- Table of Contents
-
- 16-Security Command Reference
- 00-Preface
- 01-ACL commands
- 02-Time range commands
- 03-User profile commands
- 04-Password control commands
- 05-Public key management commands
- 06-PKI commands
- 07-IPsec commands
- 08-SSH commands
- 09-SSL commands
- 10-SSL VPN commands
- 11-Session management commands
- 12-Connection limit commands
- 13-Attack detection and prevention commands
- 14-IP source guard commands
- 15-ARP attack protection commands
- 16-ND attack defense commands
- 17-ASPF commands
- 18-Protocol packet rate limit commands
- 19-Crypto engine commands
- 20-Security policy commands
- 21-Object group commands
- Related Documents
-
Title | Size | Download |
---|---|---|
12-Connection limit commands | 114.78 KB |
Contents
display connection-limit ipv6-stat-nodes
display connection-limit statistics
display connection-limit stat-nodes
reset connection-limit statistics
Connection limit commands
connection-limit
Use connection-limit to create a connection limit policy and enter its view, or enter the view of an existing connection limit policy.
Use undo connection-limit to delete a connection limit policy.
Syntax
connection-limit { ipv6-policy | policy } policy-id
undo connection-limit { ipv6-policy | policy } policy-id
Default
No connection limit policies exist.
Views
System view
Predefined user roles
network-admin
Parameters
ipv6-policy: Specifies an IPv6 connection limit policy.
policy: Specifies an IPv4 connection limit policy.
policy-id: Specifies the ID of a connection limit policy, in the range of 1 to 32. An IPv4 or IPv6 connection limit policy has its own number.
Examples
# Create IPv4 connection limit policy 1 and enter its view.
<Sysname> system-view
[Sysname] connection-limit policy 1
[Sysname-connlmt-policy-1]
# Create IPv6 connection limit policy 12 and enter its view.
<Sysname> system-view
[Sysname] connection-limit ipv6-policy 12
[Sysname-connlmt-ipv6-policy-12]
Related commands
connection-limit apply
connection-limit apply global
display connection-limit
limit
connection-limit apply
Use connection-limit apply to apply a connection limit policy to an interface.
Use undo connection-limit apply to remove a connection limit policy from an interface.
Syntax
connection-limit apply { ipv6-policy | policy } policy-id
undo connection-limit apply { ipv6-policy | policy }
Default
No connection limit policy is applied to an interface.
Views
Interface view
Predefined user roles
network-admin
Parameters
ipv6-policy: Specifies an IPv6 connection limit policy.
policy: Specifies an IPv4 connection limit policy.
policy-id: Specifies the ID of a connection limit policy, in the range of 1 to 32.
Usage guidelines
Only one IPv4 connection limit policy and one IPv6 connection limit policy can be applied to an interface. A new IPv4 or IPv6 connection limit policy overwrites the old one.
Examples
# Apply IPv4 connection limit policy 1 to VLAN-interface 2.
<Sysname> system-view
[Sysname] interface vlan-interface 2
[Sysname-Vlan-interface2] connection-limit apply policy 1
# Apply IPv6 connection limit policy 12 to VLAN-interface 2.
<Sysname> system-view
[Sysname] interface vlan-interface 2
[Sysname-Vlan-interface2] connection-limit apply ipv6-policy 12
Related commands
connection-limit
limit
connection-limit apply global
Use connection-limit apply global to apply a connection limit policy globally.
Use undo connection-limit apply global to remove the application.
Syntax
connection-limit apply global { ipv6-policy | policy } policy-id
undo connection-limit apply global { ipv6-policy | policy }
Default
No connection limit policy is applied globally.
Views
System view
Predefined user roles
network-admin
Parameters
ipv6-policy: Specifies an IPv6 connection limit policy.
policy: Specifies an IPv4 connection limit policy.
policy-id: Specifies the ID of a connection limit policy, in the range of 1 to 32.
