12-Security Command Reference

HomeSupportRoutersCR16000-M SeriesReference GuidesCommand ReferencesH3C CR16000-M Routers Command Reference-R838x-6W10112-Security Command Reference
20-Trust level commands
Title Size Download
20-Trust level commands 96.35 KB

Trust level commands

bind ssl-server-policy

Use bind ssl-server-policy to bind an SSL policy for a server.

Use undo bind ssl-server-policy to unbind an SSL policy for a server.

Syntax

bind ssl-server-policy ssl-server-policy-name

undo bind ssl-server-policy

Default

No SSL policies for a server are bound.

Views

Trust-level-server view

Predefined user roles

network-admin

Parameters

ssl-server-policy-name: Specifies an SSL server policy by its name, a string of 1 to 31 case-insensitive characters.

Usage guidelines

With this command configured, when the trust level client initiates a connection request, the trust level server uses the SSL parameters specified by an SSL server policy to establish a connection, so as to enhance the connection security. For more information about SSL, see "Configuring SSL."

Before configuring this command, create an SSL server policy. Otherwise, the configuration fails.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Create an SSL server policy named ssl-p1 for the trust level server.

<Sysname> system-view

[Sysname] trust-level

[Sysname-trust-level] server enable

[Sysname-trust-level-server] bind ssl-server-policy ssl-p1

Related commands

ssl server-policy

boundary

Use boundary to specify boundary points to extract the packet security levels.

Use undo boundary to restore the default.

Syntax

boundary origin-point k0 level-point k1 k2 k3 k4 k5 k6 k7

undo boundary

Default

No boundary points for extracting the packet security levels are configured.

Views

Trust-level view

Predefined user roles

network-admin

Parameters

origin-point k0: Specifies the origin boundary point.

level-point k1 k2 k3 k4 k5 k6 k7: Specifies boundary point 1 to 7. You must enter the seven boundary points at one time. The boundary points are separated by spaces. For the convenience of users, when executing this command, enter the seven boundary points in any order.

Usage guidelines

This command can only be configured on trust level servers and takes effect on the clients. After configuring this command on a trust level server, the server deploys the configurations to the clients.

The boundary points can be used to determine the security levels of packets. Security level is an attribute carried in the packets to identify the security status of the packets. Packets are classified into eight security levels from 0 through 7 in ascending order. The larger the value, the better the security status.

·     When the terminal generates packets, it uses 3 bits in the last 64 bits of the source IPv6 addresses to identify the security levels of the packets. The terminal sends the source IPv6 addresses to an edge device after algorithm conversion.

·     After receiving the packets, the edge device compares the source IPv6 addresses of the received packets with the configured boundary points, and assigns corresponding security levels according to the comparison result. Then, the edge device maps the security levels to the trust levels, and the routing module selects the paths according to the trust levels so as to forward the packets.

The boundary points uses IPv6 address format. For more information about the generation method of the boundary points, see the configuration guide.

Examples

# Specify boundary points to extract the security level of the packets. (As the conversion algorithm on the client is unknown, below shows an example of the value for the k0 argument and the value for the k1 k2 k3 k4 k5 k6 k7 argument.)

<Sysname> system-view

[Sysname] trust-level

[Sysname-trust-level] server enable

[Sysname-trust-level-server] quit

[Sysname-trust-level] boundary origin-point ::8000:0:0:0 level-point ::2000:0:0:0 ::4000:0:0:0 ::6000:0:0:0 :: ::A000:0:0:0 ::C000:0:0:0 ::E000:0:0:0

Related commands

server enable

trust-level

client enable

Use client enable to enable the trust level client feature and enter trust-level-client view.

Use undo client enable to disable the trust level client feature.

Syntax

client enable

undo client enable

Default

The trust level client feature is disabled.

Views

Trust-level view

Predefined user roles

network-admin

Usage guidelines

With this command configured, a device acts as a trust level client and applies the configurations deployed by a trust level server.

Examples

# Enable the trust level client feature and enter trust-level-client view.

<Sysname> system-view

[Sysname] trust-level

[Sysname-trust-level] client enable

[Sysname-trust-level-client]

flex-algo

Use flex-algo to bind a flexible algorithm to a security level.

Use undo flex-algo to restore the default.

Syntax

flex-algo algorithm-id

undo flex-algo

Default

No flexible algorithm is bound to a security level.

Views

Packet security level view

Predefined user roles

network-admin

Parameters

algorithm-id: Specifies a flexible algorithm identifier, in the range of 128 to 255.

Usage guidelines

With this command configured, after receiving the packets with specified security levels, a device uses the routing topologies calculated by the flexible algorithms bound to the security levels for packet forwarding.

The flexible algorithms configured by this command must be contained in the flexible algorithms configured in IS-IS view. Otherwise, the trust level function cannot forward the packets according to the expected paths. For more information about flexible algorithms, see IS-IS configuration in Layer 3—IP Routing Configuration Guide.

