset password-control blacklist password-control length Use password-control length to set the minimum password length. Use undo password-control length to restore the default. Syntax password-control length length undo password-control length Default In non-FIPS mode: The global minimum password length is 10 characters. In FIPS mode: The global minimum password length is 15 characters.
# Set the minimum password length to 16 characters for the user group test. [Sysname] user-group test [Sysname-ugroup-test] password-control length 16 [Sysname-ugroup-test] quit # Set the minimum password length to 16 characters for the device management user abc. [Sysname] local-user abc class manage [Sysname-luser-manage-abc] password-control length 16 Related commands display local-user...
password-control login-attempt Use password-control login-attempt to configure the login attempt limit. The settings include the maximum number of consecutive login failures and the action to be taken when the maximum number is reached. Use undo password-control login-attempt to restore the default. Syntax password-control login-attempt login-times [ exceed { lock | lock-time time | unlock } ] undo password-control login-attempt...
Page 443
Whether a blacklisted user and user account are locked depends on the locking setting: • If a user account is permanently locked for a user, the user cannot use this account unless this account is removed from the password control blacklist. To remove the user account, use the reset password-control blacklist command.
Related commands display local-user display password-control display password-control blacklist display user-group reset password-control blacklist password-control super aging Use password-control super aging to set the expiration time for super passwords. Use undo password-control super aging to restore the default. Syntax password-control super aging aging-time undo password-control super aging Default A super password expires after 90 days.
A super password must contain a minimum of one character type and a minimum of one character for each type. In FIPS mode: A super password must contain a minimum of four character types and a minimum of one character for each type.
Predefined user roles network-admin Parameters length: Specifies the minimum length of super passwords in characters. The value range for this argument is 4 to 63 in non-FIPS mode, and 15 to 63 in FIPS mode. Examples # Set the minimum length of super passwords to 16 characters. <Sysname>...
reset password-control blacklist Use reset password-control blacklist to remove blacklisted users. Syntax reset password-control blacklist [ user-name user-name ] Views User view Predefined user roles network-admin Parameters user-name user-name: Specifies the username of a user account to be removed from the password control blacklist.
Page 448
<Sysname> reset password-control history-record Are you sure to delete all local user's history records? [Y/N]:y Related commands password-control history...
Keychain commands accept-lifetime utc Use accept-lifetime utc to set the receiving lifetime for a key of a keychain in absolute time mode. Use undo accept-lifetime to restore the default. Syntax accept-lifetime utc start-time start-date { duration { duration-value | infinite } | to end-time end-date } undo accept-lifetime Default...
[Sysname] keychain abc mode absolute [Sysname-keychain-abc] key 1 [Sysname-keychain-abc-key-1] accept-lifetime utc 12:30 2015/1/21 to 18:30 2015/1/21 authentication-algorithm Use authentication-algorithm to specify an authentication algorithm for a key. Use undo authentication-algorithm to restore the default. Syntax authentication-algorithm { hmac-md5 | md5 } undo authentication-algorithm Default No authentication algorithm is specified for a key.
Page 451
Parameters name keychain-name: Specifies a keychain by its name, a case-sensitive string of 1 to 63 characters. If you do not specify a keychain, this command displays information about all keychains. key key-id: Specifies a key by its ID in the range of 0 to 281474976710655. If you do not specify a key, this command displays information about all keys in a keychain.
Field Description Algorithm Authentication algorithm for the key: hmac-md5 or md5. Send lifetime Sending lifetime for the key. Send status Status of the send key: Active or Inactive. Accept lifetime Receiving lifetime for the key. Accept status Status of the accept key: Active or Inactive. Use key to create a key for a keychain and enter its view, or enter the view of an existing key.
Views System view Predefined user roles network-admin Parameters keychain-name: Specifies a keychain name, a case-sensitive string of 1 to 63 characters. mode: Specifies a time mode. absolute: Specifies the absolute time mode. In this mode, each time point during a key's lifetime is the UTC time and is not affected by the system's time zone or daylight saving time.
Examples # Set the key to 123456 in plaintext form for key 1. <Sysname> system-view [Sysname] keychain abc mode absolute [Sysname-keychain-abc] key 1 [Sysname-keychain-abc-key-1] key-string plain 123456 send-lifetime utc Use send-lifetime utc to set the sending lifetime for a key of a keychain in absolute time mode. Use undo send-lifetime to restore the default.
Page 455
[Sysname-keychain-abc] key 1 [Sysname-keychain-abc-key-1] send-lifetime utc 12:30 2015/1/21 to 18:30 2015/1/21...
Public key management commands The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features, commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about FIPS mode, see Security Configuration Guide. display public-key local public Use display public-key local public to display local public keys.
Page 457
Key code: 307C300D06092A864886F70D0101010500036B003068026100CAB4CACCA16442AD5F453442 762F03897E0D494FEDE69224F5C051A441D290976733A278C9F0C0F5A198E66143EAB54A64 DB608269CAE844B1E7CC64AD7E808972E7CF887F3B657F056E7930FC84FBF1AD83A01CC47E 9D85C13413996ECD093B0203010001 ============================================= Key name: rsa1 Key type: RSA Time when key pair created: 15:42:26 2011/05/12 Key code: 30819F300D06092A864886F70D010101050003818D0030818902818100DEBC46F217DDF11D 426E7095AA45CD6BF1F87343D952569AC223A01365E0D8C91D49D347C143C5D8FAADA896AA 1A827E580F2502F1926F52197230E1DE391A64015C43DD79DC4E9E171BAEA1DEB4C71DAED7 9A6EDFD460D8945D27D39B7C9822D56AEA5B7C2CCFF1B6BC524AD498C3B87D4BD6EB36AF03 92D8C6D940890BF4290203010001 # Display all local DSA public keys. <Sysname> display public-key local dsa public ============================================= Key name: dsakey (default) Key type: DSA...
Page 458
585DA7F42519718CC9B09EEF0381850002818100A1E456C8DA2AD1BB83B1BDF2A1A6B5A6E8 3642B460402445DA7E4036715F468F76655E114D460B7112F57143EE020AEF4A5BFAD07B74 0FBCB1C64DA8A2BCE619283421445EEC77D3CF0D11866E9656AD6511F4926F8376967B0AB7 15F9FB7B514BC1174155DD6E073B1FCB3A2749E6C5FEA81003E16729497D0EAD9105E3E76A # Display all local ECDSA public keys. <Sysname> display public-key local ecdsa public ============================================= Key name: ecdsakey (default) Key type: ECDSA Time when key pair created: 15:42:04 2011/05/12 Key code: 3049301306072A8648CE3D020106082A8648CE3D03010103320004C10CF7CE42193F7FC2AF 68F5DC877835A43009DB6135558A7FB8316C361B0690B4FD84A14C0779C76DD6145BF9362B ============================================= Key name: ecdsa1 Key type: ECDSA Time when key pair created: 15:43:33 2011/05/12 Key code:...
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isplay the public key of local ECDSA key pair ecdsa1. <Sysname> display public-key local ecdsa public name ecdsa1 ============================================= Key name: ecdsa1 Key type: ECDSA Time when key pair created: 15:43:33 2011/05/12 Key code: 3049301306072A8648CE3D020106082A8648CE3D03010103320004A1FB84D92315B8DB72D1 AE672C7CFA5135D5F5B02377F2F092F182EC83B5819795BC94CCBD3EBA7D4F0F2B2EB20C58...
Page 460
Predefined user roles network-admin network-operator Parameters brief: Displays brief information about all peer host public keys. The brief information includes only the key type, key modulus, and key name. name publickey-name: Displays detailed information about a peer host public key, including its key code.
Field Description Modulus Key modulus length in bits. Name Name of the peer host public key. Related commands public-key peer public-key peer import sshkey peer-public-key end Use peer-public-key end to exit public key view to system view and save the configured peer host public key.
public-key local create Use public-key local create to create local key pairs. Syntax In non-FIPS mode: public-key local create { dsa | ecdsa [ secp192r1 | secp256r1 | secp384r1 ] | rsa } [ name key-name ] In FIPS mode: public-key local create { dsa | ecdsa [ secp256r1 | secp384r1 ] | rsa } [ name key-name ] Default No local key pairs exist.
Page 463
If you do not assign the key pair a name, the system assigns the default name to the key pair and marks the key pair as default. You can also assign the default name to another key pair, but the system does not mark the key pair as default.
Page 464
Generating Keys..++++++++++++++++++++++++++++++++++++++++++++++++++* ..+..+..+........+..+.......+..+....+.....+...+..+....+..+..+....+..+...+..+..+..+....+..+......+..+..+....+..+...+......+..+..+...+..+..+.......+++++++++++++++++++++++++++++++++++++++++++++++++++* Create the key pair successfully. # Create a local ECDSA key pair with the default name. <Sysname> system-view [Sysname] public-key local create ecdsa Generating Keys... Create the key pair successfully. # Create a local RSA key pair named rsa1. <Sysname>...
<Sysname> system-view [Sysname] public-key local create rsa The range of public key modulus is (2048 ~ 2048). It will take a few minutes.Press CTRL+C to abort. Input the modulus length [default = 2048]: Generating Keys..++++++ .++++++ ..++++++++ ..++++++++ Create the key pair successfully. # In FIPS mode, create a local DSA key pair with the default name.
name key-name: Specifies a local key pair by its name, a case-insensitive string of 1 to 64 characters. Valid characters are letters, digits, and hyphens (-). If you do not specify a key pair, this command destroys all key pairs of the specified type. Usage guidelines To avoid key compromise, destroy the local key pair and generate a new pair after any of the following conditions occurs:...
Page 467
Predefined user roles network-admin Parameters name key-name: Specifies a local DSA key pair by its name, a case-insensitive string of 1 to 64 characters. Valid characters are letters, digits, and hyphens (-). If you do not specify a key pair, this command exports the host public key of the local DSA key pair with the default name.
<Sysname> system-view [Sysname] public-key local export dsa openssh ssh-dss AAAAB3NzaC1kc3MAAACBANdXJixFhMRMIR8YvZbl8GHE8KQj9/5ra4WzTO9yzhSg06UiL+CM7OZb5sJlhUiJ3 B7b0T7IsnTan3W6Jsy5h3I2Anh+kiuoRCHyLDyJy5sG/WD+AZQd3Xf+axKJPadu68HRKNl/BnjXcitTQchQbz WCFLFqL6xLNolQOHgRx9ozAAAAFQDHcyGMc37I7pk7Ty3tMPSO2s6RXwAAAIEAgiaQCeFOxHS68pMuadOx8YU XrZWUGEzN/OrpbsTV75MTPoS0cJPFKyDNNdAkkrOVnsZJliW8T6UILiLFs3ThbdABMs5xsCAhcJGscXthI5HH bB+y6IMXwb2BcdQey4PiEMA8ybMugQVhwhYhxz1tqsAo9LFYXaf0JRlxjMmwnu8AAACAQZEs400SvNIVfnqxw vA7PvOVEA89tKni/f6GDBvWY9Z2Q499pAqUBtYcqQea8T4zBInxx2eF3lLaZJrIvAS205zXxSzQoU9190kakd MdasIjQLWYGyepFc3sTwmIflQeweUwLVAPaOesKaCERjxg+e4maYWlAvySGT4c9NJlxLo= dsa-key # Export the host public key of local DSA key pair dsa1 in OpenSSH format to a file named dsa1.pub. <Sysname> system-view [Sysname] public-key local export dsa name dsa1 openssh dsa1.pub # Display the host public key of local DSA key pair dsa1 in SSH2.0 format.
Page 469
Predefined user roles network-admin Parameters name key-name: Specifies a local ECDSA key pair by its name, a case-insensitive string of 1 to 64 characters. Valid characters are letters, digits, and hyphens (-). If you do not specify a key pair, this command exports the host public key of the local ECDSA key pair with the default name.
[Sysname] public-key local export ecdsa openssh ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBBREw5tkARpbV+sYArt/xcW+UJEAevx7O ckTtTLPBiLP5bWkSdKbvo+3oHRuIyZqmNTIcxuBjuBap+pHc919C58= ecdsa-key Related commands public-key local create public-key peer import sshkey public-key local export rsa Use public-key local export rsa to export a local RSA host public key. Syntax In non-FIPS mode: public-key local export rsa [ name key-name ] { openssh | ssh1 | ssh2 } [ filename ] In FIPS mode: public-key local export rsa [ name key-name ] { openssh | ssh2 } [ filename ]...
Page 471
On the peer device, use the public-key peer import sshkey command to import the host public key from the file. SSH1.5, SSH2.0, and OpenSSH are different public key formats. Choose the correct public key format that is supported on the device where you import the host public key. In FIPS mode, the device only supports SSH2.0 and OpenSSH.
Execute the peer-public-key end command to save the public key and return to system view. The public key you type in the public key view must be in a correct format. If the peer device is an H3C device, use the display public-key local public command to display and record its public key. Examples # Assign name key1 to the peer host public key and enter public key view.
Page 473
Syntax public-key peer keyname import sshkey filename undo public-key peer keyname Default No peer host public keys exist. Views System view Predefined user roles network-admin Parameters keyname: Specifies a name for a peer host public key, a case-sensitive string of 1 to 64 characters. filename: Specifies a public key file by its name, a case-insensitive string of 1 to 128 characters.
PKI commands The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features, commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about FIPS mode, see Security Configuration Guide. IPv6-related parameters are not supported on the following routers: •...
• The subject name field and the issuer name field can contain a single DN, multiple FQDNs, and multiple IP addresses. • The alternative subject name field can contain multiple FQDNs and IP addresses but zero DNs. An attribute rule is a combination of an attribute-value pair with an operation keyword, as listed in Table Table 57 Combinations of attribute-value pairs and operation keywords Operation...
Default No trusted CA is specified. Views PKI domain view Predefined user roles network-admin Parameters name: Specifies the trusted CA by its name, a case-sensitive string of 1 to 63 characters. Usage guidelines To obtain a CA certificate in a PKI domain, you must specify the trusted CA name. The trusted CA name uniquely identifies the CA to be used if multiple CAs exist on the CA server specified for the PKI domain.
• State and country where the entity resides. • FQDN. • IP address. You can specify only one PKI entity for a PKI domain. If you execute this command multiple times, the most recent configuration takes effect. Examples # Specify PKI entity en1 for certificate request in PKI domain aaa. <Sysname>...
Page 478
Syntax certificate request mode { auto [ password { cipher | simple } string | renew-before-expire days [ reuse-public-key ] [ automatic-append common-name ] ] * | manual } undo certificate request mode Default The certificate request mode is manual. Views PKI domain view Predefined user roles...
Examples # Set the certificate request mode to auto. <Sysname> system-view [Sysname] pki domain aaa [Sysname-pki-domain-aaa] certificate request mode auto # Set the certificate request mode to auto, and set the certificate revocation password in plain text to 123456. <Sysname> system-view [Sysname] pki domain aaa [Sysname-pki-domain-aaa] certificate request mode auto password simple 123456 # Set the certificate request mode to auto, and set the certificate revocation password in plain text to...
If the CA server automatically approves certificate requests, the PKI entity can obtain the certificate immediately after it submits a certificate request. In this case, the PKI entity does not send queries to the CA server. Examples # Set the polling interval to 15 minutes, and the maximum number of query attempts to 40. <Sysname>...
common-name Use common-name to set the common name for a PKI entity. Use undo common-name to restore the default. Syntax common-name common-name-sting undo common-name Default No common name is set for a PKI entity. Views PKI entity view Predefined user roles network-admin Parameters common-name-sting: Specifies a common name, a case-sensitive string of 1 to 63 characters.
Predefined user roles network-admin Parameters url-string: Specifies the URL of the CRL repository, a case-sensitive string of 1 to 511 characters. The URL format is ldap://server_location or http://server_location. The URL length is restricted by the CLI string limitation or the url-string parameter, whichever is smaller. Usage guidelines To use CRL checking, a CRL must be obtained from a CRL repository.
Usage guidelines If you do not specify a policy name, this command displays information about all certificate-based access control policies. Examples # Display information about certificate-based access control policy mypolicy. <Sysname> display pki certificate access-control-policy mypolicy Access control policy name: mypolicy Rule 1 deny mygroup1...
Usage guidelines If you do not specify a certificate attribute group, this command displays information about all certificate attribute groups. Examples # Display information about certificate attribute group mygroup. <Sysname> display pki certificate attribute-group mygroup Attribute group name: mygroup Attribute 1 subject-name Attribute 2 issuer-name...
Page 486
Syntax display pki certificate domain domain-name { ca | local | peer [ serial serial-num ] } Views Any view Predefined user roles network-admin network-operator Parameters domain-name: Specifies a PKI domain by its name, a case-insensitive string of 1 to 31 characters. The domain name cannot contain the special characters listed in Table Table 60 Special characters...
Page 487
Subject: C=cn, O=ccc, OU=ppp, CN=rootca Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (1024 bit) Modulus: 00:c4:fd:97:2c:51:36:df:4c:ea:e8:c8:70:66:f0: 28:98:ec:5a:ee:d7:35:af:86:c4:49:76:6e:dd:40: 4a:9e:8d:c0:cb:d9:10:9b:61:eb:0c:e0:22:ce:f6: 57:7c:bb:bb:1b:1d:b6:81:ad:90:77:3d:25:21:e6: 7e:11:0a:d8:1d:3c:8e:a4:17:1e:8c:38:da:97:f6: 6d:be:09:e3:5f:21:c5:a0:6f:27:4b:e3:fb:9f:cd: c1:91:18:ff:16:ee:d8:cf:8c:e3:4c:a3:1b:08:5d: 84:7e:11:32:5f:1a:f8:35:25:c0:7e:10:bd:aa:0f: 52:db:7b:cd:5d:2b:66:5a:fb Exponent: 65537 (0x10001) Signature Algorithm: sha1WithRSAEncryption 6d:b1:4e:d7:ef:bb:1d:67:53:67:d0:8f:7c:96:1d:2a:03:98: 3b:48:41:08:a4:8f:a9:c1:98:e3:ac:7d:05:54:7c:34:d5:ee: 09:5a:11:e3:c8:7a:ab:3b:27:d7:62:a7:bb:bc:7e:12:5e:9e: 4c:1c:4a:9f:d7:89:ca:20:46:de:c5:b3:ce:36:ca:5e:6e:dc: e7:c6:fe:3f:c5:38:dd:d5:a3:36:ad:f4:3d:e6:32:7f:48:df: 07:f0:a2:32:89:86:72:22:cd:ed:e5:0f:95:df:9c:75:71:e7: fe:34:c5:a0:64:1c:f0:5c:e4:8f:d3:00:bd:fa:90:b6:64:d8: 88:a6 # Display information about local certificates in PKI domain aaa.
Page 488
bd:5c:ce:b6:17:2f:e0:fc:c0:3e:b7:c4:99:31:5b: 8a:f0:ea:02:fd:2d:44:7a:67 Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Basic Constraints: CA:FALSE Netscape Cert Type: SSL Client, S/MIME X509v3 Key Usage: Digital Signature, Non Repudiation, Key Encipherment X509v3 Extended Key Usage: TLS Web Client Authentication, E-mail Protection, Microsoft Smartcardlogin Netscape Comment: User Certificate of OpenCA Labs X509v3 Subject Key Identifier: 91:95:51:DD:BF:4F:55:FA:E4:C4:D0:10:C2:A1:C2:99:AF:A5:CB:30...
Page 489
de:18:9d:c1 # Display brief information about all peer certificates in PKI domain aaa. <Sysname> display pki certificate domain aaa peer Total peer certificates: 1 Serial Number: 9a0337eb2156ba1f5476e4d754a5a9f7 Subject Name: CN=sldsslserver # Display detailed information about a peer certificate in PKI domain aaa. <Sysname>...
Domain Name: domain1 Renew Time : 03:12:05 2016-06-13 Renew public key: Key type: RSA Time when key pair created: 15:40:48 2016/06/13 Key code: 30819F300D06092A864886F70D010101050003818D0030818902818100DAA4AAFEFE04C2C9 667269BB8226E26331E30F41A8FF922C7338208097E84332610632B49F75DABF6D871B80CE C1BA2B75020077C74745C933E2F390DC0B39D35B88283D700A163BB309B19F8F87216A44AB FBF6A3D64DEB33E5CEBF2BCF26296778A26A84F4F4C5DBF8B656ACFA62CD96863474899BC1 2DA4C04EF5AE0835090203010001 The command output indicates that the reuse-public-key keyword was not configured for PKI domain domain1 and a new key pair was created for the new certificate.
