- Table of Contents
-
- 12-Security Command Reference
- 00-Preface
- 01-Security zone commands
- 02-AAA commands
- 03-802.1X commands
- 04-MAC authentication commands
- 05-Portal commands
- 06-Port security commands
- 07-User profile commands
- 08-Password control commands
- 09-Keychain commands
- 10-Public key management commands
- 11-PKI commands
- 12-IPsec commands
- 13-Group domain VPN commands
- 14-SSH commands
- 15-SSL commands
- 16-SSL VPN commands
- 17-ASPF commands
- 18-APR commands
- 19-Session management commands
- 20-Connection limit commands
- 21-Object group commands
- 22-Object policy commands
- 23-Attack detection and prevention commands
- 24-IP source guard commands
- 25-ARP attack protection commands
- 26-ND attack defense commands
- 27-uRPF commands
- 28-Crypto engine commands
- 29-FIPS commands
- 30-mGRE commands
- Related Documents
-
Title | Size | Download |
---|---|---|
20-Connection limit commands | 87.04 KB |
display connection-limit ipv6-stat-nodes
display connection-limit statistics
display connection-limit stat-nodes
reset connection-limit statistics
Connection limit commands
connection-limit
Use connection-limit to create a connection limit policy and enter its view, or enter the view of an existing connection limit policy.
Use undo connection-limit to delete a connection limit policy.
Syntax
connection-limit { ipv6-policy | policy } policy-id
undo connection-limit { ipv6-policy | policy } policy-id
Default
No connection limit policies exist.
Views
System view
Predefined user roles
network-admin
Parameters
ipv6-policy: Specifies an IPv6 connection limit policy.
policy: Specifies an IPv4 connection limit policy.
policy-id: Specifies the ID of a connection limit policy, in the range of 1 to 32. An IPv4 or IPv6 connection limit policy has its own number.
Examples
# Create IPv4 connection limit policy 1 and enter its view.
<Sysname> system-view
[Sysname] connection-limit policy 1
[Sysname-connlmt-policy-1]
# Create IPv6 connection limit policy 12 and enter its view.
<Sysname> system-view
[Sysname] connection-limit ipv6-policy 12
[Sysname-connlmt-ipv6-policy-12]
Related commands
connection-limit apply
connection-limit apply global
display connection-limit
limit
connection-limit apply
Use connection-limit apply to apply a connection limit policy to an interface.
Use undo connection-limit apply to remove a connection limit policy from an interface.
Syntax
connection-limit apply { ipv6-policy | policy } policy-id
undo connection-limit apply { ipv6-policy | policy }
Default
No connection limit policy is applied to an interface.
Views
Interface view
Predefined user roles
network-admin
Parameters
ipv6-policy: Specifies an IPv6 connection limit policy.
policy: Specifies an IPv4 connection limit policy.
policy-id: Specifies the ID of a connection limit policy, in the range of 1 to 32.
Usage guidelines
Only one IPv4 connection limit policy and one IPv6 connection limit policy can be applied to an interface. A new IPv4 or IPv6 connection limit policy overwrites the old one.
Examples
# Apply IPv4 connection limit policy 1 to GigabitEthernet 1/0/1.
<Sysname> system-view
[Sysname] interface gigabitethernet 1/0/1
[Sysname-GigabitEthernet1/0/1] connection-limit apply policy 1
# Apply IPv6 connection limit policy 12 to GigabitEthernet 1/0/1.
<Sysname> system-view
[Sysname] interface gigabitethernet 1/0/1
[Sysname-GigabitEthernet1/0/1] connection-limit apply ipv6-policy 12
Related commands
connection-limit
limit
connection-limit apply global
Use connection-limit apply global to apply a connection limit policy globally.
Use undo connection-limit apply global to remove the application.
Syntax
connection-limit apply global { ipv6-policy | policy } policy-id
undo connection-limit apply global { ipv6-policy | policy }
Default
No connection limit policy is applied globally.
Views
System view
Predefined user roles
network-admin
Parameters
ipv6-policy: Specifies an IPv6 connection limit policy.
policy: Specifies an IPv4 connection limit policy.
policy-id: Specifies the ID of a connection limit policy, in the range of 1 to 32.
Usage guidelines
Only one IPv4 connection limit policy and one IPv6 connection limit policy can be applied globally. A new IPv4 or IPv6 connection limit policy overwrites the old one.