Examples

# Bind flexible algorithm 128 to security level 5.

<Sysname> system-view

[Sysname] trust-level

[Sysname-trust-level] server enable

[Sysname-trust-level-server] quit

[Sysname-trust-level] security-level 5

[Sysname-trust-level-sec-5] flex-algo 128

Related commands

trust-level

isis-system-id

Use isis-system-id to specify an IS-IS System ID contained in a trust level policy.

Use undo isis-system-id to restore the default.

Syntax

isis-system-id system-id

undo isis-system-id

Default

No IS-IS System IDs contained in a trust level policy are configured.

Views

Trust-level-policy view

Predefined user roles

network-admin

Parameters

system-id: Specifies a device participating in trusted forwarding in a trust network.

Usage guidelines

An IS-IS System ID uniquely identifies a device in IS-IS protocol. The IS-IS System IDs can be obtained by using the network-entity command in IS-IS Command Reference.

If you execute this command multiple times in the same view, the most recent configuration takes effect.

Examples

# Specify IS-IS System ID 1680.1000.1001 contained in trust level policy a.

<Sysname> system-view

[Sysname] trust-level

[Sysname-trust-level] server enable

[Sysname-trust-level-server] quit

[Sysname-trust-level] policy a

[Sysname-trust-level-policy-a] isis-system-id 1680.1000.1001

Related commands

network-entity (Layer 3—IP Routing Command Reference)

policy

Use policy to create a trust level policy and enter trust-level-policy view, or enter trust-level-policy view if a trust level policy exists.

Use undo policy to delete a trust level policy.

Syntax

policy policy-name

undo policy policy-name

Default

No trust level policies exist.

Views

Trust-level view

Predefined user roles

network-admin

Parameters

policy-name: Specifies a trust level policy by its name, a string of 1 to 31 case-insensitive characters.

Usage guidelines

This command can only be configured on a server.

A trust level policy is used to bind a network transmission device to its trust level. Configure a trust level policy on the server for each network transmission device participating in forwarding in a trust network. The server deploys all configured trust policies to all clients. All devices participating in trusted forwarding in the network save a table containing the IS-IS System IDs and trust levels of all network transmission devices. The table can be used to calculate forwarding topologies.

You can create multiple trust policies. You need to configure a trust level policy for each network transmission device participating in trusted forwarding.

Examples

# Create trust level policy A and enter trust-level-policy view.

<Sysname> system-view

[Sysname] trust-level

[Sysname-trust-level] server enable

[Sysname-trust-level-server] quit

[Sysname-trust-level] policy A

[Sysname-trust-level-policy-a]

Related commands

isis-system-id

trust level

port trust-level enable

Use port trust-level enable to enable the trust level feature on an interface.

Use undo port trust-level enable to disable the trust level feature on an interface.

Syntax

port trust-level enable

undo port trust-level enable

Default

The trust level feature on an interface is disabled.

Views

Layer 3 Ethernet interface/subinterface view

Layer 3 aggregate interface/subinterface view

Predefined user roles

network-admin

Usage guidelines

To enable this command on a Layer 3 Ethernet or aggregate subinterface, make sure common Dot1q termination or common QinQ termination is enabled on the subinterface (by using the vlan-type dot1q vid or vlan-type dot1q vid second-dot1q command). For more information about VLAN termination commands, see Layer 2LAN Switching Command Reference.

This command can only be configured on the interfaces of an edge device connected to the trusted terminals.

With the trust level feature on the interfaces enabled, the edge device can extract the security levels of the received packets according to the boundary point configuration for trusted forwarding.

Do not configure this feature on non-edge devices. The packets received by non-edge devices can be forwarded normally according to the routes.

Examples

# Enable the trust level feature on Ten-GigabitEthernet3/0/1.

<Sysname> system-view

[Sysname] interface ten-gigabitethernet 3/0/1

[Sysname-Ten-GigabitEthernet3/0/1] port trust-level enable

security-level

Use security-level to enter packet security level view.

Use undo security-level to delete packet security level view and all configurations in the view.

Syntax

security-level sec-level

undo security-level sec-level

Views

Trust-level view

Predefined user roles

network-admin

Parameters

sec-level: Specifies a packet security level, in the range of 0 to 7. The larger the value, the higher the security level and the trustworthiness.

Usage guidelines

The packet security level view can be used to configure the following parameters for forwarding packets with specified security levels:

·     Flexible algorithm—A flexible algorithm determines the routing topology for trusted forwarding of the packets with a specific security level.

·     Service class—A service class determines an SRv6 TE policy for trusted forwarding of the packets with a specific security level.

For the security-level command to take effect, you must first use the server enable command to enable the trust level server feature.

Examples

# Enter packet security level view 7.

<Sysname> system-view

[Sysname] trust-level

[Sysname-trust-level] server enable

[Sysname-trust-level-server] quit

[Sysname-trust-level] security-level 7

[Sysname-trust-level-sec-7]

Related commands

flex-algo

server enable

service-class

server enable

Use server enable to enable the trust level server feature and enter trust-level-server view.

Use undo server enable to disable the trust level server feature.

