- Table of Contents
-
- 03-Security Command Reference
- 00-Preface
- 01-Security zone commands
- 02-Security policy commands
- 03-Object group commands
- 04-Object policy commands
- 05-AAA commands
- 06-IPoE commands
- 07-Portal commands
- 08-User identification commands
- 09-Password control commands
- 10-Public key management commands
- 11-PKI commands
- 12-SSH commands
- 13-SSL commands
- 14-ASPF commands
- 15-APR commands
- 16-Session management commands
- 17-Connection limit commands
- 18-Attack detection and prevention commands
- 19-DDoS protection commands
- 20-uRPF commands
- 21-ARP attack protection commands
- 22-ND attack defense commands
- 23-IP-MAC binding commands
- 24-Keychain commands
- 25-Crypto engine commands
- 26-SMS commands
- 27-Terminal identification commands
- 28-Flow manager commands
- 29-Trusted access control commands
- 30-Location identification commands
- 31-Server connection detection commands
- 32-MAC authentication commands
- Related Documents
-
Title | Size | Download |
---|---|---|
20-uRPF commands | 97.82 KB |
display ip urpf statistics security-zone
reset ip urpf statistics security-zone
display ipv6 urpf statistics security-zone
reset ipv6 urpf statistics security-zone
IPv4 uRPF commands
display ip urpf
Use display ip urpf to display uRPF configuration.
Syntax
In standalone mode:
display ip urpf [ security-zone zone-name ] [ slot slot-number [ cpu cpu-number ] ]
In IRF mode:
display ip urpf [ security-zone zone-name ] [ chassis chassis-number slot slot-number [ cpu cpu-number ] ]
Views
Any view
Predefined user roles
network-admin
network-operator
context-admin
context-operator
Parameters
security-zone zone-name: Specifies a security zone by its name, a case-insensitive string of 1 to 31 characters. The string cannot include hyphens (-).
slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command displays uRPF configuration for all cards. (In standalone mode.)
chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The chassis-number argument represents the member ID of the IRF member device. The slot-number argument represents the slot number of the card. If you do not specify a card, this command displays uRPF configuration for all cards. (In IRF mode.)
cpu cpu-number: Specifies a CPU by its number. This option is available only if multiple CPUs are available on the specified slot.
Examples
# Display uRPF configuration for the specified security zone.
<Sysname> display ip urpf security-zone Untrust
uRPF configuration information of security-zone Untrust(failed):
Check type: strict
Allow default route
Link check
Suppress drop ACL: 3000
Table 1 Command output
Field |
Description |
(failed) |
The system failed to deliver the uRPF configuration to the forwarding chip because of insufficient chip resources. This field is not displayed if the delivery is successful. |
Check type |
uRPF check mode: loose or strict. |
Allow default route |
Using the default route is allowed. |
Link check |
Link layer check is enabled. |
Suppress drop ACL |
ACL used for drop suppression. |
display ip urpf statistics security-zone
Use display ip urpf statistics security-zone to display uRPF statistics for a security zone.
Syntax
In standalone mode:
display ip urpf statistics security-zone zone-name [ slot slot-number [ cpu cpu-number ] ]
In IRF mode:
display ip urpf statistics security-zone zone-name [ chassis chassis-number slot slot-number [ cpu cpu-number ] ]
Views
Any view
Predefined user roles
network-admin
network-operator
context-admin
context-operator
Parameters
zone-name: Specifies a security zone by its name, a case-insensitive string of 1 to 31 characters. The string cannot include hyphens (-).
slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command displays information for all cards. (In standalone mode.)
chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The chassis-number argument represents the member ID of the IRF member device. The slot-number argument represents the slot number of the card. If you do not specify a card, this command displays information for all cards. (In IRF mode.)
cpu cpu-number: Specifies a CPU by its number. This option is available only if multiple CPUs are available on the specified slot.
Examples
# (In standalone mode.) Display uRPF statistics for security zone Untrust.
<Sysname> display ip urpf statistics security-zone Untrust slot 1
uRPF information:
Drops : 390712
Suppressed drops: 0
Table 2 Command output
Field |
Description |
uRPF information |
uRPF statistics. |
Drops |
Number of dropped packets. |
Suppressed drops |
Number of packets that are not dropped because they match the ACL for drop suppression. |
Related commands
reset ip urpf statistics security-zone
ip urpf
Use ip urpf to enable uRPF.
Use undo ip urpf to disable uRPF.
Syntax
ip urpf { loose [ allow-default-route ] [ acl acl-number ] | strict [ allow-default-route ] [ acl acl-number ] [ link-check ] }
undo ip urpf
Default
uRPF is disabled.