Page 492
Views Any view Predefined user roles network-admin network-operator Parameters domain-name: Specifies a PKI domain by its name, a case-insensitive string of 1 to 31 characters. The domain name cannot contain the special characters listed in Table Table 63 Special characters Character name Symbol Character name...
Table 64 Command output Field Description Certificate Request Transaction number Certificate request transaction number, starting from 1. Certificate request status, including only the pending Status status. Certificate purposes: • General—Signature and encryption. Key usage • Signature—Signature only. • Encryption—Encryption only. Remaining number of attempts to query certificate Remain polling attempts request status.
Page 494
Usage guidelines Use this command to identify whether a certificate has been revoked. Examples # Display information about the CRL saved at the local for PKI domain aaa. <Sysname> display pki crl domain aaa Certificate Revocation List (CRL): Version 2 (0x1) Signature Algorithm: sha1WithRSAEncryption Issuer: /C=cn/O=docm/OU=sec/CN=therootca Last Update: Apr 28 01:42:13 2011 GMT...
Field Description Key ID. keyid This field identifies the key pair used to sign the CRL. Signature Algorithm: Signature algorithm and signature data. Related commands pki retrieve-crl fqdn Use fqdn to set the FQDN of an entity. Use undo fqdn to restore the default. Syntax fqdn fqdn-name-string undo fqdn...
Views PKI entity view Predefined user roles network-admin Parameters ip-address: Specifies an IPv4 address. interface interface-type interface-number: Specifies an interface by its type and number. The primary IPv4 address of the interface will be used as the IP address of the PKI entity. Usage guidelines Use this command to assign an IP address to a PKI entity or specify an interface for the entity.
• The CRL repository uses LDAP for CRL distribution. However, the CRL repository URL configured for the PKI domain does not contain the IP address or host name of the LDAP server. You can specify only one LDAP server for a PKI domain. If you execute this command multiple times, the most recent configuration takes effect.
Use undo organization to restore the default. Syntax organization org-name undo organization Default No organization name is set for a PKI entity. Views PKI entity view Predefined user roles network-admin Parameters org-name: Specifies an organization name, a case-sensitive string of 1 to 63 characters. No comma can be included.
pki abort-certificate-request Use pki abort-certificate-request to abort the certificate request for a PKI domain. Syntax pki abort-certificate-request domain domain-name Views System view Predefined user roles network-admin Parameters domain-name: Specifies a PKI domain by its name, a case-insensitive string of 1 to 31 characters. The domain name cannot contain the special characters listed in Table Table 67 Special characters...
undo pki certificate access-control-policy policy-name Default No certificate-based access control policies exist. Views System view Predefined user roles network-admin Parameters policy-name: Specifies a policy name, a case-insensitive string of 1 to 31 characters. Usage guidelines A certificate-based access control policy contains a set of access control rules that permit or deny access to the device based on the attributes in the requesting client's certificate.
A certificate attribute group must be associated with an access control rule (a permit or deny statement configured by using the rule command). If a certificate attribute group does not have any attribute rules, the system determines that the all certificates match the associated access control rule.
To delete a specific peer certificate in a PKI domain, perform the following steps: Execute the display pki certificate command to determine the serial number of the peer certificate. Execute the pki delete-certificate domain domain-name peer serial serial-num command. Examples # Remove the CA certificate in PKI domain aaa.
Predefined user roles network-admin Parameters domain-name: Specifies a PKI domain name, a case-insensitive string of 1 to 31 characters. The domain name cannot contain the special characters listed in Table Table 69 Special characters Character name Symbol Character name Symbol Tilde Asterisk Left angle bracket...
Examples # Create a PKI entity named en and enter its view. <Sysname> system-view [Sysname] pki entity en [Sysname-pki-entity-en] Related commands pki domain pki export Use pki export to export the CA certificate and the local certificates in a PKI domain. Syntax pki export domain domain-name der { all | ca | local } filename filename pki export domain domain-name p12 { all | local } passphrase p12-key filename filename...
Page 505
aes-192-cbc: Specifies 192-bit AES_CBC for encrypting the private key of a local certificate. aes-256-cbc: Specifies 256-bit AES_CBC for encrypting the private key of a local certificate. des-cbc: Specifies DES_CBC for encrypting the private key of a local certificate. pem-key: Specifies a password for encrypting the private key of a local certificate in PEM format. filename filename: Specifies the name of the file for storing the certificate.
Page 506
The specified file name can contain an absolute path. If the specified path does not exist, the export operation fails. Examples # Export the CA certificate in the PKI domain to a file named cert-ca.der in DER format. <Sysname> system-view [Sysname] pki export domain domain1 der ca filename cert-ca.der # Export the local certificates in the PKI domain to a file named cert-lo.der in DER format.
Related commands pki domain pki import Use pki import to import the CA certificate, local certificates, or peer certificates for a PKI domain. Syntax pki import domain domain-name { der { ca | local | peer } filename filename | p12 local filename filename | pem { ca | local | peer } [ filename filename ] } Views System view...
Page 512
• For the local certificates or peer certificates to be imported, the correct CA certificate chain must exist. The CA certificate chain can be stored on the device, or carried in the local certificates or peer certificates. If the PKI domain, the local certificates, or the peer certificates do not have the CA certificate chain, you must import the CA certificate first.
Page 513
[Sysname] pki import domain aaa pem ca filename rootca_pem.cer The trusted CA's finger print is: fingerprint:FFFF 3EFF FFFF 37FF FFFF 137B FFFF 7535 SHA1 fingerprint:FFFF FF7F FF2B FFFF 7618 FF4C FFFF 0A7D FFFF FF69 Is the finger print correct?(Y/N):y [Sysname] # Import CA certificate file aca_pem.cer in PEM format to PKI domain bbb.
This command is not saved in the configuration file. Examples # Display information about the certificate request in PKCS#10 format. <Sysname> system-view [Sysname] pki request-certificate domain aaa pkcs10 *** Request for general certificate *** -----BEGIN NEW CERTIFICATE REQUEST----- MIIBTDCBtgIBADANMQswCQYDVQQDEwJqajCBnzANBgkqhkiG9w0BAQEFAAOBjQAw gYkCgYEAw5Drj8ofs9THA4ezkDcQPBy8pvH1kumampPsJmx8sGG52NFtbrDTnTT5 ALx3LJijB3d/ndKpcHT/DfbJVDCn5gdw32tBZyCkEwMHZN3ol2z7Nmdcu5TED6iN8 4m+hfp1QWoV6lty3o9pxAXuQl8peUDcfN6WV3LBXYyl1WCtkLkECAwEAAaAAMA0G CSqGSIb3DQEBBAUAA4GBAA8E7BaIdmT6NVCZgv/I/1tqZH3TS4e4H9Qo5NiCKiEw...
ca: Specifies the CA certificate. local: Specifies the local certificates. peer entity-name: Specifies a peer entity by its name, a case-insensitive string of 1 to 31 characters. Usage guidelines In online mode: • You can obtain the CA certificate through the SCEP protocol. If a CA certificate already exists locally, do not obtain the CA certificate again.
Predefined user roles network-admin Parameters domain-name: Specifies a PKI domain by its name, a case-insensitive string of 1 to 31 characters. The domain name cannot contain the special characters listed in Table Table 74 Special characters Character name Symbol Character name Symbol Tilde Asterisk...
undo pki storage { certificates | crls } Default Certificates and CRLs are stored in the PKI directory on the storage media of the device. The PKI directory is automatically created when a certificate is successfully requested, obtained, or imported for the first time.
Page 520
Table 75 Special characters Character name Symbol Character name Symbol Tilde Asterisk Left angle bracket < Backslash Right angle bracket > Vertical bar Quotation marks " Colon Apostrophe ca: Specifies the CA certificate. local: Specifies the local certificates. Usage guidelines Generally, certificates are automatically verified when you request, obtain, or import them, or when an application uses PKI.
Predefined user roles network-admin Parameters name key-name: Specifies a key pair by its name, a case-insensitive string of 1 to 64 characters. The key pair name can contain only letters, digits, and hyphens (-). length key-length: Specifies the key length, in bits. In non-FIPS mode, the value range is 512 to 2048, and the default is 1024.
Page 523
public-key ecdsa name key-name [ secp256r1 | secp384r1 ] undo public-key Default No key pair is specified for certificate request. Views PKI domain view Predefined user roles network-admin Parameters name key-name: Specifies a key pair by its name, a case-insensitive string of 1 to 64 characters. The key pair name can contain only letters, digits, and hyphens (-).
public-key rsa Use public-key rsa to specify an RSA key pair for certificate request. Use undo public-key to restore the default. Syntax public-key rsa { { encryption name encryption-key-name [ length key-length ] | signature name signature-key-name [ length key-length ] } * | general name key-name [ length key-length ] } undo public-key Default No key pair is specified for certificate request.
The length key-length option takes effect only if you specify a nonexistent key pair. The device will automatically create the key pair by using the specified name and length before submitting a certificate request. The length key-length option is ignored if the specified key pair already exists or is already contained in an imported certificate.
Usage guidelines If you set the certificate request mode to auto for a PKI domain that does not have a CA certificate, you must configure the fingerprint for CA certificate verification. When an application, like IKE, triggers the device to request local certificates, the device automatically performs the following operations: Obtains the CA certificate from the CA server.
Predefined user roles network-admin Parameters id: Assigns an ID to the access control rule, in the range of 1 to 16. The default setting is the smallest unused ID in this range. deny: Denies the certificates that match the associated attribute group. permit: Permits the certificates that match the associated attribute group.
Predefined user roles network-admin Parameters ip: Specifies a source IPv4 address. ipv6: Specifies a source IPv6 address. ip-address: Specifies the IPv4 or IPv6 address. interface interface-type interface-number: Specifies an interface by its type and number. The interface's primary IP address will be used as the source IP address for PKI protocol packets. Usage guidelines Use this command to specify the source IP address for PKI protocol packets.
Predefined user roles network-admin Parameters state-name: Specifies a state or province by its name, a case-sensitive string of 1 to 63 characters. No comma can be included. Examples # Set the state name to countryA for PKI entity en. <Sysname> system-view [Sysname] pki entity en [Sysname-pki-entity-en] state countryA subject-dn...
If you configure this command multiple times, the most recent configuration takes effect. Examples # Configure the DN for PKI entity en. <Sysname> system-view [Sysname] pki entity en [Sysname-pki-entity-en] subject-dn CN=test,C=CN,O=abc,OU=rdtest,OU=rstest,ST=countryA,L=pukras Related commands common-name country locality organization organization-unit state usage Use usage to specify the extensions for certificates.
[Sysname-pki-domain-aaa] usage ike vpn-instance Use vpn-instance to specify the VPN instance where the certificate request reception authority and the CRL repository belong. Use undo vpn-instance to restore the default. Syntax vpn-instance vpn-instance-name undo vpn-instance Default The certificate request reception authority and the CRL repository belong to the public network. Views PKI domain view Predefined user roles...
IPsec commands The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features, commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about FIPS mode, see Security Configuration Guide. The GDOI IPsec policy negotiation mode is not supported on the following routers: •...
Hardware Keyword compatibility MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-10-PoE /810-LM-HK/810-W-LM-HK/810-LMS/810-LUS MSR2600-10-X1 MSR 2630 MSR3600-28/3600-51 MSR3600-28-SI/3600-51-SI MSR3610-X1/3610-X1-DP/3610-X1-DC/3610-X1-DP-DC MSR 3610/3620/3620-DP/3640/3660 MSR5620/5660/5680 Usage guidelines In non-FIPS mode, you can specify multiple AH authentication algorithms for one IPsec transform set, and the algorithm specified earlier has a higher priority. For a manual or IKEv1-based IPsec policy, the first specified AH authentication algorithm takes effect.
Usage guidelines You can configure different descriptions for IPsec policies, IPsec policy templates, or IPsec profiles to distinguish them. Examples # Configure the description for IPsec policy 1 as CenterToA. <Sysname> system-view [Sysname] ipsec policy policy1 1 isakmp [Sysname-ipsec-policy-isakmp-policy1-1] description CenterToA display ipsec { ipv6-policy | policy } Use display ipsec { ipv6-policy | policy } to display information about IPsec policies.
Page 537
SA duration(traffic based): 1843200 kilobytes SA idle time: # Display information about all IPv6 IPsec policies. <Sysname> display ipsec ipv6-policy ------------------------------------------- IPsec Policy: mypolicy ------------------------------------------- ----------------------------- Sequence number: 1 Mode: Manual ----------------------------- Description: This is my first IPv6 policy Security data flow: 3600 Remote address: 1000::2 Transform set: mytransform Inbound AH setting:...
Page 538
Field Description Negotiation mode of the IPsec policy: • Manual—Manual mode. • Mode ISAKMP—IKE negotiation mode. • Template—IPsec policy template mode. • GDOI—GDOI mode. IPsec policy configuration incomplete. Possible causes include: • The ACL is not configured. • The IPsec transform set is not configured. •...
display ipsec { ipv6-policy-template | policy-template } Use display ipsec { ipv6-policy-template | policy-template } to display information about IPsec policy templates. Syntax display ipsec { ipv6-policy-template | policy-template } [ template-name [ seq-number ] ] Views Any view Predefined user roles network-admin network-operator Parameters...
Page 540
IPsec SA local duration(traffic based): 1843200 kilobytes SA idle time: # Display information about all IPv6 IPsec policy templates. <Sysname> display ipsec ipv6-policy-template ----------------------------------------------- IPsec Policy Template: template6 ----------------------------------------------- --------------------------------- Sequence number: 1 --------------------------------- Description: This is policy template Traffic Flow Confidentiality: Disabled Security data flow : Selector mode: standard Local address:...
Related commands ipsec { ipv6-policy | policy } isakmp template display ipsec profile Use display ipsec profile to display information about IPsec profiles. Syntax display ipsec profile [ profile-name ] Views Any view Predefined user roles network-admin network-operator Parameters profile-name: Specifies an IPsec profile by its name, a case-insensitive string of 1 to 63 characters. Usage guidelines If you do not specify any parameters, this command displays information about all IPsec profiles.
Table 78 Command output Field Description IPsec profile IPsec profile name. Mode Negotiation mode used by the IPsec profile, manual or IKE. Description Description of the IPsec profile. Transform set IPsec transform set used by the IPsec profile. Related commands ipsec profile display ipsec sa Use display ipsec sa to display information about IPsec SAs.
Page 543
<Sysname> display ipsec sa brief ----------------------------------------------------------------------- Interface/Global Dst Address Protocol Status ----------------------------------------------------------------------- GE1/0/1 10.1.1.1 Active GE1/0/1 255.255.255.255 4294967295 Active GE1/0/1 100::1/64 Active Global Active Table 79 Command output Field Description Interface where the IPsec SA belongs to or global IPsec SA (created by using an Interface/Global IPsec profile).
Page 544
dest addr: 192.168.1.0/255.255.255.0 port: 0 protocol: ip [Inbound ESP SAs] SPI: 3564837569 (0xd47b1ac1) Connection ID: 1 Transform set: ESP-ENCRYPT-AES-CBC-128 ESP-AUTH-SHA1 SA duration (kilobytes/sec): 4294967295/604800 SA remaining duration (kilobytes/sec): 1843200/2686 Max received sequence-number: 5 Anti-replay check enable: Y Anti-replay window size: 32 UDP encapsulation used for NAT traversal: N Status: Active [Outbound ESP SAs]...
Page 545
Field Description Sequence number Sequence number of the IPsec policy entry. Negotiation mode used by the IPsec policy: • Manual • Mode ISAKMP • Template • GDOI Tunnel id IPsec tunnel ID. Encapsulation mode Encapsulation mode, transport or tunnel. Perfect Forward Secrecy (PFS) used by the IPsec policy for negotiation: •...
Field Description Max sent sequence-number Max sequence number in the sent packets. Anti-replay check enable Whether anti-replay checking is enabled. UDP encapsulation used for NAT Whether NAT traversal is used by the IPsec SA. traversal Status of the IPsec SA: Active or Standby. In a VSRP scenario, this field displays either Active or Status Standby.
Related commands reset ipsec statistics display ipsec transform-set Use display ipsec transform-set to display information about IPsec transform sets. Syntax display ipsec transform-set [ transform-set-name ] Views Any view Predefined user roles network-admin network-operator Parameters transform-set-name: Specifies an IPsec transform set by its name, a case-insensitive string of 1 to 63 characters.
Field Description State Whether the IPsec transform set is complete. Encapsulation mode Encapsulation mode used by the IPsec transform set: transport or tunnel. Whether Extended Sequence Number (ESN) is enabled. Perfect Forward Secrecy (PFS) used by the IPsec policy for negotiation: •...
Page 550
---------------------------------------------------------------------------- Tunn-id Src Address Dst Address Inbound SPI Outbound SPI Status ---------------------------------------------------------------------------- 1000 2000 Active 3000 4000 1.2.3.1 2.2.2.2 5000 6000 Active 7000 8000 Table 83 Command output Field Description Source IP address of the IPsec tunnel. Src Address For IPsec SAs created by using IPsec profiles, this field displays two hyphens (--).
Page 551
Inside vpn-instance: SA's SPI: outbound: 6000 (0x00001770) [AH] inbound: 5000 (0x00001388) [AH] outbound: 8000 (0x00001f40) [ESP] inbound: 7000 (0x00001b58) [ESP] Tunnel: local address: 1.2.3.1 remote address: 2.2.2.2 Flow: as defined in ACL 3100 # Display detailed information about IPsec tunnel 1. <Sysname>...
Field Description Information about the data flow protected by the IPsec tunnel, including Flow source IP address, destination IP address, source port, destination port, and protocol. Range of data flow protected by the IPsec tunnel that is established as defined in ACL 3001 manually.
<Sysname> system-view [Sysname] ipsec transform-set tran1 [Sysname-ipsec-transform-set-tran1] encapsulation-mode transport Related commands ipsec transform-set esn enable Use esn enable to enable the Extended Sequence Number (ESN) feature. Use undo esn enable to disable the ESN feature. Syntax esn enable [ both ] undo esn enable Default ESN is disabled.
Page 554
undo esp authentication-algorithm In FIPS mode: esp authentication-algorithm { sha1| sha256 | sha384 | sha512 } * undo esp authentication-algorithm Default ESP does not use any authentication algorithms. Views IPsec transform set view Predefined user roles network-admin Parameters aes-xcbc-mac: Uses the HMAC-AES-XCBC-96 algorithm, which uses a 128-bit key. This keyword is available only for IKEv2.
Page 556
camellia-cbc-256: Uses the Camellia algorithm in CBC mode, which uses a 256-bit key. This keyword is available only for IKEv2. des-cbc: Uses the DES algorithm in CBC mode, which uses a 64-bit key. gmac-128: Uses the GMAC algorithm, which uses a 128-bit key. This keyword is available only for IKEv2.
Hardware Keyword compatibility MSR2600-10-X1 MSR 2630 MSR3600-28/3600-51 MSR3600-28-SI/3600-51-SI MSR3610-X1/3610-X1-DP/3610-X1-DC/3610-X1-DP-DC MSR 3610/3620/3620-DP/3640/3660 MSR5620/5660/5680 Usage guidelines You can specify multiple ESP encryption algorithms for one IPsec transform set, and the algorithm specified earlier has a higher priority. For a manual or IKEv1-based IPsec policy, the first specified ESP encryption algorithm takes effect. To make sure an IPsec tunnel can be established successfully, the IPsec transform sets specified at both ends of the tunnel must have the same first ESP encryption algorithm.
Parameters profile-name: Specifies an IKE profile by its name, a case-insensitive string of 1 to 63 characters. Usage guidelines The IKE profile specified for an IPsec policy, IPsec policy template, or IPsec profile defines the parameters used for IKE negotiation. You can specify only one IKE profile for an IPsec policy, IPsec policy template, or IPsec profile.
Default The anti-replay window size is 64. Views System view Predefined user roles network-admin Parameters width: Specifies the size for the anti-replay window. It can be 64, 128, 256, 512, or 1024 packets. Usage guidelines Changing the anti-replay window size affects only the IPsec SAs negotiated later. Service data packets might be received in a very different order than their original order, and the IPsec anti-replay feature might drop them as replayed packets, affecting normal communications.
An IKE-based IPsec policy can be applied to multiple interfaces. A manual IPsec policy can be applied to only one interface. Examples # Apply the IPsec policy policy1 to interface GigabitEthernet 1/0/1. <Sysname> system-view [Sysname] interface gigabitethernet 1/0/1 [Sysname-GigabitEthernet1/0/1] ipsec apply policy policy1 Related commands display ipsec { ipv6-policy | policy } ipsec { ipv6-policy | policy }...
