﻿<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:trackback="http://madskills.com/public/xml/rss/module/trackback/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/"><channel><title>IT博客-刘锐欢迎你的到来!-文章分类-华为网络技术</title><link>http://www.cnitblog.com/liserui/category/2458.html</link><description>&lt;P&gt;&lt;IMG height=50 alt=ms_masthead_10x7a_ltr.jpg src="http://www.cnitblog.com/images/cnitblog_com/liserui/ms_masthead_10x7a_ltr.jpg" width=140 border=0&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;IMG height=70 alt=mcse.gif src="http://www.cnitblog.com/images/cnitblog_com/liserui/mcse.gif" width=150 border=0&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;IMG height=70 alt=mcp.gif src="http://www.cnitblog.com/images/cnitblog_com/liserui/mcp.gif" width=150 border=0&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;IMG height=60 alt=huawei.gif src="http://www.cnitblog.com/images/cnitblog_com/liserui/huawei.gif" width=100 border=0&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;IMG height=73 alt=logo.gif src="http://www.cnitblog.com/images/cnitblog_com/liserui/logo.gif" width=110 border=0&gt;&lt;/P&gt;
</description><language>zh-cn</language><lastBuildDate>Thu, 29 Sep 2011 14:45:55 GMT</lastBuildDate><pubDate>Thu, 29 Sep 2011 14:45:55 GMT</pubDate><ttl>60</ttl><item><title>华为访问列表的一些资料</title><link>http://www.cnitblog.com/liserui/articles/9548.html</link><dc:creator>www.liserui.cnitblog.com</dc:creator><author>www.liserui.cnitblog.com</author><pubDate>Sat, 22 Apr 2006 12:24:00 GMT</pubDate><guid>http://www.cnitblog.com/liserui/articles/9548.html</guid><wfw:comment>http://www.cnitblog.com/liserui/comments/9548.html</wfw:comment><comments>http://www.cnitblog.com/liserui/articles/9548.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.cnitblog.com/liserui/comments/commentRss/9548.html</wfw:commentRss><trackback:ping>http://www.cnitblog.com/liserui/services/trackbacks/9548.html</trackback:ping><description><![CDATA[=============================================================================<br />标准ACL：列表号1-99，只限制源地址<br />---------------------------------------------------------<br />[Router1]acl 1              --只允许一台主机的流量通过<br />[Router1-acl-1]rule permit source 192.168.0.99 0.0.0.0<br />[Router1-acl-1]rule deny source any<br /><br />192.168.0.99 0.0.0.0可以简写为192.168.0.99 0或者192.168.0.99<br /><br />[Router1]acl 2              --只允许一个网段的流量通过<br />[Router1-acl-2]rule permit source 192.168.0.99 0.0.0.255<br />[Router1-acl-2]rule deny source any<br /><br />[Router1]acl 3              --拒绝一台主机的流量<br />[Router1-acl-3]rule deny source 192.168.0.99 0<br /><br />[Router1]acl 4              --拒绝一个网段的流量<br />[Router1-acl-4]rule deny source 192.168.0.99 0.0.0.255<br /><br />[Router1]int e0             --在接口上应用ACL和取消ACL的应用<br />[Router1-Ethernet0]firewall packet-filter 1 inbound<br />[Router1-Ethernet0]undo firewall packet-filter 1 inbound<br />[Router1-Ethernet0]firewall packet-filter 2 inbound<br />[Router1-Ethernet0]undo firewall packet-filter 2 in<br />[Router1-Ethernet0]firewall packet-filter 3 in<br />[Router1-Ethernet0]undo firewall packet-filter 3 in<br />[Router1-Ethernet0]firewall packet-filter 4 in<br />[Router1-Ethernet0]undo firewall packet-filter 4 in<br /><br />[Router1]display acl        --显示所配置的所有ACL<br />[Router1]undo acl 4         --删除某一个ACL<br />============================================================================<br />扩展ACL：列表号100-199，可针对源地址、目标地址、协议、端口进行筛选<br />------------------------------------------------------------------<br />[RA]acl 110      --禁止主机99和所用网段间的ICMP流量,互相都PING不通<br />[RA-acl-100]rule deny icmp source 192.168.0.99 0 destination any<br /><br />[RA]acl 111      --99 PING其它网段PING不通,其它网段可以PING通99<br />[RA-acl-101]rule deny icmp source 192.168.0.99 0 destination any icmp-type echo<br /><br />[RA]acl 112      --99 能够PING通其它网段,其它网段PING不通99<br />[RA-acl-102]rule deny icmp source 192.168.0.99 0 destination any icmp-type echo-reply<br /><br /><br />[Router1]acl 101            --拒绝192.168.0.0网段到131.107.0.0网段的telnet流量<br />[Router1-acl-101]rule deny tcp source 192.168.0.99 0.0.0.255 des 131.107.0.0 0.0.255.255 eq telnet<br /><br />[Router1]acl 102            --只允许一台主机到所有网段的Telnet流量<br />[Router1-acl-102]rule permit tcp source 192.168.0.99 0 des any eq 23<br />[Router1-acl-102]rule deny ip source any des any<br /><br />[Router1]int e0<br />[Router1-Ethernet0]firewall packet-filter 100 in<br />[Router1-Ethernet0]undo firewall pack 100 in<br />[Router1-Ethernet0]firewall packet-filter 101 in<br />[Router1-Ethernet0]undo firewall pack 101 in<br />[Router1-Ethernet0]firewall packet-filter 102 in<br />[Router1-Ethernet0]undo firewall pack 102 in<br /><br />[Router1]acl 103   --样例：只允许外网访问内网的WWW、FTP、DNS服务，其它流量拒绝<br />[Router1-acl-103]rule permit tcp source any des 192.168.0.0 0.0.0.255 eq www<br />[Router1-acl-103]rule permit tcp source any des 192.168.0.0 0.0.0.255 eq ftp<br />[Router1-acl-103]rule permit tcp source any des 192.168.0.0 0.0.0.255 eq 53<br />[Router1-acl-103]rule permit udp source any des 192.168.0.0 0.0.0.255 eq 53<br />[Router1-acl-103]rule deny ip source any des 192.168.0.0 0.0.0.255<br />[Router1-acl-103]quit<br />[Router1]int s0<br />[Router1-Serial0]firewall pack 103 in<br />====================================================================================<br />时间段的过滤：使ACL只在特定的时间生效<br />----------------------------------------------------<br />[Router1]clock 14:09:40 11 3 2005                  --先调整路由器时钟<br />[Router1]display clock<br />  Current router time:14:09:50 Mar 11 2005<br />[Router1]timerang enable                           --启用时间段过滤<br />[Router1]settr 8:00 10:00 11:30 13:30 14:15 15:30  --设置时间段<br />[Router1]display timerang                          --显示所配置的时间段<br />  TimeRange packet-filtering enable.<br />  beginning of time range:<br />     08:00 - 10:00<br />     11:30 - 13:30<br />     14:15 - 15:30<br />  end of time range.<br />[Router1]display isintr                --显示当前是否在所配置的时间段内<br />[Router1]acl 1<br />[Router1-acl-1]rule special deny source 192.168.0.99 0  --special:规则在所设时间段内生效<br />[Router1-acl-1]rule normal deny source 192.168.0.100 0  --normal:规则在所设时间段外生效<br />[Router1-acl-1]quit<br />[Router1]interface ethernet 0<br />[Router1-Ethernet0]firewall packet-filter 1 inbound<br />====================================================================================<br />在同一个访问列表中的不同规则冲突：AUTO深度优先 CONFIG先加入的规则优先<br />------------------------------------------------------<br />[Router1]acl 10             --不指明时，缺省为AUTO<br /><br />[Router1]acl 10 match-order auto     --ACL10主机99流量可以通过<br />[Router1-acl-10]rule deny source 192.168.0.99 0.0.0.255<br />[Router1-acl-10]rule permit source 192.168.0.99 0<br /><br />[Router1]acl 11 match-order config   --ACL11主机99流量不能通过<br />[Router1-acl-11]rule deny source 192.168.0.99 0.0.0.255<br />[Router1-acl-11]rule permit source 192.168.0.99 0<br /><br />[Router1]int e0<br />[Router1-Ethernet0]firewall packet 10 in<br />[Router1-Ethernet0]undo firewall packet 10 in<br />[Router1-Ethernet0]firewall packet 11 in<br />[Router1-Ethernet0]undo firewall packet 11 in<br />=====================================================================================<br />在华为路由器的一个接口上可以同时应用多条ACL,如果<br />不同访问列表的规则发生冲突,列表号大的ACL所配置的规则优先<br />---------------------------------------------------<br />[RA]acl 1<br />[RA-acl-1]rule deny source 192.168.0.99 0<br />[RA-acl-1]quit<br /><br />[RA]acl 2<br />[RA-acl-2]rule permit source 192.168.0.99 0<br />[RA-acl-2]rule deny source any<br />[RA-acl-2]quit<br /><br />[RA]int e0<br />[RA-Ethernet0]firewall packet-filter 1 inbound<br />[RA-Ethernet0]firewall packet-filter 2 inbound  --结果因为ACL 2优先,所以99的流量被允许通过.<br />======================================================================================<img src ="http://www.cnitblog.com/liserui/aggbug/9548.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.cnitblog.com/liserui/" target="_blank">www.liserui.cnitblog.com</a> 2006-04-22 20:24 <a href="http://www.cnitblog.com/liserui/articles/9548.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>华为2621防病毒列表</title><link>http://www.cnitblog.com/liserui/articles/9547.html</link><dc:creator>www.liserui.cnitblog.com</dc:creator><author>www.liserui.cnitblog.com</author><pubDate>Sat, 22 Apr 2006 12:20:00 GMT</pubDate><guid>http://www.cnitblog.com/liserui/articles/9547.html</guid><wfw:comment>http://www.cnitblog.com/liserui/comments/9547.html</wfw:comment><comments>http://www.cnitblog.com/liserui/articles/9547.