Examples
# Apply IPv4 connection limit policy 1 globally.
<Sysname> system-view
[Sysname] connection-limit apply global policy 1
# Apply IPv6 connection limit policy 12 globally.
<Sysname> system-view
[Sysname] connection-limit apply global ipv6-policy 12
connection-limit
limit
description
Use description to configure a description for a connection limit policy.
Use undo description to restore the default.
Syntax
description text
undo description
Default
A connection limit policy does not have a description.
Views
IPv4 connection limit policy view
IPv6 connection limit policy view
Predefined user roles
network-admin
Parameters
text: Specifies a description, a case-sensitive string of 1 to 127 characters.
Usage guidelines
If you execute this command multiple times, the most recent configuration takes effect.
Examples
# Configure the description as CenterToA for IPv4 connection limit policy 1.
<Sysname> system-view
[Sysname] connection-limit policy 1
[Sysname-connlmt-policy-1] description CenterToA
Related commands
display connection-limit
display connection-limit
Use display connection-limit to display information about connection limit policies.
Syntax
display connection-limit { ipv6-policy | policy } { policy-id | all }
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
ipv6-policy: Specifies an IPv6 connection limit policy.
policy: Specifies an IPv4 connection limit policy.
policy-id: Specifies the ID of a connection limit policy, in the range of 1 to 32.
all: Specifies all connection limit policies.
Examples
# Display information about all IPv4 connection limit policies.
<Sysname> display connection-limit policy all
3 policies in total:
Policy Rule Stat Type HiThres LoThres Rate ACL
--------------------------------------------------------------------------------
0 1 Src-Dst-Port 2000 1800 10 3000
12 Src-Dst 500 45 0 3001
255 -- 1000000 980000 0 2001
1 2 Dst-Port 800 70 0 3010
3 Src-Dst 100 90 0 3000
10 Src-Dst-Port 50 45 0 3003
11 Src 200 200 0 3004
200 -- 500000 498000 0 2002
28 4 Port 1500 1400 0 3100
5 Dst 3000 280 0 3101
21 Src-Dst 200 180 0 3102
25 Src-Port 50 35 0 3200
Description list:
Policy Description
--------------------------------------------------------------------------------
1 IPv4Description1
28 Description for IPv4 28
# Display information about IPv4 connection limit policy 1.
<Sysname> display connection-limit policy 1
IPv4 connection limit policy 1 has been applied 5 times, and has 5 limit rules.
Description: IPv4Description1
Limit rule list:
Policy Rule Stat Type HiThres LoThres Rate ACL
--------------------------------------------------------------------------------
1 2 Dst-Port 800 700 10 3010
3 Src-Dst 100 90 0 3000
10 Src-Dst-Port 50 45 0 3003
11 Src 200 200 0 3004
200 -- 500000 498000 0 2002
Application list:
GigabitEthernet1/0/1
GigabitEthernet1/0/2
Vlan-interface2
Global
# Display information about all IPv6 connection limit policies.
<Sysname> display connection-limit ipv6-policy all
2 policies in total:
Policy Rule Stat Type HiThres LoThres Rate ACL
--------------------------------------------------------------------------------
3 1 Src-Dst 1000 800 10 3010
2 Dst 500 450 0 3001
4 2 Src-Dst-Port 800 700 0 3010
3 Src 100 90 0 3020
200 -- 100000 89000 0 2005
Description list:
Policy Description
--------------------------------------------------------------------------------
3 IPv6Description3
4 Description for IPv6 4
# Display information about IPv6 connection limit policy 3.
<Sysname> display connection-limit ipv6-policy 3
IPv6 connection limit policy 3 has been applied 3 times, and has 2 limit rules.