Default The DF bit is not configured for the outer IP header of IPsec packets on an interface. The global DF bit setting is used. Views Interface view Predefined user roles network-admin Parameters clear: Clears the DF bit in the outer IP header. IPsec packets can be fragmented. copy: Copies the DF bit setting of the original IP header to the outer IP header.
Parameters after-encryption: Fragments packets after IPsec encapsulation. before-encryption: Fragments packets before IPsec encapsulation. Usage guidelines If you configure the device to fragment packets before IPsec encapsulation, the device predetermines the encapsulated packet size before the actual encapsulation. If the encapsulated packet size exceeds the MTU of the output interface, the device fragments the packets before encapsulation.
Examples # Set the DF bit in the outer IP header of IPsec packets on all interfaces. <Sysname> system-view [Sysname] ipsec global-df-bit set Related commands ipsec df-bit ipsec limit max-tunnel Use ipsec limit max-tunnel to set the maximum number of IPsec tunnels. Use undo ipsec limit max-tunnel to restore the default.
Predefined user roles network-admin Usage guidelines This command enables the device to output logs for the IPsec negotiation process. This command is available only in non-FIPS mode. Examples # Enable logging for IPsec negotiation. <Sysname> system-view [Sysname] ipsec logging negotiation enable ipsec logging packet enable Use ipsec logging packet enable to enable logging for IPsec packets.
Page 566
Default No IPsec policies exist. Views System view Predefined user roles network-admin Parameters ipv6-policy: Specifies an IPv6 IPsec policy. policy: Specifies an IPv4 IPsec policy. policy-name: Specifies a name for the IPsec policy, a case-insensitive string of 1 to 63 characters. seq-number: Specifies a sequence number for the IPsec policy entry, in the range of 1 to 65535.
Use undo ipsec { ipv6-policy | policy } local-address to remove the binding between an IPsec policy and a source interface. Syntax ipsec { ipv6-policy | policy } policy-name local-address interface-type interface-number undo ipsec { ipv6-policy | policy } policy-name local-address Default No IPsec policy is bound to a source interface.
Syntax ipsec profile profile-name [ manual | isakmp ] undo ipsec profile profile-name Default No IPsec profiles exist. Views System view Predefined user roles network-admin Parameters profile-name: Specifies a name for the IPsec profile, a case-insensitive string of 1 to 63 characters. manual: Specifies the IPsec SA setup mode as manual.
Default IPsec redundancy is disabled. Views System view Predefined user roles network-admin Usage guidelines With IPsec redundancy enabled, the system synchronizes the following information from the active device to the standby device at configurable intervals: • Lower bound values of the IPsec anti-replay window for inbound packets. •...
Usage guidelines You can also configure IPsec SA lifetimes in IPsec policy view or IPsec policy template view. The device prefers the IPsec SA lifetimes configured in IPsec policy view or IPsec policy template view over the global IPsec SA lifetimes. When IKE negotiates IPsec SAs, it uses the local lifetime settings or those proposed by the peer, whichever are smaller.
Related commands display ipsec sa sa idle-time ipsec transform-set Use ipsec transform-set to create an IPsec transform set and enter its view, or enter the view of an existing IPsec transform set. Use undo ipsec transform-set to delete an IPsec transform set. Syntax ipsec transform-set transform-set-name undo ipsec transform-set transform-set-name...
Default The primary IPv4 address of the interface to which the IPsec policy is applied is used as the local IPv4 address. The first IPv6 address of the interface to which the IPsec policy is applied is used as the local IPv6 address. Views IPsec policy view IPsec policy template view...
ah: Specifies the AH protocol. Usage guidelines The two tunnel ends must use the same security protocol in the IPsec transform set. Examples # Specify the AH protocol for the IPsec transform set. <Sysname> system-view [Sysname] ipsec transform-set tran1 [Sysname-ipsec-transform-set-tran1] protocol ah qos pre-classify Use qos pre-classify to enable the QoS pre-classify feature.
Default The active device synchronizes the anti-replay window lower bound value every time it receives 1000 packets and synchronizes the sequence number every time it sends 100000 packets. Views IPsec policy view IPsec policy template view Predefined user roles network-admin Parameters inbound inbound-interval: Specifies the interval at which the active device synchronizes the lower bound value of the IPsec anti-replay window to the standby device.
Page 578
Views IPsec policy view IPsec policy template view Predefined user roles network-admin Parameters ipv6: Specifies the remote address or host name of an IPv6 IPsec tunnel. To specify the remote address or host name of an IPv4 IPsec tunnel, do not specify this keyword. hostname: Specifies the remote host name, a case-insensitive string of 1 to 253 characters.
After a manual IPsec SA is cleared, the system automatically creates a new SA based on the parameters of the IPsec policy. After IKE negotiated SAs are cleared, the system creates new SAs only when IKE negotiation is triggered by packets. Examples # Clear all IPsec SAs.
Page 581
undo reverse-route dynamic Default IPsec RRI is disabled. Views IPsec policy view IPsec policy template view Predefined user roles network-admin Parameters next-hop: Specifies a next hop IP address for the IPsec PRI-created static route. If you do not specify a next hop IP address, the static route uses the remote IP address of the IPsec tunnel as the next hop IP address.
# Display the routing table. You can see a created static route. (Other information is not shown.) [Sysname] display ip routing-table Destination/Mask Proto Cost NextHop Interface 4.0.0.0/24 Static 60 2.2.2.3 GE1/0/1 Related commands display ip routing-table (Layer 3—IP Routing Command Reference) ipsec policy ipsec policy-template reverse-route preference...
Use undo reverse-route tag to restore the default. Syntax reverse-route tag tag-value undo reverse-route tag Default The route tag value is 0 for the static routes created by IPsec RRI. Views IPsec policy view IPsec policy template view Predefined user roles network-admin Parameters tag-value: Specifies a tag value.
Predefined user roles network-admin Parameters time-based seconds: Specifies the time-based SA lifetime in the range of 180 to 604800 seconds. traffic-based kilobytes: Specifies the traffic-based SA lifetime in the range of 2560 to 4294967295 kilobytes. Usage guidelines IKE prefers the SA lifetime of the IPsec policy, IPsec policy template, or IPsec profile over the global SA lifetime configured by the ipsec sa global-duration command.
Parameters inbound: Specifies a hexadecimal authentication key for inbound SAs. outbound: Specifies a hexadecimal authentication key for outbound SAs. ah: Uses AH. esp: Uses ESP. cipher: Specifies a key in encrypted form. simple: Specifies a key in plaintext form. For security purposes, the key specified in plaintext form will be stored in encrypted form.
Page 586
Views IPsec policy view IPsec profile view Predefined user roles network-admin Parameters inbound: Specifies a hexadecimal encryption key for inbound SAs. outbound: Specifies a hexadecimal encryption key for outbound SAs. esp: Uses ESP. cipher: Specifies a key in encrypted form. simple: Specifies a key in plaintext form.
[Sysname-ipsec-policy-manual-policy1-100] sa hex-key encryption inbound esp simple 1234567890abcdef [Sysname-ipsec-policy-manual-policy1-100] sa hex-key encryption outbound esp simple abcdefabcdef1234 Related commands display ipsec sa sa string-key sa idle-time Use sa idle-time to set the IPsec SA idle timeout. If no traffic matches an IPsec SA within the idle timeout interval, the IPsec SA is deleted.
sa spi Use sa spi to configure an SPI for IPsec SAs. Use undo sa spi to remove the SPI. Syntax sa spi { inbound | outbound } { ah | esp } spi-number undo sa spi { inbound | outbound } { ah | esp } Default No SPI is configured for IPsec SAs.
Related commands display ipsec sa sa string-key Use sa string-key to set a key string (a key in character format) for manual IPsec SAs. Use undo sa string-key to remove the key string. Syntax sa string-key { inbound | outbound } { ah | esp } [ cipher | simple ] string undo sa string-key { inbound | outbound } { ah | esp } Default No key string is configured for manual IPsec SAs.
Examples # Configure the inbound and outbound SAs that use AH to use the plaintext keys abcdef and efcdab, respectively. <Sysname> system-view [Sysname] ipsec policy policy1 100 manual [Sysname-ipsec-policy-manual-policy1-100] sa string-key inbound ah simple abcdef [Sysname-ipsec-policy-manual-policy1-100] sa string-key outbound ah simple efcdab # In an IPv6 IPsec policy, configure the inbound and outbound SAs that use AH to use the plaintext key abcdef.
• Aggregation mode—One IPsec tunnel protects all data flows permitted by all the rules of an ACL. This mode is only used to communicate with old-version devices. • Per-host mode—One IPsec tunnel protects one host-to-host data flow. One host-to-host data flow is identified by one ACL rule and protected by one IPsec tunnel established solely for it.
Views IPsec policy view IPsec policy template view Predefined user roles network-admin Usage guidelines The TFC padding feature can hide the length of the original packet, and might affect the packet encapsulation and de-encapsulation performance. This feature takes effect on UDP packets encapsulated by ESP in transport mode and on original IP packets encapsulated by ESP in tunnel mode.
You can specify a maximum of six IPsec transform sets for an IKE-based IPsec policy. During an IKE negotiation, IKE searches for a fully matched IPsec transform set at the two ends of the IPsec tunnel. If no match is found, no SA can be set up, and the packets expecting to be protected will be dropped. If you do not specify the transform-set-name argument, the undo transform-set command removes all IPsec transform sets specified for the IPsec policy, IPsec policy template, or IPsec profile.
IKE commands The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features, commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about FIPS mode, see Security Configuration Guide. aaa authorization Use aaa authorization to enable IKE AAA authorization.
Examples # Create the IKE profile profile1. <Sysname> system-view [Sysname] ike profile profile1 # Enable AAA authorization. Specify the ISP domain abc and the username test. [Sysname-ike-profile-profile1] aaa authorization domain abc username test authentication-algorithm Use authentication-algorithm to specify an authentication algorithm for an IKE proposal. Use undo authentication-algorithm to restore the default.
Hardware Keyword compatibility MSR3610-X1/3610-X1-DP/3610-X1-DC/3610-X1-DP-DC MSR 3610/3620/3620-DP/3640/3660 MSR5620/5660/5680 Examples # Specify HMAC-SHA1 as the authentication algorithm for IKE proposal 1. <Sysname> system-view [Sysname] ike proposal 1 [Sysname-ike-proposal-1] authentication-algorithm sha Related commands display ike proposal authentication-method Use authentication-method to specify an authentication method to be used in an IKE proposal. Use undo authentication-method to restore the default.
Examples # Specify pre-shared key authentication to be used in IKE proposal 1. <Sysname> system-view [Sysname] ike proposal 1 [Sysname-ike-proposal-1] authentication-method pre-share Related commands display ike proposal ike keychain pre-shared-key certificate domain Use certificate domain to specify a PKI domain for signature authentication. Use undo certificate domain to remove a PKI domain for signature authentication.
− The automatic certificate request mode is configured for the PKI domain. If the conditions are not met, you must manually obtain the CA certificate. IKE first automatically obtains the CA certificate, and then requests a local certificate. If the CA certificate already exists locally, IKE automatically requests a local certificate.
Related commands local-user description Use description to configure a description for an IKE proposal. Use undo description to restore the default. Syntax description text undo description Default An IKE proposal does not have a description. Views IKE proposal view Predefined user roles network-admin Parameters text: Specifies the description, a case-sensitive string of 1 to 80 characters.
Views IKE proposal view Predefined user roles network-admin Parameters group1: Uses the 768-bit Diffie-Hellman group. group14: Uses the 2048-bit Diffie-Hellman group. group2: Uses the 1024-bit Diffie-Hellman group. group24: Uses the 2048-bit Diffie-Hellman group with the 256-bit prime order subgroup. group5: Uses the 1536-bit Diffie-Hellman group. Usage guidelines A DH group with a higher group number provides higher security but needs more time for processing.
RSA-SIG SHA1 DES-CBC Group 1 5000 PRE-SHARED-KEY SHA1 DES-CBC Group 1 50000 default PRE-SHARED-KEY SHA1 DES-CBC Group 1 86400 Table 85 Command output Field Description Priority Priority of the IKE proposal Authentication method Authentication method used by the IKE proposal. Authentication algorithm used in the IKE proposal: •...
Page 604
remote-address: Displays detailed information about IKE SAs with the specified remote address. ipv6: Specifies an IPv6 address. remote-address: Remote IP address. vpn-instance vpn-instance-name: Displays detailed information about IKE SAs in an MPLS L3VPN instance. The vpn-instance-name argument represents the VPN instance name, a case-sensitive string of 1 to 31 characters.
Page 605
Remote IP: 4.4.4.5 Remote ID type: IPV4_ADDR Remote ID: 4.4.4.5 Authentication-method: PRE-SHARED-KEY Authentication-algorithm: SHA1 Encryption-algorithm: AES-CBC-128 Life duration(sec): 86400 Remaining key duration(sec): 86379 Exchange-mode: Main Diffie-Hellman group: Group 1 NAT traversal: Not detected Extend authentication: Enabled Assigned IP address: 192.168.2.1 # Display detailed information about the IKE SA with the remote address of 4.4.4.5.
Page 606
Table 87 Command output Field Description Connection ID Identifier of the IKE SA. VPN instance name of the MPLS L3VPN to which the receiving Outside VPN interface belongs. VPN instance name of the MPLS L3VPN to which the protected data Inside VPN belongs.
display ike statistics Use display ike statistics to display IKE statistics. Syntax display ike statistics Views Any view Predefined user roles network-admin network-operator Examples # Display IKE statistics. <Sysname> display ike statistics IKE statistics: No matching proposal: 0 Invalid ID information: 0 Unavailable certificate: 0 Unsupported DOI: 0 Unsupported situation: 0...
Use dpd to configure IKE DPD. Use undo dpd to disable IKE DPD. Syntax dpd interval interval [ retry seconds ] { on-demand | periodic } undo dpd interval Default IKE DPD is disabled. Views IKE profile view Predefined user roles network-admin Parameters interval interval: Specifies a DPD triggering interval in the range of 1 to 300 seconds.
Page 609
encryption-algorithm { 3des-cbc | aes-cbc-128 | aes-cbc-192 | aes-cbc-256 | des-cbc | sm1-cbc-128 | sm1-cbc-192 | sm1-cbc-256 | sm4-cbc} undo encryption-algorithm In FIPS mode: encryption-algorithm { aes-cbc-128 | aes-cbc-192 | aes-cbc-256 } undo encryption-algorithm Default In non-FIPS mode, an IKE proposal uses the 56-bit DES encryption algorithm in CBC mode. In FIPS mode, an IKE proposal uses the 128-bit AES encryption algorithm in CBC mode.
Hardware Keyword compatibility MSR5620/5660/5680 sm4-cbc: Uses the SM4 algorithm in CBC mode, which uses a 128-bit key. This keyword is available only for IKEv1. The following matrix shows the sm4-cbc keyword and hardware compatibility: Hardware Keyword compatibility MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-10-Po E/810-LM-HK/810-W-LM-HK/810-LMS/810-LUS MSR2600-10-X1 MSR 2630 MSR3600-28/3600-51 MSR3600-28-SI/3600-51-SI...
Predefined user roles network-admin Parameters aggressive: Specifies the aggressive mode. main: Specifies the main mode. Usage guidelines As a best practice, specify the aggressive mode at the local end if the following conditions are met: • The local end, for example, a dialup user, obtains an IP address automatically. •...
To modify or delete an address pool, you must delete all IKE SAs and IPsec SAs. Otherwise, the assigned IPv4 addresses might not be reclaimed. Examples # Configure an IKE IPv4 address pool with the name ipv4group, address range 1.1.1.1 to 1.1.1.2, and the mask 255.255.255.0.
Examples # Configure DPD to be triggered every 10 seconds and every 5 seconds between retries if the peer does not respond. <Sysname> system-view [Sysname] ike dpd interval 10 retry 5 on-demand Related commands ike identity Use ike identity to specify the global identity used by the local end during IKE negotiations. Use undo ike identity to restore the default.
<sysname> system-view [sysname] ike identity address 2.2.2.2 Related commands local-identity ike signature-identity from-certificate ike invalid-spi-recovery enable Use ike invalid-spi-recovery enable to enable invalid security parameter index (SPI) recovery. Use undo ike invalid-spi-recovery enable to disable invalid SPI recovery. Syntax ike invalid-spi-recovery enable undo ike invalid-spi-recovery enable Default Invalid SPI recovery is disabled.
Default No IKE keepalives are sent. Views System view Predefined user roles network-admin Parameters interval: Specifies the number of seconds between IKE keepalives, in the range of 20 to 28800. Usage guidelines To detect the status of the peer, configure IKE DPD instead of the IKE keepalive feature, unless IKE DPD is not supported on the peer.
The keepalive timeout time configured at the local end must be longer than the keepalive interval configured at the peer. Because more than three consecutive packets are rarely lost on a network, you can set the keepalive timeout time to three times as long as the keepalive interval. Examples # Set the keepalive timeout time to 20 seconds.
ike limit Use ike limit to set the maximum number of half-open or established IKE SAs. Use undo ike limit to restore the default. Syntax ike limit { max-negotiating-sa negotiation-limit | max-sa sa-limit } undo ike limit { max-negotiating-sa | max-sa } Default There is no limit to the maximum number of half-open or established IKE SAs.
Views System view Predefined user roles network-admin Usage guidelines This command enables the device to output logs for the IKE negotiation process. This command is available only in non-FIPS mode. Examples # Enable logging for IKE negotiation. <Sysname> system-view [Sysname] ike logging negotiation enable ike nat-keepalive Use ike nat-keepalive to set the NAT keepalive interval.
Syntax ike profile profile-name undo ike profile profile-name Default No IKE profiles exist. Views System view Predefined user roles network-admin Parameters profile-name: Specifies an IKE profile name, a case-insensitive string of 1 to 63 characters. Examples # Create IKE profile 1 and enter its view. <Sysname>...
Usage guidelines During IKE negotiation: • The initiator sends its IKE proposals to the peer. If the initiator is using an IPsec policy with an IKE profile, the initiator sends all IKE proposals specified for the IKE profile to the peer. An IKE proposal specified earlier for the IKE profile has a higher priority.
Examples # Configure the local device to always obtain the identity information from the local certificate for signature authentication. <Sysname> system-view [sysname] ike signature-identity from-certificate Related commands local-identity ike identity inside-vpn Use inside-vpn to specify an inside VPN instance. Use undo inside-vpn to restore the default. Syntax inside-vpn vpn-instance vpn-instance-name undo inside-vpn...
undo keychain keychain-name Default No IKE keychain is specified for pre-shared key authentication. Views IKE profile view Predefined user roles network-admin Parameters keychain-name: Specifies an IKE keychain name, a case-insensitive string of 1 to 63 characters. Usage guidelines You can specify a maximum of six IKE keychains for an IKE profile. An IKE keychain specified earlier has a higher priority.
fqdn fqdn-name: Uses an FQDN as the local ID. The fqdn-name argument is a case-sensitive string of 1 to 255 characters, such as www.test.com. If you do not specify this argument, the device name configured by using the sysname command is used as the local FQDN. user-fqdn user-fqdn-name: Uses a user FQDN as the local ID.
vpn-instance vpn-instance-name: Specifies the MPLS L3VPN instance to which the IPv4 or IPv6 address belongs. The vpn-instance-name argument represents the VPN instance name, a case-sensitive string of 1 to 31 characters. To specify an IP address on the public network, do not specify this option.
Usage guidelines Use this command to specify which address or interface can use the IKE profile for IKE negotiation. Specify the local address configured in IPsec policy or IPsec policy template view (using the local-address command) for this command. If no local address is configured, specify the IP address of the interface that uses the IPsec policy.
• address range low-ipv4-address high-ipv4-address: Uses a range of IPv4 addresses as the peer ID for IKE profile matching. The end address must be higher than the start address. • address ipv6 ipv6-address [ prefix-length ]: Uses an IPv6 host address or an IPv6 subnet address as the peer ID for IKE profile matching.
[Sysname-ike-keychain-key1] pre-shared-key address 1.1.1.2 255.255.255.255 key simple 123456TESTplat&! Related commands authentication-method keychain priority (IKE keychain view) Use priority to specify a priority for an IKE keychain. Use undo priority to restore the default. Syntax priority priority undo priority Default The priority of an IKE keychain is 100. Views IKE keychain view Predefined user roles...
Views IKE profile view Predefined user roles network-admin Parameters priority priority: Specifies a priority number in the range of 1 to 65535. The smaller the priority number, the higher the priority. Usage guidelines To determine the priority of an IKE profile, the device examines the existence of the match local address command before examining the priority number.
[Sysname-ike-profile-prof1] proposal 10 Related commands ike proposal reset ike sa Use reset ike sa to delete IKE SAs. Syntax reset ike sa [ connection-id connection-id ] Views User view Predefined user roles network-admin Parameters connection-id connection-id: Specifies the connection ID of the IKE SA to be cleared, in the range of 1 to 2000000000.
Views User view Predefined user roles network-admin Examples # Clears IKE MIB statistics. <Sysname> reset ike statistics Related commands snmp-agent trap enable ike sa duration Use sa duration to set the IKE SA lifetime for an IKE proposal. Use undo sa duration to restore the default. Syntax sa duration seconds undo sa duration...
Page 633
Examples # Enable SNMP notifications for IKE globally. <Sysname> system-view [Sysname] snmp-agent trap enable ike global # Enable SNMP notifications for events of creating IKE tunnels. [Sysname] snmp-agent trap enable ike tunnel-start...
[Sysname-ikev2-profile-profile1] aaa authorization domain abc username test Related commands display ikev2 profile address Use address to specify the IP address or IP address range of an IKEv2 peer. Use undo address to restore the default. Syntax address { ipv4-address [ mask | mask-length ] | ipv6 ipv6-address [ prefix-length ] } undo address Default The IKEv2 peer's IP address or IP address range is not specified.
Page 636
Use undo authentication-method to remove the local or remote identity authentication method. Syntax authentication-method { local | remote } { dsa-signature | ecdsa-signature | pre-share | rsa-signature } undo authentication-method local undo authentication-method remote { dsa-signature | ecdsa-signature | pre-share | rsa-signature } Default No local or remote identity authentication method is specified.
[Sysname-ikev2-profile-profile1] keychain keychain1 Related commands display ikev2 profile certificate domain (ikev2 profile view) keychain (ikev2 profile view) certificate domain Use certificate domain to specify a PKI domain for signature authentication in IKEv2 negotiation. Use undo certificate domain to remove a PKI domain for signature authentication in IKEv2 negotiation.
display ikev2 profile display ikev2 policy Use display ikev2 policy to display the IKEv2 policy configuration. Syntax display ikev2 policy [ policy-name | default ] Views Any view Predefined user roles network-admin network-operator Parameters policy-name: Specifies an IKEv2 policy by its name, a case-insensitive string of 1 to 63 characters. default: Specifies the default IKEv2 policy.
display ikev2 profile Use display ikev2 profile to display the IKEv2 profile configuration. Syntax display ikev2 profile [ profile-name ] Views Any view Predefined user roles network-admin network-operator Parameters profile-name: Specifies an IKEv2 profile by its name, a case-insensitive string of 1 to 63 characters. If you do not specify an IKEv2 profile, this command displays the configuration of all IKEv2 profiles.
Field Description Match criteria Criteria for looking up the IKEv2 profile. Local identity ID of the local end. Local authentication method Method that the local end uses for authentication. Remote authentication methods Methods that the remote end uses for authentication. Keychain IKEv2 keychain that the IKEv2 profile uses.
Usage guidelines This command displays IKEv2 proposals in descending order of priorities. If you do not specify any parameters, this command displays the configuration of all IKEv2 proposals. Examples # Display the configuration of all IKEv2 proposals. <Sysname> display ikev2 proposal IKEv2 proposal : 1 Encryption: 3DES-CBC AES-CBC-128 AES-CTR-192 CAMELLIA-CBC-128 Integrity: MD5 SHA256 AES-XCBC-MAC...
Page 643
ipv4-address: Specifies a local or remote IPv4 address. ipv6 ipv6-address: Specifies a local or remote IPv6 address. vpn-instance vpn-instance-name: Displays information about the IKEv2 SAs in a VPN instance. The vpn-instance-name argument represents the VPN instance name, a case-sensitive string of 1 to 31 characters.
Page 644
Inside VRF: - Local SPI: 8f8af3dbf5023a00 Remote SPI: 0131565b9b3155fa Local ID type: FQDN Local ID: device_a Remote ID type: FQDN Remote ID: device_b Auth sign method: Pre-shared key Auth verify method: Pre-shared key Integrity algorithm: HMAC_MD5 PRF algorithm: HMAC_MD5 Encryption algorithm: AES-CBC-192 Life duration: 86400 secs Remaining key duration: 85604 secs Diffie-Hellman group: MODP1024/Group2...
Field Description PRF algorithm PRF algorithms that the IKEv2 proposal uses. Encryption algorithm Encryption algorithms that the IKEv2 proposal uses. Life duration Lifetime of the IKEv2 SA, in seconds. Remaining key duration Remaining lifetime of the IKEv2 SA, in seconds. Diffie-Hellman group DH groups used in IKEv2 key negotiation.
Page 647
Unsupported critical payload: 0 Invalid IKE SPI: 0 Invalid major version: 0 Invalid syntax: 0 Invalid message ID: 0 Invalid SPI: 0 No proposal chosen: 0 Invalid KE payload: 0 Authentication failed: 0 Single pair required: 0 TS unacceptable: 0 Invalid selectors: 0 Tempture failure: 0 No child SA: 0...
Predefined user roles network-admin Parameters group1: Uses the 768-bit Diffie-Hellman group. group2: Uses the 1024-bit Diffie-Hellman group. group5: Uses the 1536-bit Diffie-Hellman group. group14: Uses the 2048-bit Diffie-Hellman group. group24: Uses the 2048-bit Diffie-Hellman group with the 256-bit prime order subgroup. group19: Uses 256-bit ECP Diffie-Hellman group.
retry seconds: Specifies the DPD retry interval in the range of 2 to 60 seconds. The default is 5 seconds. on-demand: Triggers DPD on demand. The device triggers DPD if it has IPsec traffic to send and has not received any IPsec packets from the peer for the specified interval. periodic: Triggers DPD at regular intervals.
aes-cbc-256: Uses the AES algorithm in CBC mode, which uses a 256-bit key. aes-ctr-128: Uses the AES algorithm in CTR mode, which uses a 128-bit key. aes-ctr-192: Uses the AES algorithm in CTR mode, which uses a 192-bit key. aes-ctr-256: Uses the AES algorithm in CTR mode, which uses a 256-bit key. camellia-cbc-128: Uses the Camellia algorithm in CBC mode, which uses a 128-bit key.
[Sysname] ikev2 keychain key1 # Create an IKEv2 peer named peer1. [Sysname-ikev2-keychain-key1] peer peer1 # Specify the host name test of the IKEv2 peer. [Sysname-ikev2-keychain-key1-peer-peer1] hostname test Related commands ikev2 keychain peer identity Use identity to specify the ID of an IKEv2 peer. Use undo identity to restore the default.
# Specify the peer IPv4 address 1.1.1.2 as the ID of the IKEv2 peer. [Sysname-ikev2-keychain-key1-peer-peer1] identity address 1.1.1.2 Related commands ikev2 keychain peer identity local Use identity local to configure the local ID, the ID that the device uses to identify itself to the peer during IKEv2 negotiation..
ikev2 address-group Use ikev2 address-group to configure an IKEv2 IPv4 address pool for assigning IPv4 addresses to remote peers. Use undo ikev2 address-group to delete an IKEv2 IPv4 address pool. Syntax ikev2 address-group group-name start-ipv4-address end-ipv4-address [ mask | mask-length ] undo ikev2 address-group group-name Default No IKEv2 IPv4 address pools exist.
undo ikev2 cookie-challenge Default The cookie challenging feature is disabled. Views System view Predefined user roles network-admin Parameters number: Specifies the threshold for triggering the cookie challenging feature. The value range for this argument is 1 to 1000 half-open IKE SAs. Usage guidelines When an IKEv2 responder maintains a threshold number of half-open IKE SAs, it starts the cookie challenging mechanism.
periodic: Triggers DPD at regular intervals. The device triggers DPD at the specified interval. Usage guidelines DPD is triggered periodically or on-demand. As a best practice, use the on-demand mode when the device communicates with a large number of IKEv2 peers. For an earlier detection of dead peers, use the periodic triggering mode, which consumes more bandwidth and CPU.
Usage guidelines Different from the IKEv2 IPv4 address pool, the device assigns an IPv6 subnet to a peer from the IKEv2 IPv6 address pool. The peer can use the assigned IPv6 subnet to assign IPv6 addresses to other devices. IKEv2 IPv6 address pools cannot overlap with each other. Examples # Configure an IKEv2 IPv6 address pool with the name ipv6group, prefix 1:1::/64, and the assigned prefix length 80.
Use undo ikev2 nat-keepalive to restore the default. Syntax ikev2 nat-keepalive seconds undo ikev2 nat-keepalive Default The NAT keepalive interval is 10 seconds. Views System view Predefined user roles network-admin Parameters seconds: Specifies the NAT keepalive interval in seconds, in the range of 5 to 3600. Usage guidelines This command takes effect when the device resides in the private network behind a NAT device.
Usage guidelines Each end must have an IKEv2 policy for the IKE_SA_INIT exchange. The initiator looks up an IKEv2 policy by the IP address of the interface to which the IPsec policy is applied and the VPN instance to which the interface belongs. The responder looks up an IKEv2 policy by the IP address of the interface that receives the IKEv2 packet and the VPN instance to which the interface belongs.
<Sysname> system-view [Sysname] ikev2 profile profile1 [Sysname-ikev2-profile-profile1] Related commands display ikev2 profile ikev2 proposal Use ikev2 proposal to create an IKEv2 proposal and enter its view, or enter the view of an existing IKEv2 proposal. Use undo ikev2 proposal to delete an IKEv2 proposal. Syntax ikev2 proposal proposal-name undo ikev2 proposal proposal-name...
Use undo keychain to restore the default. Syntax keychain keychain-name undo keychain Default No IKEv2 keychain is specified for an IKEv2 profile. Views IKEv2 profile view Predefined user roles network-admin Parameters keychain-name: Specifies an IKEv2 keychain by its name. The keychain name is a case-insensitive string of 1 to 63 characters and cannot contain a hyphen (-).
Predefined user roles network-admin Parameters address: Specifies a local interface or IP address to which an IKEv2 profile can be applied. interface-type interface-number: Specifies a local interface by its type and number. It can be any Layer 3 interface. ipv4-address: Specifies the IPv4 address of a local interface. ipv6 ipv6-address: Specifies the IPv6 address of a local interface.
Predefined user roles network-admin Parameters interface-type interface-number: Specifies a local interface by its type and number. It can be any Layer 3 interface. ipv4-address: Specifies the IPv4 address of a local interface. ipv6 ipv6-address: Specifies the IPv6 address of a local interface. Usage guidelines IKEv2 policies with this command configured are looked up before those that do not have this command configured.
• address ipv4-address [ mask | mask-length ]: Uses an IPv4 host address or an IPv4 subnet address as the peer ID for IKEv2 profile matching. The value range for the mask-length argument is 0 to 32. • address range low-ipv4-address high-ipv4-address: Uses a range of IPv4 addresses as the peer ID for IKEv2 profile matching.
undo match vrf Default No VPN instance is specified, and the IKEv2 policy matches all local IP addresses in the public network. Views IKEv2 policy view Predefined user roles network-admin Parameters name vrf-name: Specifies a VPN instance by its name, a case-sensitive string of 1 to 31 characters. any: Specifies the public network and all VPN instances.
Parameters name vrf-name: Specifies a VPN instance by its name, a case-sensitive string of 1 to 31 characters. any: Specifies the public network and all VPN instances. Usage guidelines If an IKEv2 profile belongs to a VPN instance, only interfaces in the VPN instance can use the IKEv2 profile for IKEv2 negotiation.
[Sysname-ikev2-profile-profile1]nat-keepalive 1200 Related commands display ikev2 profile ikev2 nat-keepalive peer Use peer to create an IKEv2 peer and enter its view, or enter the view of an existing IKEv2 peer. Use undo peer to delete an IKEv2 peer. Syntax peer name undo peer name Default No IKEv2 peers exist.
Page 669
Syntax pre-shared-key [ local | remote ] { ciphertext | plaintext } string undo pre-shared-key [ local | remote ] Default No pre-shared key exists. Views IKEv2 peer view Predefined user roles network-admin Parameters local: Specifies a pre-shared key for certificate signing. remote: Specifies a pre-shared key for certificate authentication.
sha512: Uses the HMAC-SHA512 algorithm. Usage guidelines You can specify multiple PRF algorithms for an IKEv2 proposal. An algorithm specified earlier has a higher priority. Examples # Create an IKEv2 proposal named prop1. <Sysname> system-view [Sysname] ikev2 proposal prop1 # Specify HMAC-SHA1 and HMAC-MD5 as the PRF algorithms, with HMAC-SHA1 preferred. [Sysname-ikev2-proposal-prop1] prf sha1 md5 Related commands ikev2 proposal...
priority (IKEv2 profile view) Use priority to set a priority for an IKEv2 profile. Use undo priority to restore the default. Syntax priority priority undo priority Default The priority of an IKEv2 profile is 100. Views IKEv2 profile view Predefined user roles network-admin Parameters priority: Specifies the priority of the IKEv2 profile, in the range of 1 to 65535.
Usage guidelines You can specify multiple IKEv2 proposals for an IKEv2 policy. A proposal specified earlier has a higher priority. Examples # Specify the IKEv2 proposal proposal1 for the IKEv2 policy policy1. <Sysname> system-view [Sysname] ikev2 policy policy1 [Sysname-ikev2-policy-policy1] proposal proposal1 Related commands display ikev2 policy ikev2 proposal...
-------------------------------------------------------------------- 1.1.1.1/500 1.1.1.2/500 2.2.2.1/500 2.2.2.2/500 Status: IN-NEGO: Negotiating, EST: Established, DEL: Deleting # Delete the IKEv2 SA whose remote IP address is 1.1.1.2. <Sysname> reset ikev2 sa remote 1.1.1.2 <Sysname> display ikev2 sa Tunnel ID Local Remote Status -------------------------------------------------------------------- 2.2.2.1/500 2.2.2.2/500 Status: IN-NEGO: Negotiating, EST: Established, DEL: Deleting...
Page 675
Predefined user roles network-admin Parameters seconds: Specifies the IKEv2 SA lifetime in seconds, in the range of 120 to 86400. Usage guidelines An IKEv2 SA can be used for subsequent IKEv2 negotiations before its lifetime expires, saving a lot of negotiation time. However, the longer the lifetime, the higher the possibility that attackers collect enough information and initiate attacks.
Group domain VPN commands The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features, commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about FIPS mode, see Security Configuration Guide. The following matrix shows the feature and hardware compatibility: Hardware Group domain VPN compatibility...
Examples # Set the anti-replay window size to 50 seconds for GDOI GM group group1. <Sysname> system-view [Sysname] gdoi gm group group1 [Sysname-gdoi-gm-group-group1] client anti-replay window sec 50 Related commands display gdoi gm anti-replay client registration Use client registration to specify a registration interface for a GM in a GDOI GM group. The GM uses the registration interface to send packets to the KS.
client transform-sets Use client transform-sets to specify IPsec transform sets supported by a GM. Use undo client transform-sets to restore the default. Syntax client transform-sets transform-set-name&<1-6> undo client transform-sets Default A GM supports the IPsec transform set configured with the following security parameters: •...
Page 680
Syntax display gdoi gm [ group group-name ] Views Any view Predefined user roles network-admin network-operator Parameters group group-name: Specifies a GDOI GM group by its name. A GDOI GM group name is a case-insensitive string of 1 to 63 characters. If you do not specify a group, this command displays information about all GDOI GM groups.
Page 682
Rekeys cumulative: Total received : 52 Rekeys after latest registration: 3 Total rekey ACKs sent : 23 ACL downloaded from KS 90.1.1.2: rule 0 deny udp source-port eq 848 destination-port eq 848 rule 1 deny ospf rule 2 permit icmp KEK: Rekey transport type : Unicast...
Page 683
Field Description Period of time after which the GM re-registers with a KS. Re-register in N/A indicates that the GM does not re-register with a KS. Succeeded registrations Number of successful registrations. Attempted registrations Number of registration attempts. KS from which the GM receives the last rekey message. Last rekey from N/A indicates that the GM does not receive any rekey messages.
Field Description TEK information. SPI of the IPsec SA. Transform Transform set list. Remaining key lifetime IPsec SA remaining lifetime in seconds. display gdoi gm acl Use display gdoi gm acl to display ACL information for the GM. Syntax display gdoi gm acl [ download | local ] [ group group-name ] Views Any view Predefined user roles...
Examples # Display anti-replay information for all GDOI GM groups. <Sysname> display gdoi gm anti-replay Group name: abc Anti-replay timestamp type : POSIX-TIME Anti-replay window : 200.16 ms Related commands client anti-replay window display gdoi gm ipsec sa Use display gdoi gm ipsec sa to display IPsec SA information obtained by the GM. Syntax display gdoi gm ipsec sa [ group group-name ] Views...
Field Description Transform Transform set. Remaining key lifetime Remaining lifetime of the IPsec SA, in seconds. display gdoi gm members Use display gdoi gm members to display brief information about the GM. Syntax display gdoi gm members [ group group-name ] Views Any view Predefined user roles...
Field Description IP address or host name of the KS with which the GM registers. Registered with If the host name is displayed, this field also displays the IP address of the host in brackets. Re-register in Period of time after which the GM re-registers with a KS. Succeeded registrations Number of successful registrations.
D3721818 B66201F0 BD1987BE DD28D533 C38E7D42 939D2B71 3FAAA17A 128DF862 E45C531D A0C8593E D7D602E9 7A7E675A 94AF6B25 2972CF85 94E601BD 19020301 0001 Table 97 Command output Field Description Group name GDOI GM group name. KS address IPv4 or IPv6 address of the KS. Conn-ID ID of the rekey SA. My cookie Local cookie of the rekey SA.
Group name: GDOI-GROUP1 (Multicast) Number of rekeys received (cumulative) : 1904 Number of rekeys received after registration : 889 Multicast destination address : 239.192.1.190 Rekey (KEK) SA information: Destination Source Conn-ID My cookie His cookie : 239.192.1.190 90.1.1.1 9646 14406D26 8C58E504 Current : 239.192.1.190...
Parameters ipv6: Specifies an IPv6 GDOI GM group. If you do not specify this keyword, the command creates an IPv4 GDOI GM group. group-name: Specifies a name for the GDOI GM group, a case-insensitive string of 1 to 63 characters. Usage guidelines IPv4 GDOI GM groups and IPv6 GDOI GM groups share the same namespace.
[Sysname-ipsec-policy-gdoi-map-1] group abc Related commands gdoi gm group ipsec { ipv6-policy | policy } identity Use identity to configure an ID for a GDOI GM group. Use undo identity to restore the default. Syntax identity { address ip-address | number number } undo identity Default No ID is configured for a GDOI GM group.
Views User view Predefined user roles network-admin Parameters group group-name: Specifies a GDOI GM group by its name. A GDOI GM group name is a case-insensitive string of 1 to 63 characters. If you do not specify a group, this command clears GDOI information for all GM groups.
Page 694
[Sysname-gdoi-gm-group-abc] server address 3.3.3.4...
SSH commands Commands and descriptions for centralized devices apply to the following routers: • MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-10-PoE/810-LM-HK/810-W-LM-HK/810-L MS/810-LUS. • MSR2600-10-X1. • MSR 2630. • MSR3600-28/3600-51. • MSR3600-28-SI/3600-51-SI. • MSR3610-X1/3610-X1-DP/3610-X1-DC/3610-X1-DP-DC. • MSR 3610/3620/3620-DP/3640/3660. Commands and descriptions for distributed devices apply to the following routers: •...
Page 696
Parameters session: Displays SSH server session information. status: Displays the SSH server status. slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command displays SSH server session information for the active MPU. (Distributed devices in standalone mode.) slot slot-number: Specifies an IRF member device by its member ID.
Table 100 Command output Field Description UserPid User process ID. SessID Session ID. Protocol version of the SSH server. Encrypt Encryption algorithm used on the SSH server. Session state: • Init—Initialization. • Ver-exchange—Version negotiation. • Keys-exchange—Key exchange. State • Auth-request—Authentication request. •...
Related commands display ssh server sftp server enable Use sftp server enable to enable the SFTP server. Use undo sftp server enable to disable the SFTP server. Syntax sftp server enable undo sftp server enable Default The SFTP server is disabled. Views System view Predefined user roles...