Views
Security zone view
Predefined user roles
network-admin
context-admin
Parameters
loose: Enables loose uRPF check. To pass loose uRPF check, the source address of a packet must match the destination address of a FIB entry.
strict: Enables strict uRPF check. To pass strict uRPF check, the source address and receiving interface of a packet must match the destination address and output interface of a FIB entry. You can enable strict uRPF check only in VLAN interface view.
allow-default-route: Allows using the default route for uRPF check.
acl acl-number: Specifies an ACL by its number.
· For a basic ACL, the value range is 2000 to 2999.
· For an advanced ACL, the value range is 3000 to 3999.
link-check: Enables link layer check (Ethernet link).
Usage guidelines
uRPF can be deployed on a PE connected to a CE or an ISP, or on a CE.
Configure strict uRPF check for traffic that uses symmetric path and configure loose uRPF check for traffic that uses asymmetric path. A symmetric path exists for a session if the PE uses the same interface to receive upstream traffic and send downstream traffic. The path is asymmetric if the PE uses different interfaces to receive upstream traffic and send downstream traffic.
· Typically, symmetric path applies to traffic that goes through an ISP's PE interface connected to the CE. You can configure strict uRPF checkfor the security zone to which the PE interface belongs.
· Asymmetric path might exist for traffic that goes through a PE interface connected to another ISP. In this case, configure loose uRPF checkfor the security zone to which the PE interface belongs.
Typically, you do not need to configure the allow-default-route keyword on a PE device, because it has no default route pointing to a CE. If you enable uRPF on a security zone where the CE interface resides and the security zone has a default route pointing to the PE, specify the allow-default-route keyword.
You can use an ACL to match specific packets, so they are forwarded even if they fail to pass uRPF check.
If the specified ACL does not exist or does not contain rules, the ACL cannot match any packets.
If the vpn-instance keyword is specified in an ACL rule, the rule applies only to VPN packets. If the vpn-instance keyword is not specified in an ACL rule, the rule applies only to public network packets.
If a Layer 3 PE interface connects to a large number of PCs, configure the link-check keyword on the interface to enable link layer check. uRPF checks the validity of the source MAC address.
Examples
# Configure strict uRPF check for security zone Untrust.
<Sysname> system-view
[Sysname] security-zone name Untrust
[Sysname-security-zone-Untrust] ip urpf strict
Related commands
display ip urpf
reset ip urpf statistics security-zone
Use reset ip urpf statistics security-zone to clear uRPF statistics for a security zone.
Syntax
reset ip urpf statistics security-zone zone-name
Views
User view
Predefined user roles
network-admin
network-operator
context-admin
context-operator
Parameters
zone-name: Specifies a security zone by its name, a case-insensitive string of 1 to 31 characters. The string cannot include hyphens (-).
Examples
# Clear uRPF statistics for security zone Untrust.
<Sysname> reset ip urpf statistics security-zone Untrust
Related commands
display ip urpf statistics security-zone
IPv6 uRPF commands
display ipv6 urpf
Use display ipv6 urpf security-zone to display IPv6 uRPF configuration.
Syntax
In standalone mode:
display ipv6 urpf [ security-zone zone-name ] [ slot slot-number [ cpu cpu-number ] ]
In IRF mode:
display ipv6 urpf [ security-zone zone-name ] [ chassis chassis-number slot slot-number [ cpu cpu-number ] ]
Views
Any view
Predefined user roles
network-admin
network-operator
context-admin
context-operator
Parameters
security-zone zone-name: Specifies a security zone by its name, a case-insensitive string of 1 to 31 characters. The string cannot include hyphens (-).
slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command displays IPv6 uRPF configuration for all cards. (In standalone mode.)
chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The chassis-number argument represents the member ID of the IRF member device. The slot-number argument represents the slot number of the card. If you do not specify a card, this command displays IPv6 uRPF configuration for all cards. (In IRF mode.)
cpu cpu-number: Specifies a CPU by its number. This option is available only if multiple CPUs are available on the specified slot.
Examples
# Display IPv6 uRPF configuration for the specified security zone.
<Sysname> display ipv6 urpf security-zone Untrust
IPv6 uRPF configuration information of security-zone Untrust(failed):
Check type: loose
Allow default route
Suppress drop ACL: 2000
Table 3 Command output
Field |
Description |
(failed) |
The system failed to deliver the IPv6 uRPF configuration to the forwarding chip because of insufficient chip resources. This field is not displayed if the delivery is successful. |
Check type |
IPv6 uRPF check mode: loose or strict. |
Allow default route |
Using the default route is allowed. |
Suppress drop ACL |
IPv6 ACL used for drop suppression. |
display ipv6 urpf statistics security-zone
Use display ipv6 urpf statistics security-zone to display IPv6 uRPF statistics for a security zone.