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.cnitblog.com/liserui/comments/commentRss/9547.html</wfw:commentRss><trackback:ping>http://www.cnitblog.com/liserui/services/trackbacks/9547.html</trackback:ping><description><![CDATA[acl 3000 match-order auto<br />    rule normal deny udp source any destination any destination-port equal tftp<br />    rule normal deny tcp source any destination any destination-port equal 135<br />    rule normal deny udp source any destination any destination-port equal 135<br />    rule normal deny udp source any destination any destination-port equal netbios-ns<br />    rule normal deny udp source any destination any destination-port equal netbios-dgm<br />    rule normal deny tcp source any destination any destination-port equal 139<br />    rule normal deny udp source any destination any destination-port equal netbios-ssn<br />    rule normal deny tcp source any destination any destination-port equal 445<br />    rule normal deny udp source any destination any destination-port equal 445<br />    rule normal deny udp source any destination any destination-port equal 539<br />    rule normal deny udp source any destination any destination-port equal 593<br />    rule normal deny tcp source any destination any destination-port equal 593<br />    rule normal deny udp source any destination any destination-port equal 1434<br />    rule normal deny tcp source any destination any destination-port equal 4444<br />    rule normal deny tcp source any destination any destination-port equal 9996<br />    rule normal deny tcp source any destination any destination-port equal 5554<br />    rule normal deny udp source any destination any destination-port equal 5554<br />    rule normal deny tcp source any destination any destination-port equal 137<br />    rule normal deny tcp source any destination any destination-port equal 138<br />    rule normal deny tcp source any destination any destination-port equal 1025<br />    rule normal deny udp source any destination any destination-port equal 1025<br />    rule normal deny tcp source any destination any destination-port equal 9995<br />    rule normal deny udp source any destination any destination-port equal 9995<br />    rule normal deny tcp source any destination any destination-port equal 1068<br />    rule normal deny udp source any destination any destination-port equal 1068<br />    rule normal deny tcp source any destination any destination-port equal 1023<br />    rule normal deny udp source any destination any destination-port equal 1023<br /><img src ="http://www.cnitblog.com/liserui/aggbug/9547.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.cnitblog.com/liserui/" target="_blank">www.liserui.cnitblog.com</a> 2006-04-22 20:20 <a href="http://www.cnitblog.com/liserui/articles/9547.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>网络中端到端流量的管理白皮书</title><link>http://www.cnitblog.com/liserui/articles/9160.html</link><dc:creator>www.liserui.cnitblog.com</dc:creator><author>www.liserui.cnitblog.com</author><pubDate>Thu, 13 Apr 2006 22:00:00 GMT</pubDate><guid>http://www.cnitblog.com/liserui/articles/9160.html</guid><wfw:comment>http://www.cnitblog.com/liserui/comments/9160.html</wfw:comment><comments>http://www.cnitblog.com/liserui/articles/9160.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.cnitblog.com/liserui/comments/commentRss/9160.html</wfw:commentRss><trackback:ping>http://www.cnitblog.com/liserui/services/trackbacks/9160.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: 简介																																																										 在较短的时间内，互联网“杀手级”应用已经从电子邮件、网络浏览演变为端到端（Peer-to-Peer，P2P）应用。在音乐和电影数字化技术不断成熟的条件下，用户可以从互联网上轻松并免费获得这些数据文件，这使得P2P应用程序成为互联网上下载最多的软件之一。Kaz...&nbsp;&nbsp;<a href='http://www.cnitblog.com/liserui/articles/9160.html'>阅读全文</a><img src ="http://www.cnitblog.com/liserui/aggbug/9160.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.cnitblog.com/liserui/" target="_blank">www.liserui.cnitblog.com</a> 2006-04-14 06:00 <a href="http://www.cnitblog.com/liserui/articles/9160.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item></channel></rss>