Usage guidelines If an SFTP connection is idle when the idle timeout timer expires, the system automatically terminates the connection. To promptly release connection resources, set the idle timeout timer to a small value when many SFTP connections concurrently exist. Examples # Set the idle timeout timer to 500 minutes for SFTP connections.
The SSH redirect server can provide the SSH redirect service after SSH redirect is enabled and an SSH redirect listening port is configured. The SSH client can use the ssh2 ip address port number command to access the destination device. The ip address argument and the port number argument specify the IP address of the SSH redirect server and the SSH redirect listening port, respectively.
<Sysname> system-view [Sysname] line tty 1 [Sysname-line-tty1] ssh redirect disconnect Related commands ssh redirect enable ssh redirect enable Use ssh redirect enable to enable SSH redirect for a user line. Use undo ssh redirect enable to disable SSH redirect for a user line. Syntax ssh redirect enable undo ssh redirect enable...
Examples # Enable SSH redirect on TTY line 7. <Sysname> system-view [Sysname] line tty 7 [Sysname-line-tty7] ssh redirect enable Related commands ssh redirect listen-port ssh redirect disconnect ssh redirect listen-port Use ssh redirect listen-port to set a listening port of SSH redirect. Use undo ssh redirect listen-port to restore the default.
Examples # Set the SSH redirect listening port number to 5000 on TTY line 1. <Sysname> system-view [Sysname] line tty 1 [Sysname-line-tty1] ssh redirect listen-port 5000 Related commands ssh redirect enable ssh redirect timeout Use ssh redirect timeout to set the idle-timeout timer for the redirected SSH connection. Use undo ssh redirect timeout to restore the default.
Examples # Set the idle-timeout timer to 200 seconds for the redirected SSH connection. <Sysname> system-view [Sysname] line tty 1 [Sysname-line-tty1] ssh redirect timeout 200 Related commands ssh redirect enable ssh server acl Use ssh server acl to specify an ACL to control IPv4 SSH connections. Use undo ssh server acl to restore the default.
Related commands display ssh server ssh server authentication-retries Use ssh server authentication-retries to set the maximum number of authentication attempts for SSH users. Use undo ssh server authentication-retries to restore the default. Syntax ssh server authentication-retries retries undo ssh server authentication-retries Default The maximum number of authentication attempts is 3 for SSH users.
Syntax ssh server authentication-timeout time-out-value undo ssh server authentication-timeout Default The SSH user authentication timeout timer is 60 seconds. Views System view Predefined user roles network-admin Parameters time-out-value: Specifies an authentication timeout timer in the range of 1 to 120 seconds. Usage guidelines If a user does not finish the authentication when the timeout timer expires, the connection cannot be established.
Examples # Enable the SSH server to support SSH1 clients. <Sysname> system-view [Sysname] ssh server compatible-ssh1x enable Related commands display ssh server ssh server dscp Use ssh server dscp to set the DSCP value in the IPv4 SSH packets that the SSH server sends to SSH clients.
Views System view Predefined user roles network-admin Examples # Enable the Stelnet server. <Sysname> system-view [Sysname] ssh server enable Related commands display ssh server ssh server ipv6 acl Use ssh server ipv6 acl to specify an ACL to control IPv6 SSH connections to the server. Use undo ssh server ipv6 acl to restore the default.
<Sysname> system-view [Sysname] acl ipv6 basic 2001 [Sysname-acl6-ipv6-basic-2001] rule permit source 1::1 64 [Sysname-acl6-ipv6-basic-2001] quit [Sysname] ssh server ipv6 acl ipv6 2001 Related commands display ssh server ssh server ipv6 dscp Use ssh server ipv6 dscp to set the DSCP value in the IPv6 SSH packets that the SSH server sends to SSH clients.
Views System view Predefined user roles network-admin Parameters port-number: Specifies a port number in the range of 1 to 65535. Usage guidelines If you modify the SSH port number when the SSH service is enabled, the SSH service is restarted and all SSH connections are terminated after the modification.
Usage guidelines Periodically updating the RSA server key pair prevents malicious hacking to the key pair and enhances security of the SSH connections. This command takes effect only on SSH1 clients. The system starts to count down the configured minimum update interval after the first SSH1 user logs in to the server.
Page 713
service-type: Specifies a service type for the SSH user. • all: Specifies service types Stelnet, SFTP, SCP, and NETCONF. • scp: Specifies the service type SCP. • sftp: Specifies the service type SFTP. • stelnet: Specifies the service type Stelnet. •...
Page 714
You do not need to create an SSH user by using the ssh user command. However, if you want to display all SSH users, including the password-only SSH users, for centralized management, you can use this command to create them. If such an SSH user has been created, make sure you have specified the correct service type and authentication method.
SSH client commands Use bye to terminate the connection with the SFTP server and return to user view. Syntax Views SFTP client view Predefined user roles network-admin Usage guidelines This command has the same function as the exit and quit commands. Examples # Terminate the connection with the SFTP server.
cdup Use cdup to return to the upper-level directory. Syntax cdup Views SFTP client view Predefined user roles network-admin Example # Return to the upper-level directory from the current working directory /test1. sftp> cd test1 Current Directory is:/test1 sftp> pwd Remote working directory: /test1 sftp>...
Syntax dir [ -a | -l ] [ remote-path ] Views SFTP client view Predefined user roles network-admin Parameters -a: Displays detailed information about files and subdirectories under a directory in a list, including the files and subdirectories with names starting with dots (.). -l: Displays detailed information about the files and subdirectories under a directory in a list, excluding the files and subdirectories with names starting with dots (.).
Predefined user roles network-admin network-operator Examples # Display the source IP address configured for the SFTP client. <Sysname> display sftp client source The source IP address of the SFTP client is 192.168.0.1 The source IPv6 address of the SFTP client is 2:2::2:2. Related commands sftp client ipv6 source sftp client source...
Usage guidelines This command has the same function as the bye and quit commands. Examples # Terminate the SFTP connection. sftp> exit <Sysname> Use get to download a file from the SFTP server and save it locally. Syntax get remote-file [ local-file ] Views SFTP client view Predefined user roles...
Page 720
cd [path] Change remote directory to 'path' cdup Change remote directory to the parent directory delete path Delete remote file dir [-a|-l][path] Display remote directory listing List all filenames List filename including the specific information of the file exit Quit sftp get remote-path [local-path] Download file help Display this help text...
Examples # Display detailed information about the files and subdirectories under the current directory, including the files and subdirectories with names starting with dots (.). sftp> ls -a drwxrwxrwx 512 Dec 18 14:12 . drwxrwxrwx 512 Dec 18 14:12 .. -rwxrwxrwx 301 Dec 18 14:11 010.pub -rwxrwxrwx...
Parameters local-file: Specifies the name of a local file. remote-file: Specifies the name of a file on an SFTP server. If you do not specify this argument, the file will be remotely saved with the same name as the local file. Examples # Upload the local file startup.bak to the SFTP server and save it as startup01.bak.
remove Use remove to delete a file from the SFTP server. Syntax remove remote-file Views SFTP client view Predefined user roles network-admin Parameters remote-file: Specifies a file by its name. Usage guidelines This command has the same function as the delete command. Examples # Delete the file temp.c from the SFTP server.
Syntax rmdir remote-path Views SFTP client view Predefined user roles network-admin Parameters remote-path: Specifies a directory. Examples # Delete the subdirectory temp1 under the current directory on the SFTP server. sftp> rmdir temp1 Use scp to establish a connection to an IPv4 SCP server and transfer files with the server. Syntax In non-FIPS mode: scp server [ port-number ] [ vpn-instance vpn-instance-name ] { put | get } source-file-name...
Page 725
destination-file-name: Specifies the name of the target file. If you do not specify this argument, the target file uses the same file name as the source file. identity-key: Specifies a public key algorithm for the client. The default is dsa in non-FIPS mode and is rsa in FIPS mode.
interface interface-type interface-number: Specifies a source interface by its type and number. The IPv4 address of this interface is the source IPv4 address of the SCP packets. ip ip-address: Specifies a source IPv4 address. Examples # Connect the SCP client to the SCP server 200.1.1.1. Specify the public key of the server as svkey, and download the file abc.txt from the server.
Page 727
-i interface-type interface-number: Specifies an output interface by its type and number for SCP packets. This option is used only when the server uses a link-local address to provide the SCP service for the client. The specified output interface on the SCP client must have a link-local address. get: Downloads the file.
publickey keyname: Specifies the host public key of the server, which is used to authenticate the server. The keyname argument is a case-insensitive string of 1 to 64 characters. source: Specifies a source IPv6 address or source interface for IPv6 SCP packets. By default, the device automatically selects a source IPv6 address for IPv6 SCP packets in compliance with RFC 3484.
Page 729
port-number: Specifies the port number of the server, in the range of 1 to 65535. The default is 22. vpn-instance vpn-instance-name: Specifies the MPLS L3VPN instance to which the server belongs. The vpn-instance-name argument is a case-sensitive string of 1 to 31 characters. identity-key: Specifies a public key algorithm for the client.
source: Specifies a source IPv4 address or source interface for the SFTP packets. By default, the device uses the primary IPv4 address of the output interface in the routing entry as the source IPv4 address of SFTP packets. As a best practice to ensure successful IPv4 SFTP connections, specify a loopback interface or dialer interface as the source interface or specify that interface's IPv4 address as the source IPv4 address.
Examples # Specify 2:2::2:2 as the source IPv6 address for SFTP packets. <Sysname> system-view [Sysname] sftp client ipv6 source ipv6 2:2::2:2 Related commands display sftp client source sftp client source Use sftp client source to configure the source IPv4 address for SFTP packets. Use undo sftp client source to restore the default.
Page 733
prefer-ctos-hmac: Specifies the preferred client-to-server HMAC algorithm. The default is sha1. Algorithms sha1 and sha1-96 provide stronger security but cost more computation time than algorithms md5 and md5-96. • md5: Specifies the HMAC algorithm hmac-md5. • md5-96: Specifies the HMAC algorithm hmac-md5-96. •...
ssh client ipv6 source Use ssh client ipv6 source to configure the source IPv6 address for SSH packets that are sent by the Stelnet client. Use undo ssh client ipv6 source to restore the default. Syntax ssh client ipv6 source { interface interface-type interface-number | ipv6 ipv6-address } undo ssh client ipv6 source Default The source IPv6 address for SSH packets is not configured.
Default The source IPv4 address for SSH packets is not configured. The Stelnet client uses the primary IPv4 address of the output interface in the routing entry as the source address of the SSH packets. Views System view Predefined user roles network-admin Parameters interface interface-type interface-number: Specifies a source interface by its type and number.
Page 736
Predefined user roles network-admin Parameters server: Specifies a server by its IPv4 address or host name, a case-insensitive string of 1 to 253 characters. port-number: Specifies the port number of the server, in the range 1 to 65535. The default is 22. vpn-instance vpn-instance-name: Specifies the MPLS L3VPN instance to which the server belongs.
dscp dscp-value: Specifies the DSCP value in the IPv4 SSH packets. The value range for the dscp-value argument is 0 to 63, and the default value is 48. The DSCP value determines the transmission priority of the packet. escape character: Specifies a case-sensitive escape character. By default, the escape character is a tilde (~).
Page 739
• sha1-96: Specifies the HMAC algorithm hmac-sha1-96. prefer-kex: Specifies preferred exchange algorithm. default dh-group-exchange-sha1 in non-FIPS mode and dh-group14-sha1 in FIPS mode. • dh-group-exchange-sha1: Specifies the key exchange algorithm diffie-hellman-group-exchange-sha1. • dh-group1-sha1: Specifies the key exchange algorithm diffie-hellman-group1-sha1. • dh-group14-sha1: Specifies the key exchange algorithm diffie-hellman-group14-sha1. The algorithm dh-group14-sha1 provides stronger security but costs more computation time than the algorithm dh-group1-sha1.
Syntax In non-FIPS mode: ssh2 algorithm key-exchange dh-group-exchange-sha1 dh-group14-sha1 dh-group1-sha1 } * undo ssh2 algorithm key-exchange In FIPS mode: ssh2 algorithm key-exchange dh-group14-sha1 undo ssh2 algorithm key-exchange Default In non-FIPS mode: SSH2 uses the key exchange algorithms dh-group-exchange-sha1, dh-group14-sha1, and dh-group1-sha1 in descending order of priority for algorithm negotiation.
Syntax In non-FIPS mode: ssh2 algorithm mac { sha1 | sha1-96 | md5 | md5-96 } * undo ssh2 algorithm mac In FIPS mode: ssh2 algorithm mac { sha1 | sha1-96 } * undo ssh2 algorithm mac Default In non-FIPS mode: SSH2 uses the MAC algorithms sha1, sha1-96, md5, and md5-96 in descending order of priority for algorithm negotiation.
Page 744
Syntax In non-FIPS mode: ssh2 algorithm public-key { ecdsa | dsa | rsa } * undo ssh2 algorithm public-key In FIPS mode: ssh2 algorithm public-key { ecdsa | rsa } * undo ssh2 algorithm public-key Default In non-FIPS mode: SSH2 uses the public key algorithms ecdsa, dsa, and rsa in descending order of priority for algorithm negotiation.
SSL commands The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features, commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about FIPS mode, see Security Configuration Guide. The following matrix shows the feature and hardware compatibility: Hardware SSL compatibility MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-10-PoE/810-LM-HK/8...
ciphersuite Use ciphersuite to specify the cipher suites supported by an SSL server policy. Use undo ciphersuite to restore the default. Syntax In non-FIPS mode: ciphersuite dhe_rsa_aes_128_cbc_sha dhe_rsa_aes_256_cbc_sha exp_rsa_des_cbc_sha | exp_rsa_rc2_md5 | exp_rsa_rc4_md5 | rsa_3des_ede_cbc_sha | rsa_aes_128_cbc_sha | rsa_aes_256_cbc_sha | rsa_des_cbc_sha | rsa_rc4_128_md5 | rsa_rc4_128_sha } * undo ciphersuite In FIPS mode:...
Usage guidelines SSL employs the following algorithms: • Data encryption algorithms—Encrypt data to ensure privacy. Commonly used data encryption algorithms are usually symmetric key algorithms, such as DES_CBC, 3DES_EDE_CBC, AES_CBC, and RC4. When using a symmetric key algorithm, the SSL server and the SSL client must use the same key.
optional: Enables optional SSL client authentication. Usage guidelines SSL uses digital certificates to authenticate communicating parties. For more information about digital certificates, see Security Configuration Guide. Mandatory SSL client authentication—The SSL server requires an SSL client to submit its digital certificate for identity authentication.
Predefined user roles network-admin network-operator Parameters policy-name: Specifies an SSL client policy by its name, a case-insensitive string of 1 to 31 characters. If you do not specify a policy name, this command displays information about all SSL client policies. Examples # Display information about SSL client policy policy1.
rsa_aes_256_cbc_sha: Specifies the cipher suite that uses key exchange algorithm RSA, data encryption algorithm 256-bit AES_CBC, and MAC algorithm SHA. rsa_des_cbc_sha: Specifies the cipher suite that uses key exchange algorithm RSA, data encryption algorithm DES_CBC, and MAC algorithm SHA. rsa_rc4_128_md5: Specifies the cipher suite that uses key exchange algorithm RSA, data encryption algorithm 128-bit RC4, and MAC algorithm MD5.
Views SSL client policy view Predefined user roles network-admin Usage guidelines SSL uses digital certificates to authenticate communicating parties. For more information about digital certificates, see Security Configuration Guide. If you execute the server-verify enable command, an SSL server must send its digital certificate to the SSL client for authentication.
Examples # Set the maximum number of cached sessions to 600, and the timeout time for cached sessions to 1800 seconds. <Sysname> system-view [Sysname] ssl server-policy policy1 [Sysname-ssl-server-policy-policy1] session cachesize 600 timeout 1800 Related commands display ssl server-policy ssl client-policy Use ssl client-policy to create an SSL client policy and enter its view, or enter the view of an existing SSL client policy.
Syntax ssl renegotiation disable undo ssl renegotiation disable Default SSL session renegotiation is enabled. Views System view Predefined user roles network-admin Usage guidelines The SSL session renegotiation feature enables the SSL client and server to reuse a previously negotiated SSL session for an abbreviated handshake. Disabling session renegotiation causes more computational overhead to the system but it can avoid potential risks.
<Sysname> system-view [Sysname] ssl server-policy policy1 [Sysname-ssl-server-policy-policy1] Related commands display ssl server-policy ssl version ssl3.0 disable Use ssl version ssl3.0 disable to disable SSL 3.0 on the device. Use undo ssl version ssl3.0 disable restore the default. Syntax ssl version ssl3.0 disable undo ssl version ssl3.0 disable Default SSL 3.0 is enabled on the device.
Page 757
undo version Default The SSL protocol version for an SSL client policy is TLS 1.0. Views SSL client policy view Predefined user roles network-admin Parameters ssl3.0: Specifies SSL 3.0. tls1.0: Specifies TLS 1.0. Usage guidelines If you execute this command multiple times, the most recent configuration takes effect. You can specify SSL 3.0 or TLS 1.0 for an SSL client policy: •...
SSL VPN commands The following matrix shows the feature and hardware compatibility: Hardware SSL VPN compatibility MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-10-PoE/810-LM-HK/8 10-W-LM-HK MSR810-LMS/810-LUS MSR2600-10-X1 MSR 2630 MSR3600-28/3600-51 MSR3600-28-SI/3600-51-SI MSR3610-X1/3610-X1-DP/3610-X1-DC/3610-X1-DP-DC MSR 3610/3620/3620-DP/3640/3660 MSR5620/5660/5680 aaa domain Use aaa domain to specify an ISP domain for authentication, authorization, and accounting of SSL VPN users in an SSL VPN context.
Usage guidelines An SSL VPN username cannot carry ISP domain information. After this command is executed, an SSL VPN gateway uses the specified ISP domain for authentication, authorization, and accounting of SSL VPN users in the context. Examples # Specify ISP domain myserver for authentication, authorization, and accounting of SSL VPN users in SSL VPN context ctx1.
Default Certificate authentication is disabled. Views SSL VPN context view Predefined user roles network-admin Usage guidelines After you enable certificate authentication, you must also execute the client-verify command in SSL server policy view. The SSL VPN gateway uses the digital certificate sent by an SSL VPN client to authenticate the client's identity.
Usage guidelines A file policy rewrites a file carried in an HTTP response to a file of the type specified by this command. If the specified file type is different from that indicated by the content-type field in the HTTP response, users might not be able to read the file correctly. If you execute this command multiple times, the most recent configuration takes effect.
Default No policy group is specified as the default policy group. Views SSL VPN context view Predefined user roles network-admin Parameters group-name: Specifies the name of a policy group, a case-insensitive string of 1 to 31 characters. The specified policy group must have been created by using the policy-group command. Usage guidelines You can configure multiple policy groups for an SSL VPN context.
Usage guidelines If you execute this command multiple times, the most recent configuration takes effect. Examples # Configure a description for shortcut shortcut1. <Sysname> system-view [Sysname] sslvpn context ctx1 [Sysname-sslvpn-context-ctx1] shortcut shortcut1 [Sysname-sslvpn-context-ctx1-shortcut-shortcut1] description shortcut1 description (SSL VPN AC interface view) Use description to configure a description for an SSL VPN AC interface.
Page 764
Predefined user roles network-admin network-operator Parameters sslvpn-ac interface-number: Specifies an SSL VPN AC interface by its number in the range of 0 to 4095. If you specify the sslvpn-ac keyword without the interface-number argument, this command displays information about all SSL VPN AC interfaces. brief: Displays brief interface information.
Page 765
Field Description Bandwidth Expected bandwidth for the interface. Maximum transmission unit MTU of the interface. IP address of the interface. If no IP address is assigned to the interface, this field displays Internet protocol processing: Disabled, and the interface cannot Internet protocol processing process packets.
Field Description Interface Abbreviated interface name. Physical link state of the interface: • UP—The link is physically up. • DOWN—The link is physically down. Link • ADM—The interface has been shut down by using the shutdown command. To restore the physical state of the interface, use the undo shutdown command.
Field Description Code verification Whether code verification is enabled for the SSL VPN context. Default policy group Default policy group used by the SSL VPN context. Associated SSL VPN gateway SSL VPN gateway associated with the SSL VPN context. Domain name Domain name specified for the SSL VPN context.
Page 769
Predefined user roles network-admin network-operator Parameters brief: Displays brief SSL VPN gateway information. If you do not specify this keyword, the command displays detailed SSL VPN gateway information. name gateway-name: Specifies an SSL VPN context by its name. An SSL VPN context name is a case-insensitive string of 1 to 31 characters, and can contain only letters, digits, and underscores (_).
Field Description Causes for the Down operation status: • Administratively down—The SSL VPN gateway is disabled. To enable the gateway, use the service enable command. • Down reason VPN instance not exist—The VPN instance to which the SSL VPN gateway belongs does not exist. •...
Views Any view Predefined user roles network-admin network-operator Parameters group-name: Specifies a policy group by its name, a case-insensitive string of 1 to 31 characters. context context-name: Specifies an SSL VPN context by its name. An SSL VPN context name is a case-insensitive string of 1 to 31 characters, and can contain only letters, digits, and underscores (_).
Page 772
slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a member device, this command displays TCP port forwarding connection information for all member devices. (Centralized devices in IRF mode.) Examples # (Centralized devices in standalone mode.) Display TCP port forwarding connection information for all SSL VPN contexts <Sysname>...
display sslvpn session Use display sslvpn session to display SSL VPN session information. Syntax display sslvpn session [ context context-name ] [ user user-name | verbose ] Views Any view Predefined user roles network-admin network-operator Parameters context context-name: Specifies an SSL VPN context by its name. An SSL VPN context name is a case-insensitive string of 1 to 31 characters, and can contain only letters, digits, and underscores (_).
Page 774
Field Description Conn Number of connections in the SSL VPN session. Idle Time Duration that the SSL VPN session has been idle. Created Creation time of the SSL VPN session. User IP address IPv4 or IPv6 address used by the SSL VPN session. # Display detailed information about the SSL VPN session for SSL VPN user user1.
Table 115 Command output Field Description User SSL VPN username. Context Context to which the user belongs. Policy group Policy group used by the user. Idle timeout Idle timeout time of the SSL VPN session, in seconds. Created at Creation time of the SSL VPN session. Most recent time when the SSL VPN user accessed resources through the Lastest SSL VPN session.
Syntax emo-server address { host-name | ipv4-address } port port-number undo emo-server Default No EMO server is specified for mobile clients. Views SSL VPN context view Predefined user roles network-admin Parameters address: Specifies the host name or IPv4 address of the EMO server. host-name: Specifies the host name of the EMO server, a case-insensitive string of 1 to 127 characters.
Parameters ip-address: Specifies the destination IP address of the route. It cannot be a multicast, broadcast, or loopback address. mask: Specifies the subnet mask of the destination IP address. mask-length: Specifies the mask length of the destination IP address, an integer in the range of 0 to Usage guidelines To deny user access to specific network nodes or segments behind an SSL VPN gateway, configure exclude routes for those nodes or segments.
Usage guidelines After you configure a resource link for a port forwarding item, you can click the port forwarding name on the SSL VPN Web page to access the resource. If you execute this command for a port forwarding item multiple times, the most recent configuration takes effect.
Syntax file-policy policy-name undo file-policy policy-name Default No file policies exist. Views SSL VPN context view Predefined user roles network-admin Parameters policy-name: Specifies a file policy name, a case-insensitive string of 1 to 31 characters. Usage guidelines The SSL VPN gateway uses a file policy to rewrite the content of Web page files before forwarding them to requesting Web access users.
Usage guidelines You can specify both an advanced ACL and a URI ACL for IP access filtering. The SSL VPN gateway uses the following procedure to determine whether to forward an IP access request: Matches the request against rules in the URI ACL: If the request matches a permit rule, the gateway forwards the request.
Usage guidelines You can specify both an advanced ACL and a URI ACL for IP access filtering. The SSL VPN gateway uses the following procedure to determine whether to forward an IP access request: Matches the request against rules in the URI ACL: If the request matches a permit rule, the gateway forwards the request.
Usage guidelines You can specify both an advanced ACL and a URI ACL for TCP access filtering. For mobile client users, the SSL VPN gateway uses the following procedure to determine whether to forward a TCP access request: Matches the request against the authorized port forwarding list. If the request matches a port forwarding entry in the list, the gateway forwards the request.
Predefined user roles network-admin Parameters uri-acl-name: Specifies a URI ACL by its name, a case-insensitive string of 1 to 31 characters. The specified URI ACL must already exist. Usage guidelines You can specify both an advanced ACL and a URI ACL for TCP access filtering. For mobile client users, the SSL VPN gateway uses the following procedure to determine whether to forward a TCP access request: Matches the request against the authorized port forwarding list.
Default A user can access only the Web resources in the URL list authorized to the user. Views SSL VPN policy group view Predefined user roles network-admin Parameters ipv6: Specifies an IPv6 ACL. Do not configure this keyword if you want to specify an IPv4 ACL. acl advanced-acl-number: Specifies an advanced ACL by its number in the range of 3000 to 3999.
Syntax filter web-access uri-acl uri-acl-name undo filter web-access uri-acl Default Users can access only the Web resources authorized to them through the URL list. Views SSL VPN policy group view Predefined user roles network-admin Parameters uri-acl-name: Specifies a URI ACL by its name, a case-insensitive string of 1 to 31 characters. The specified URI ACL must already exist.
Views SSL VPN context view Predefined user roles network-admin Parameters all: Logs out all users. session session-id: Logs out all users in a session. The session-id argument specifies the session ID in the range of 1 to 4294967295. user user-name: Logs out a user. The user-name argument specifies the username, a case-sensitive string of 1 to 63 characters.
Default The heading of a URL list is Web. Views URL list view Predefined user roles network-admin Parameters string: Specifies a URL list heading, a case-insensitive string of 1 to 31 characters. Examples # Configure the heading of URL list url as urlhead. <Sysname>...
<Sysname> system-view [Sysname] sslvpn gateway gateway1 [Sysname-sslvpn-gateway-gateway1] http-redirect port 1025 include Use include to add an include route to a route list. Use undo include to delete an include route from a route list. Syntax include ip-address { mask | mask-length } undo include ip-address { mask | mask-length } Default No include routes exist.
interface sslvpn-ac Use interface sslvpn-ac to create an SSL VPN AC interface and enter its view, or enter the view of an existing SSL VPN AC interface. Use undo interface sslvpn-ac to delete an SSL VPN AC interface. Syntax interface sslvpn-ac interface-number undo interface sslvpn-ac interface-number Default No SSL VPN AC interfaces exist.
Usage guidelines A remote user uses the IPv4 address and port number configured by this command to access an SSL VPN gateway. For remote users to access the SSL VPN gateway correctly, you must specify an IPv4 address other than the default address (0.0.0.0) or the management address for the gateway. The specified IPv4 address must be the IP address of an interface on the gateway device and is reachable from clients and internal servers.
Related commands ip-tunnel access-route ip-tunnel access-route Use ip-tunnel access-route to specify the routes to be issued to clients. Use undo ip-tunnel access-route to restore the default. Syntax ip-tunnel access-route { ip-address { mask-length | mask } | force-all | ip-route-list list-name } undo ip-tunnel access-route Default No routes to be issued to clients are specified.
[Sysname-sslvpn-context-ctx1-route-list-rtlist] quit [Sysname-sslvpn-context-ctx1] policy-group pg1 [Sysname-sslvpn-context-ctx1-policy-group-pg1] ip-tunnel access-route ip-route-list rtlist Related commands ip-route-list ip-tunnel address-pool Use ip-tunnel address-pool to specify an address pool for IP access. Use undo ip-tunnel address-pool to restore the default. Syntax ip-tunnel address-pool pool-name mask { mask-length | mask } undo ip-tunnel address-pool Default No address pool is specified for IP access.
Syntax ip-tunnel dns-server { primary | secondary } ip-address undo ip-tunnel dns-server { primary | secondary } Default No DNS servers are specified for IP access. Views SSL VPN context view Predefined user roles network-admin Parameters primary: Specifies the primary DNS server. secondary: Specifies the secondary DNS server.
Examples # Specify SSL VPN AC 100 for IP access. <Sysname> system-view [Sysname] sslvpn context ctx [Sysname-sslvpn-context-ctx] ip-tunnel interface sslvpn-ac 100 Related commands interface sslvpn-ac ip-tunnel keepalive Use ip-tunnel keepalive to set the keepalive interval for IP access. Use undo ip-tunnel keepalive to restore the default. Syntax ip-tunnel keepalive seconds undo ip-tunnel keepalive...
Default No WINS servers are specified for IP access. Views SSL VPN context view Predefined user roles network-admin Parameters primary: Specifies the primary WINS server. secondary: Specifies the secondary WINS server. ip-address: Specifies the IPv4 address of the WINS server. It cannot be a multicast, broadcast, or loopback address.
Examples # Configure the IPv6 address of SSL VPN gateway gw1 as 200::1 and the port number as 8000. <Sysname> system-view [Sysname] sslvpn gateway gw1 [Sysname-sslvpn-gateway-gw1] ipv6 address 200::1 port 8000 Related commands display sslvpn gateway local-port Use local-port to configure a port forwarding instance for a port forwarding item. Use undo local-port to remove the configuration.
local-port 80 local-name 127.0.0.1 remote-server 192.168.0.213 remote-port 80 The port forwarding instance will be displayed together with the port forwarding item name on the SSL VPN Web page. In this example, tcp1 (127.0.0.1:80 -> 192.168.0.213) will be displayed. If you map a TCP service to a local host name, the TCP access client software will add the IP address corresponding to the host name to the host file hosts.
Parameters filtering: Enables resource access log filtering. With this keyword specified, the device generates only one log for accesses of the same user to the same resource in a minute. If this keyword is not specified, the device generates a log for each resource access. Usage guidelines This feature logs resource accesses of SSL VPN users.
Use logo to specify a logo to be displayed on SSL VPN webpages. Use undo logo to restore the default. Syntax logo { file file-name | none } undo logo Default The logo displayed on SSL VPN webpages is H3C. Views SSL VPN context view Predefined user roles network-admin Parameters file file-name: Specifies a logo file by its name, a case-insensitive string of 1 to 255 characters.
Examples # Specify the logo in the file flash:/mylogo.gif as the logo displayed on SSL VPN webpages. <Sysname> system-view [Sysname] sslvpn context ctx1 [Sysname-sslvpn-context-ctx1] logo file flash:/mylogo.gif max-onlines Use max-onlines to set the maximum number of concurrent logins for each account. Use undo max-onlines to restore the default.
Predefined user roles network-admin Parameters max-number: Specifies the maximum number of sessions, in the range of 1 to 1048575 Examples # Set the maximum number of sessions to 500 for SSL VPN context ctx1. <Sysname> system-view [Sysname] sslvpn context ctx1 [Sysname-sslvpn-context-ctx1] max-users 500 Related commands display sslvpn context...
Related commands sslvpn context Use mtu to set the MTU of an SSL VPN AC interface. Use undo mtu to restore the default. Syntax mtu size undo mtu Default The MTU is 1500 bytes. Views SSL VPN AC interface view Predefined user roles network-admin Parameters...
Usage guidelines During file content rewriting, the new content will replace the old content specified by using the old-content command. If the new content contains spaces, enclose the content in double quotation marks. Examples # Specify the new content in rewrite rule rule1 of file policy fp. <Sysname>...
Related commands new-content policy-group Use policy-group to create an SSL VPN policy group and enter its view, or enter the view of an existing SSL VPN policy group. Use undo policy-group to delete a policy group. Syntax policy-group group-name undo policy-group group-name Default No SSL VPN policy groups exist.
Default No port forwarding lists exist. Views SSL VPN context view Predefined user roles network-admin Parameters port-forward-name: Specifies a name for the port forwarding list, a case-insensitive string of 1 to 31 characters. Usage guidelines Port forwarding lists provide TCP access services for SSL VPN users. A port forwarding list can contain multiple port forwarding items.
Parameters item-name: Specifies a name for the port forwarding item, a case-insensitive string of 1 to 31 characters. Usage guidelines A port forwarding item defines an accessible TCP service provided on an internal server. It contains the following settings: • A port forwarding instance.
• If you specify the sslvpn-ac keyword without the interface-number argument, this command clears statistics for all existing SSL VPN AC interfaces. • If you specify both the sslvpn-ac keyword and the interface-number argument, this command clears statistics for the specified SSL VPN AC interface. Examples # Clear statistics for SSL VPN AC 1000.
Use undo resources port-forward-item to remove a port forwarding item from a port forwarding list. Syntax resources port-forward-item item-name undo resources port-forward-item item-name Default A port forwarding list does not contain any port forwarding items. Views Port forwarding list view Predefined user roles network-admin Parameters...
Parameters shortcut-name: Specifies a shortcut by its name, a case-insensitive string of 1 to 31 characters. Usage guidelines You can assign multiple shortcuts to a shortcut list. Examples # Assign shortcut list1 to shortcut list shortcut1. <Sysname> system-view [Sysname] sslvpn context ctx1 [Sysname-sslvpn-context-ctx1] shortcut shortcut1 [Sysname-sslvpn-context-ctx1-shortcut-shortcut1] quit [Sysname-sslvpn-context-ctx1] shortcut-list list1...
resources url-list Use resources url-list to specify a URL list for an SSL VPN policy group. Use undo resources url-list to remove the configuration. Syntax resources url-list url-list-name undo resources url-list Default No URL list is specified for an SSL VPN policy group. Views SSL VPN policy group view Predefined user roles...
Views File policy view Predefined user roles network-admin Parameters rule-name: Specifies a rule name, a case-insensitive string of 1 to 31 characters. Usage guidelines You can configure multiple rewrite rules in a file policy. Examples # Create a rewrite rule named rule1 and enter its view. <Sysname>...
Page 814
Table 116 URI field descriptions Field Description Protocol name. Options are: • http. • https. • protocol tcp. • udp. • icmp. • Domain name or address of a host. • Valid host address formats: IPv4 or IPv6 address. For example, 192.168.1.1. ...
service enable (SSL VPN context view) Use service enable to enable an SSL VPN context. Use undo service enable to disable an SSL VPN context. Syntax service enable undo service enable Default An SSL VPN context is disabled. Views SSL VPN context view Predefined user roles network-admin Examples...
session-connections Use session-connections to set the maximum number of connections allowed per session. Use undo session-connections to restore the default. Syntax session-connections number undo session-connections Default A maximum of 64 connections are allowed per session. Views SSL VPN context view Predefined user roles network-admin Parameters...
Usage guidelines After you create a shortcut, use the execution command to configure a resource link for it. Users can then click the shortcut name on the SSL VPN Web page to access the associated resource. Examples # Create a shortcut named shortcut1 and enter its view. <Sysname>...
Views SSL VPN AC interface view Predefined user roles network-admin Examples # Shut down SSL VPN AC 1000. <Sysname> system-view [Sysname] interface sslvpn-ac 1000 [Sysname-SSLVPN-AC1000] shutdown sms-imc address Use sms-imc address to specify an IMC server for SMS message authentication. Use undo sms-imc address to restore the default.
Syntax sms-imc enable undo sms-imc enable Default IMC SMS message authentication is disabled. Views SSL VPN context view Predefined user roles network-admin Usage guidelines Before you execute this command, make sure SMS message authentication has been configured on the IMC server. In IP access mode, the authentication process for an SSL VPN user using an iNode client is as follows: The iNode client sends a user login request to the SSL VPN gateway.
Views SSL VPN context view Predefined user roles network-admin Parameters policy-name: Specifies an SSL client policy by its name, a case-insensitive string of 1 to 31 characters. Usage guidelines You can apply only one SSL client policy to an SSL VPN context. For the applied SSL client policy to take effect, you must enable the SSL VPN context by using the service enable command.
If you execute this command multiple times, the new configuration overwrites the previous configuration, but does not take effect. For the new configuration to take effect, disable the SSL VPN gateway and then enable the SSL VPN gateway. Examples # Apply SSL server policy CA_CERT to SSL VPN gateway gw1. <Sysname>...
sslvpn gateway Use sslvpn gateway to create an SSL VPN gateway and enter its view, or enter the view of an existing SSL VPN gateway. Use undo sslvpn gateway to delete an SSL VPN gateway. Syntax sslvpn gateway gateway-name undo sslvpn gateway gateway-name Default No SSL VPN gateways exist.
Syntax sslvpn ip address-pool pool-name start-ip-address end-ip-address undo sslvpn ip address-pool pool-name Default No address pools exist. Views System view Predefined user roles network-admin Parameters pool-name: Specifies a name for the address pool, a case-insensitive string of 1 to 31 characters. start-ip-address end-ip-address: Specifies the start IP address and end IP address for the pool.
Examples # Set the idle timeout timer to 50 minutes for SSL VPN sessions. <Sysname> system-view [Sysname] sslvpn context ctx1 [Sysname-sslvpn-context-ctx1] timeout idle 50 Related commands display sslvpn policy-group title Use title to configure a title to be displayed on SSL VPN webpages. Use undo title to restore the default.
Predefined user roles network-admin Parameters uri-acl-name: Specifies a name for the URI ACL, a case-insensitive string of 1 to 31 characters. Usage guidelines A URI ACL is a set of rules that permit or deny access to resources. You can use URI ACLs for IP, TCP, and Web access filtering of SSL VPN users.
Field Description Host name or IP address of the server where the file resides. host To specify an IPv6 address, enclose the IPv6 address in brackets. For example, http://[1234::5678]:8080/a.html. Port number on which the server listens for resource access requests. port If you do not specify a port number, the default port number of the protocol is used, which is 80 for HTTP and 443 for HTTPS.
Field Description Domain name or IP address of a host. host To specify an IPv6 address, enclose the IPv6 address in brackets. For example. http://[1234::5678]:8080. Port number. port If you do not specify a port number, the default port number of the protocol is used, which is 80 for HTTP and 443 for HTTPS.
Default No URL lists exist. Views SSL VPN context view Predefined user roles network-admin Parameters name: Specifies a name for the URL list, a case-insensitive string of 1 to 31 characters. Examples # Create a URL list named url1 and enter URL list view. <Sysname>...
Use undo vpn-instance to restore the default. Syntax vpn-instance vpn-instance-name undo vpn-instance Default An SSL VPN context is associated with the public network. Views SSL VPN context view Predefined user roles network-admin Parameters vpn-instance-name: Specifies the name of a VPN instance, a case-sensitive string of 1 to 31 characters.
Page 830
Usage guidelines The VPN instance specified for an SSL VPN gateway is called a front VPN instance. You can specify only one VPN instance for an SSL VPN gateway. You can specify a nonexistent VPN instance for an SSL VPN gateway. The SSL VPN gateway does not take effect until the VPN instance is created.
ASPF commands IPv6-related parameters are not supported on the following routers: • MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-10-PoE/810-LM-HK/810-W-LM-HK/810-L MS/810-LUS. • MSR3600-28-SI/3600-51-SI. Commands and descriptions for centralized devices apply to the following routers: • MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-10-PoE/810-LM-HK/810-W-LM-HK/810-L MS/810-LUS. • MSR2600-10-X1. • MSR 2630. • MSR3600-28/3600-51. • MSR3600-28-SI/3600-51-SI. • MSR3610-X1/3610-X1-DP/3610-X1-DC/3610-X1-DP-DC.
You can apply an ASPF policy to both the inbound and outbound directions of an interface. Examples # Apply ASPF policy 1 to the outbound direction of GigabitEthernet 1/0/1. <Sysname> system-view [Sysname] interface gigabitethernet 1/0/1 [Sysname-GigabitEthernet1/0/1] aspf apply policy 1 outbound Related commands aspf policy display aspf all...
[Sysname-zone-pair-security-Trust-Untrust] aspf apply policy 1 Related commands aspf policy display aspf all zone-pair security (Fundamentals Command Reference) aspf icmp-error reply Use aspf icmp-error reply to enable the device to send ICMP error messages for packet dropping by security policies applied to zone pairs. Use undo aspf icmp-error reply to restore the default.
Views System view Predefined user roles network-admin Parameters aspf-policy-number: Assigns a number to the ASPF policy. The value range for this argument is 1 to 256. Examples # Create ASPF policy 1 and enter its view. <Sysname> system-view [Sysname] aspf policy 1 [Sysname-aspf-policy-1] Related commands display aspf all...
