客户发觉有一条rule 170 ACL FAILed , 在日志看见PFILTER_IF_NOT_SUPPORT ,请问大家一下
型号 : LS-10506X
版本: 7624P12
<IRDRRCORE>disp object-group
Ip address object group PAMS-PROD: 3 objects(in use)
PAMS-PROD
0 network host address 10.31.202.200
10 network host address 10.31.202.201
20 network host address 10.31.202.202
acl advanced name ACL-SystemPrinter-IN
step 10
rule 0 permit icmp
rule 10 permit ospf
rule 20 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.0.0 0.0.255.255 source-port eq nntp
rule 30 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.0.0 0.0.255.255 source-port eq www established
rule 40 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.0.0 0.0.255.255 source-port eq 139 established
rule 50 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.0.0 0.0.255.255 source-port eq 445 established
rule 60 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.0.0 0.0.255.255 source-port eq 443 established
rule 70 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.0.0 0.0.255.255 source-port eq lpd established
rule 80 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.0.0 0.0.255.255 source-port eq 631 established
rule 90 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.0.0 0.0.255.255 source-port eq 5001 established
rule 100 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.0.0 0.0.255.255 source-port eq 5002 established
rule 110 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.0.0 0.0.255.255 source-port eq 9100 established
rule 120 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.0.0 0.0.255.255 source-port eq 9101 established
rule 130 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.0.0 0.0.255.255 source-port eq 9102 established
rule 140 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.0.0 0.0.255.255 source-port eq 9103 established
rule 150 permit udp source 10.31.238.0 0.0.1.255 destination 10.31.0.0 0.0.255.255 source-port eq netbios-ssn
rule 160 permit udp source 10.31.238.0 0.0.1.255 destination 10.31.0.0 0.0.255.255 source-port eq 445
rule 170 permit tcp source 10.31.238.0 0.0.1.255 destination object-group PAMS source-port eq 3389 established counting
rule 171 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.202.200 0 source-port eq 3389 established counting
rule 172 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.202.201 0 source-port eq 3389 established counting
rule 173 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.202.202 0 source-port eq 3389 established counting
rule 174 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.202.200 0 destination-port eq 3389 established counting
rule 175 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.202.201 0 destination-port eq 3389 established counting
rule 176 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.202.202 0 destination-port eq 3389 established counting
rule 180 permit ip source 10.31.238.0 0.0.1.255 destination 10.31.202.220 0
rule 190 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.202.0 0.0.0.255 source-port eq 3389 established counting
rule 200 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.101.165 0 source-port eq 3389 established
rule 200 comment For Testing & can be removed
rule 9999 deny ip
show the statistics as below:
[IRDRRCORE-acl-ipv4-adv-ACL-SystemPrinter-IN]disp packet-filter sta interface Vlan-interface 2381 i
Interface: Vlan-interface2381
Inbound policy:
IPv4 ACL ACL-SystemPrinter-IN, Hardware-count
From 2022-11-11 10:47:45 to 2022-11-11 11:19:54
rule 0 permit icmp
rule 10 permit ospf
rule 20 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.0.0 0.0.255.255 source-port eq nntp
rule 30 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.0.0 0.0.255.255 source-port eq www established
rule 40 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.0.0 0.0.255.255 source-port eq 139 established
rule 50 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.0.0 0.0.255.255 source-port eq 445 established
rule 60 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.0.0 0.0.255.255 source-port eq 443 established
rule 70 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.0.0 0.0.255.255 source-port eq lpd established