Description: IPv6Description3
Limit rule list:
Policy Rule Stat Type HiThres LoThres Rate ACL
--------------------------------------------------------------------------------
3 1 Src-Dst 1000 800 0 3010
2 Dst 500 450 0 3001
Application list:
GigabitEthernet1/0/1
Vlan-interface2
Field |
Description |
Limit rule list |
Connection limit policy information. |
Policy |
Number of the connection limit policy. |
Rule |
Number of the connection limit rule. |
Stat Type |
Statistics types: · Src-Dst-Port—Limits connections by source IP, destination IP, and service combination. · Src-Dst—Limits connections by source IP address and destination IP address combination. · Src-Port—Limits connections by source IP and service combination. · Dst-Port—Limits connections by destination IP and service combination. · Src—Limits connections by source IP address. · Dst—Limits connections by destination IP address. · Port—Limits connections by service. · Dslite—Limits connections by B4 device of a DS-Lite tunnel. · --—Limits connections not by a specific IP address or service. All connections that match the ACL used by the rule are limited. |
HiThres |
Upper limit of the connections. |
LoThres |
Lower limit of the connections. |
Rate |
Maximum number of connections established per second. |
ACL |
Number or name of the ACL used by the rule. |
Application list |
Application list of the connection limit policy, including interface name and Global. Global indicates that the connection limit policy is applied globally. |
Description |
Connection limit policy description. |
Description list |
List of connection limit policy descriptions. |
Related commands
connection-limit
connection-limit apply
connection-limit apply global
limit
display connection-limit ipv6-stat-nodes
Use display connection-limit ipv6-stat-nodes to display statistics about IPv6 connections that match connection limit rules globally or on an interface.
Syntax
In standalone mode:
display connection-limit ipv6-stat-nodes { global | interface interface-type interface-number } [ { deny-new | permit-new } | destination destination-ip | service-port port-number | source source-ip ] * [ count ]
In IRF mode:
display connection-limit ipv6-stat-nodes { global | interface interface-type interface-number } [ slot slot-number ] [ { deny-new | permit-new } | destination destination-ip | service-port port-number | source source-ip ] * [ count ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
global: Displays statistics about IPv6 connections that match connection limit rules globally.
interface interface-type interface-number: Specifies an interface by its type and number.
slot slot-number: Specifies an IRF member device by its member ID. This option is available only when you specify the global keyword or specify a virtual interface, such as a VLAN-interface and tunnel interface. (In IRF mode.)
deny-new: Displays limit rule-based statistics sets of which new connections are rejected.
permit-new: Displays limit rule-based statistics sets of which new connections are allowed.
destination destination-ip: Specifies a destination by its IP address.
service-port port-number: Specifies a service port by its port number.
source source-ip: Specifies a source by its IP address.
count: Displays only the number of limit rule-based statistics sets. Detailed information about the specified IPv6 connections is not displayed. If you do not specify this keyword, the command displays detailed information about the specified IPv6 connections that match connection limit rules.
Usage guidelines
The statistics for this command include the following information:
· Connection information, including the source/destination IP address, service port, and transport layer protocol of connections.
· Matching connection limit rules.
· Number of current connections.
· Whether or not new connections can be created.
To further filter the output statistics, specify the following options in the command:
· source source-ip.
· destination destination-ip.
· service-port port-number.
· permit-new.
· deny-new.
For example, if you specify the source source-ip and destination destination-ip combination, this command displays statistics about IPv6 connections that match connection limit rules by source IP address and destination IP address.
If you specify none of the previously mentioned parameters, this command displays statistics about all IPv6 connections that match connection limit rules.
Deleting or modifying an IPv6 connection limit policy will not delete the effective IPv6 connection limit rule-based statistics sets. An IPv6 connection limit rule-based statistics set will be automatically deleted after all the IPv6 connections for the set are disconnected.
Examples
# (In standalone mode.) Display statistics about all IPv6 connections that match the connection limit rule on GigabitEthernet 1/0/1.
<Sysname> display connection-limit ipv6-stat-nodes interface gigabitethernet 1/0/1
Slot 0:
Src IP address : Any
VPN instance : vpn5
Dst IP address : fe80::5ed9:98ff:feb1:69b6
VPN instance : abcdefghijklmnopqrstuvwxyzabcde
DS-Lite tunnel peer : 9876543210
Service : tcp/12345
Limit rule ID : 12345(ACL: 3184)
Sessions threshold Hi/Lo: 1000000/90000
Sessions count : 150000
Sessions limit rate : 0
New session flag : Permit
# (In standalone mode.) Display statistics about all IPv6 connections that match the connection limit rule on VLAN-interface 2.