Page 835
rsh: Specifies Remote Shell (RSH), an application layer protocol. rtsp: Specifies Real Time Streaming Protocol (RTSP), an application layer protocol. sccp: Specifies Skinny Client Control Protocol (SCCP), an application layer protocol. sip: Specifies Session Initiation Protocol (SIP), an application layer protocol. smtp: Specifies SMTP, an application layer protocol.
display aspf all Use display aspf all to display the configuration of all ASPF policies and their applications. Syntax display aspf all Views Any view Predefined user roles network-admin network-operator Examples # Display the configuration of all ASPF policies and their applications. <Sysname>...
network-operator Parameters aspf-policy-number: Specifies the number of an ASPF policy. The value range for this argument is 1 to 256. default: Specifies the predefined ASPF policy. Examples # Display the configuration of ASPF policy 1. <Sysname> display aspf policy 1 ASPF policy configuration: Policy number: 1 ICMP error message check: Disabled...
Page 839
Predefined user roles network-admin network-operator Parameters ipv4: Displays IPv4 ASPF sessions. ipv6: Displays IPv6 ASPF sessions. slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command displays ASPF sessions on all cards. (Distributed devices in standalone mode.) slot slot-number: Specifies an IRF member device by its member ID.
Field Description • VPN-instance—MPLS L3VPN instance where the session is initiated. • VLAN ID—VLAN to which the session belongs during Layer 2 forwarding. VPN-instance/VLAN ID/Inline ID • Inline ID—Inline to which the session belongs during Layer 2 forwarding. If no VPN instance, VLAN ID, or Inline ID is specified, a hyphen (-) is displayed for each field.
tcp syn-check Use tcp syn-check to enable TCP SYN check. Use undo tcp syn-check to disable TCP SYN check. Syntax tcp syn-check undo tcp syn-check Default TCP SYN check is disabled. Views ASPF policy view Predefined user roles network-admin Usage guidelines TCP SYN check checks the first packet to establish a TCP connection whether it is a SYN packet.
APR commands IPv6-related parameters are not supported on the following routers: • MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-10-PoE/810-LM-HK/810-W-LM-HK/810-L MS/810-LUS. • MSR3600-28-SI/3600-51-SI. Commands and descriptions for centralized devices apply to the following routers: • MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-10-PoE/810-LM-HK/810-W-LM-HK/810-L MS/810-LUS. • MSR2600-10-X1. • MSR 2630. • MSR3600-28/3600-51. • MSR3600-28-SI/3600-51-SI. • MSR3610-X1/3610-X1-DP/3610-X1-DC/3610-X1-DP-DC.
<Sysname> system-view [Sysname] app-group aaa [Sysname-app-group-aaa] Related commands copy app-group description include application application statistics enable Use application statistics enable to enable the application statistics feature on the specified direction of an interface. Use undo application statistics enable to disable the application statistics feature on the specified direction of an interface.
<Sysname> system-view [Sysname] interface gigabitethernet 1/0/2 [Sysname-GigabitEthernet1/0/2] application statistics enable outbound # Enable application statistics in the inbound and outbound directions of GigabitEthernet 1/0/3. <Sysname> system-view [Sysname] interface gigabitethernet 1/0/3 [Sysname-GigabitEthernet1/0/3] application statistics enable Related commands display application statistics apr set detectlen Use apr set detectlen to set the maximum detected length for an NBAR rule.
The following matrix shows the command and hardware compatibility: Hardware Command compatibility MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-10-PoE/810-LM -HK/810-W-LM-HK MSR810-LMS/810-LUS MSR2600-10-X1 MSR 2630 MSR3600-28/3600-51 MSR3600-28-SI/3600-51-SI MSR3610-X1/3610-X1-DP/3610-X1-DC/3610-X1-DP-DC MSR 3610/3620/3620-DP/3640/3660 MSR5620/5660/5680 Use this command to update the APR signature database if the device can access the signature database services at the H3C website.
APR signature file. This command is independent of the apr signature auto-update command. Use this command to update the APR signature database if you find a new version of APR signature database at the H3C website. Examples # Manually trigger an automatic update for the APR signature database.
apr signature rollback Use apr signature rollback to roll back the APR signature database. Syntax apr signature rollback { factory | last } Views System view Predefined user roles network-admin Parameters factory: Rolls back the APR signature database to the factory version. last: Rolls back the APR signature database to the last version.
Page 853
MSR 3610/3620/3620-DP/3640/3660 MSR5620/5660/5680 Use this command to update APR signature database if the device cannot access the signature database services at the H3C website. You can use either of the following methods to manually update the APR signature database: •...
Page 854
Update scenario Format of file-path Remarks The update file is stored in a different directory on the same path/filename storage medium. Before updating the signature database, you must first use the cd command to open the root directory of the storage medium where the file is The update file is stored on a path/filename stored.
<Sysname> system-view [Sysname] apr signature update ftp://user%3A123:user%40abc%2F123@192.168.0.10/apr-1.0.2-en.dat # Manually update the APR signature database by using an APR signature file stored on the device, The file is stored in directory cfa0:/apr-1.0.23-en.dat. In this example, the working directory is cfa0:. <Sysname> system [Sysname] apr signature update apr-1.0.23-en.dat # Manually update the APR signature database by using an APR signature file stored on the device, The file is stored in directory cfa0:/dpi/apr-1.0.23-en.dat.
description (application group view) Use description to configure a description for an application group. Use undo description to restore the default. Syntax description text undo description Default An application group is described as "User-defined application group". Views Application group view Predefined user roles network-admin Parameters...
Parameters text: Specifies a description, a case-sensitive string of 1 to 127 characters. Usage guidelines The following matrix shows the command and hardware compatibility: Hardware Command compatibility MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-10-PoE/810-LM -HK/810-W-LM-HK MSR810-LMS/810-LUS MSR2600-10-X1 MSR 2630 MSR3600-28/3600-51 MSR3600-28-SI/3600-51-SI MSR3610-X1/3610-X1-DP/3610-X1-DC/3610-X1-DP-DC MSR 3610/3620/3620-DP/3640/3660 MSR5620/5660/5680 Configure descriptions for different user-defined NBAR rules for identification and management purposes.
Parameters ip ipv4-address: Specifies a destination IPv4 address or IPv4 subnet, in dotted decimal notation. mask-length: Specifies the mask length for IPv4 addresses, in the range of 0 to 32. ipv6 ipv6-address: Specifies a destination IPv6 address or IPv6 subnet. prefix-length: Specifies the prefix length for IPv6 addresses, in the range of 0 to 128.
Views NBAR rule view Predefined user roles network-admin Parameters to-client: Specifies the direction from server to client. to-server: Specifies the direction from client to server. Usage guidelines The following matrix shows the command and hardware compatibility: Hardware Command compatibility MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-10-PoE/810-LM -HK/810-W-LM-HK MSR810-LMS/810-LUS MSR2600-10-X1...
Views NBAR rule view Predefined user roles network-admin Usage guidelines The following matrix shows the command and hardware compatibility: Hardware Command compatibility MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-10-PoE/810-LM -HK/810-W-LM-HK MSR810-LMS/810-LUS MSR2600-10-X1 MSR 2630 MSR3600-28/3600-51 MSR3600-28-SI/3600-51-SI MSR3610-X1/3610-X1-DP/3610-X1-DC/3610-X1-DP-DC MSR 3610/3620/3620-DP/3640/3660 MSR5620/5660/5680 Use this command to disable a user-defined NBAR rule if the following conditions exist: •...
Page 861
Parameters name group-name: Specifies an application group by its name. The group-name argument is a case-insensitive string of 1 to 63 characters. The names invalid and other are not allowed. If you do not specify any parameters, this command displays information about all application groups. Examples # Display information about all application groups.
Field Description Number of predefined application groups in the application group. pre-defined app-group count This field is not supported in the current software version. List of predefined application groups. Include pre-defined app-group list This field is not supported in the current software version.
Field Description Application protocol type: • Type Pre-defined. • User-defined. App ID/Application ID ID of the application protocol. Whether or not the protocol is a tunnel protocol: • Tunnel Yes. • Whether or not the protocol is a cryptographic protocol: •...
Page 866
slot slot-number: Specifies a card by its slot number. This option is available only for global interfaces, such as VLAN and tunnel interface. (Distributed devices in standalone mode.) slot slot-number: Specifies an IRF member by its member ID. This option is available only for global interfaces, such as VLAN and tunnel interface.
Field Description Bytes Number of bytes received or sent by the interface. Packets received or sent per second. Bytes received or sent per second. Related commands app-group application statistics enable display application statistics top Use display application statistics top to display statistics for application protocols on an interface in descending order, based on the specified criteria.
Page 869
argument represents the slot number of the card. This option is available only for global interfaces, such as VLAN and tunnel interface. (Distributed devices in IRF mode.) Usage guidelines This command displays application statistics only after the application statistics feature is enabled on the specified interface.
# Display the top three application protocols that have received and sent the most bytes per second on GigabitEthernet 1/0/1. <Sysname> display application statistics top 3 bps interface gigabitethernet 1/0/1 Interface : GigabitEthernet1/0/1 Application In/Out Packets Bytes appaaaaasg 190023111111111111 252334402111111111 2342222222 9411222222 170034...
Application Protocol Port tacacs-ds net-bios-dgm 137, 138, 139 137, 138, 139 tftp Table 128 Command output Field Description Application Application protocol using the port mapping. Protocol Transport layer protocol. Port Port number of the application protocol. Related commands display port-mapping port-mapping display port-mapping user-defined Use display port-mapping user-defined to display information about the user-defined port...
IPv4 subnet 10.10.10.1/24 SCTP IPv6 host 2000:fdb8::1:00ab:853c:39ab HTTP IPv4 ACL 2002 HTTP SCTP IPv6 ACL 2002 Table 129 Command output Field Description Application Application protocol using port mapping. Port Port number to which the application protocol is mapped. Protocol Transport layer protocol. Match types: •...
Predefined user roles network-admin Parameters application-name: Specifies an application protocol by its name, a case-insensitive string of 1 to 63 characters. The names invalid and other are not allowed. Usage guidelines Execute this command multiple times to add multiple predefined or user-defined application protocols to an application group.
http: Specifies HTTP packets to which the NBAR rule is applied. tcp: Specifies TCP packets to which the NBAR rule is applied. udp: Specifies UDP packets to which the NBAR rule is applied. Usage guidelines The following matrix shows the command and hardware compatibility: Hardware Command compatibility MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-10-PoE/810-LM...
Default If the APR signature database is automatically updated at a regular basis, the current APR signature file is not overwritten for an update operation. Instead, the device will back up the current APR signature file. Views Auto-update configuration view Predefined user roles network-admin Usage guidelines...
Default An application protocol is mapped to a well-known port. Views System view Predefined user roles network-admin Parameters application application-name: Specifies an application protocol by its name, a case-insensitive string of 1 to 63 characters. The names invalid and other are not allowed. port port-number: Specifies a port by its number, in the range of 0 to 65535.
Default An application protocol is mapped to a well-known port. Views System view Predefined user roles network-admin Parameters application application-name: Specifies an application protocol by its name, a case-insensitive string of 1 to 63 characters. The names invalid and other are not allowed. port port-number: Specifies a port by its number in the range of 0 to 65535.
Page 879
undo port-mapping application application-name port port-number [ protocol protocol-name ] host { ip | ipv6 } start-ip-address [ end-ip-address ] [ vpn-instance vpn-instance-name ] Default An application protocol is mapped to a well-known port. Views System view Predefined user roles network-admin Parameters application application-name: Specifies an application protocol by its name, a case-insensitive...
Usage guidelines APR uses subnet-based host-port mappings to recognize packets. A packet is recognized as an application protocol packet when it matches all the following conditions in a mapping: • The packet is destined for the specified IP subnet in the mapping. •...
service-port Use service-port to specify a port number or a port range as a match criterion in a user-defined NBAR rule. Use undo service-port to restore the default. Syntax service-port { port-num | range start-port end-port } undo service-port Default A user-defined NBAR rule matches packets of all port numbers.
Hardware Command compatibility MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-10-PoE/810-LM -HK/810-W-LM-HK MSR810-LMS/810-LUS MSR2600-10-X1 MSR 2630 MSR3600-28/3600-51 MSR3600-28-SI/3600-51-SI MSR3610-X1/3610-X1-DP/3610-X1-DC/3610-X1-DP-DC MSR 3610/3620/3620-DP/3640/3660 MSR5620/5660/5680 You can repeat this command to configure multiple signatures of different match patterns in a user-defined NBAR rule, and all signatures take effect. The logical relation of these signatures is OR, which indicates that a packet that matches any signature matches the NBAR rule.
Parameters ip ipv4-address: Specifies a source IPv4 address or IPv4 subnet, in dotted decimal notation. mask-length: Specifies the mask length for IPv4 addresses, in the range of 0 to 32. ipv6 ipv6-address: Specifies a source IPv6 address or IPv6 subnet. prefix-length: Specifies the prefix length for IPv6 addresses, in the range of 0 to 128.
Page 886
Default The device automatically updates the APR signature database between 02:01:00 to 04:01:00 every day. Views Auto-update configuration view Predefined user roles network-admin Parameters daily: Specifies the daily update interval. weekly: Specifies the weekly update interval. You can specify one day in a week for the update: •...
Page 887
Examples # Configure the device to automatically update the APR signature database at 23:10:00 every Monday with a tolerance time of 10 minutes. <Sysname> system-view [Sysname] apr signature auto-update [Sysname-apr-autoupdate] update schedule weekly mon start-time 23:10:00 tingle 10 Related commands apr signature auto-update...
Session management commands IPv6-related parameters are not supported on the following routers: • MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-10-PoE/810-LM-HK/810-W-LM-HK/810-L MS/810-LUS. • MSR3600-28-SI/3600-51-SI. Commands and descriptions for centralized devices apply to the following routers: • MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-10-PoE/810-LM-HK/810-W-LM-HK/810-L MS/810-LUS. • MSR2600-10-X1. • MSR 2630. • MSR3600-28/3600-51. • MSR3600-28-SI/3600-51-SI. •...
Views Any view Predefined user roles network-admin network-operator Examples # Display the aging time for sessions in different protocol states. <Sysname> display session aging-time state State Aging Time(s) TCP-EST 3600 UDP-OPEN UDP-READY ICMP-REQUEST ICMP-REPLY RAWIP-OPEN RAWIP-READY UDPLITE-OPEN UDPLITE-READY DCCP-REQUEST DCCP-EST 3600 DCCP-CLOSEREQ SCTP-INIT...
Page 891
Distributed devices in standalone mode/centralized devices in IRF mode: display session relation-table { ipv4 | ipv6 } [ slot slot-number ] Distributed devices in IRF mode: display session relation-table { ipv4 | ipv6 } [ chassis chassis-number slot slot-number ] Views Any view Predefined user roles...
Field Description Total entries found Total number of found relation entries. display session statistics ipv4 Use display session statistics ipv4 to display IPv4 unicast session statistics. Syntax Centralized devices in standalone mode: display session statistics ipv4 { source-ip source-ip | destination-ip destination-ip | protocol { dccp | icmp | raw-ip | sctp | tcp | udp | udp-lite } | source-port source-port | destination-port destination-port } * Distributed devices in standalone mode/centralized devices in IRF mode:...
Page 894
argument represents the slot number of the card. If you do not specify a card, this command displays IPv4 unicast session statistics for all cards. (Distributed devices in IRF mode.) Examples # Display statistics for unicast sessions from IP address 111.15.111.66. <Sysname>...
Page 897
Syntax Centralized devices in standalone mode: display session statistics [ summary ] Distributed devices in standalone mode/centralized devices in IRF mode: display session statistics [ summary ] [ slot slot-number ] Distributed devices in IRF mode: display session statistics [ summary ] [ chassis chassis-number slot slot-number ] Views Any view Predefined user roles...
Page 898
Past 30 days: 0/s Current relation-table entries: 0 Session establishment rate: 0/s TCP: UDP: ICMP: ICMPv6: UDP-Lite: SCTP: DCCP: RAWIP: Received TCP 0 packets 0 bytes Received UDP 118 packets 13568 bytes Received ICMP 105 packets 8652 bytes Received ICMPv6 0 packets 0 bytes Received UDP-Lite :...
Page 899
Field Description The average number of sessions per second in the most recent Past 30 days 30 days. History average session establishment History statistics of average session establishment rates. rate The average session establishment rate in the most recent Past hour hour.
Field Description Sessions Total number of unicast sessions. Number of TCP unicast sessions. Number of UDP unicast sessions. Rate Rate of unicast session creation. TCP rate Rate of TCP unicast session creation. UDP rate Rate of UDP unicast session creation. display session statistics multicast Use display session statistics multicast to display multicast session statistics.
Page 903
verbose: Displays detailed information about IPv4 unicast session entries. If you do not specify this keyword, the command displays brief information about IPv4 unicast session entries. Usage guidelines If you do not specify any parameters, this command displays all IPv4 unicast session entries. Examples # (Centralized devices in standalone mode.) Display brief information about all IPv4 unicast session entries.
Start time: 2011-07-29 19:12:33 TTL: 55s Initiator->Responder: 1 packets 60 bytes Responder->Initiator: 0 packets 0 bytes Total sessions found: 2 Table 138 Command output Field Description Initiator Information about the unicast session from the initiator to the responder. Responder Information about the unicast session from the responder to the initiator. Address of the DS-Lite tunnel peer.
Page 908
Usage guidelines If you do not specify any parameters, this command displays all IPv6 unicast session entries. Examples # (Centralized devices in standalone mode.) Display brief information about all IPv6 unicast session entries. <Sysname> display session table ipv6 Slot 0: Initiator: Source IP/port: 2011::2/58473...
Page 909
Inbound interface: GigabitEthernet1/0/2 Source security zone: Local State: ICMPV6_REQUEST Application: OTHER Start time: 2011-07-29 19:23:41 TTL: 55s Initiator->Responder: 1 packets 104 bytes Responder->Initiator: 0 packets 0 bytes Total sessions found: 1 # (Distributed devices in standalone mode/centralized devices in IRF mode.) Display detailed information about all IPv6 unicast session entries.
Field Description MPLS L3VPN instance to which the unicast session belongs. VLAN and inline to which the unicast session belongs during Layer 2 VPN instance/VLAN ID/Inline forwarding. If a parameter is not specified, a hyphens (-) is displayed for the proper field.
Page 911
[ protocol { dccp | icmp | raw-ip | sctp | tcp | udp | udp-lite } ] [ source-port source-port ] [ destination-port destination-port ] [ verbose ] Views Any view Predefined user roles network-admin network-operator Parameters slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command displays information for all cards.
Page 912
Inbound interface: GigabitEthernet1/0/1 Outbound interface list: GigabitEthernet1/0/2 GigabitEthernet1/0/3 Total sessions found: 3 # (Distributed devices in standalone mode/centralized devices in IRF mode.) Display brief information about all IPv4 multicast session entries. <Sysname> display session table multicast ipv4 Slot 0: Total sessions found: 0 Slot 1: Total sessions found: 0 Slot 2:...
Field Description Inbound interface Inbound interface of the first packet from the initiator to responder. Outbound interface Outbound interface of the first packet from the initiator to responder. Outbound interface list Outbound interfaces of the first packet from the initiator to responder. Security zone to which the inbound interface belongs.
Page 917
argument represents the slot number of the card. If you do not specify a card, this command displays information for all cards. (Distributed devices in IRF mode.) source-ip start-source-ip [ end-source-ip ]: Specifies a source IPv6 address or IPv6 address range for a multicast session from the initiator to the responder.
Page 918
Inbound initiator: Source IP/port: 3::4/1617 Destination IP/port: FF0E::1/1025 DS-Lite tunnel peer: - VPN instance/VLAN ID/Inline ID: -/-/- Protocol: UDP(17) Inbound interface: GigabitEthernet1/0/1 Outbound interface list: GigabitEthernet1/0/2 GigabitEthernet1/0/3 Total sessions found: 3 # (Centralized devices in standalone mode.) Display detailed information about all IPv6 multicast session entries.
Field Description Application layer protocol, FTP or DNS. Application If it is an unknown protocol identified by an unknown port, this field displays OTHER. Start time Time when the multicast session was created. Remaining lifetime of the multicast session, in seconds. Inbound interface Inbound interface of the first packet from the initiator to responder.
argument represents the slot number of the card. If you do not specify a card, this command clears relation entries for all cards. (Distributed devices in IRF mode.) Usage guidelines If you do not specify the IPv4 keyword or the IPv6 keyword, this command clears all IPv4 and IPv6 relation entries.
Predefined user roles network-admin Parameters slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command clears unicast session entries for all cards. (Distributed devices in standalone mode.) slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a member device, this command clears unicast session entries for all member devices.
slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a member device, this command clears information for all member devices. (Centralized devices in IRF mode.) chassis chassis-number slot slot-number: Specifies a card on a member device. The chassis-number argument represents the member ID of the IRF member device.
udp-lite } ] [ source-port source-port ] [ destination-port destination-port ] [ vpn-instance vpn-instance-name ] Views User view Predefined user roles network-admin Parameters slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command clears information for all cards.