Usage guidelines
Only one IPv4 connection limit policy and one IPv6 connection limit policy can be applied globally. A new IPv4 or IPv6 connection limit policy overwrites the old one.
Examples
# Apply IPv4 connection limit policy 1 globally.
<Sysname> system-view
[Sysname] connection-limit apply global policy 1
# Apply IPv6 connection limit policy 12 globally.
<Sysname> system-view
[Sysname] connection-limit apply global ipv6-policy 12
connection-limit
limit
description
Use description to configure a description for a connection limit policy.
Use undo description to restore the default.
Syntax
description text
undo description
Default
A connection limit policy does not have a description.
Views
IPv4 connection limit policy view
IPv6 connection limit policy view
Predefined user roles
network-admin
Parameters
text: Specifies a description, a case-sensitive string of 1 to 127 characters.
Usage guidelines
If you execute this command multiple times, the most recent configuration takes effect.
Examples
# Configure the description as CenterToA for IPv4 connection limit policy 1.
<Sysname> system-view
[Sysname] connection-limit policy 1
[Sysname-connlmt-policy-1] description CenterToA
Related commands
display connection-limit
display connection-limit
Use display connection-limit to display information about connection limit policies.
Syntax
display connection-limit { ipv6-policy | policy } { policy-id | all }
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
ipv6-policy: Specifies an IPv6 connection limit policy.
policy: Specifies an IPv4 connection limit policy.
policy-id: Specifies the ID of a connection limit policy, in the range of 1 to 32.
all: Specifies all connection limit policies.
Examples
# Display information about all IPv4 connection limit policies.
<Sysname> display connection-limit policy all
3 policies in total:
Policy Rule Stat Type HiThres LoThres Rate PermitNew ACL
--------------------------------------------------------------------------------
0 1 Src-Dst-Port 2000 1800 10 No 3000
12 Src-Dst 500 45 0 Yes 3001
255 -- 1000000 980000 0 No 2001
1 2 Dst-Port 800 70 0 Yes 3010
3 Src-Dst 100 90 0 No 3000
10 Src-Dst-Port 50 45 0 No 3003
11 Src 200 200 0 No 3004
200 -- 500000 498000 0 No 2002
28 4 Port 1500 1400 0 No 3100
5 Dst 3000 280 0 No 3101
21 Src-Dst 200 180 0 No 3102
25 Src-Port 50 35 0 No 3200
Description list:
Policy Description
--------------------------------------------------------------------------------
1 IPv4Description1
28 Description for IPv4 28
# Display information about IPv4 connection limit policy 1.
<Sysname> display connection-limit policy 1
IPv4 connection limit policy 1 has been applied 5 times, and has 5 limit rules.
Description: IPv4Description1
Limit rule list:
Policy Rule Stat Type HiThres LoThres Rate PermitNew ACL
--------------------------------------------------------------------------------
1 2 Dst-Port 800 70 0 Yes 3010
3 Src-Dst 100 90 0 No 3000
10 Src-Dst-Port 50 45 0 No 3003
11 Src 200 200 0 No 3004
200 -- 500000 498000 0 No 2002
Application list:
GigabitEthernet1/0/1
GigabitEthernet1/0/2
Vlan-interface2
Global
# Display information about all IPv6 connection limit policies.
<Sysname> display connection-limit ipv6-policy all
2 policies in total:
Policy Rule Stat Type HiThres LoThres Rate PermitNew ACL
--------------------------------------------------------------------------------
3 1 Src-Dst 1000 800 10 Yes 3010
2 Dst 500 450 0 Yes 3001
4 2 Src-Dst-Port 800 700 0 No 3010
3 Src 100 90 0 No 3020
200 -- 100000 89000 0 No 2005
Description list:
Policy Description
--------------------------------------------------------------------------------
3 IPv6Description3
4 Description for IPv6 4
# Display information about IPv6 connection limit policy 3.
<Sysname> display connection-limit ipv6-policy 3
IPv6 connection limit policy 3 has been applied 3 times, and has 2 limit rules.
Description: IPv6Description3
Limit rule list:
Policy Rule Stat Type HiThres LoThres Rate PermitNew ACL
--------------------------------------------------------------------------------
3 1 Src-Dst 1000 800 0 Yes 3010
2 Dst 500 450 0 No 3001
Application list:
GigabitEthernet1/0/1
Vlan-interface2
Field |
Description |
Limit rule list |
Connection limit policy information. |
Policy |
Number of the connection limit policy. |
Rule |
Number of the connection limit rule. |
Stat Type |
Statistics types: · Src-Dst-Port—Limits connections by source IP, destination IP, and service combination. · Src-Dst—Limits connections by source IP address and destination IP address combination. · Src-Port—Limits connections by source IP and service combination. · Dst-Port—Limits connections by destination IP and service combination. · Src—Limits connections by source IP address. · Dst—Limits connections by destination IP address. · Port—Limits connections by service. · Dslite—Limits connections by B4 device of a DS-Lite tunnel.(This value is not supported in the current software version.) · --—Limits connections not by a specific IP address or service. All connections that match the ACL used by the rule are limited. |
HiThres |
Upper limit of the connections. |
LoThres |
Lower limit of the connections. |
Rate |
Maximum number of connections established per second. |
ACL |
Number or name of the ACL used by the rule. |
PermitNew |
Permit new connections when the connection count or connection rate exceeds the threshold. |
Application list |
Application list of the connection limit policy, including interface name and Global. Global indicates that the connection limit policy is applied globally. |
Description |
Connection limit policy description. |
Description list |
List of connection limit policy descriptions. |
Related commands
connection-limit
connection-limit apply
connection-limit apply global
limit
display connection-limit ipv6-stat-nodes
Use display connection-limit ipv6-stat-nodes to display statistics about IPv6 connections that match connection limit rules globally or on an interface.
Syntax
display connection-limit ipv6-stat-nodes { global | interface interface-type interface-number } [ { deny-new | permit-new } | destination destination-ip | service-port port-number | source source-ip ] * [ count ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
global: Displays statistics about IPv6 connections that match connection limit rules globally.
interface interface-type interface-number: Specifies an interface by its type and number.
deny-new: Displays limit rule-based statistics sets of which new connections are rejected.
permit-new: Displays limit rule-based statistics sets of which new connections are allowed.
destination destination-ip: Specifies a destination by its IP address.
service-port port-number: Specifies a service port by its port number.
source source-ip: Specifies a source by its IP address.
count: Displays only the number of limit rule-based statistics sets. Detailed information about the specified IPv6 connections is not displayed. If you do not specify this keyword, the command displays detailed information about the specified IPv6 connections that match connection limit rules.
Usage guidelines
The statistics for this command include the following information:
· Connection information, including the source/destination IP address, service port, and transport layer protocol of connections.
· Matching connection limit rules.
· Number of current connections.
· Whether or not new connections can be created.
To further filter the output statistics, specify the following options in the command:
· source source-ip.
· destination destination-ip.
· service-port port-number.
· permit-new.
· deny-new.
For example, if you specify the source source-ip and destination destination-ip combination, this command displays statistics about IPv6 connections that match connection limit rules by source IP address and destination IP address.
If you specify none of the previously mentioned parameters, this command displays statistics about all IPv6 connections that match connection limit rules.
Deleting or modifying an IPv6 connection limit policy will not delete the effective IPv6 connection limit rule-based statistics sets. An IPv6 connection limit rule-based statistics set will be automatically deleted after all the IPv6 connections for the set are disconnected.
Examples
# Display statistics about all IPv6 connections that match the connection limit rule on GigabitEthernet 1/0/1.
<Sysname> display connection-limit ipv6-stat-nodes interface gigabitethernet 1/0/1
Slot 0:
Src IP address : Any
VPN instance : vpn5
Dst IP address : fe80::5ed9:98ff:feb1:69b6
VPN instance : abcdefghijklmnopqrstuvwxyzabcde
DS-Lite tunnel peer : 9876543210
Service : tcp/12345
Limit rule ID : 12345(ACL: 3184)
Sessions threshold Hi/Lo: 1000000/90000
Sessions count : 150000
Sessions limit rate : 0
New session flag : Permit
# Display statistics about all IPv6 connections that match the connection limit rule on VLAN-interface 2.
<Sysname> display connection-limit ipv6-stat-nodes interface vlan-interface 2
Slot 0:
Src IP address : Any
VPN instance : vpn5
Dst IP address : fe80::5ed9:98ff:feb1:69b6
VPN instance : abcdefghijklmnopqrstuvwxyzabcde
DS-Lite tunnel peer : 9876543210
Service : tcp/12345
Limit rule ID : 12345(ACL: 3184)
Sessions threshold Hi/Lo: 1000000/90000
Sessions count : 150000
Sessions limit rate : 0
New session flag : Permit
# Display the number of limit rule-based statistics sets by source IP address 2::1.
<Sysname> display connection-limit ipv6-stat-nodes global source 2::1 count
Slot 0:
Current limit statistic nodes count is 16.
Table 2 Command output
Field |
Description |
Src IP address |
Source IP address. |
Dst IP address |
Destination IP address. |
VPN instance |
This field is not supported in the current software version. MPLS L3VPN instance to which the IP address belongs. Two hyphens (--) indicates that the IP address is on the public network. |
DS-Lite tunnel peer |
This field is not supported in the current software version. Peer IP address of the DS-Lite tunnel to which the connection belongs. Two hyphens (--) indicates that the connection does not belong to a DS-Lite tunnel. |
Service |
Protocol name and service port number. For an unwell-known protocol, this field displays unknown(xx).The cross signs (xx) indicates the protocol number. For the ICMP protocol, the protocol number is the decimal digits that are converted from the hexadecimal contents of the type and code fields. |
Limit rule ID |
ID of the matched rule. The ACL number of the rule is enclosed in parentheses. |
Sessions threshold Hi/Lo |
Upper and lower connection limits. |
Sessions count |
Number of current connections. |
Sessions limit rate |
Maximum number of connections established per second. |
New session flag |
Whether or not new connections can be created: · Permit—New connections can be created. · Deny—New connections cannot be created. NOTE: When the number of connections reaches the upper limit, this field displays Permit although new connections are not allowed. This field displays Deny only when the number of connections exceeds the upper limit. |
Related commands
connection-limit apply global ipv6-policy
connection-limit apply ipv6-policy
connection-limit ipv6-policy
limit
display connection-limit statistics
Use display connection-limit statistics to display the connection limit statistics globally or on an interface.
Syntax
display connection-limit statistics { global | interface interface-type interface-number }
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
global: Displays the global connection limit statistics.
interface interface-type interface-number: Specifies an interface by its type and number.
Examples
# Display the global connection limit statistics.
<Sysname> display connection-limit statistics global
Connection limit statistics (Global, slot 0):
Dropped IPv4 packets: 54781
Dropped IPv6 packets: 11457
Table 3 Command output
Field |
Description |
Dropped IPv4 packet |
Number of IPv4 packets that are dropped because the upper connection limit is exceeded for the IPv4 connection limit policy that is configured globally or on an interface. |
Dropped IPv6 packet |
Number of IPv6 packets that are dropped because the upper connection limit is exceeded for the IPv6 connection limit policy that is configured globally or on an interface. |
Related commands
connection-limit
connection-limit apply
connection-limit apply global
limit
display connection-limit stat-nodes
Use display connection-limit stat-nodes to display statistics about IPv4 connections that match connection limit rules globally or on an interface.
Syntax
display connection-limit stat-nodes { global | interface interface-type interface-number } [ { deny-new | permit-new } | destination destination-ip | service-port port-number | source source-ip ] * [ count ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
global: Displays statistics about IPv4 connections that match connection limit rules globally.
interface interface-type interface-number: Specifies an interface by its type and number.
deny-new: Displays limit rule-based statistics sets of which new connections are rejected.
permit-new: Displays limit rule-based statistics sets of which new connections are allowed.
destination destination-ip: Specifies a destination by its IP address.
service-port port-number: Specifies a service port by its port number.
source source-ip: Specifies a source by its IP address.
count: Displays only the number of limit rule-based statistics sets. Detailed information about the specified IPv4 connections is not displayed. If you do not specify this keyword, the command displays detailed information about the specified IPv4 connections that match connection limit rules.
Usage guidelines
The statistics for this command include the following information:
· Connection information, including the source/destination IP address, service port, and transport layer protocol of connections.
· Matching connection limit rules.
· Number of current connections.
· Whether or not new connections can be created.
To further filter the output statistics, specify the following options in the command:
· source source-ip.
· destination destination-ip.
· service-port port-number.
· permit-new.
· deny-new.
For example, if you specify the source source-ip and destination destination-ip combination, this command displays statistics about IPv4 connections that match connection limit rules by source IP address and destination IP address.
If you specify none of the previously mentioned parameters, this command displays statistics about all IPv4 connections that match connection limit rules.
Deleting or modifying an IPv4 connection limit policy will not delete the effective IPv4 connection limit rule-based statistics sets. An IPv4 connection limit rule-based statistics set will be automatically deleted after all the IPv4 connections for the set are disconnected.
Examples
# Display statistics about all IPv4 connections that match the connection limit rule on GigabitEthernet 1/0/1.
<Sysname> display connection-limit stat-nodes interface gigabitethernet 1/0/1
Slot 0:
Src IP address : 100.100.100.100
VPN instance : 0123456789012345678901234567890
Dst IP address : 200.200.200.200
VPN instance : abcdefghijklmnopqrstuvwxyzabcde
DS-Lite tunnel peer : 1234567890
Service : tcp/12345
Limit rule ID : 12345(ACL: 3001)
Sessions threshold Hi/Lo: 1100000/980000
Sessions count : 1050000
Sessions limit rate : 0
New session flag : Permit
# Display statistics about all IPv4 connections that match the connection limit rule on VLAN-interface 2.
<Sysname> display connection-limit stat-nodes interface vlan-interface 2
Slot 0:
Src IP address : 100.100.100.100
VPN instance : 0123456789012345678901234567890
Dst IP address : 200.200.200.200
VPN instance : abcdefghijklmnopqrstuvwxyzabcde
DS-Lite tunnel peer : 1234567890
Service : tcp/12345
Limit rule ID : 12345(ACL: 3001)
Sessions threshold Hi/Lo: 1100000/980000
Sessions count : 1050000
Sessions limit rate : 0
New session flag : Permit
# Display the number of global limit rule-based statistics sets.
<Sysname> display connection-limit stat-nodes global count
Slot 0:
Current limit statistic nodes count is 5.
Table 4 Command output
Field |
Description |
Src IP address |
Source IP address. |
Dst IP address |
Destination IP address. |
VPN instance |
This field is not supported in the current software version. MPLS L3VPN instance to which the IP address belongs. Two hyphens (--) indicates that the IP address is on the public network. |
DS-Lite tunnel peer |
This field is not supported in the current software version. Peer IP address of the DS-Lite tunnel to which the connection belongs. Two hyphens (--) indicates that the connection does not belong to a DS-Lite tunnel. |
Service |
Protocol name and service port number. For an unwell-known protocol, this field displays unknown(xx). The cross signs (xx) represents the protocol number. For the ICMP protocol, the protocol number is the decimal digits that are converted from the hexadecimal contents of the type and code fields. |
Sessions threshold Hi/Lo |
Upper and lower connection limits. |
Sessions count |
Number of current connections. |
Sessions limit rate |
Maximum number of connections established per second. |
New session flag |
Whether or not new connections can be created: · Permit—New connections can be created. · Deny—New connections cannot be created. NOTE: When the number of connections reaches the upper limit, this field displays Permit although new connections are not allowed. This field displays Deny only when the number of connections exceeds the upper limit. |
Related commands
connection-limit apply global policy
connection-limit apply policy
connection-limit policy
limit
limit
Use limit to configure a connection limit rule.
Use undo limit to delete a connection limit rule.
Syntax
In IPv4 connection limit policy view:
limit limit-id acl { acl-number | name acl-name } [ per-destination | per-service | per-source ] * { amount max-amount min-amount | rate rate } * [ description text | permit-new ] *
undo limit limit-id
In IPv6 connection limit policy view:
limit limit-id acl ipv6 { acl-number | name acl-name } [ per-destination | per-service | per-source ] * { amount max-amount min-amount | rate rate } * [ description text | permit-new ] *
undo limit limit-id
Default
No connection limit rules exist.
Views
IPv4 connection limit policy view
IPv6 connection limit policy view
Predefined user roles
network-admin
Parameters
limit-id: Specifies a connection limit rule by its ID in the range of 1 to 256.
acl: Specifies the ACL that matches the user range. Only the user connections that match the ACL are limited.
ipv6: Specifies an IPv6 ACL. If you do not specify this keyword, an IPv4 ACL is used.
acl-number: Specifies an ACL by its number in the range of 2000 to 3999.
name acl-name: Specifies an ACL by its name. The acl-name argument is a case-insensitive string of 1 to 63 characters. It must start with an English letter. To avoid confusion, it cannot be all.
per-destination: Limits connections by destination IP address.
per-service: Limits connections by service depending on transport layer protocol and service port.
per-source: Limits connections by source IP address.
amount: Limits the number of connections.
max-amount: Specifies the upper connection limit in the range of 1 to 4294967294. If the permit-new parameter is not specified, when user connections in a range or of a type exceed the upper limit, new connections cannot be created until the connection count drops below min-amount.
min-amount: Specifies the lower connection limit in the range of 1 to 4294967294. The lower connection limit cannot be greater than the upper connection limit. New connections cannot be created until the connection number goes below the lower connection limit.
rate: Limits the connection establishment rate.
rate: Specifies the maximum number of connections established per second. The value range is 5 to 10000000. If the permit-new parameter is not specified, when user connections in a range or of a type exceed this rate, new connections cannot be created until the connection rate drops below this rate.
description text: Specifies a description for the connection limit rule, a case-sensitive string of 1 to 127 characters. By default, a connection limit rule does not have a description.
permit-new: Permits new connections when the connection count or connection rate exceeds the threshold and generates alarm logs.
Usage guidelines
Each connection limit policy can define multiple rules, and each rule must specify the used ACL, rule type, and either of upper/lower connection limit and connection establishment rate limit. In one rule, you can specify one or multiple of the keywords per-destination, per-source, and per-service. For example, if the per-destination and per-source combination is specified, connections are limited by the source IP address and destination IP address. Connections with the same source IP address and destination IP address are the same type.
When you configure a connection limit rule, follow these guidelines:
· Different rules in the same connection limit policy must use different ACLs.
· If you specify none of the per-destination, per-source, and per-service keywords, all connections that match the specified ACL are limited by the specified value.
· When the connections established on a device are matched against a connection limit policy, the limit rules in the policy are matched in ascending order of rule ID.
· When the specified ACL changes, the connections that have been established are limited by the new connection limit policy.