<Sysname> display connection-limit ipv6-stat-nodes interface vlan-interface 2
Slot 0:
Src IP address : Any
VPN instance : vpn5
Dst IP address : fe80::5ed9:98ff:feb1:69b6
VPN instance : abcdefghijklmnopqrstuvwxyzabcde
DS-Lite tunnel peer : 9876543210
Service : tcp/12345
Limit rule ID : 12345(ACL: 3184)
Sessions threshold Hi/Lo: 1000000/90000
Sessions count : 150000
Sessions limit rate : 0
New session flag : Permit
# (In IRF mode.) Display statistics about IPv6 connections that match the connection limit rule on IRF member device 2.
<Sysname> display connection-limit ipv6-stat-nodes global slot 2
Slot 2:
Src IP address : Any
VPN instance : --
Dst IP address : Any
VPN instance : --
DS-Lite tunnel peer : --
Service : icmp/0
Limit rule ID : 22(ACL: 3666)
Sessions threshold Hi/Lo: 3500/3000
Sessions count : 3100
Sessions limit rate : 0
New session flag : Permit
# (In standalone mode.) Display the number of limit rule-based statistics sets by source IP address 2::1.
<Sysname> display connection-limit ipv6-stat-nodes global source 2::1 count
Slot 0:
Current limit statistic nodes count is 16.
# (In IRF mode.) Display the number of limit rule-based statistics sets on IRF member device 2.
<Sysname> display connection-limit ipv6-stat-nodes global slot 2 count
Slot 2:
Current limit statistic nodes count is 0.
Table 2 Command output
Field |
Description |
Src IP address |
Source IP address. |
Dst IP address |
Destination IP address. |
VPN instance |
MPLS L3VPN instance to which the IP address belongs. Two hyphens (--) indicates that the IP address is on the public network. |
DS-Lite tunnel peer |
Peer IP address of the DS-Lite tunnel to which the connection belongs. Two hyphens (--) indicates that the connection does not belong to a DS-Lite tunnel. |
Service |
Protocol name and service port number. For an unwell-known protocol, this field displays unknown(xx).The cross signs (xx) indicates the protocol number. For the ICMP protocol, the protocol number is the decimal digits that are converted from the hexadecimal contents of the type and code fields. |
Limit rule ID |
ID of the matched rule. The ACL number of the rule is enclosed in parentheses. |
Sessions threshold Hi/Lo |
Upper and lower connection limits. |
Sessions count |
Number of current connections. |
Sessions limit rate |
Maximum number of connections established per second. |
New session flag |
Whether or not new connections can be created: · Permit—New connections can be created. · Deny—New connections cannot be created. NOTE: When the number of connections reaches the upper limit, this field displays Permit although new connections are not allowed. This field displays Deny only when the number of connections exceeds the upper limit. |
Related commands
connection-limit apply global ipv6-policy
connection-limit apply ipv6-policy
connection-limit ipv6-policy
limit
display connection-limit statistics
Use display connection-limit statistics to display the connection limit statistics globally or on an interface.
Syntax
In standalone mode:
display connection-limit statistics { global | interface interface-type interface-number }
In IRF mode:
display connection-limit statistics { global | interface interface-type interface-number } [ slot slot-number ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
global: Displays the global connection limit statistics.
interface interface-type interface-number: Specifies an interface by its type and number.
slot slot-number: Specifies an IRF member device by its member ID. This option is available only when you specify the global keyword or specify a virtual interface, such as a VLAN interface or tunnel interface. (In IRF mode.)
Examples
# (In standalone mode.) Display the global connection limit statistics.
<Sysname> display connection-limit statistics global
Connection limit statistics (Global, slot 0):
Dropped IPv4 packets: 54781
Dropped IPv6 packets: 11457
# (In IRF mode.) Display the global connection limit statistics on IRF member device 2.
<Sysname> display connection-limit statistics global slot 2
Connection limit statistics (Global, slot 2):
Dropped IPv4 packets: 74213
Dropped IPv6 packets: 58174
Table 3 Command output
Field |
Description |
Dropped IPv4 packet |
Number of IPv4 packets that are dropped because the upper connection limit is exceeded for the IPv4 connection limit policy that is configured globally or on an interface. |
Dropped IPv6 packet |
Number of IPv6 packets that are dropped because the upper connection limit is exceeded for the IPv6 connection limit policy that is configured globally or on an interface. |
Related commands
connection-limit
connection-limit apply
connection-limit apply global
limit
display connection-limit stat-nodes
Use display connection-limit stat-nodes to display statistics about IPv4 connections that match connection limit rules globally or on an interface.
