< Home

deception aci enable

Function

The deception aci enable command enables the Access Control Isolation (ACI) deception function.

The undo deception aci enable command disables the ACI deception function.

The ACI deception function is disabled by default.

Format

deception aci detect-network { id id-number | all } enable

undo deception aci detect-network { id id-number | all } enable

Parameters

Parameter Description Value
id id-number

Specifies the ID of a network segment to be detected.

The value is an integer ranging from 1 to 50.

all

Specifies all network segments to be detected.

-

Views

Deception view

Default Level

2: Configuration level

Usage Guidelines

ACI is an isolation scheme for controlling intranet communication through DNS access. After this function is enabled, the source or destination address in the detected network segment must be accessed through the domain name. If the IP address is directly accessed or the IP address that does not exist is accessed, traffic is deceived to the Decoy.

The DecoySensor parses DNS reply packets and establishes mappings between the source addresses of DNS request packets and the IP addresses corresponding to the domain names in DNS reply packets (that is, the ACI table). Subsequent TCP SYN packets and ICMP ping packets will match the ACI table. Traffic that fails to match the table is deceived to the Decoy for in-depth interactive detection.

ACI also supports the configuration of an ACI suffix using the deception aci suffix command. The default value is aci. An ACI suffix functions as an intranet access key. For example, if the IP address of the server in the detected network segment is 192.168.1.1, the server must be accessed through 192.168.1.1.aci if the default ACI suffix is used. If the IP address of the server is directly accessed or the IP address with an incorrect ACI suffix is accessed, traffic is deceived to the Decoy for in-depth interactive detection.

The ACI deception function takes effect only after the deception function is enabled using deception enable.

Example

# Enable the ACI deception function.

<HUAWEI> system-view
[HUAWEI] deception
[HUAWEI-deception] deception aci detect-network all enable
Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >