19-Security Command Reference

HomeSupportReference GuidesCommand ReferencesH3C MSR1000[2600][3600] Routers Command Reference(V9)-R9119-6W10019-Security Command Reference
23-APR commands
Title Size Download
23-APR commands 213.10 KB

APR commands

app-group

Use app-group to create an application group and enter its view, or enter the view of an existing application group.

Use undo app-group to delete the specified application group.

Syntax

app-group group-name

undo app-group group-name

Default

No application groups exist.

Views

System view

Predefined user roles

network-admin

Parameters

group-name: Specifies the application group name, a case-insensitive string of 1 to 63 characters. The names invalid and other are not allowed.

Usage guidelines

You can create a maximum of 1000 application groups on the device.

Examples

# Create an application group named aaa and enter its view.

<Sysname> system-view

[Sysname] app-group aaa

[Sysname-app-group-aaa]

Related commands

copy app-group

description

include application

application statistics enable

Use application statistics enable to enable the application statistics feature on the specified direction of an interface.

Use undo application statistics enable to disable the application statistics feature on the specified direction of an interface.

Syntax

application statistics enable [ inbound | outbound ]

undo application statistics enable [ inbound | outbound ]

Default

The application statistics feature is disabled on both directions of an interface.

Views

Layer 2 interface view/Layer 3 interface view

Predefined user roles

network-admin

Parameters

inbound: Specifies the inbound direction of the interface.

outbound: Specifies the outbound direction of the interface.

Usage guidelines

IMPORTANT

IMPORTANT:

The application statistics feature consumes a large amount of system memory. When the system generates a low-memory alarm, disable the application statistics feature on interfaces.

 

If no direction is specified, application statistics is enabled in both the inbound and outbound directions.

When this feature is enabled, the device separately counts the number of packets or bytes that the interface has received or sent for each application protocol. It also calculates the transmission rates of the interface for these protocols.

To display application statistics, use the display application statistics command.

Examples

# Enable application statistics in the inbound direction of GigabitEthernet 0/0/1.

<Sysname> system-view

[Sysname] interface gigabitethernet 0/0/1

[Sysname-GigabitEthernet0/0/1] application statistics enable inbound

# Enable application statistics in the outbound direction of GigabitEthernet 0/0/2.

<Sysname> system-view

[Sysname] interface gigabitethernet 0/0/2

[Sysname-GigabitEthernet0/0/2] application statistics enable outbound

# Enable application statistics in the inbound and outbound directions of GigabitEthernet 0/0/3.

<Sysname> system-view

[Sysname] interface gigabitethernet 0/0/3

[Sysname-GigabitEthernet0/0/3] application statistics enable

# Enable application statistics in the inbound direction of Vlan-interface 2.

<Sysname> system-view

[Sysname] interface Vlan-interface 2

[Sysname-Vlan-interface2] application statistics enable inbound

Related commands

display application statistics

apr signature auto-update

Use apr signature auto-update to enable automatic update for the APR signature library and enter auto-update configuration view.

Use undo apr signature auto-update to disable automatic update for the APR signature library.

Syntax

apr signature auto-update

undo apr signature auto-update

Default

Automatic update is disabled for the APR signature library.

Views

System view

Predefined user roles

network-admin

Usage guidelines

Use this command to update the APR signature library if the device can access the signature library services at the H3C website.

Examples

# Enable automatic update for the APR signature library and enter auto-update configuration view.

<Sysname> system-view

[Sysname] apr signature auto-update

[Sysname-apr-autoupdate]

Related commands

override-current

update schedule

apr signature auto-update-now

Use apr signature auto-update-now to manually trigger an automatic update for the APR signature library.

Syntax

apr signature auto-update-now

Views

System view

Predefined user roles

network-admin

Usage guidelines

This command starts the automatic APR signature library update process and backs up the current APR signature file. This command is independent of the apr signature auto-update command.

Use this command to update the APR signature library if you find a new version of APR signature library at the H3C website.

Examples

# Manually trigger an automatic update for the APR signature library.

<Sysname> system-view

[Sysname] apr signature auto-update-now

apr signature rollback

Use apr signature rollback to roll back the APR signature library.

Syntax

apr signature rollback { factory | last }

Views

System view

Predefined user roles

network-admin

Parameters

factory: Rolls back the APR signature library to the factory version.

last: Rolls back the APR signature library to the last version.

Usage guidelines

You can use this command if you find that high error rate or abnormality occurs when the device uses the current APR signature library for application recognition.

Each time a rollback operation is performed, the device backs up the current version of the APR signature library. If you repeat the apr signature rollback last command multiple times, the APR signature library will repeatedly switch between the current version and the last version.

To ensure that the APR signature library can be successfully rolled back to the last version, back up the current APR signature library each time you update the library.

Examples

# Roll back the APR signature library to the last version.

<Sysname> system-view

[Sysname] apr signature rollback last

apr signature update

Use apr signature update to manually update the APR signature library.

Syntax

apr signature update [ override-current ] file-path

Views

System view

Predefined user roles

network-admin

Parameters

override-current: Overwrites the old APR signature file. If you do not specify this keyword, the old APR signature file will be saved as a backup signature file on the device after the update.

file-path: Specifies the path of the new APR signature file, a case-insensitive string of 1 to 255 characters.

Usage guidelines

Use this command to update APR signature library if the device cannot access the signature library services at the H3C website.

You can use either of the following methods to manually update the APR signature library:

·     Local update—By using the locally stored APR signature file.

To ensure a successful update, the APR signature file must be stored on the active MPU.

The following table describes the formats of the file-path argument for different update scenarios:

 

Update scenario

Format of file-path

Remarks

The update file is stored in the current working directory.

filename

To display the current working directory, use the pwd command (see file system management in Fundamentals Command Reference).

The update file is stored in a different directory on the same storage medium.

filename

Before updating the signature library, you must use the cd command to open the directory where the update file is stored.

For information about the cd command, see file system management in Fundamentals Command Reference.

The update file is stored on a different storage medium.

path/filename

Before updating the signature library, you must first use the cd command to open the root directory of the storage medium where the file is stored.

For information about the cd command, see file system management in Fundamentals Command Reference.

 

·     FTP/TFTP update—By using the APR signature file stored on an FTP or TFTP server.

The following table describes the formats of the file-path argument for different update scenarios:

 

Update scenario

Format of file-path

Remarks

The update file is stored on an FTP server.

ftp://username:password@server address/filename

The username argument represents the FTP login username.

The password argument represents the FTP login password.

The server address argument represents the IP address or host name of the FTP server.

If an FTP login username or password includes colons (:), at signs (@), or slashes (/), you must replace these special characters with the corresponding escape characters.

·     The escape character for the colon (:) character is %3A or %3a.

·     The escape character for the at sign (@) character is %40.

·     The escape character for the slash (/) character is %2F or %2f.

The update file is stored on a TFTP server.

tftp://server address/filename

The server address argument represents the IP address or host name of the TFTP server.

 

If you specify the host name, make sure the following requirements are met:

¡     The device can resolve the IP address of the FTP or TFTP server through static or dynamic domain name resolution.

¡     The device and server can reach each other.

-     For information about DNS, see Layer 3—IP Services Configuration Guide.

Examples

# Manually update the APR signature library by using an APR signature file stored on a TFTP server.

<Sysname> system-view

[Sysname] apr signature update tftp://192.168.0.1/apr-1.0.2-en.dat

# Manually update the APR signature library by using an APR signature file stored on an FTP server.

<Sysname> system-view

[Sysname] apr signature update ftp://user%3A123:user%40abc%2F123@192.168.0.10/apr-1.0.2-en.dat

# Manually update the APR signature library by using an APR signature file stored on the device, The file is stored in directory cfa0:/apr-1.0.23-en.dat. In this example, the working directory is cfa0:.

<Sysname> system-view

[Sysname] apr signature update apr-1.0.23-en.dat

# Manually update the APR signature library by using an APR signature file stored on the device, The file is stored in directory cfa0:/dpi/apr-1.0.23-en.dat. In this example, the working directory is cfa0:.

<Sysname> cd dpi

<Sysname> system-view

[Sysname] apr signature update apr-1.0.23-en.dat

# Manually update the APR signature library by using an APR signature file stored on the device, The file is stored in directory cfb0:/dpi/apr-1.0.23-en.dat. In this example, the working directory is cfa0:.

<Sysname> cd cfb0:/

<Sysname> system-view

[Sysname] apr signature update dpi/apr-1.0.23-en.dat

copy app-group

Use copy app-group to copy all application protocols in an application group to another group.

Syntax

copy app-group group-name

Views

Application group view

Predefined user roles

network-admin

Parameters

group-name: Specifies the name of the source application group, a case-insensitive string of 1 to 63 characters. The names invalid and other are not allowed.

Usage guidelines

Execute this command multiple times to copy application protocols in different groups to the current group.

Examples

# Copy application protocols in group bcd to group abc.

<Sysname> system-view

[Sysname] app-group abc

[Sysname-app-group-abc] copy app-group bcd

Related commands

app-group

include application

description (application group view)

Use description to configure the description of an application group.

Use undo description to restore the default.

Syntax

description text

undo description

Default

An application group is described as "User-defined application group".

Views

Application group view

Predefined user roles

network-admin

Parameters

text: Specifies a description, a case-sensitive string of 1 to 127 characters. If the string includes spaces, use a pair of quotation marks ("") to enclose all characters.

Usage guidelines

Configure descriptions for different application groups for identification and management purposes.

Examples

# Configure a description for application group aaa.

<Sysname> system-view

[Sysname] app-group aaa

[Sysname-app-group-aaa] description "User defined aaa group"

Related commands

app-group

description (user-defined NBAR application rule view)

Use description to configure the description of a user-defined NBAR application rule.

Use undo description to restore the default.

Syntax

description text

undo description

Default

A user-defined NBAR application rule is described as "User defined rule".

Views

User-defined NBAR application rule view

Predefined user roles

network-admin

Parameters

text: Specifies a description, a case-sensitive string of 1 to 127 characters.

Usage guidelines

Configure descriptions for different user-defined NBAR application rules for identification and management purposes.

Examples

# Configure a description for user-defined NBAR application rule 1.

<Sysname> system-view

[Sysname] nbar user-defined-application abcd

[Sysname-user-defined-app-abcd] rule 1 l4-protocol tcp l5-protocol http pattern-type keyword

[Sysname-user-defined-app-abcd-rule-1] description "A user-defined rule"

Related commands

nbar user-defined-application

rule

description (user-defined NBAR application view)

Use description to configure the description of a user-defined NBAR application.

Use undo description to restore the default.

Syntax

description text

undo description

 

Default

A user-defined NBAR application is described as "User defined application".

Views

User-defined NBAR application view

Predefined user roles

network-admin

Parameters

text: Specifies a description, a case-sensitive string of 1 to 127 characters.

Usage guidelines

Configure descriptions for different user-defined NBAR applications for identification and management purposes.

Examples

# Configure a description for user-defined NBAR application abcd.

<Sysname> system-view

[Sysname] nbar user-defined-application abcd

[Sysname-user-defined-app-abcd] description "A user-defined application based on HTTP"

destination address

Use destination address to specify a destination IP address or subnet as a match criterion in a user-defined NBAR application rule.

Use undo destination address to restore the default.

Syntax

destination address ip ipv4-address [ mask-length ]

undo destination address

Default

A user-defined NBAR application rule matches packets destined for all IP addresses.

Views

User-defined NBAR application rule view

Predefined user roles

network-admin

Parameters

ip ipv4-address: Specifies a destination IPv4 address or IPv4 subnet, in dotted decimal notation.

mask-length: Specifies the mask length for IPv4 addresses, in the range of 0 to 32. If you do not specify this argument, the default mask length is 32.

Usage guidelines

If you execute this command multiple times for the same user-defined NBAR application rule, the most recent configuration takes effect.

Examples

# Configure user-defined NBAR application rule 1 to match packets destined for IPv4 subnet 192.168.1.0/24.

<Sysname> system-view

[Sysname] nbar user-defined-application abcd

[Sysname-user-defined-app-abcd] rule 1 l4-protocol tcp l5-protocol http pattern-type keyword

[Sysname-user-defined-app-abcd-rule-1] destination address ip 192.168.1.0 24

destination port

Use destination port to specify a destination port number or port range as a match criterion in a user-defined NBAR application rule.

Use undo destination port to restore the default.

Syntax

destination port { port-num | range start-port to end-port }

undo destination port

Default

A user-defined NBAR application rule matches packets destined for all port numbers.

Views

User-defined NBAR application rule view

Predefined user roles

network-admin

Parameters

port-num: Specifies a destination port number, in the range of 0 to 65535.

range: Specifies a destination port range.

start-port: Specifies a start port number, in the range of 0 to 65534.

to end-port: Specifies an end port number, in the range of 1 to 65535. The end port number must be greater than the start port number.

Usage guidelines

If you execute this command multiple times for the same user-defined NBAR application rule, the most recent configuration takes effect.

Examples

# Configure user-defined NBAR application rule 1 to match packets destined for a port number in the range of 2001 to 2004.

<Sysname> system-view

[Sysname] nbar user-defined-application abcd

[Sysname-user-defined-app-abcd] rule 1 l4-protocol tcp l5-protocol http pattern-type keyword

[Sysname-user-defined-app-abcd-rule-1] destination port range 2001 to 2004

detection

Use detection to configure a detection item for a keyword-type signature.

Use undo detection to delete detection items for a keyword-type signature.

Syntax

detection detection-id field field-name match-type { exclude | include } { hex hex-vector | regex regex-pattern | text text-string } [ offset offset-value [ depth depth-value ] | relative-offset relative-offset-value [ relative-depth relative-depth-value ] ]

undo detection { all | detection-id }

 

Default

No detection items are configured for a keyword-type signature.