Syntax
In standalone mode:
display connection-limit stat-nodes { global | interface interface-type interface-number } [ { deny-new | permit-new } | destination destination-ip | service-port port-number | source source-ip ] * [ count ]
display connection-limit stat-nodes { global | interface interface-type interface-number } dslite-peer b4-address [ count ]
In IRF mode:
display connection-limit stat-nodes { global | interface interface-type interface-number } [ slot slot-number ] [ { deny-new | permit-new } | destination destination-ip | service-port port-number | source source-ip ] * [ count ]
display connection-limit stat-nodes { global | interface interface-type interface-number } [ slot slot-number ] dslite-peer b4-address [ count ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
global: Displays statistics about IPv4 connections that match connection limit rules globally.
interface interface-type interface-number: Specifies an interface by its type and number.
slot slot-number: Specifies an IRF member device by its member ID. This option is available only when you specify the global keyword or specify a virtual interface, such as a VLAN-interface and tunnel interface. (In IRF mode.)
deny-new: Displays limit rule-based statistics sets of which new connections are rejected.
permit-new: Displays limit rule-based statistics sets of which new connections are allowed.
destination destination-ip: Specifies a destination by its IP address.
service-port port-number: Specifies a service port by its port number.
source source-ip: Specifies a source by its IP address.
dslite-peer b4-address: Specifies a B4 device on a DS-Lite tunnel. The b4-address argument specifies the IPv6 address of the B4 device.
count: Displays only the number of limit rule-based statistics sets. Detailed information about the specified IPv4 connections is not displayed. If you do not specify this keyword, the command displays detailed information about the specified IPv4 connections that match connection limit rules.
Usage guidelines
The statistics for this command include the following information:
· Connection information, including the source/destination IP address, service port, and transport layer protocol of connections.
· Matching connection limit rules.
· Number of current connections.
· Whether or not new connections can be created.
To further filter the output statistics, specify the following options in the command:
· source source-ip.
· destination destination-ip.
· service-port port-number.
· permit-new.
· deny-new.
For example, if you specify the source source-ip and destination destination-ip combination, this command displays statistics about IPv4 connections that match connection limit rules by source IP address and destination IP address.
If you specify none of the previously mentioned parameters, this command displays statistics about all IPv4 connections that match connection limit rules.
Deleting or modifying an IPv4 connection limit policy will not delete the effective IPv4 connection limit rule-based statistics sets. An IPv4 connection limit rule-based statistics set will be automatically deleted after all the IPv4 connections for the set are disconnected.
Examples
# (In standalone mode.) Display statistics about all IPv4 connections that match the connection limit rule on GigabitEthernet 1/0/1.
<Sysname> display connection-limit stat-nodes interface gigabitethernet 1/0/1
Slot 0:
Src IP address : 100.100.100.100
VPN instance : 0123456789012345678901234567890
Dst IP address : 200.200.200.200
VPN instance : abcdefghijklmnopqrstuvwxyzabcde
DS-Lite tunnel peer : 1234567890
Service : tcp/12345
Limit rule ID : 12345(ACL: 3001)
Sessions threshold Hi/Lo: 1100000/980000
Sessions count : 1050000
Sessions limit rate : 0
New session flag : Permit
# (In standalone mode.) Display statistics about all IPv4 connections that match the connection limit rule on VLAN-interface 2.
<Sysname> display connection-limit stat-nodes interface vlan-interface 2
Slot 0:
Src IP address : 100.100.100.100
VPN instance : 0123456789012345678901234567890
Dst IP address : 200.200.200.200
VPN instance : abcdefghijklmnopqrstuvwxyzabcde
DS-Lite tunnel peer : 1234567890
Service : tcp/12345
Limit rule ID : 12345(ACL: 3001)
Sessions threshold Hi/Lo: 1100000/980000
Sessions count : 1050000
Sessions limit rate : 0
New session flag : Permit
# (In IRF mode.) Display statistics about IPv4 connections that match the connection limit rule on IRF member device 2.
<Sysname> display connection-limit stat-nodes global slot 2
Slot 2:
Src IP address : Any
VPN instance : Vpn1
Dst IP address : 202.113.16.117
VPN instance : Vpn2
DS-Lite tunnel peer : --
Service : icmp/0
Limit rule ID : 7(ACL: 3102)
Sessions threshold Hi/Lo: 4000/3800
Sessions count : 1001
Sessions limit rate : 0
New session flag : Permit
# (In standalone mode.) Display the number of global limit rule-based statistics sets.
<Sysname> display connection-limit stat-nodes global count
Slot 0:
Current limit statistic nodes count is 5.