Examples
# Configure connection limit rule 1 for IPv4 connection limit policy 1:
1. Configure ACL 3000.
<Sysname> system-view
[Sysname] acl advanced 3000
[Sysname-acl-ipv4-adv-3000] rule permit ip source 192.168.0.0 0.0.0.255
[Sysname-acl-ipv4-adv-3000] quit
2. Limit connections that match ACL 3000 by the source and destination IP addresses, with the upper limit 2000, lower limit 1800, and establishment rate 10 per second.
[Sysname] connection-limit policy 1
[Sysname-connlmt-policy-1] limit 1 acl 3000 per-destination per-source amount 2000 1800 rate 10
3. Verify that when the connection number exceeds 2000, new connections cannot be established until the connection number goes below 1800. (Details not shown.)
# Configure connection limit rule 1 for IPv4 connection limit policy 1:
1. Configure ACL 3000.
<Sysname> system-view
[Sysname] acl advanced 3000
[Sysname-acl-ipv4-adv-3000] rule permit ip source 192.168.0.0 0.0.0.255
[Sysname-acl-ipv4-adv-3000] quit
2. Limit connections that match ACL 3000 by the source and destination IP addresses, with the upper limit 2000, lower limit 1800, and establishment rate 10 per second. Specify the permit-new keyword.
[Sysname] connection-limit policy 1
[Sysname-connlmt-policy-1] limit 1 acl 3000 per-destination per-source amount 2000 1800 rate 10 permit-new
3. Verify that when the connection number exceeds 2000 or the connection rate exceeds 10 per second, new connections can be established but alarm logs are generated. (Details not shown.)
# Configure connection limit rule 2 for IPv6 connection limit policy 12:
1. Configure ACL 2001.
<Sysname> system-view
[Sysname] acl ipv6 basic 2001
[Sysname-acl-ipv6-basic-2001] rule permit source 2:1::/96
[Sysname-acl-ipv6-basic-2001] quit
2. Limit connections that match ACL 2001 by the source and destination IP addresses, with the upper limit 200, lower limit 100, and establishment rate 10 per second.
[Sysname] connection-limit ipv6-policy 12
[Sysname-connlmt-ipv6-policy-12] limit 2 acl ipv6 2001 per-destination amount 200 100 rate 10
3. Verify that when the connection number exceeds 200, new connections cannot be established until the connection number goes below 100. (Details not shown.)
# Configure connection limit rule 2 for IPv6 connection limit policy 12:
1. Configure ACL 2001.
<Sysname> system-view
[Sysname] acl ipv6 basic 2001
[Sysname-acl-ipv6-basic-2001] rule permit source 2:1::/96
[Sysname-acl-ipv6-basic-2001] quit
2. Limit connections that match ACL 2001 by the destination IP addresses, with the upper limit 200, lower limit 100, and establishment rate 10 per second. Specify the permit-new keyword.
[Sysname] connection-limit ipv6-policy 12
[Sysname-connlmt-ipv6-policy-12] limit 2 acl ipv6 2001 per-destination amount 200 100 rate 10
3. Verify that when the connection number exceeds 200 or the connection rate exceeds 10 per second, new connections can be established but alarm logs are generated. (Details not shown.)
connection-limit
display connection-limit
reset connection-limit statistics
Use reset connection-limit statistics to clear the connection limit statistics globally or on an interface.
Syntax
reset connection-limit statistics { global | interface interface-type interface-number }
Views
User view
Predefined user roles
network-admin
network-operator
Parameters
global: Clears the global connection limit statistics.
interface interface-type interface-number: Specifies an interface by its type and number.
Examples
# Clear the connection limit statistics on GigabitEthernet 1/0/1.
<Sysname> reset connection-limit statistics interface gigabitethernet 1/0/1
# Clear the connection limit statistics on VLAN-interface 2.
<Sysname> reset connection-limit statistics interface vlan-interface 2
display connection-limit statistics