Views

Keyword-type NBAR rule signature view

Predefined user roles

network-admin

Parameters

detection-id: Specifies a detection item ID in the range of 1 to 32.

field field-name: Specifies a protocol field by its name. The detection item is matched in the scope of the specified protocol field. You can enter a question mark to obtain a list of supported protocol fields.

match-type { exclude | include }: Specifies the match type as exclude or include.

hex hex-vector: Specifies a hexadecimal vector as the match pattern. The hex-vector argument is a string of 8 to 126 characters. The number of characters must be even. The argument must start and end with a vertical bar (|), for example, |1234567890|.

regex regex-pattern: Specifies a regular expression as the match pattern. The regex-pattern argument is a case-sensitive string of 3 to 253 characters.

text text-string: Specifies a string as the match pattern. The string argument is a case-sensitive string of 3 to 256 characters.

offset offset-value: Specifies the offset from the beginning of the specified protocol field, in the range of 0 to 65535 bytes. A packet matches the signature after the offset. If you do not specify this option, a packet matches the signature from the beginning of the specified protocol field.

depth depth-value: Specifies the depth of the detection item, in the range of 3 to 65535 bytes.

relative-offset relative-offset-value: Specifies the offset from the end of the previous detection item, in the range of -32767 to -1 and 1 to 32767 bytes. A packet matches the signature after the offset. If the offset value is minus, the detection item is before the previous detection item.

relative-depth relative-depth-value: Specifies the relative depth of the detection item, in the range of 3 to 65535 bytes.

all: Specifies all detection items.

Usage guidelines

You can configure multiple detection items for a signature. The relationship among detection items is logic AND, and the match order is the configuration order. A packet matches a signature only if all detection items are matched.

As a best practice to ensure correct detection results, configure the protocol fields in the order they appear in HTTP packets.

Examples

# Configure a detection item in user-defined NBAR rule signature 1.

<Sysname> system-view

[Sysname] nbar user-defined-application app_http

[Sysname-user-defined-app-app_http] rule 1 l4-protocol tcp l5-protocol http pattern-type keyword

[Sysname-user-defined-app-app_http-rule-1] keyword-signature 1 field http.uri include text abcdefg

[Sysname-user-defined-app-app_http-rule-1-signature-1] detection 1 field http.uri match-type include text abc offset 10 depth 50

detect-length

Use detect-length to set the maximum detected length for a user-defined NBAR application.

Use undo detect-length to restore the default.

Syntax

detect-length value

undo detect-length

Default

The maximum detected length is not set for a user-defined NBAR application.

Views

User-defined NBAR application view

Predefined user roles

network-admin

Parameters

value: Specifies the maximum detected length in the range of 0 to 4294967295 bytes.

Usage guidelines

The maximum detected length determines whether to inspect subsequent packets after the device recognizes an application:

·     If the inspected byte count already reaches the maximum number, the device will not inspect subsequent packets.

·     If the inspected byte count does not reach the maximum number, the device will inspect subsequent packets until the maximum number is reached.

If no maximum detected length is configured, the device continues to inspect subsequent packets for application recognition after recognizing an application. Inspection of subsequent packets affects device performance.

When you set the maximum detected length, make sure you fully understand its impact on system performance.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Set the maximum detected length to 100000 bytes for user-defined NBAR application abcd.

<Sysname> system-view

[Sysname] nbar user-defined-application abcd

[Sysname-user-defined-app-abcd] detect-length 100000

Related commands

nbar user-defined-application

direction

Use direction to specify a direction as a match criterion in a user-defined NBAR application rule.

Use undo direction to restore the default.

Syntax

direction { to-client | to-server }

undo direction

Default

A user-defined NBAR application rule matches packets in both directions.

Views

User-defined NBAR application rule view

Predefined user roles

network-admin

Parameters

to-client: Specifies the direction from server to client.

to-server: Specifies the direction from client to server.

Usage guidelines

To modify the direction, execute the undo direction command before configuring the new direction.

Examples

# Configure user-defined NBAR application rule 1 to match packets from client to server.

<Sysname> system-view

[Sysname] nbar user-defined-application abcd

[Sysname-user-defined-app-abcd] rule 1 l4-protocol tcp l5-protocol http pattern-type keyword

[Sysname-user-defined-app-abcd-rule-1] direction to-server

Related commands

rule

disable

Use disable to disable a user-defined NBAR application rule.

Use undo disable to restore the default.

Syntax

disable

undo disable

Default

A user-defined NBAR application rule is enabled.

Views

User-defined NBAR application rule view

Predefined user roles

network-admin

Usage guidelines

Use this command to disable a user-defined NBAR application rule if the following conditions exist:

·     The NBAR application rule will not be used in the foreseeable future.

·     You do not want to delete the NBAR application rule.

Examples

# Disable user-defined NBAR application rule 1.

<Sysname> system-view

[Sysname] nbar user-defined-application abcd

[Sysname-user-defined-app-abcd] rule 1 l4-protocol tcp l5-protocol http pattern-type keyword

[Sysname-user-defined-app-abcd-rule-1] disable

Related commands

rule

display app-group

Use display app-group to display information about the specified application groups.

Syntax

display app-group [ name group-name ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

name group-name: Specifies an application group by its name. The group-name argument is a case-insensitive string of 1 to 63 characters. The names invalid and other are not allowed. If you do not specify an application group, this command displays information about all application groups.

Examples

# Display information about all application groups.

<Sysname> display app-group

User-defined count:3

Group Name                         Type           Group ID

 6767                               User-defined   0x00800002

 er                                 User-defined   0x00800001

 hbc                                User-defined   0x00800003

# Display information about application group er.

<Sysname> display app-group name er

 Group English name: er

 Group Chinese name: er

 Group ID:           0x00800001

 Type:               User-defined

 

Application count:  2

 Include application list:

 Application name                   Type           App ID

 114Travel                          Pre-defined    0x0000542c

 banc                                User-defined   0x00800001

 

pre-defined app-group count:0

 Include pre-defined app-group list:

 App-group name                     Type           App-group ID

Table 1 Command output

Field

Description

User-defined count

Number of application groups.

Group Name

Name of the application group.

Group English name

English name of the application group.

Type

Application protocol attribute:

·     Pre-defined.

·     User-defined.

This filed always displays User-defined for application groups.

Application count

Number of application protocols in the application group.

Include application list

Application protocol list.

Application name

Application protocol name.

App ID

Application protocol ID.

pre-defined app-group count

Number of predefined application groups in the application group.

This field is not supported in the current software version.

Include pre-defined app-group list

List of predefined application groups.

This field is not supported in the current software version.

App-group name

Name of a predefined application group.

This field is not supported in the current software version.

App-group ID

ID of a predefined application group.

This field is not supported in the current software version.

 

Related commands

app-group

include

display application

Use display application to display information about the specified application protocols.

Syntax

display application [ pre-defined | user-defined ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

pre-defined: Specifies the predefined application protocols.

user-defined: Specifies the user-defined application protocols.

Usage guidelines

If you do not specify any parameters, this command displays information about all application protocols.

Examples

# Display information about all predefined application protocols.

<Sysname> display application pre-defined

 Pre-defined count: 817

 

 Application name         Type         App ID      Tunnel  Encrypted  DetectLen

 12530WAP_Application_We  Pre-defined  0x000003ac  No      No         0

 b_HTTP

 12580_Application_HTTP   Pre-defined  0x00000312  No      No         0

 126_Web_Email_Download_  Pre-defined  0x000002b7  No      No         0

 HTTP

 126_Web_Email_Login_HTT  Pre-defined  0x000002b3  No      No         0

 P

 126_Web_Email_Read_Emai  Pre-defined  0x000002b4  No      No         0

 l_HTTP

 126_Web_Email_Receive_E  Pre-defined  0x000002b6  No      No         0

 mail_HTTP

 126_Web_Email_Send_Emai  Pre-defined  0x000002b5  No      No         0

 l_HTTP

 126_Web_Email_Upload_HT  Pre-defined  0x000002b8  No      No         0

 TP

 139_mobile_weibo_commen  Pre-defined  0x000001da  No      No         0

 t_HTTP

 139_mobile_weibo_login_  Pre-defined  0x000001d9  No      No         0

 HTTP

 139_mobile_weibo_login_  Pre-defined  0x00000444  No      No         0

---- More ----

# Display information about all user-defined application protocols.

<Sysname> display application user-defined

 User-defined count: 4

 

 Application name         Type         App ID      Tunnel  Encrypted  DetectLen

 def                      User-defined  0x00800002  No      No         0

 dfer                     User-defined  0x00800003  No      No         0

 efer                     User-defined  0x00800004  No      No         0

 fdfad                    User-defined  0x00800001  No      No         0

# Display information about all application protocols.

<Sysname> display application

 Total count:        821

 Pre-defined count:  817

 User-defined count: 4

 

 Application name         Type         App ID      Tunnel  Encrypted  DetectLen

 12530WAP_Application_We  Pre-defined  0x000003ac  No      No         0

 b_HTTP

 12580_Application_HTTP   Pre-defined  0x00000312  No      No         0

 126_Web_Email_Download_  Pre-defined  0x000002b7  No      No         0

 HTTP

 126_Web_Email_Login_HTT  Pre-defined  0x000002b3  No      No         0

 P

 126_Web_Email_Read_Emai  Pre-defined  0x000002b4  No      No         0

 l_HTTP

 126_Web_Email_Receive_E  Pre-defined  0x000002b6  No      No         0

 mail_HTTP

 126_Web_Email_Send_Emai  Pre-defined  0x000002b5  No      No         0

 l_HTTP

 126_Web_Email_Upload_HT  Pre-defined  0x000002b8  No      No         0

 TP

 139_mobile_weibo_commen  Pre-defined  0x000001da  No      No         0

 t_HTTP

 139_mobile_weibo_login_  Pre-defined  0x000001d9  No      No         0

 HTTP

 139_mobile_weibo_login_  Pre-defined  0x00000444  No      No         0

 HTTPS

 139Mail_Login_HTTP       Pre-defined  0x000001cb  No      No         0

 139Mail_Login_HTTPS      Pre-defined  0x0000038c  No      No         0

 139Mail_Login_TCP        Pre-defined  0x0000044b  No      No         0

 163TV_HTTP               Pre-defined  0x000004c3  No      No         0

 17173_Application_HTTP   Pre-defined  0x00000350  No      No         0

 178Game_Application_HTT  Pre-defined  0x00000222  No      No         0

 P

 17K_fiction_Application  Pre-defined  0x00000330  No      No         0

 _HTTP

 19lou_Login_http_stream  Pre-defined  0x000002c0  No      No         0

 

 19lou_Publish_Or_Reply_  Pre-defined  0x000002c2  No      No         0

 http_stream1

 19lou_Publish_Or_Reply_  Pre-defined  0x000002c3  No      No         0

 http_stream2

 19lou_View_http_stream   Pre-defined  0x000002c1  No      No         0

 1ting_Music_Application  Pre-defined  0x000001bc  No      No         0

 _Mobile_HTTP

 21CN_Email_Read_HTTP     Pre-defined  0x000003fb  No      No         0

 21CN_Email_Send_HTTP     Pre-defined  0x000003fc  No      No         0

---- More ----

Table 2 Command output

Field

Description

Total count

Total number of application protocols.

Pre-defined count

Number of predefined application protocols.

User-defined count

Number of user-defined application protocols.

Application name

Name of the application protocol.

Type

Application protocol type:

·     Pre-defined.

·     User-defined.

App ID/Application ID

ID of the application protocol.

Tunnel

Whether or not the protocol is a tunnel protocol, such as L2TP:

·     Yes.

·     No.

Encrypted

Whether or not the protocol is a cryptographic protocol:

·     Yes.

·     No.

DetectLen

Length of data to be inspected for application recognition. The length can be predefined or user defined.

The measurement unit is byte.

 

Related commands

app-group

include

display application statistics

Use display application statistics to display statistics for the specified application protocols.

Syntax

display application statistics [ direction { inbound | outbound } | interface interface-type interface-number [ slot slot-number ] | name application-name ] *

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

direction: Specifies the direction of the interface.

inbound: Specifies the inbound direction.

outbound: Specifies the outbound direction.

interface interface-type interface-number: Specifies an interface by its type and number.

slot slot-number: Specifies a card by its slot number. This option is available only for global interfaces, such as VLAN interfaces and tunnel interfaces.

name application-name: Specifies an application protocol by its name, a case-insensitive string of 1 to 63 characters. The names invalid and other are not allowed.

Usage guidelines

If you do not specify any options or keywords, this command displays statistics for application protocols on all interfaces in both inbound and outbound directions.

This command displays statistics for application protocols only after the application statistics feature is enabled on the specified interfaces. Disabling the application statistics feature on the specified interfaces deletes the corresponding application statistics.

You can display statistics for application protocols based on certain criteria, including application protocol names, interface directions, interface names, or a combination of the criteria.

Examples

# Display application statistics for GigabitEthernet 0/0/1.

<Sysname> display application statistics interface gigabitethernet 0/0/1

Interface : GigabitEthernet0/0/1

Application   In/Out  Packets            Bytes                PPS      BPS

Slot 1 :

http            IN      275                78631                0         275

                 OUT     357                255251               0        101

https           IN      403                39267                0        44

                 OUT     681                623501               0        32

netbios-dgm    IN      3                  729                   0        32

                 OUT     0                  0                     0        0

netbios-ns     IN      248                22816                2        1423

                 OUT     0                  0                     0        0

telnet          IN      801                43374                10      4509

                 OUT     1519               65388                20      6774

# Display application statistics for Vlan-interface 2.

<Sysname> display application statistics interface Vlan-interface 2

Interface : Vlan-interface2

Application   In/Out  Packets            Bytes                PPS      BPS

Slot 1 :

http            IN      275                78631                0         275

                 OUT     357                255251               0        101

https           IN      403                39267                0        44

                 OUT     681                623501               0        32

netbios-dgm    IN      3                  729                   0        32

                 OUT     0                  0                     0        0

netbios-ns     IN      248                22816                2        1423

                 OUT     0                  0                     0        0

telnet          IN      801                43374                10      4509

                 OUT     1519               65388                20      6774

Table 3 Command output

Field

Description

Interface

Interface name.

Application

Name of the application protocol.

In/Out

Interface direction:

·     In—Inbound.

·     Out—Outbound.

Packets

Number of packets received or sent by the interface.

Bytes

Number of bytes received or sent by the interface.

PPS

Packets received or sent per second.

BPS

Bytes received or sent per second.

 

Related commands

app-group

application statistics enable

display application statistics top

Use display application statistics top to display statistics for application protocols on an interface in descending order, based on the specified criteria.

Syntax

display application statistics top number { bps | bytes | packets | pps } interface interface-type interface-number [ slot slot-number ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

number: Specifies the number of application statistics entries to be displayed. The value range is 0 to 4294967295.

bytes: Sorts application protocols by traffic size in bytes.

bps: Sorts application protocols by traffic rate in bps.

packets: Sorts application protocols by traffic size in packet count.

pps: Sorts application protocols by traffic rate in pps.

interface interface-type interface-number: Specifies an interface by its type and number.

slot slot-number: Specifies a card by its slot number. This option is available only for global interfaces, such as VLAN interfaces and tunnel interfaces.

Usage guidelines

This command displays application statistics only after the application statistics feature is enabled on the specified interface. Disabling the application statistics feature on the interface deletes the existing statistics.

The system uses the sum of inbound and outbound statistics to rank the application protocols. If the sum statistics for multiple application protocols is the same, the system displays these protocols in alphabetical order.

Examples

# Display the top three application protocols that have received and sent the most packets on GigabitEthernet 0/0/1.

<Sysname> display application statistics top 3 packets interface gigabitethernet 0/0/1

Interface : GigabitEthernet0/0/1

Application   In/Out Packets            Bytes                PPS      BPS

Slot 1 :

telnet          IN     1389               75219                0        44

                 OUT    2626               112745               0        54

https           IN     468                42830                0        123

                 OUT    746                626101               0        91

netbios-ns     IN     965                88780                2        1411

                 OUT    0                  0                     0        0

# Display the top three application protocols that have received and sent the most packets on Vlan-interface 2.

<Sysname> display application statistics top 3 packets interface Vlan-interface 2

Interface : Vlan-interface2

Application   In/Out Packets            Bytes                PPS      BPS

Slot 1 :

telnet          IN     1389               75219                0        44

                 OUT    2626               112745               0        54

https           IN     468                42830                0        123

                 OUT    746                626101               0        91

netbios-ns     IN     965                88780                2        1411

                 OUT    0                  0                     0        0

Table 4 Command output

Field

Description

Interface

Interface name.

Application

Name of the application.

In/Out

Interface direction:

·     In—Inbound.

·     Out—Outbound.

Packets

Number of packets received or sent by the interface.

Bytes

Number of bytes received or sent by the interface.

PPS

Packets received or sent per second.

BPS

Bytes received or sent per second.

 

Related commands

app-group

application statistics enable

display apr signature library

Use display apr signature library to display APR signature library information.

Syntax

display apr signature library

Views

Any view

Predefined user roles

network-admin

network-operator

Examples

# Display APR signature library information.

<Sysname> display apr signature library

APR signature library information:

Type       SigVersion         ReleaseTime                  Size

Current    1.0.49             Tue Sep 13 06:54:01 2016   659744

Last        1.0.52             Wed Nov 02 07:14:03 2016   702640

Factory    1.0.0              Fri Dec 31 16:00:00  1999   77040

Table 5 Command output

Field

Description

Type

Version type of the APR signature library:

·     Current.

·     Last.

·     Factory.

SigVersion

Version of the APR signature library.

ReleaseTime

Release time of the APR signature library.

Size

Size of the APR signature library, in bytes.

 

display port-mapping pre-defined

Use display port-mapping pre-defined to display information about the predefined port-mappings.

Syntax

display port-mapping pre-defined

Views

Any view

Predefined user roles

network-admin

network-operator

Examples

# Display information about all predefined port mappings.

<Sysname> display port-mapping pre-defined

Application                     Protocol Port

afs3-kaserver                   TCP        7004

                                   UDP        7004

aol                               TCP        5190, 5191, 5192, 5193

                                   UDP        5190, 5191, 5192, 5193

appleqtc                         TCP        458

                                   UDP        458

bgp                               TCP        179

                                   UDP        179

Table 6 Command output

Field

Description

Application

Application using the port mapping.

Protocol

Transport layer protocol.

Port

Port number of the application.

 

Related commands

display port-mapping

port-mapping

include application

Use include application to add application protocols to an application group.

Use undo include application to remove application protocols from an application group.

Syntax

include application application-name

undo include application application-name

Default

No application protocols exist in an application group.

Views

Application group view

Predefined user roles

network-admin

Parameters

application-name: Specifies an application protocol by its name, a case-insensitive string of 1 to 63 characters. The names invalid and other are not allowed.

Usage guidelines

Execute this command multiple times to add multiple predefined or user-defined application protocols to an application group. The number of application protocols in an application group is not limited.

If you add a nonexistent application protocol to the application group, the system first creates the protocol before adding it to the application group. Whether the device can recognize the packets of this protocol depends on your configuration.

Examples

# Add HTTP and FTP to group abc.

<Sysname> system-view

[Sysname] app-group abc

[Sysname-app-group-abc] include application http

[Sysname-app-group-abc] include application ftp

Related commands

app-group

copy app-group

integer-signature

Use integer-signature to create an integer-type signature for a user-defined NBAR application rule.

Use undo integer-signature to cancel the signature configuration.

Syntax

integer-signature field field-name { { eq | nequ } number | range start-number to end-number }

undo integer-signature

 

Default

No integer-type signatures are configured for a user-defined NBAR application rule.

Views

User-defined NBAR application rule view

Predefined user roles

network-admin

Parameters

field field-name: Specifies a protocol field by its name. You can enter a question mark to obtain a list of supported protocol fields.

eq: Matches the protocol field equal to the specified length.

nequ: Matches the protocol field not equal to the specified length.

number: Specifies a protocol field length in the range of 1 to 4294967295 bytes.

range: Specifies a protocol field length range.

start-number: Specifies a start value of the range, in the range of 1 to 4294967294 bytes.

to end-number: Specifies an end value of the range, in the range of 2 to 4294967295 bytes. The end value must be greater than the start value.

Usage guidelines

A packet matches an integer-type signature if the length of the protocol field is matched.

Only one integer-type signature can be configured for a user-defined NBAR application rule.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Configure signature 1 in user-defined NBAR application rule 1 to match packets with the length of the HTTP-URL protocol filed as 100.

<Sysname> system-view

[Sysname] nbar user-defined-application abcd

[Sysname-user-defined-app-abcd] rule 1 l4-protocol tcp l5-protocol http pattern-type integer

[Sysname-user-defined-app-abcd-rule-1] integer-signature filed http.uri eq 100

keyword-signature

Use keyword-signature to create a keyword-type signature for a user-defined NBAR application rule and enter keyword-type signature view, or enter the view of an existing keyword-type signature.

Use undo keyword-signature to cancel the signature configuration.

Syntax

keyword-signature signature-id field field-name include { hex hex-vector | text text-string } [ [ offset offset-value ] [ depth depth-value ] ]

undo keyword-signature { signature-id | all}

Default

No keyword-type signatures are configured for a user-defined NBAR application rule.

Views

User-defined NBAR application rule view

Predefined user roles

network-admin

Parameters

signature-id: Specifies the signature ID in the range of 1 to 10.

field field-name: Specifies a protocol field by its name. You can enter a question mark to obtain a list of supported protocol fields.

include: Includes the specified content.

hex hex-vector: Specifies a hexadecimal vector as the match pattern. The hex-vector argument is a string of 8 to 126 characters. The argument must start and end with a vertical bar (|) and must contain an even number of characters, for example, |123456|.

text text-string: Specifies a string as the match pattern. The string argument is a case-sensitive string of 3 to 127 characters.

offset offset-value: Specifies the offset from the beginning of the data field, in bytes. The value range for the offset-value argument is 1 to 65535. A packet matches the signature after the offset. If you do not specify this option, a packet matches the signature from the beginning. If you also specify the field field-name option, the offset begins from the protocol field.

depth depth-value: Specifies the detection depth from the start position, in the range of 3 to 65535 bytes. If you do not specify this option, the whole protocol field is detected.

Usage guidelines

This command can be executed only for a keyword-type NBAR application rule.

If you execute this command multiple times with the same signature ID, the most recent configuration takes effect.

Examples

# Configure signature 1 in user-defined NBAR application rule 1 to define packet match string abcdefg and enter the signature view.

<Sysname> system-view

[Sysname] nbar user-defined-application abcd

[Sysname-user-defined-app-abcd] rule 1 l4-protocol tcp l5-protocol http pattern-type keyword

[Sysname-user-defined-app-abcd-rule-1] keyword-signature 1 filed http.uri include text abcdefg

[Sysname-user-defined-app-abcd-rule-1-signature-1]

Related commands

detection

rule

nbar user-defined-application

Use nbar user-defined-application to create a user-defined NBAR application and enter its view, or enter the view of an existing NBAR application rule.

Use undo nbar user-defined-application to delete a user-defined NBAR application.

Syntax

nbar user-defined-application application-name

undo nbar user-defined-application application-name

Default

No user-defined NBAR applications exist.

Views

System view

Predefined user roles

network-admin

Parameters

application-name: Specifies an application protocol by its name, a case-insensitive string of 1 to 63 characters. The following names are not allowed:

·     invalid.

·     other.

·     Names of predefined application protocols.

Usage guidelines

You can configure rules, match logic among rules, priority, and risk type for an application.

Examples

# Create a user-defined NBAR application named abcd and enter its view.

<Sysname> system-view

[Sysname] nbar user-defined-application app1

[Sysname-user-defined-app-app1]

override-current

Use override-current to overwrite the current signature file for an update operation if the APR signature library is automatically updated at a regular basis.

Use undo override-current to restore the default.

Syntax

override-current

undo override-current

Default

If the APR signature library is automatically updated at a regular basis, the current APR signature file is not overwritten for an update operation. Instead, the device will back up the current APR signature file.

Views

Auto-update configuration view

Predefined user roles

network-admin

Usage guidelines

Use this command only if the device memory is insufficient.

This command disables the APR signature library from being rolled back to the last version. Do not use this command if the device memory is sufficient.

Examples

# Overwrite the current APR signature file for a regular online auto-update operation.

<Sysname> system-view

[Sysname] apr signature auto-update

[Sysname-apr-autoupdate] override-current

Related commands

apr signatures auto-update

port-mapping

Use port-mapping to configure a general port mapping.

Use undo port-mapping to remove a general port mapping.

Syntax

port-mapping application application-name port port-number [ protocol protocol-name ]

undo port-mapping application application-name port port-number [ protocol protocol-name ]

Default

An application is mapped to a common port.

Views

System view

Predefined user roles

network-admin

Parameters

application application-name: Specifies an application by its name. You can enter a question mark to obtain a list of supported applications.

port port-number: Specifies a port by its number, in the range of 0 to 65535.

protocol protocol-name: Specifies a transport layer protocol by its name, including:

·     dccp: Specifies DCCP.

·     sctp: Specifies SCTP.

·     tcp: Specifies TCP.

·     udp: Specifies UDP.

·     udp-lite: Specifies UDP-Lite.

Usage guidelines

If no transport layer protocol is specified, packets that meet the following conditions are recognized as the specified application's packets:

·     Packets are encapsulated by any transport layer protocol.

·     Packets have the specified port.

If the destination port of a packet matches a general port mapping, APR recognizes the packet as the specified application's packet.

A mapping with the transport layer protocol specified has a higher priority than one without it.

If two port mappings are configured with the same port number and transport layer protocol, but with different applications, the most recent configuration takes effect.

To change the port number mapped to an application, perform the following tasks:

1.     Use the undo port-mapping application command to remove the existing general port mapping.

2.     Use the port-mapping application command to specify a different port number for the application.

Examples

# Create a general port mapping of port 3456 to FTP.

<Sysname> system-view

[Sysname] port-mapping application ftp port 3456

Related commands

display port-mapping user-defined

port-mapping acl

Use port-mapping acl to configure an ACL-based host-port mapping.

Use undo port-mapping acl to remove an ACL-based host-port mapping.

Syntax

port-mapping application application-name port port-number [ protocol protocol-name ] acl [ ipv6 ] acl-number

undo port-mapping application application-name port port-number [ protocol protocol-name ] acl [ ipv6 ] acl-number

Default

An application is mapped to a common port.

Views

System view

Predefined user roles

network-admin

Parameters

application application-name: Specifies an application by its name. You can enter a question mark to obtain a list of applications.

port port-number: Specifies a port by its number in the range of 0 to 65535.

protocol protocol-name: Specifies a transport layer protocol by its name, including:

·     dccp: Specifies DCCP.

·     sctp: Specifies SCTP.

·     tcp: Specifies TCP.

·     udp: Specifies UDP.

·     udp-lite: Specifies UDP-Lite.

acl [ ipv6 ] acl-number: Specifies the number of an ACL, in the range of 2000 to 2999. To specify an IPv6 ACL, include the ipv6 keyword. To specify an IPv4 ACL, do not include the ipv6 keyword. The ACL will not count traffic that matches this ACL-based host-port mapping even if match counting is enabled for the ACL.

Usage guidelines

APR uses ACL-based host-port mappings to recognize packets. A packet is recognized as an application packet when it matches all the following conditions in a mapping:

·     The packet's destination IP address matches the specified source IP address defined in the ACL.

·     The packet's destination port matches the specified port in the mapping.

·     The transport layer protocol that encapsulates the packet matches the specified transport layer protocol if you specify a transport layer protocol in the mapping.

If two port mappings are configured with the same port number, transport layer protocol, and ACL, but with different applications, the most recent configuration takes effect.

A mapping with the transport layer protocol specified has a higher priority than one without it.

Examples

# Create a port mapping of port 3456 to FTP for the packets matching ACL 2000.

<Sysname> system-view

[Sysname] port-mapping application ftp port 3456 acl 2000

Related commands

display port-mapping user-defined

port-mapping host

Use port-mapping host to configure an IP address-based host-port mapping.

