An IPv4 Management Plane Access Control (MPAC) policy can be configured to filter IPv4 packets destined for the CPU.
The system view is displayed.
An IPv4 MPAC policy is created, and the IPv4 MPAC policy view is displayed.
Protocol Type |
Command |
Remarks |
---|---|---|
TCP or UDP |
rule [ rule-id ] [ name rule-name ] { permit | deny } protocol { tcp | tcp-protocol-number | udp | udp-protocol-number } [ [ source-port source-port-number ] | [ destination-port destination-port-number ] | [ source-ip { source-ipv4-address { source-ipv4-mask | 0 } | any } ] | [ destination-ip { destination-ipv4-address { destination-ipv4-mask | 0 } | any } ] ] * |
- |
BGP, Dynamic Host Configuration Protocol-C(DHCP-C), Dynamic Host Configuration Protocol-R(DHCP-R), FTP, IP, LDP, LSP ping, NTP, OSPF, PIM, RIP, RSVP, SNMP, SSH, Telnet, TFTP, or IGMP |
rule [ rule-id ] [ name rule-name ] { permit | deny } protocol { ip-protocol-number | bgp | dhcp-c | dhcp-r | ftp | ip | ldp | lsp-ping | ntp | ospf | pim | rip | rsvp | snmp | ssh | telnet | tftp | igmp } [ [ source-ip { source-ipv4-address { source-ipv4-mask | 0 } | any } ] | [ destination-ip { destination-ipv4-address { destination-ipv4-mask | 0 } | any } ] ] * |
- |
IS-IS or any other protocol |
rule [ rule-id ] [ name rule-name ] { deny | permit } protocol { any | isis } |
Exercise caution when using the rule [ rule-id ] deny protocol any command. After this command is applied globally, no protocol packets are sent to the CPU, causing the device to be out of management. |
The step is configured for rules in the MPAC policy.
The description is configured for the MPAC policy.
Return to the system view.
Apply an IPv4 MPAC policy globally.
Run service-security global-binding ipv4 security-policy-name
An MPAC policy is applied globally.
Apply an IPv4 MPAC policy to an interface.
Run interface interface-type interface-number
The interface view is displayed.
Run service-security binding ipv4 security-policy-name
The MPAC policy is applied to the interface.
The configuration is committed.