ACLs Applied to an IPsec Policy

An IPsec policy can protect different data flows. In practice, you need to define data flows through an ACL and quote the ACL in a security policy. Therefore, data flows are protected.

According to ACL rules, IPsec identifies which packets need or do not need security protection. Data flows matching advanced ACLs (permit) are protected and sent after being processed by IPsec. Data flows that do not match advanced ACLs are transmitted directly. Data flows that need to be encrypted but actually not are considered as attack data flows and discarded.

Pay attention to the following items:

Table 1 Matching Principles of ACLs Applied to an IPsec Policy
ACL Matching Result IPsec Processing Result
The packet matches the permit rule The packet is processed by IPsec, and then be forwarded.
The packet matches the deny rule The packet is forwarded directly.
The relative ACL exists and there are rules in the ACL, but the packet does not match any rule The packet is forwarded directly.
The relative ACL does not exist IPsec does not support these kinds of ACLs
The relative ACL exists but there is no rule in the ACL
Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >