在交换机上对高危端口进行封堵,怎么进行配置。
(0)
最佳答案
#
acl adance 3100
rule 5 deny tcp destination-port eq 445
rule 10 deny tcp destination-port eq 135
rule 15 deny tcp destination-port eq 137
rule 20 deny tcp destination-port eq 138
rule 25 deny tcp destination-port eq 139
rule 30 deny udp destination-port eq 445
rule 35 deny udp destination-port eq 135
rule 40 deny udp destination-port eq 137
rule 45 deny udp destination-port eq 138
rule 50 deny udp destination-port eq 139
#
traffic classifier anti_wana operator and
if-match acl 3100
#
traffic behavior anti_wana
filter deny
#
qos policy anti_wana
classifier anti_wana behavior anti_wana
#
[接口视图]
qos apply policy anti_wana inbound
qos apply policy anti_wana outbound
[全局视图] //基于全局应用QoS策略仅在MPE单板(仅入方向)和SPC单板上生效;部分设备无法使用此命令,只能在接口上应用。
qos apply policy anti_wana global inbound
qos apply policy anti_wana global outbound
==========================================
近期勒索病毒发生了变异,3389端口也在攻击之列中,请在ACL中添加相关规则,以防不测!
rule 55 deny udp destination-port eq 3389
rule 60 deny tcp destination-port eq 3389
(0)
如果我在ACL里面放通了某个IP 可以访问445 端口,那流行为下面也是filter deny吗?
acl number 3333
rule 0 deny udp destination-port eq tftp
rule 1 deny tcp destination-port eq 135
rule 2 deny udp destination-port eq 135
rule 3 deny udp destination-port eq netbios-ns
rule 4 deny udp destination-port eq netbios-dgm
rule 5 deny tcp destination-port eq 139
rule 6 deny udp destination-port eq netbios-ssn
rule 7 deny tcp destination-port eq 445
rule 8 deny udp destination-port eq 445
rule 9 deny tcp destination-port eq 539
rule 10 deny udp destination-port eq 539
rule 11 deny udp destination-port eq 593
rule 12 deny tcp destination-port eq 593
rule 13 deny udp destination-port eq 1434
rule 14 deny udp destination-port eq 1433
rule 15 deny tcp destination-port eq 4444
rule 16 deny tcp destination-port eq 9996
rule 17 deny tcp destination-port eq 5554
rule 18 deny udp destination-port eq 9996
rule 19 deny udp destination-port eq 5554
rule 20 deny tcp destination-port eq 137
rule 21 deny tcp destination-port eq 138
rule 22 deny tcp destination-port eq 1025
rule 23 deny udp destination-port eq 1025
rule 24 deny tcp destination-port eq 9995
rule 25 deny udp destination-port eq 9995
rule 26 deny tcp destination-port eq 1068
rule 27 deny udp destination-port eq 1068
rule 28 deny tcp destination-port eq 1023
rule 29 deny udp destination-port eq 1023
rule 30 permit icmp icmp-type echo
rule 31 permit icmp icmp-type echo-reply
rule 32 permit icmp icmp-type ttl-exceeded
rule 33 deny icmp
进入相应的内网口和外网口,下发到inbound方向
如interface ethernet 1/0
packet-filter 3333 inbound
packet-filter 3333 outbound
(0)
您好,请知:
以下是S7500E系列封堵高危端口的配置脚本及案例连接,请参考:
1、创建ACL,对高危端口进行拦截:
acl number 3210
rule 0 deny tcp destination-port eq 135
rule 1 deny udp destination-port eq 135
rule 2 deny tcp destination-port eq 137
rule 3 deny udp destination-port eq netbios-ns
rule 4 deny tcp destination-port eq 138
rule 5 deny udp destination-port eq netbios-dgm
rule 6 deny udp destination-port eq netbios-ssn
rule 7 deny tcp destination-port eq 139
rule 8 deny tcp destination-port eq 445
rule 9 deny udp destination-port eq 445
rule 10 deny tcp destination-port eq 3389
rule 11 deny udp destination-port eq 3389
rule 20 deny tcp source-port eq 135
rule 21 deny udp source-port eq 135
rule 22 deny tcp source-port eq 137
rule 23 deny udp source-port eq netbios-ns
rule 24 deny tcp source-port eq 138
rule 25 deny udp source-port eq netbios-dgm
rule 26 deny udp source-port eq netbios-ssn
rule 27 deny tcp source-port eq 139
rule 28 deny tcp source-port eq 445
rule 29 deny udp source-port eq 445
rule 30 deny tcp source-port eq 3389
rule 31 deny udp source-port eq 3389
rule 1500 permit ip
2、将ACL下发到端口:
int range gi 1/0/1 gi 1/0/24
packet-filter 3210 inbound
packet-filter 3210 outbound
quit
https://zhiliao.h3c.com/theme/details/127170
(0)
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
如果我在ACL里面放通了某个IP 可以访问445 端口,那流行为下面也是filter deny吗?