12-Security

HomeSupportDiagnose & MaintainTroubleshootingH3C MSR1000[2600][3600] Routers Troubleshooting Guide(V9)-R9141-6W10012-Security
01-Security Policy Troubleshooting Guide
Title Size Download
01-Security Policy Troubleshooting Guide 44.39 KB

Troubleshooting security policies

Traffic of an application permitted by a security policy is blocked

Symptom

In the security policy, an application and the basic protocols it relies on are configured to be permitted. However, the traffic of this application is still blocked.

Common causes

The following are the common causes for this type of issue:

·     The traffic of this application hit a security policy rule with a higher priority, and the rule action is drop.

·     The traffic of this application hit the expected security policy, but the traffic was eventually discarded by DPI.

Troubleshooting flow

The troubleshooting flow for issues of this type is as follows:

1.     Examine whether the security policy rule hit by the traffic is the expected rule.

2.     Examine the current security policy rule to verify if DPI content security is configured.

Figure 1 shows the troubleshooting flowchart.

Figure 1 Flowchart for troubleshooting traffic blocking issue of a permitted application

 

Solution

1.     Examine whether the security policy rule hit by the traffic is the expected rule.

# Configure an ACL as a filtering condition. In this example, the source address is 10.10.10.10, destination address is 20.20.20.20, and destination port is 80.

[Device]acl advanced 3999

[Device-acl-ipv4-adv-3999]rule 0 permit tcp source 10.10.10.10 0 destination 20.20.20.20 0 destination-port eq 80

# Enable security policy debugging to view the traffic hit status.

<Device>debugging security-policy packet ip acl 3999

This command is CPU intensive and might affect ongoing services. Are you sure you want to continue? [Y/N]:y

<Device>terminal monitor

<Device>terminal debugging

# View the debug information and view the SecurityPolicy field to determine if the traffic hits the expected security policy rule.

¡     If the traffic hits another rule and the rule action is deny, it indicates that the traffic is discarded. In this case, edit this rule to permit the traffic or move the rule to a position after the expected hit rule.

*May 23 14:30:16:909 2022 H3C FILTER/7/PACKET: -Context=1; The packet is denied. Src-Zone=Trust, Dst-Zone=Local;If-In=GigabitEthernet0/0/1(1), If-Out=xxx(1284); Packet Info:Src-IP=10.10.10.10, Dst-IP=20.20.20.20, VPN-Instance=, Src-MacAddr=9ce8-95c9-6289,Src-Port=68, Dst-Port=80, Protocol=UDP(17), Application=invalid(0),Terminal=invalid(0), SecurityPolicy=1, Rule-ID=1.

¡     If the traffic hits the expected rule, and the action is permit, it indicates that the traffic might be discarded by DPI. In this case, proceed to step 2.

*May 23 14:30:16:909 2022 H3C FILTER/7/PACKET: -Context=1; The packet is permitted. Src-Zone=Trust, Dst-Zone=Local;If-In=GigabitEthernet0/0/1(1), If-Out=xxx(1284); Packet Info:Src-IP=10.10.10.10, Dst-IP=20.20.20.20, VPN-Instance=, Src-MacAddr=9ce8-95c9-6289,Src-Port=68, Dst-Port=80, Protocol=UDP(17), Application=invalid(0),Terminal=invalid(0), SecurityPolicy=1, Rule-ID=1.

2.     Examine whether content security is configured for the security policy.

a.     Execute the display security-policy rule name rule-name command to view the current security policy rule configuration.

[Device] display security-policy rule 0 name testpolicy

 

 rule 0 name testpolicy

  action pass

  profile test

  application name QQ mailbox

  application name http

  application name https

  application name dns

  application name tcp

b.     Examine if the security policy rule is configured with a DPI content security profile. If the traffic is blocked by the content security profile, determine whether the traffic is safe and require to be permitted. If the traffic requires permitting, modify the action of the corresponding content security profile policy.

3.     If the issue persists, collect the following information and contact Technical Support:

¡     Results of each step.

¡     Device configuration file.

Related alarm and log messages

Alarm messages

N/A

Log messages

N/A

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Intelligent Storage
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
  • Technical Blogs
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网