# (In IRF mode.) Display the number of limit rule-based statistics sets on IRF member device 2 by source IP address 1.1.1.1.
<Sysname> display connection-limit stat-nodes global slot 2 source 1.1.1.1 count
Slot 2:
Current limit statistic nodes count is 0.
Table 4 Command output
Field |
Description |
Src IP address |
Source IP address. |
Dst IP address |
Destination IP address. |
VPN instance |
MPLS L3VPN instance to which the IP address belongs. Two hyphens (--) indicates that the IP address is on the public network. |
DS-Lite tunnel peer |
Peer IP address of the DS-Lite tunnel to which the connection belongs. Two hyphens (--) indicates that the connection does not belong to a DS-Lite tunnel. |
Service |
Protocol name and service port number. For an unwell-known protocol, this field displays unknown(xx). The cross signs (xx) represents the protocol number. For the ICMP protocol, the protocol number is the decimal digits that are converted from the hexadecimal contents of the type and code fields. |
Sessions threshold Hi/Lo |
Upper and lower connection limits. |
Sessions count |
Number of current connections. |
Sessions limit rate |
Maximum number of connections established per second. |
New session flag |
Whether or not new connections can be created: · Permit—New connections can be created. · Deny—New connections cannot be created. NOTE: When the number of connections reaches the upper limit, this field displays Permit although new connections are not allowed. This field displays Deny only when the number of connections exceeds the upper limit. |
Related commands
connection-limit apply global policy
connection-limit apply policy
connection-limit policy
limit
limit
Use limit to configure a connection limit rule.
Use undo limit to delete a connection limit rule.
Syntax
In IPv4 connection limit policy view:
limit limit-id acl { acl-number | name acl-name } [ per-destination | per-service | per-source ] * { amount max-amount min-amount | rate rate } * [ description text ]
limit limit-id acl ipv6 { acl-number | name acl-name } per-dslite-b4 { amount max-amount min-amount | rate rate } * [ description text ]
undo limit limit-id
In IPv6 connection limit policy view:
limit limit-id acl ipv6 { acl-number | name acl-name } [ per-destination | per-service | per-source ] * { amount max-amount min-amount | rate rate } * [ description text ]
undo limit limit-id
Default
No connection limit rules exist.
Views
IPv4 connection limit policy view
IPv6 connection limit policy view
Predefined user roles
network-admin
Parameters
limit-id: Specifies a connection limit rule by its ID in the range of 1 to 256.
acl: Specifies the ACL that matches the user range. Only the user connections that match the ACL are limited.
ipv6: Specifies an IPv6 ACL. If you do not specify this keyword, an IPv4 ACL is used.
acl-number: Specifies an ACL by its number in the range of 2000 to 3999.
name acl-name: Specifies an ACL by its name. The acl-name argument is a case-insensitive string of 1 to 63 characters. It must start with an English letter. To avoid confusion, it cannot be all.
per-destination: Limits connections by destination IP address.
per-service: Limits connections by service depending on transport layer protocol and service port.
per-source: Limits connections by source IP address.
per-dslite-b4: Limits connections by IPv6 address of a B4 device on a DS-Lite tunnel. This keyword is available only in IPv4 connection limit policy view.
amount: Limits the number of connections.
max-amount: Specifies the upper connection limit in the range of 1 to 4294967294. When user connections in a range or of a type exceed the upper connection limit, new connections cannot be created.
min-amount: Specifies the lower connection limit in the range of 1 to 4294967294. The lower connection limit cannot be greater than the upper connection limit. New connections cannot be created until the connection number goes below the lower connection limit.
rate: Limits the connection establishment rate.
rate: Specifies the maximum number of connections established per second. The value range is 5 to 10000000.
description text: Specifies a description for the connection limit rule, a case-sensitive string of 1 to 127 characters. By default, a connection limit rule does not have a description.