Use undo port-mapping host to remove an IP address-based host-port mapping.

Syntax

port-mapping application application-name port port-number [ protocol protocol-name ] host { ip | ipv6 } start-ip-address [ end-ip-address ] [ vpn-instance vpn-instance-name ]

undo port-mapping application application-name port port-number [ protocol protocol-name ] host { ip | ipv6 } start-ip-address [ end-ip-address ] [ vpn-instance vpn-instance-name ]

Default

An application is mapped to a common port.

Views

System view

Predefined user roles

network-admin

Parameters

application application-name: Specifies an application by its name. You can enter a question mark to obtain a list of applications.

port port-number: Specifies a port by its number, in the range of 0 to 65535.

protocol protocol-name: Specifies a transport layer protocol by its name, including:

·     dccp: Specifies DCCP.

·     sctp: Specifies SCTP.

·     tcp: Specifies TCP.

·     udp: Specifies UDP.

·     udp-lite: Specifies UDP-Lite.

ip: Specifies IPv4 addresses.

ipv6: Specifies IPv6 addresses.

start-ip-address [ end-ip-address ]: Specifies a range of IPv4 or IPv6 addresses. The start-ip-address argument represents the start IP address, and the end-ip-address argument represents the end IP address. To specify only one IP address, provide only the start IP address. To specify a range of IP addresses, provide both the start and end IP addresses, and make sure the end IP address is higher than the start IP address.

vpn-instance vpn-instance-name: Specifies an MPLS L3VPN instance by its name, a case-sensitive string of 1 to 31 characters. If you configure a mapping for the public network, do not specify this option.

Usage guidelines

APR uses IP address-based host-port mappings to recognize packets. A packet is recognized as an application packet when it matches all the following conditions in a mapping:

·     The packet is destined for the specified IP address or IP subnet in the mapping.

·     The packet's destination port matches the specified port in the mapping.

·     The transport layer protocol that encapsulates the packet matches the specified transport layer protocol if you specify a transport layer protocol in the mapping.

No overlapping of IP addresses is tolerable for the host-port mappings configured with the same application, port number, and transport layer protocol.

If two port mappings are configured with the same port number, transport layer protocol, and IP address or IP address ranges, but with different applications, the most recent configuration takes effect.

A mapping with the transport layer protocol specified has a higher priority than one without it.

Examples

# Create a mapping of port 3456 to FTP for the IPv4 packets sent to the host at 1.1.1.1 to 1.1.1.10.

<Sysname> system-view

[Sysname] port-mapping application ftp port 3456 host ip 1.1.1.1 1.1.1.10

# Create a mapping of port 3456 to FTP for the IPv6 packets sent to 1::1.

<Sysname> system-view

[Sysname] port-mapping application ftp port 3456 host ipv6 1::1

Related commands

display port-mapping user-defined

port-mapping subnet

Use port-mapping subnet to configure a subnet-based host-port mapping.

Use undo port-mapping subnet to remove a subnet-based host-port mapping.

Syntax

port-mapping application application-name port port-number [ protocol protocol-name ] subnet { ip ipv4-address { mask-length | mask } | ipv6 ipv6-address prefix-length } [ vpn-instance vpn-instance-name ]

undo port-mapping application application-name port port-number [ protocol protocol-name ] subnet { ip ipv4-address { mask-length | mask } | ipv6 ipv6-address prefix-length } [ vpn-instance vpn-instance-name ]

Default

An application is mapped to a common port.

Views

System view

Predefined user roles

network-admin

Parameters

application application-name: Specifies an application by its name. You can enter a question mark to obtain a list of applications.

port port-number: Specifies a port by its number, in the range of 0 to 65535.

protocol protocol-name: Specifies a transport layer protocol by its name, including:

·     dccp: Specifies DCCP.

·     sctp: Specifies SCTP.

·     tcp: Specifies TCP.

·     udp: Specifies UDP.

·     udp-lite: Specifies UDP-Lite.

ip ipv4-address { mask-length | mask }: Specifies an IPv4 subnet.

·     The ipv4-address argument specifies the IPv4 network address.

·     The mask-length argument specifies the mask length of the IPv4 subnet, in the range of 1 to 32.

·     The mask argument specifies the subnet mask in dotted decimal notation.

ipv6 ipv6-address prefix-length: Specifies an IPv6 subnet. The ipv6-address argument specifies the IPv6 network address, and the prefix-length argument specifies the length of the IPv6 prefix, in the range of 1 to 128.

vpn-instance vpn-instance-name: Specifies an MPLS L3VPN instance by its name, a case-sensitive string of 1 to 31 characters. If you configure a mapping for the public network, do not specify this option.

Usage guidelines

APR uses subnet-based host-port mappings to recognize packets. A packet is recognized as an application packet when it matches all the following conditions in a mapping:

·     The packet is destined for the specified IP subnet in the mapping.

·     The packet's destination port matches the specified port in the mapping.

·     The transport layer protocol that encapsulates the packet matches the specified transport layer protocol if you specify a transport layer protocol in the mapping.

If multiple subnet-based mappings are applied to packets and these subnets overlap, APR matches the packets destined for the overlapped segment with the port mapping of the subnet that has the smallest range.

If two port mappings are configured with the same port number, transport layer protocol, and subnet, but with different applications, the most recent configuration takes effect.

A mapping with the transport layer protocol specified has a higher priority than one without it.

Examples

# Create a mapping of port 3456 to FTP for the packets sent to the IPv4 hosts on subnet 1.1.1.0/24.

<Sysname> system-view

[Sysname] port-mapping application ftp port 3456 subnet ip 1.1.1.0 24

# Create a mapping of port 3456 to FTP for the packets sent to the IPv6 hosts on subnet 1:: /120.

<Sysname> system-view

[Sysname] port-mapping application ftp port 3456 subnet ipv6 1:: 120

Related commands

display port-mapping user-defined

priority

Use priority to set a priority for a user-defined NBAR application.

Use undo priority to restore the default.

Syntax

priority priority-level

undo priority

Default

No priority is configured for a user-defined NBAR application.

Views

User-defined NBAR application view

Predefined user roles

network-admin

Parameters

priority-level: Specifies a priority in the range of 1 to 255. The greater the priority value, the higher the priority.

Usage guidelines

When a packet matches multiple applications with different priorities, the application with the highest priority applies. When a packet matches multiple applications with the same priority, the application first configured applies.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Set the priority to 201 for user-defined NBAR application abcd.

<Sysname> system-view

[Sysname] nbar user-defined-application abcd

[Sysname-user-defined-app-abcd] priority 201

reset application statistics

Use reset application statistics to clear application statistics for interfaces.

Syntax

reset application statistics [ interface interface-type interface-number ]

Views

User view

Predefined user roles

network-admin

Parameters

interface interface-type interface-number: Specifies an interface by its type and number. If you do not specify an interface, this command clears application statistics for all interfaces.

Examples

# Clear application statistics for GigabitEthernet 0/0/1.

<Sysname> reset application statistics interface gigabitethernet 0/0/1

# Clear application statistics for all interfaces.

<Sysname> reset application statistics

Related commands

application statistics enable

display application statistics

risk type

Use risk type to configure a risk type for a user-defined NBAR application.