Syntax
In standalone mode:
display ipv6 urpf statistics security-zone zone-name [ slot slot-number [ cpu cpu-number ] ]
In IRF mode:
display ipv6 urpf statistics security-zone zone-name [ chassis chassis-number slot slot-number [ cpu cpu-number ] ]
Views
Any view
Predefined user roles
network-admin
network-operator
context-admin
context-operator
Parameters
zone-name: Specifies a security zone by its name, a case-insensitive string of 1 to 31 characters. The string cannot include hyphens (-).
slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command displays information for all cards. (In standalone mode.)
chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The chassis-number argument represents the member ID of the IRF member device. The slot-number argument represents the slot number of the card. If you do not specify a card, this command displays information for all cards. (In IRF mode.)
cpu cpu-number: Specifies a CPU by its number. This option is available only if multiple CPUs are available on the specified slot.
Examples
# (In standalone mode.) Display IPv6 uRPF statistics for security zone Untrust.
<Sysname> display ipv6 urpf statistics security-zone Untrust slot 1
IPv6 uRPF information:
Drops : 390712
Suppressed drops: 0
Table 4 Command output
Field |
Description |
IPv6 uRPF information |
IPv6 uRPF statistics. |
Drops |
Number of dropped packets. |
Suppressed drops |
Number of packets that are not dropped because they match the ACL for drop suppression. |
Related commands
reset ipv6 urpf statistics security-zone
ipv6 urpf
Use ipv6 urpf to enable IPv6 uRPF.
Use undo ipv6 urpf to disable IPv6 uRPF.
Syntax
ipv6 urpf { loose | strict } [ allow-default-route ] [ acl acl-number ]
undo ipv6 urpf
Default
IPv6 uRPF is disabled.
Views
Security zone view
Predefined user roles
network-admin
context-admin
Parameters
loose: Enables loose IPv6 uRPF check. To pass loose IPv6 uRPF check, the source address of a packet must match the destination address of an IPv6 FIB entry.
strict: Enables strict IPv6 uRPF check. To pass strict IPv6 uRPF check, the source address and receiving interface of a packet must match the destination address and output interface of an IPv6 FIB entry.
allow-default-route: Allows using the default route for IPv6 uRPF check.
acl acl-number: Specifies an IPv6 ACL by its number.
· For a basic IPv6 ACL, the value range is 2000 to 2999.
· For an advanced IPv6 ACL, the value range is 3000 to 3999.
Usage guidelines
IPv6 uRPF can be deployed on a CE or on a PE connected to either a CE or an ISP.
Configure strict IPv6 uRPF check for traffic that uses symmetric path and configure loose IPv6 uRPF check for traffic that uses asymmetric path. A symmetric path exists for a session if the PE uses the same interface to receive upstream traffic and send downstream traffic. The path is asymmetric if the PE uses different interfaces to receive upstream traffic and send downstream traffic.
· Typically, symmetric path applies to traffic that goes through an ISP's PE interface connected to the CE. You can configure strict IPv6 uRPF check for the security zone to which the PE interface belongs.
· Asymmetric path might exist for traffic that goes through a PE interface connected to another ISP. In this case, configure loose IPv6 uRPF check for the security zone to which the PE interface belongs.
You can use an ACL to match specific packets, so they are forwarded even if they fail to pass IPv6 uRPF check.
If the specified ACL does not exist or does not contain rules, the ACL cannot match any packets.
If the vpn-instance keyword is specified in an ACL rule, the rule applies only to VPN packets. If the vpn-instance keyword is not specified in an ACL rule, the rule applies only to public network packets.
Typically, you do not need to configure the allow-default-route keyword on a PE device, because it has no default route pointing to a CE. If you enable uRPF on a security zone where the CE interface resides and the security zone has a default route pointing to the PE, specify the allow-default-route keyword.
Examples
# Configure loose IPv6 uRPF check for the security zone Untrust.
<Sysname> system-view
[Sysname] security-zone name Untrust
[Sysname-security-zone-Untrust] ipv6 urpf loose
Related commands
display ipv6 urpf
reset ipv6 urpf statistics security-zone
Use reset ipv6 urpf statistics security-zone to clear IPv6 uRPF statistics for a security zone.
Syntax
reset ipv6 urpf statistics security-zone zone-name
Views
User view
Predefined user roles
network-admin
network-operator
context-admin
context-operator
Parameters
zone-name: Specifies a security zone by its name, a case-insensitive string of 1 to 31 characters. The string cannot include hyphens (-).
Examples
# Clear IPv6 uRPF statistics for security zone Untrust.
<Sysname> reset ipv6 urpf statistics security-zone Untrust
Related commands
display ipv6 urpf statistics security-zone