Usage guidelines
Each connection limit policy can define multiple rules, and each rule must specify the used ACL, rule type, and either of upper/lower connection limit and connection establishment rate limit. In one rule, you can specify one or multiple of the keywords per-destination, per-source, and per-service, but you cannot specify the per-dslite-b4 keyword together with other keywords. For example, if the per-destination and per-source combination is specified, connections are limited by the source IP address and destination IP address. Connections with the same source IP address and destination IP address are the same type.
When you configure a connection limit rule, follow these guidelines:
· Different rules in the same connection limit policy must use different ACLs.
· If you specify none of the per-destination, per-source, and per-service keywords, all connections that match the specified ACL are limited by the specified value.
· When the connections established on a device are matched against a connection limit policy, the limit rules in the policy are matched in ascending order of rule ID.
· When the specified ACL changes, the connections that have been established are limited by the new connection limit policy.
· A rule that has the per-dslite-b4 keyword limits IPv4 connections of the DS-Lite tunnel B4 device that matches the specified IPv6 ACL in the rule. On a DS-Lite tunnel network, if the AFTR device uses the Endpoint-Independent Mapping-based NAT configuration, you must limit connections from external IPv4 networks to access the internal IPv4 network. To implement B4 device-based connection limits, perform the following tasks:
¡ Add a rule that has the per-dslite-b4 keyword to a connection limit policy.
¡ Apply the policy globally or on the DS-Lite tunnel interface.
Examples
# Configure connection limit rule 1 for IPv4 connection limit policy 1:
1. Configure ACL 3000.
<Sysname> system-view
[Sysname] acl advanced 3000
[Sysname-acl-ipv4-adv-3000] rule permit ip source 192.168.0.0 0.0.0.255
[Sysname-acl-ipv4-adv-3000] quit
2. Limit connections that match ACL 3000 by the source and destination IP addresses, with the upper limit 2000, lower limit 1800, and establishment rate 10 per second.
[Sysname] connection-limit policy 1
[Sysname-connlmt-policy-1] limit 1 acl 3000 per-destination per-source amount 2000 1800 rate 10
3. Verify that when the connection number exceeds 2000, new connections cannot be established until the connection number goes below 1800. (Details not shown.)
# Configure connection limit rule 2 for IPv6 connection limit policy 12:
1. Configure ACL 2001.
<Sysname> system-view
[Sysname] acl ipv6 basic 2001
[Sysname-acl-ipv6-basic-2001] rule permit source 2:1::/96
[Sysname-acl-ipv6-basic-2001] quit
2. Limit connections that match ACL 2001 by the source and destination IP addresses, with the upper limit 200, lower limit 100, and establishment rate 10 per second.
[Sysname] connection-limit ipv6-policy 12
[Sysname-connlmt-ipv6-policy-12] limit 2 acl ipv6 2001 per-destination amount 200 100 rate 10
3. Verify that when the connection number exceeds 200, new connections cannot be established until the connection number goes below 100. (Details not shown.)
connection-limit
display connection-limit
reset connection-limit statistics
Use reset connection-limit statistics to clear the connection limit statistics globally or on an interface.
Syntax
In standalone mode:
reset connection-limit statistics { global | interface interface-type interface-number }
In IRF mode:
reset connection-limit statistics { global | interface interface-type interface-number } [ slot slot-number ]
Views
User view
Predefined user roles
network-admin
network-operator
Parameters
global: Clears the global connection limit statistics.
interface interface-type interface-number: Specifies an interface by its type and number.
slot slot-number: Specifies an IRF member device by its member ID. The slot-number argument represents the ID of the IRF member device. This option is available only when you specify the global keyword or specify a virtual interface, such as a VLAN interface or tunnel interface. (In IRF mode.)
Examples
# (In standalone mode.) Clear the connection limit statistics on GigabitEthernet 1/0/1.
<Sysname> reset connection-limit statistics interface gigabitethernet 1/0/1
# (In standalone mode.) Clear the connection limit statistics on VLAN-interface 2.
<Sysname> reset connection-limit statistics interface vlan-interface 2
# (In IRF mode.) Clear the global connection limit statistics on IRF member device 2.
<Sysname> reset connection-limit statistics global slot 2
display connection-limit statistics