Use undo risk type to remove a risk type of a user-defined NBAR application.

Syntax

risk type risk-type

undo risk type [ risk-type ]

 

Default

A user-defined NBAR application does not have any risk type.

Views

User-defined NBAR application view

Predefined user roles

network-admin

Parameters

risk-type: Specifies a risk type by its name. You can enter a question mark (?) to obtain a list of supported risk types.

Usage guidelines

You can configure this command multiple times to specify multiple risk types for a user-defined NBAR application. The more risk types a user-defined NBAR application has, the higher risk level the application has. You can configure security policies according to the risk level.

If you do not specify a risk type when executing the undo risk type command, all risk types of the user-defined NBAR application are removed.

Examples

# Configure risk type Misoperation for user-defined NBAR application app1.

<Sysname> system-view

[Sysname] nbar user-defined-application app1

[Sysname-user-defined-app-app1] risk type Misoperation

rule

Use rule to configure a rule for a user-defined NBAR application and enter the rule view, or enter the view of an existing user-defined NBAR application rule.

Use undo rule to delete a user-defined NBAR application rule.

Syntax

rule rule-id l4-protocol l4-protocol-name l5-protocol l5-protocol-name pattern-type { keyword | integer }

undo rule { rule-id | all }

Default

No user-defined NBAR application rules exist.

Views

User-defined NBAR application view

Predefined user roles

network-admin

Parameters

rule-id: Specifies a rule ID in the range of 1 to 8. The smaller the priority value, the higher the priority.

l4-protocol l4-protocol-name: Specifies a Layer 4 protocol (transport layer protocol) by its name. You can enter a question mark (?) to obtain a list of supported Layer 4 protocols.

l5-protocol l5-protocol-name: Specifies a Layer 5 protocol (application layer protocol) by its name. You can enter a question mark (?) to obtain a list of supported Layer 5 protocols.

pattern-type: Specifies a pattern type.

keyword: Specifies the keyword type.

integer: Specifies the integer type.

all: Specifies all rules.

Usage guidelines

You can configure multiple rules for a user-defined NBAR application. The match logic among multiple rules is configured by using the rule match-logic command.

To modify the contents of rule, you must delete the rule and create a new rule.

Examples

# Create rule 1 for user-defined NBAR application myapp.

<Sysname> system-view

[Sysname] nbar user-defined-application myapp

[Sysname-user-defined-app-myapp] rule 1 l4-protocol tcp l5-protocol http pattern-type keyword

[Sysname-user-defined-app-myapp-rule-1]

rule match-logic

Use rule match-logic to configure the rule match logic of a user-defined NBAR application.

Use undo rule match-logic to restore the default.

Syntax

rule match-logic { and | or }

undo rule match-logic

Default

The rule match logic of a user-defined NBAR application is OR.

Views

User-defined NBAR application view

Predefined user roles

network-admin

Parameters

and: Specifies logic AND.

or: Specifies logic OR.

Usage guidelines

When the match logic is AND, a packet matches a user-defined NBAR application if it matches all rules of the application. When the match logic is OR, a packet matches a user-defined NBAR application if it matches any one of the rules of the application.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# configure the rule match logic of user-defined NBAR application myapp as AND.

<Sysname> system-view

[Sysname] nbar user-defined-application myapp

[Sysname-user-defined-app-myapp] rule match-logic and

source address

Use source address to specify a source IP address or subnet as a match criterion in a user-defined NBAR application rule.

Use undo source address to restore the default.

Syntax

source address ip ipv4-address [ mask-length ]

undo source address

 

Default

A user-defined NBAR rule matches packets sourced from all IP addresses.

Views

User-defined NBAR application rule view

Predefined user roles

network-admin

Parameters

ip ipv4-address: Specifies a source IPv4 address or IPv4 subnet, in dotted decimal notation.

mask-length: Specifies the mask length for IPv4 addresses, in the range of 0 to 32.

Usage guidelines

If you execute this command multiple times for the same NBAR rule, the most recent configuration takes effect.

Examples

# Configure user-defined NBAR rule 1 to match packets sourced from IPv4 subnet 192.168.2.0/24.

<Sysname> system-view

[Sysname] nbar user-defined-application abcd

[Sysname-user-defined-app-abcd] rule 1 l4-protocol tcp l5-protocol http pattern-type keyword

[Sysname-user-defined-app-abcd-rule-1] source address ip 192.168.2.0 24

source port

Use source port to specify a source IP address or subnet as a match criterion in a user-defined NBAR application rule.

Use undo source port to restore the default.

Syntax

source port { port-num | range start-port to end-port }

undo source port

 

Default

A user-defined NBAR rule matches packets sourced from all port numbers.

Views

User-defined NBAR application rule view

Predefined user roles

network-admin

Parameters

port-num: Specifies a source port number, in the range of 0 to 65535.

range: Specifies a source port range.

start-port: Specifies a start port number, in the range of 0 to 65534.

to end-port: Specifies an end port number, in the range of 1 to 65535. The end port number must be greater than the start port number.

Usage guidelines

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Configure user-defined NBAR rule 1 to match packets from a port number in the range of 2001 to 2004.

<Sysname> system-view

[Sysname] nbar user-defined-application abcd

[Sysname-user-defined-app-abcd] rule 1 l4-protocol tcp l5-protocol http pattern-type keyword

[Sysname-user-defined-app-abcd-rule-1] source port range 2001 to 2004

update schedule

Use update schedule to set the update schedule for automatic update, including the update interval and update time.

Use undo update schedule to restore the default.

Syntax

update schedule { daily | weekly { fri | mon | sat | sun | thu | tue | wed } } start-time time tingle minutes

undo update schedule

Default

The device automatically updates the APR signature library between 02:01:00 to 04:01:00 every day.

Views

Auto-update configuration view

Predefined user roles

network-admin

Parameters

daily: Specifies the daily update interval.

weekly: Specifies the weekly update interval. You can specify one day in a week for the update:

·     fri: Specifies Friday.

·     mon: Specifies Monday.

·     sat: Specifies Saturday.

·     sun: Specifies Sunday.

·     thu: Specifies Thursday.

·     tue: Specifies Tuesday.

·     wed: Specifies Wednesday.

start-time time: Specifies the start time for the update, in the format of hh:mm:ss. The value range for the time argument is 00:00:00 to 23:59:59.

tingle minutes: Specifies the tolerance time in minutes. The value range for the minutes argument is 0 to 120 minutes. An automatic update will occur at a time point between the following time points:

·     Start time minus half of the tolerance time.

·     Start time plus half of the tolerance time.

For example, if the specified start time is 01:00:00 and the tolerance time is 60 minutes, the update starts during the period from 00:30:00 to 01:30:00.

Usage guidelines

Examples

# Configure the device to automatically update the APR signature library at 23:10:00 every Monday with a tolerance time of 10 minutes.

<Sysname> system-view

[Sysname] apr signature auto-update

[Sysname-apr-autoupdate] update schedule weekly mon start-time 23:10:00 tingle 10

Related commands

apr signature auto-update

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网