13-Security Command Reference

HomeSupportRoutersCR16000-F SeriesReference GuidesCommand ReferencesH3C CR16000-F Routers Command Reference-R838x-6W10113-Security Command Reference
20-SMA commands
Title Size Download
20-SMA commands 92.88 KB

SMA commands

display sma-anti-spoof ipv6 address-prefix

Use display sma-anti-spoof ipv6 address-prefix to display IPv6 prefix information.

Syntax

In standalone mode:

display sma-anti-spoof ipv6 address-prefix [ acs address-domain-level level-value ] [ slot slot-number [ cpu cpu-number ] ]

In IRF mode:

display sma-anti-spoof ipv6 address-prefix [ acs address-domain-level level-value ] [ chassis chassis-number slot slot-number [ cpu cpu-number ] ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

acs address-domain-level level-value: Specifies ACSs at the specified AD level. The level-value argument represents the AD level in the range of 0 to 3.

slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command displays IPv6 prefix information on the active MPU. (In standalone mode.)

chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The chassis-number argument represents the member ID of the IRF member device. The slot-number argument represents the slot number of the card. If you do not specify a card, this command displays IPv6 prefix information on the global active MPU. (In IRF mode.)

cpu cpu-number: Specifies a CPU by its number. This option is available only if multiple CPUs are available on the specified slot.

Examples

# Display IPv6 prefix information.

<Sysname> display sma-anti-spoof ipv6 address-prefix

Alliance number: 1

  ACS address-domain level: 1

    Address-domain ID: 1023

     IPv6 prefix: AA:AA::/64

     Effective at: May 1 14:12:49 2021

     Address-domain level: 3

     Common level: 0

     Address-domain cnt: 4

     Address-domain list: 12 34 56 78

Table 1 Command output

Field

Description

Alliance number

Trust alliance ID.

ACS address-domain level

AD level of the ACS.

Address-domain ID

AD ID of the IPv6 prefix.

IPv6 prefix

IPv6 prefix list of the AD.

Effective at

Time when the IPv6 prefix starts to take effect. Letter i in the round brackets indicates that the prefix takes effect immediately when the AER receives the prefix.

Address-domain level

AD level of the IPv6 prefix.

Common level

Highest level of the common AD for the AER and IPv6 prefix.

Address-domain cnt

Number of ADs through which SMA packets with the IPv6 prefix is transmitted.

Address-domain list

List of ADs through which SMA packets with the IPv6 prefix is transmitted.

display sma-anti-spoof ipv6 packet-tag

Use display sma-anti-spoof ipv6 packet-tag to display SMA tag information for all AD pairs.

Syntax

In standalone mode:

display sma-anti-spoof ipv6 packet-tag [ acs address-domain-level level-value ] [ slot slot-number [ cpu cpu-number ] ]

In IRF mode:

display sma-anti-spoof ipv6 packet-tag [ acs address-domain-level level-value ] [ chassis chassis-number slot slot-number [ cpu cpu-number ] ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

acs address-domain-level level-value: Specifies ACSs at the specified AD level. The level-value argument represents the AD level in the range of 0 to 3.

slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command displays SMA tag information on the active MPU. (In standalone mode.)

chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The chassis-number argument represents the member ID of the IRF member device. The slot-number argument represents the slot number of the card. If you do not specify a card, this command displays SMA tag information on the global active MPU. (In IRF mode.)

cpu cpu-number: Specifies a CPU by its number. This option is available only if multiple CPUs are available on the specified slot.

Examples

# Display SMA tag information for all AD pairs.

<Sysname> display sma-anti-spoof ipv6 packet-tag

Alliance number: 1

  ACS address-domain level: 1

    Source address-domain ID: 10

    Destination address-domain ID: 11

    Tag: 0xABCD

    Transition interval: 10s

Table 2 Command output

Field

Description

Alliance number

Trust alliance ID.

ACS address-domain level

AD level for the ACS.

Source address-domain ID

Source AD ID.

Destination address-domain ID

Destination AD ID.

Tag

SMA tag, a binary number of up to 128 bits, displayed in hexadecimal format. For example, 0xABCD.

Transition interval

Tag aging timer in seconds. The tag ages out after the timer expires.

sma-anti-spoof ipv6 address-domain

Use sma-anti-spoof ipv6 address-domain to specify an AD for the AER.

Use undo sma-anti-spoof ipv6 address-domain to remove the AD specified for the AER.

Syntax

sma-anti-spoof ipv6 address-domain domain-id

undo sma-anti-spoof ipv6 address-domain

Default

No AD is specified for an AER.

Views

System view

Predefined user roles

network-admin

Parameters

domain-id: Specify the AD ID in the range of 1 to 2147483647.

Usage guidelines

The address domain (AD) concept is introduced to support the hierarchy structure of a trust or sub-trust alliance. You can divide ADs in the same sub-alliance into a maximum of four levels to form a hierarchy structure. Smaller the level number, higher the level. For example, create level 0 for a city, create level 1 for an institution in the city, and create level 2 for a building or department of the institution.

An ACS is required in each AD at every level to perform the following tasks:

·     Exchanges information with ACSs in other ADs at the same level.

·     Sends alliance mapping, IPv6 prefix, and tag information to AERs of the local AD.

The administrator manages members in an AD through ACS and updates IPv6 prefix and state machine information.

At different AD levels in a sub-alliance, you must specify a unique ID for each AD and the ID cannot be the same as the ID of the sub-alliance.

Each AD ID has a corresponding AD level, which is also defined by the administrator through ACS.

Examples

# Specify AD 1 for the AER.

<Sysname> system-view

[Sysname] sma-anti-spoof ipv6 address-domain 1

sma-anti-spoof ipv6 enable

Use sma-anti-spoof ipv6 enable to enable SMA.

Use undo sma-anti-spoof ipv6 enable to disable SMA.

Syntax

sma-anti-spoof ipv6 enable

undo sma-anti-spoof ipv6 enable

Default

SMA is disabled.

Views

System view

Predefined user roles

network-admin

Usage guidelines

You must enable SMA for all SMA configurations to take effect.

Examples

# Enable SMA.

<Sysname> system-view

[Sysname] sma-anti-spoof ipv6 enable

Related commands

sma-anti-spoof ipv6 filter enable

sma-anti-spoof ipv6 server

sma-anti-spoof ipv6 filter enable

Use sma-anti-spoof ipv6 filter enable to enable AER packet filtering.

Use undo sma-anti-spoof ipv6 filter enable to disable AER packet filtering.

Syntax

sma-anti-spoof ipv6 filter enable

undo sma-anti-spoof ipv6 filter enable

Default

AER packet filtering is disabled.

Views

System view

Predefined user roles

network-admin

Usage guidelines

In an SMA network, upon receiving a packet to the ACS, the AER removes the SMA-Option from the packet and then directly forwards the packet to the ACS without verifying the packet tag. This prevents ACS communication failures caused by AER errors. However, packet forwarding without tag verification might cause security issues.

To solve the issue, you can enable AER packet filtering for the AER to verify the validity of tags in packets destined to its ACS and drop packets that fail the verification.

As a best practice, enable this feature only when the network is insecure.

This feature takes effect only when SMA is enabled. To enable SMA, execute the sma-anti-spoof ipv6 enable command.

Examples

# Enable AER packet filtering.

<Sysname> system-view

[Sysname] sma-anti-spoof ipv6 filter enable

Related commands

sma-anti-spoof ipv6 enable

sma-anti-spoof ipv6 port-type

Use sma-anti-spoof ipv6 port-type to configure an SMA interface type.

Use undo sma-anti-spoof ipv6 port-type to restore the default.

Syntax

sma-anti-spoof ipv6 port-type { egress level level-value | ingress }

undo sma-anti-spoof ipv6 port-type

Default

An interface is not an SMA interface and does not perform SMA.

Views

Layer 3 Ethernet interface view

Layer 3 Ethernet subinterface view

Layer 3 aggregate interface view

Layer 3 aggregate subinterface view

VLAN interface view

FlexE logical interface view

Predefined user roles

network-admin

Parameters

egress: Configures an interface as an SMA egress interface.

level level-value: Specifies the highest AD level for the SMA egress interface. The value range is 0 to 3. A smaller value represents a higher level.

ingress: Configures an interface as an SMA ingress interface.

Usage guidelines

To ensure correct packet classification, tag adding, tag checking, and packet forwarding, you must configure the SMA interface type. SMA interfaces include the following types:

·     Ingress interface—Connected to an SMA-disabled router in the local AD.

·     Egress interface—Connected to an AER in another AD.

Examples

# Configure Ten-GigabitEthernet 3/1/1 as an SMA egress interface at level 0.

<Sysname> system-view

[Sysname] interface ten-gigabitethernet 3/1/1

[Sysname-Ten-GigabitEthernet3/1/1] sma-anti-spoof ipv6 port-type egress level 0

Related commands

sma-anti-spoof ipv6 enable

sma-anti-spoof ipv6 server

Use sma-anti-spoof ipv6 server to configure a link between an AER and its ACS.

Use undo sma-anti-spoof ipv6 server to restore the default.

Syntax

sma-anti-spoof ipv6 server ipv6-address client client-ipv6-address [ ssl-client-policy policy-name ] address-domain-level level-value

undo sma-anti-spoof ipv6 server address-domain-level level-value

Default

No link is configured between an AER and its ACS.

Views

System view

Predefined user roles

network-admin

Parameters

ipv6-address: Specifies the ACS IPv6 address.

client client-ipv6-address: Specifies the IPv6 address of the AER client.

ssl-client-policy policy-name: Specifies an existing SSL client policy by its name, a case-insensitive string of 1 to 31 characters. If you do not specify this option, the command establishes a TCP link.

address-domain-level level-value: Specifies the AD level of the ACS server, in the range of 0 to 3.

Usage guidelines

Use the sma-anti-spoof ipv6 enable command to enable SMA before you use this command to configure a link between an AER and its ACS. If you specify a nonexistent SSL client policy, the SSL link between the AER and ACS cannot be established.

As a best practice for security purposes, configure an SSL link when the network is insecure.

For the AER to communicate with the ACS server, you must use this command to specify the AD level of the ACS server based on the AD level obtained from the network topology. If you do not do so or specify an inconsistent AD level, the AER cannot communicate with the ACS.

The AER can communicate with only one ACS server at an AD level.

You can specify only one AD level for an ACS server.

Examples

# Configure the AER to establish an SSL link with the ACS at 1::1 by using SSL client policy ssl, specify the client address as 1::2, and specify the ACS AD level as 1.

<Sysname> system-view

[Sysname] sma-anti-spoof ipv6 server 1::1 client 1::2 ssl-client-policy ssl address-domain-level 1

# Configure the AER to establish a TCP link with the ACS at 1::1, specify the client address as 1::2, and specify the ACS AD level as 1.

<Sysname> system-view

[Sysname] sma-anti-spoof ipv6 server 1::1 client 1::2 address-domain-level 1

Related commands

sma-anti-spoof ipv6 enable

sma-anti-spoof ipv6 sub-alliance

Use sma-anti-spoof ipv6 sub-alliance to specify a sub-trust alliance for the AER.

Use undo sma-anti-spoof ipv6 sub-alliance to remove the specified sub-trust alliance for the AER.

Syntax

sma-anti-spoof ipv6 sub-alliance sub-alli-number

undo sma-anti-spoof ipv6 sub-alliance

Default

No sub-trust alliance is specified for an AER.

Views

System view

Predefined user roles

network-admin

Parameters

sub-alli-number: Specifies the sub-trust alliance ID in the range of 1 to 255.

Usage guidelines

In a trust alliance, each AER must maintain 2(n-1) state machines, where n represents the number of ASs in the alliance. This requires great maintenance efforts and a huge storage space if a large number of ASs exist in an alliance. To solve the issue, SMA allows you to divide a trust alliance into multiple sub-trust alliances.

In a sub-trust alliance, an AS that connects to the AER in another sub-alliance is called an edge AS. The main edge AS elected by the ACS registers with the trust alliance on behalf of the sub-alliance, and only the main edge AS maintains the state machines. The main edge AS sends the sub-alliance tag to all the ACSs in the sub-alliance, and the ACSs send the tag to AERs. This significantly reduces the workload on AERs.

Examples

# Specify sub-trust alliance 1 to the AER.

<Sysname> system-view

[Sysname] sma-anti-spoof ipv6 sub-alliance 1

Related commands

sma-anti-spoof ipv6 enable

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网