Syntax

server enable

undo server enable

Default

The trust level server feature is disabled.

Views

Trust-level view

Predefined user roles

network-admin

Usage guidelines

The configuration of a trust level server or client is as follows:

1.     The user configures the trust level parameters on the server.

2.     A client automatically establishes SSL connection to the server after the server address is specified.

3.     The server automatically deploys the trust level configurations to the client through SSL connection.

Examples

# Enable the trust level server feature and enter trust-level-server view.

<Sysname> system-view

[Sysname] trust-level

[Sysname-trust-level] server enable

[Sysname-trust-level-server]

Related commands

bind ssl-server-policy

server ipv6-address

Use server ipv6-address to configure the parameters of a trust level server.

Use undo server ipv6-address to restore the default.

Syntax

server ipv6-address ipv6-address ssl-client-policy policy-name

undo server ipv6-address

Default

No parameters of a trust level server are configured.

Views

Trust-level-client view

Predefined user roles

network-admin

Parameters

ipv6-address: Specifies the IPv6 address of a trust level server.

ssl-client-policy policy-name: Specifies an SSL client policy by its name, a string of 1 to 31 case-insensitive characters.

Usage guidelines

Use this command to configure the parameters of a trust level server on a trust level client, so as to establish SSL connection to the server.

Examples

# Specify IPv6 address 2000::1 and SSL client policy test of a trust level server on a client.

<Sysname> system-view

[Sysname] trust-level

[Sysname-trust-level] client enable

[Sysname-trust-level-client] server ipv6-address 2000::1 ssl-client-policy test

Related commands

ssl client-policy

service-class

Use service-class to bind a service class for an SRv6 TE policy to a security level.

Use undo service-class to restore the default.

Syntax

service-class service-class-value

undo service-class

Default

No service class for an SRv6 TE policy is bound to a security level.

Views

Packet security level view

Predefined user roles

network-admin

Parameters

service-class-value: Specifies a service class value. The value range for this argument is 1 to 15. The smaller the service class value, the lower the SRv6 TE policy priority. An SRv6 TE policy that is not assigned a service class value has the lowest priority.

Usage guidelines

With this command configured, when a device receives the packets with specified security levels, it selects a matching SRv6 TE policy tunnel according to the bound service classes for packet forwarding. For more information about SRv6 TE Policy, see Segment Routing Configuration Guide.

Examples

# Bind service class 5 for an SRv6 TE policy to security level 7.

<Sysname> system-view

[Sysname] trust-level

[Sysname-trust-level] server enable

[Sysname-trust-level-server] quit

[Sysname-trust-level] security-level 7

[Sysname-trust-level-sec-7] service-class 5

trust level

Use trust level to specify the trust level of a device.

Use undo trust level to restore the default.

Syntax

trust level trust-level

undo trust level

Default

The trust level of a device is not configured.

Views

Trust-level-policy view

Predefined user roles

network-admin

Parameters

trust-level: Specifies the trust level of a network transmission device. The value range for this argument is 0 to 7. The larger the value, the higher the trustworthiness and the reliability.

Usage guidelines

An IS-IS System ID uniquely identifies a device participating in trusted forwarding. The trust level command specifies the trust level of the device to which the IS-IS System ID belongs. The IS-IS System ID and the trust level configuration are both contained in a trust level policy.

Trust level is an attribute of the network transmission devices in a trust network to identify device trustworthiness. Network transmission devices are classified into eight trust levels from 0 through 7 in ascending order, corresponding to eight packet security levels. The larger the value, the higher the security level and the trustworthiness.

A network transmission device forwards packets with a security level that is lower than or equal to its trust level. For example, a network transmission device with a trust level of 5 forwards packets with security levels of 0 to 5, but not packets with security levels of 6 and 7.

If you execute this command multiple times in the same view, the most recent configuration takes effect.

Examples

# Specify trust level 3 contained in trust level policy a.

<Sysname> system-view

[Sysname] trust-level

[Sysname-trust-level] server enable

[Sysname-trust-level-server] quit

[Sysname-trust-level] policy a

[Sysname-trust-level-policy-a] trust level 7

trust-level

Use trust-level to enable the trust level feature and enter trust-level view, or enter trust-level view if the trust level feature is enabled.

Use undo trust-level to disable the trust level feature.

Syntax

trust-level

undo trust-level

Default

The trust level feature is disabled.

Views

System view

Predefined user roles

network-admin

Usage guidelines

CAUTION

CAUTION:

If you disable the trust level feature, all configurations in trust-level view are restored to the default.

The trust level feature provides differential forwarding for packets with different security levels. In this way, packets with a specified security level can only be forwarded through the devices with trust levels greater than or equal to the specified security level.

Examples

# Enable the trust level feature and enter trust-level view.

<Sysname> system-view

[Sysname] trust-level

[Sysname-trust-level]

# Disable the trust level feature.

<Sysname> system-view

[Sysname] undo trust-level

Disabling trust level will restore the default settings in trust-level view. Continue? [Y/N]: Y

[Sysname]

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网