rule 80 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.0.0 0.0.255.255 source-port eq 631 established
rule 90 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.0.0 0.0.255.255 source-port eq 5001 established
rule 100 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.0.0 0.0.255.255 source-port eq 5002 established
rule 110 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.0.0 0.0.255.255 source-port eq 9100 established (2051 packets)
rule 120 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.0.0 0.0.255.255 source-port eq 9101 established
rule 130 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.0.0 0.0.255.255 source-port eq 9102 established
rule 140 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.0.0 0.0.255.255 source-port eq 9103 established
rule 150 permit udp source 10.31.238.0 0.0.1.255 destination 10.31.0.0 0.0.255.255 source-port eq netbios-ssn
rule 160 permit udp source 10.31.238.0 0.0.1.255 destination 10.31.0.0 0.0.255.255 source-port eq 445
rule 170 permit tcp source 10.31.238.0 0.0.1.255 destination object-group PAMS source-port eq 3389 established counting (Failed)
rule 171 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.202.200 0 source-port eq 3389 established counting
rule 172 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.202.201 0 source-port eq 3389 established counting
rule 173 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.202.202 0 source-port eq 3389 established counting
rule 174 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.202.200 0 destination-port eq 3389 established counting
rule 175 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.202.201 0 destination-port eq 3389 established counting
rule 176 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.202.202 0 destination-port eq 3389 established counting
rule 180 permit ip source 10.31.238.0 0.0.1.255 destination 10.31.202.220 0
rule 190 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.202.0 0.0.0.255 source-port eq 3389 established counting
rule 200 permit tcp source 10.31.238.0 0.0.1.255 destination 10.31.101.165 0 source-port eq 3389 established
rule 9999 deny ip (3066 packets)
Totally 2051 packets permitted, 3066 packets denied
Totally 40% permitted, 60% denied
--------------
%Nov 11 11:08:18:461 2022 IRDRRCORE PFILTER/3/PFILTER_IF_NOT_SUPPORT: -Chassis=2-Slot=1; Failed to apply or refresh IPv4 ACL ACL-SystemPrinter-IN rule 170 to the inbound direction of interface Vlan-interface2381. The ACL is not supported.
%Nov 11 11:08:19:234 2022 IRDRRCORE PFILTER/3/PFILTER_IF_NOT_SUPPORT: -Chassis=2-Slot=2; Failed to apply or refresh IPv4 ACL ACL-SystemPrinter-IN rule 170 to the inbound direction of interface Vlan-interface2381. The ACL is not supported.
%Nov 11 11:08:19:607 2022 IRDRRCORE PFILTER/3/PFILTER_IF_NOT_SUPPORT: -Chassis=1-Slot=0; Failed to apply or refresh IPv4 ACL ACL-SystemPrinter-IN rule 170 to the inbound direction of interface Vlan-interface2381. The ACL is not supported.
%Nov 11 11:08:18:653 2022 IRDRRCORE PFILTER/3/PFILTER_IF_NOT_SUPPORT: -Chassis=2-Slot=5; Failed to apply or refresh IPv4 ACL ACL-SystemPrinter-IN rule 170 to the inbound direction of interface Vlan-interface2381. The ACL is not supported.
%Nov 11 11:08:18:476 2022 IRDRRCORE PFILTER/3/PFILTER_IF_NOT_SUPPORT: -Chassis=1-Slot=1; Failed to apply or refresh IPv4 ACL ACL-SystemPrinter-IN rule 170 to the inbound direction of interface Vlan-interface2381. The ACL is not supported.
%Nov 11 11:08:18:806 2022 IRDRRCORE PFILTER/3/PFILTER_IF_NOT_SUPPORT: -Chassis=2-Slot=3; Failed to apply or refresh IPv4 ACL ACL-SystemPrinter-IN rule 170 to the inbound direction of interface Vlan-interface2381. The ACL is not supported.
(0)
补充一下
vlan 2381
description System Printer segment
interface Vlan-interface2381
description System Printer
ip address 10.31.238.1 255.255.254.0
packet-filter name ACL-SystemPrinter-IN inbound hardware-count
(0)
S7506E-X ACL通过包过滤下发报错提示Failed to apply
感觉是这个问题,对比命令手册看下吧 或者undo object-group那条再试试
https://www.h3c.com/cn/d_202208/1659990_30005_0.htm#
(0)
暂无评论
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
暂无评论