Examples # Clear all IPv6 multicast session entries. <Sysname> reset session table multicast ipv6 # Clear the IPv6 multicast session entries with the source IP address of 2011::0002. <Sysname> reset session table multicast ipv6 source-ip 2011::0002 Related commands display session table multicast ipv6 session aging-time application Use session aging-time application to set the aging time for sessions of an application layer protocol or an application.
nbar application port-mapping port-mapping acl port-mapping host port-mapping subnet session aging-time state session persistent acl session aging-time state Use session aging-time state to set the aging time for the sessions in a protocol state. Use undo session aging-time state to restore the default for the sessions in a protocol state. If you do not specify a protocol state, this command restores all aging time for sessions in different protocol states to the default.
syn: Specifies the TCP SYN-SENT and SYN-RCV states. tcp-close: Specifies the TCP CLOSE state. tcp-est: Specifies the TCP ESTABLISHED state. tcp-time-wait: Specifies the TCP TIME-WAIT state. udp-open: Specifies the UDP OPEN state. udp-ready: Specifies the UDP READY state. time-value: Specifies the aging time in seconds. The value range is 1 to 100000. Usage guidelines This command sets the aging time for stable sessions of the application layer protocols that are not supported by the session aging-time application command.
If you execute this command multiple times, the most recent configuration takes effect. Examples # Configure the device to output session logs on a per-10-mega-packet basis. <Sysname> system-view [Sysname] session statistics enable [Sysname] session log packets-active 10 Related commands session log enable session statistics enable session log enable Use session log enable to enable session logging.
Usage guidelines For the device to output a session log when a session entry is created, make sure both session logging and logging for session creation are enabled. Examples # Enable logging for session creation. <Sysname> system-view [Sysname] session log flow-begin Related commands session log enable session log flow-end...
Views System view Predefined user roles network-admin Parameters time-value: Specifies the interval in minutes. The value range for the time-value argument is 10 to 120 and the value must be integer times of 10. Usage guidelines If you set both time-based and traffic-based logging, the device outputs a session log when whichever is reached.
For a TCP session in ESTABLISHED state, the priority of the aging time is as follows: • Aging time for persistent sessions. • Aging time for sessions of application layer protocols. • Aging time for sessions in different protocol states. A never-age-out session is not removed until the device receives a connection close request from the initiator or responder, or you manually clear the session entries.
session statistics enable Use session statistics enable to enable session statistics collection for software fast forwarding. Use undo session statistics enable to disable session statistics collection for software fast forwarding. Syntax session statistics enable undo session statistics enable Default Session statistics collection is disabled for software fast forwarding. Views System view Predefined user roles...
Connection limit commands IPv6-related parameters are not supported on the following routers: • MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-10-PoE/810-LM-HK/810-W-LM-HK/810-L MS/810-LUS. • MSR3600-28-SI/3600-51-SI. Commands and descriptions for centralized devices apply to the following routers: • MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-10-PoE/810-LM-HK/810-W-LM-HK/810-L MS/810-LUS. • MSR2600-10-X1. • MSR 2630. • MSR3600-28/3600-51. • MSR3600-28-SI/3600-51-SI. •...
<Sysname> system-view [Sysname] connection-limit policy 1 [Sysname-connlmt-policy-1] # Create IPv6 connection limit policy 12 and enter its view. <Sysname> system-view [Sysname] connection-limit ipv6-policy 12 [Sysname-connlmt-ipv6-policy-12] Related commands connection-limit apply connection-limit apply global display connection-limit limit connection-limit apply Use connection-limit apply to apply a connection limit policy to an interface. Use undo connection-limit apply to remove the application.
Related commands connection-limit limit connection-limit apply global Use connection-limit apply global to apply a connection limit policy globally. Use undo connection-limit apply global to remove the application. Syntax connection-limit apply global { ipv6-policy | policy } policy-id undo connection-limit apply global { ipv6-policy | policy } Default No connection limit policy is applied globally.
undo description Default A connection limit policy does not have a description. Views IPv4 connection limit policy view IPv6 connection limit policy view Predefined user roles network-admin Parameters text: Specifies a description, a case-sensitive string of 1 to 127 characters. Usage guidelines If you execute this command multiple times, the most recent configuration takes effect.
Related commands connection-limit connection-limit apply connection-limit apply global limit display connection-limit ipv6-stat-nodes Use display connection-limit ipv6-stat-nodes to display statistics about IPv6 connections that match connection limit rules globally or on an interface. Syntax Centralized devices in standalone mode: display connection-limit ipv6-stat-nodes { global | interface interface-type interface-number } [ destination destination-ip | service-port port-number | source source-ip ] * [ count ] Distributed devices in standalone mode/centralized devices in IRF mode: display connection-limit ipv6-stat-nodes { global | interface interface-type interface-number }...
Page 949
count: Displays only the number of limit rule-based statistics sets. Detailed information about the specified IPv6 connections is not displayed. If you do not specify this keyword, the command displays detailed information about the specified IPv6 connections that match connection limit rules. Usage guidelines The statistics for connections that match connection limit rules include the following information: •...
Page 950
DS-Lite tunnel peer : 9876543210 Service : tcp/12345 Limit rule ID : 12345(ACL: 3184) Sessions threshold Hi/Lo: 1000000/90000 Sessions count : 150000 Sessions limit rate New session flag : Permit # (Distributed devices in standalone mode.) Display statistics about all IPv6 connections that match the connection limit rule on VLAN-interface 10 on the card in slot 2.
Page 951
Sessions threshold Hi/Lo: 2000/1500 Sessions count : 1988 Sessions limit rate New session flag : Permit # (Centralized devices in standalone mode.) Display the number of limit rule-based statistics sets by source IP address 2::1. <Sysname> display connection-limit ipv6-stat-nodes global source 2::1 count Current limit statistic nodes count is 16.
Field Description Whether or not new connections can be created: • Permit—New connections can be created. • Deny—New connections cannot be created. New session flag NOTE: When the number of connections reaches the upper limit, this field displays Permit although new connections are not allowed. This field displays Deny only when the number of connections exceeds the upper limit.
argument represents the slot number of the card. This option is available only when you specify the global keyword or specify a virtual interface, such as a VLAN interface or tunnel interface. (Distributed devices in IRF mode.) Examples # (Centralized devices in standalone mode.) Display the global connection limit statistics. <Sysname>...
Page 955
Hardware Option compatibility MSR810/810-W/810-W-DB/810-LM/810-LMS/810-LUS /810-W-LM/810-10-PoE/810-LM-HK/810-W-LM-HK MSR810-LMS/810-LUS MSR2600-10-X1 MSR 2630 MSR3600-28/3600-51 MSR3600-28-SI/3600-51-SI MSR3610-X1/3610-X1-DP/3610-X1-DC/3610-X1-DP-DC MSR 3610/3620/3620-DP/3640/3660 MSR5620/5660/5680 count: Displays only the number of limit rule-based statistics sets. Detailed information about the specified IPv4 connections is not displayed. If you do not specify this keyword, the command displays detailed information about the specified IPv4 connections that match connection limit rules.
Page 956
Service : tcp/12345 Limit rule ID : 12345(ACL: 3001) Sessions threshold Hi/Lo: 1100000/980000 Sessions count : 1050000 Sessions limit rate New session flag : Permit # (Centralized devices in standalone mode.) Display statistics about all IPv4 connections that match the connection limit rule on VLAN-interface 2. <Sysname>...
Page 957
DS-Lite tunnel peer : -- Service : icmp/0 Limit rule ID : 7(ACL: 3102) Sessions threshold Hi/Lo: 4000/3800 Sessions count : 1001 Sessions limit rate New session flag : Permit # (Distributed devices in IRF mode.) Display statistics about IPv4 connections that match the connection limit rule on GigabitEthernet 1/2/0/2.
Field Description MPLS L3VPN instance to which the IP address belongs. Two hyphens (--) VPN instance indicates that the IP address is on the public network. Peer IP address of the DS-Lite tunnel. Two hyphens (--) indicates that the DS-Lite tunnel peer connection does not belong to a DS-Lite tunnel.
Page 959
Views IPv4 connection limit policy view IPv6 connection limit policy view Predefined user roles network-admin Parameters limit-id: Specifies a connection limit rule by its ID. The value range for this argument is 1 to 256. acl: Specifies the ACL that matches the user range. Only the user connections that match the ACL are limited.
Page 960
description text: Specifies a description for the connection limit rule, a case-sensitive string of 1 to 127 characters. By default, a connection limit rule does not have a description. Usage guidelines Each connection limit policy can define multiple rules. Each rule must specify the used ACL, rule type, and either of upper/lower connection limit and connection establishment rate limit.
[Sysname-connlmt-ipv6-policy-12] limit 2 acl ipv6 2001 per-destination amount 200 100 rate 10 Verify that when the connection number exceeds 200, new connections cannot be established until the connection number goes below 100. (Details not shown.) Related commands connection-limit display connection-limit reset connection-limit statistics Use reset connection-limit statistics to clear the connection limit statistics globally or on an interface.
Page 962
# (Centralized devices in standalone mode.) Clear the connection limit statistics on VLAN-interface <Sysname> reset connection-limit statistics interface vlan-interface 2 # (Distributed devices in standalone mode.) Clear the global connection limit statistics on the card in slot 2. <Sysname> reset connection-limit statistics global slot 2 # (Centralized devices in IRF mode.) Clear the global connection limit statistics on IRF member device 2.
Object group commands The following matrix shows the feature and hardware compatibility: Hardware Object group compatibility MSR810/810-W/810-W-DB/810-LM/810-W-LM/810- 10-PoE/810-LM-HK/810-W-LM-HK MSR810-LMS/810-LUS MSR2600-10-X1 MSR 2630 MSR3600-28/3600-51 MSR3600-28-SI/3600-51-SI MSR3610-X1/3610-X1-DP/3610-X1-DC/3610-X1-D P-DC MSR 3610/3620/3620-DP/3640/3660 MSR5620/5660/5680 IPv6-related parameters are not supported on the following routers: • MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-10-PoE/810-LM-HK/810-W-LM-HK. •...
display object-group Use display object-group to display information about object groups. Syntax display object-group [ { { ip | ipv6 } address | service | port } [ default ] [ name object-group-name ] | name object-group-name ] Views Any view Predefined user roles network-admin network-operator...
10 port range 20 30 20 port group-object obj7 Service object-group obj5: 0 object(in use) Service object-group obj6: 6 objects(out of use) 0 service 200 10 service tcp source lt 50 destination range 30 40 20 service udp source range 30 40 destination gt 30 30 service icmp 20 20 40 service icmpv6 20 20 50 service group-object obj5...
• The system supports a maximum of five object group hierarchy layers. For example, if groups 1, 2, 3, and 4 use groups 2, 3, 4, and 5, respectively, group 5 cannot use another group and group 1 cannot be used by another group. Examples # Configure an IPv4 address object with the host address of 192.168.0.1.
Page 968
Predefined user roles network-admin Parameters object-id: Specifies an object ID in the range of 0 to 4294967294. If you do not configure an object ID, the system automatically assigns the object a multiple of 10 next to the greatest ID being used. For example, if the greatest ID is 22, the system automatically assigns 30.
# Configure an IPv6 address object with the IPv6 address of 1:1:1::1 and prefix length of 24. <Sysname> system-view [Sysname] object-group ipv6 address ipv6group [Sysname-obj-grp-ipv6-ipv6group] network subnet 1:1:1::1 24 # Configure an IPv6 address object with the address range of 1:1:1::1 to 1:1:1::100 <Sysname>...
Hardware Command compatibility MSR 3610/3620/3620-DP/3640/3660 MSR5620/5660/5680 You can execute this command multiple times to exclude multiple IPv4 or IPv6 addresses from an address object. Examples # Configure an IPv4 address object with the IPv4 address of 192.166.0.0 and mask of 255.255.0.0, and exclude IPv4 address 192.166.0.10 from the address object.
• If the specified group does not exist, the system creates a new object group and enters the object group view. • If the specified group exists but the group type is different from that in the command, the command fails. The undo object-group command execution results vary with the specified object group.
Examples # Rename object group ipgroup1 to ipgroup2. <Sysname> system-view [Sysname] object-group rename ipgroup1 ipgroup2 Related commands object-group port (port object group view) Use port to configure a port object. Use undo port to delete a port object. Syntax [ object-id ] port { { eq | lt | gt } port | range port1 port2 | group-object object-group-name } undo port { { eq | lt | gt } port | range port1 port2 | group-object object-group-name } undo object-id Default...
Page 973
• If the value of port is in the range of 2 to 65535, the system configures the object with a port number range of [0, port–1]. When you use the gt port option, follow these guidelines: • The value of port cannot be 65535. •...
service (service object group view) Use service to configure a service object. Use undo service to delete a service object. Syntax [ object-id ] service { protocol [ { source { { eq | lt | gt } port | range port1 port2 } | destination { { eq | lt | gt } port | range port1 port2 } } * | icmp-type icmp-code | icmpv6-type icmpv6-code ] | group-object object-group-name } undo service { protocol [ { source { { eq | lt | gt } port | range port1 port2 } | destination { { eq | lt |...
Page 975
When you use the lt port option, follow these guidelines: • The value of port cannot be 0. • If the value of port is 1, the system configures the object with a port number of 0. • If the value of port is in the range of 2 to 65535, the system configures the object with a port number range of [0, port–1].
Object policy commands The following matrix shows the feature and hardware compatibility: Hardware Object group compatibility MSR810/810-W/810-W-DB/810-LM/810-W-LM/810- 10-PoE/810-LM-HK/810-W-LM-HK MSR810-LMS/810-LUS MSR2600-10-X1 MSR 2630 MSR3600-28/3600-51 MSR3600-28-SI/3600-51-SI MSR3610-X1/3610-X1-DP/3610-X1-DC/3610-X1-D P-DC MSR 3610/3620/3620-DP/3640/3660 MSR5620/5660/5680 IPv6-related parameters are not supported on the following routers: • MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-10-PoE/810-LM-HK/810-W-LM-HK. •...
Default Rule matching acceleration is disabled for an object policy. Views Object policy view Predefined user roles network-admin Usage guidelines Insufficient hardware resources cause acceleration failures. When the system has sufficient hardware resources, acceleration can take effect again under either of the following conditions: •...
Examples # Configure the description as zone-pair security office to library for an IPv4 address object policy. <Sysname> system-view [Sysname] object-policy ip permit [Sysname-object-policy-ip-permit] description zone-pair security office to library Related commands display object-policy ip display object-policy ipv6 display object-policy accelerate Use display object-policy accelerate to display acceleration information for object policies.
Object-policy ip a Object-policy ip c # Display detailed acceleration information for IPv4 object policy a. <Sysname> display object-policy accelerate verbose ip a Object-policy ip a rule 1 drop rule 0 pass (failed) Table 147 Command output Field Description failed Rule matching acceleration and rule matching failed.
Field Description Rule matching acceleration is enabled for the IPv4 object Object-policy accelerated policy. Statement of rule 5. The value of sourceip is the name of the rule 5 pass source-ip sourceip source IPv4 address object group. rule 5 comment This rule is used for Description of rule 5.
Field Description rule 5 comment This rule is used for Description of rule 5. source-ip sourceipv6 display object-policy statistics zone-pair security Use display object-policy statistics zone-pair security to display statistics for the object policies applied to a zone pair. Syntax display object-policy statistics zone-pair security source source-zone-name destination destination-zone-name [ ip | ipv6 ] Views...
Field Description The rule has matched x packets, a total of y bytes. This field is displayed only when the following conditions exist: • x packets,y bytes The counting or logging keyword is specified in the rule command. • The rule has been matched. Related commands reset object-policy statistics display object-policy zone-pair security...
move rule Use move rule to change the rule match order of a rule in an object policy. Syntax move rule rule-id before insert-rule-id Views Object policy view Predefined user roles network-admin Parameters rule-id: Specifies a rule by its ID in the range of 0 to 65534. insert-rule-id: Specifies the ID of the target rule before which a rule is inserted.
Predefined user roles network-admin Parameters object-policy-name: Specifies an IPv4 object policy by its name, a case-insensitive string of 1 to 63 characters. Usage guidelines If the specified object policy does not exist, this command fails. You can apply only one IPv4 object policy to each zone pair. To apply a new IPv4 object policy to an instance, remove the application of the existing IPv4 object policy.
object-policy ipv6 Use object-policy ipv6 to configure an IPv6 object policy and enter its view, or enter the view of an existing IPv6 object policy. Use undo object-policy ipv6 to delete an IPv6 object policy. Syntax object-policy ipv6 object-policy-name undo object-policy ipv6 object-policy-name Default No IPv6 object policies exist.
Parameters source source-zone-name: Specifies the source security zone name, a case-insensitive string of 1 to 31 characters. destination destination-zone-name: Specifies destination security zone name, case-insensitive string of 1 to 31 characters. ip: Clears statistics for IPv4 object policies. ipv6: Clears statistics for IPv6 object policies. Usage guidelines If you do not specify a zone pair, the system clears statistics for the object policies applied to all zone pairs.
Page 988
inspect app-profile-name: Applies a DPI application profile to the packets that match the rule. The app-profile-name argument represents the DPI profile name, a case-insensitive string of 1 to 100 characters. The string can contain only letters, digits, and underscores (_). The following matrix shows the inspect app-profile-name option and hardware compatibility: Hardware Option compatibility...
If you specify a nonexistent object group in a rule, the command creates the specified object group with empty configuration. A rule that contains an object group with empty configuration does not match any packets. If you do not specify any options in the undo rule command, the command deletes the entire rule. Otherwise, the command deletes only the specified part of the rule statement.
Page 990
Default No rules are configured for an IPv6 object policy. Views IPv6 object policy view Predefined user roles network-admin Parameters rule-id: Specifies a rule ID in the range of 0 to 65534. If you do not specify an ID for the rule, the system automatically assigns the rule an integer next to the greatest ID being used.
Page 991
app-group app-group-name: Specifies an application group by its name, a case-insensitive string of 1 to 63 characters. The invalid and other application groups are not supported. counting: Enables match counting for the rule in an IPv6 object policy. By default, rule match counting is disabled.
Attack detection and prevention commands Commands and descriptions for centralized devices apply to the following routers: • MSR810/810-W/810-W-DB/810-LM/810-W-LM/810-10-PoE/810-LM-HK/810-W-LM-HK/810-L MS/810-LUS. • MSR2600-10-X1. • MSR 2630. • MSR3600-28/3600-51. • MSR3600-28-SI/3600-51-SI. • MSR3610-X1/3610-X1-DP/3610-X1-DC/3610-X1-DP-DC. • MSR 3610/3620/3620-DP/3640/3660. Commands and descriptions for distributed devices apply to the following routers: •...
Examples # Specify drop as the global action against ACK flood attacks in the attack defense policy atk-policy-1. <Sysname> system-view [Sysname] attack-defense policy atk-policy-1 [Sysname-attack-defense-policy-atk-policy-1] ack-flood action drop Related commands ack-flood threshold ack-flood detect ack-flood detect non-specific client-verify tcp enable ack-flood detect Use ack-flood detect to configure IP address-specific ACK flood attack detection.
Usage guidelines With ACK flood attack detection configured for an IP address, the device is in attack detection state. When the sending rate of ACK packets to the IP address reaches the threshold, the device enters prevention state and takes the specified actions. When the rate is below the silence threshold (three-fourths of the threshold), the device returns to the attack detection state.
ack-flood threshold Use ack-flood threshold to set the global threshold for triggering ACK flood attack prevention. Use undo ack-flood threshold to restore the default. Syntax ack-flood threshold threshold-value undo ack-flood threshold Default The global threshold is 1000 for triggering ACK flood attack prevention. Views Attack defense policy view Predefined user roles...
Default No attack defense policy is applied to an interface. Views Interface view Predefined user roles network-admin Parameters policy-name: Specifies an attack defense policy by its name. The policy name is a case-insensitive string of 1 to 31 characters. Valid characters include uppercase and lowercase letters, digits, underscores (_), and hyphens (-).
Usage guidelines An attack defense policy applied to the device itself detects packets destined for the device and prevents attacks targeted at the device. Applying an attack defense policy to the device can improve the efficiency of processing attack packets destined for the device. Each device can have only one attack defense policy applied.
Need help?
Do you have a question about the MSR Series and is the answer not in the manual?
Questions and answers