MSR2600 http 做了acl但是不生效
ip http acl name http
ip https acl name http
ip http enable
ip https enable
acl advance
d name http
description http_https
rule 3 permit ip source 172.16.113.0 0.0.0.255
acl advanced name http
http_https
rule 3 permit ip source 172.16.113.0 0.0.0.255
rule 20 deny ip
您的 ACL 配置有几个关键问题导致不生效。以下是修正后的完整配置方案:
# =====================================================
# 华三 MSR2600 HTTP/HTTPS ACL 正确配置
# =====================================================
system-view
# 1. 删除现有错误配置
undo acl advanced name http
undo ip http acl
undo ip https acl
# 2. 创建新的高级 ACL
acl advanced name HTTP_ACL # 使用有意义的名称
description "HTTP/HTTPS Access Control"
rule 5 permit ip source 172.16.113.0 0.0.0.255 # 允许特定网段
rule 10 deny ip # 拒绝所有其他IP
quit
# 3. 应用 ACL 到 HTTP/HTTPS 服务
ip http acl name HTTP_ACL
ip https acl name HTTP_ACL
# 4. 启用 HTTP/HTTPS 服务
ip http enable
ip https enable
# 5. 保存配置
save force
原配置问题分析
1. ACL 命名冲突
您创建了两个同名的 ACL:http
华三设备不允许 ACL 名称重复
2. ACL 类型错误
您混合使用了基本 ACL (acl advance) 和高级 ACL (acl advanced)
HTTP/HTTPS 服务需要高级 ACL
3. 规则顺序问题
规则 20 的 deny ip应该放在最后
ACL 规则按序号从小到大执行
4. 语法错误
d name http是无效命令
http_https行缺少命令前缀
验证配置是否生效
1. 检查 ACL 配置
display acl advanced name HTTP_ACL
# 应显示:
# Advanced ACL HTTP_ACL, 2 rules
# rule 5 permit ip source 172.16.113.0 0.0.0.255
# rule 10 deny ip
2. 检查 HTTP/HTTPS 服务配置
display ip http
# 应显示:HTTP ACL: HTTP_ACL
display ip https
# 应显示:HTTPS ACL: HTTP_ACL
3. 测试访问控制
# 从允许的网段测试 (172.16.113.0/24)
telnet 172.16.113.1 80 # 测试 HTTP
telnet 172.16.113.1 443 # 测试 HTTPS
# 从不允许的网段测试 (如 172.16.114.1)
telnet 172.16.114.1 80 # 应被拒绝
高级配置建议
1. 添加更多安全规则
acl advanced name HTTP_ACL
# 允许管理网段
rule 5 permit ip source 172.16.113.0 0.0.0.255
# 允许特定管理主机
rule 6 permit ip source 192.168.1.100 0
# 拒绝所有其他IP
rule 100 deny ip
quit
2. 结合时间段控制
# 创建时间段
time-range WORKING_HOURS 08:00 to 18:00 working-day
# 应用时间段到ACL
acl advanced name HTTP_ACL
rule 5 permit ip source 172.16.113.0 0.0.0.255 time-range WORKING_HOURS
rule 10 deny ip
quit
3. 启用日志记录
acl advanced name HTTP_ACL
rule 5 permit ip source 172.16.113.0 0.0.0.255 logging
rule 10 deny ip logging
quit
常见问题排查
如果 ACL 仍然不生效:
检查默认策略:
display current-configuration | include "ip http"
display current-configuration | include "ip https"
检查接口应用:
display ip interface brief
# 确保ACL应用到正确的接口
检查规则顺序:
display acl advanced name HTTP_ACL
# 确保deny规则在最后
测试基本连通性:
# 从客户端测试
ping 172.16.113.1
telnet 172.16.113.1 80
最终配置示例
system-view
# 清除现有配置
undo acl advanced name http
undo ip http acl
undo ip https acl
# 创建新ACL
acl advanced name MGMT_ACCESS
description "HTTP/HTTPS Management Access"
rule 5 permit ip source 172.16.113.0 0.0.0.255
rule 10 permit ip source 192.168.1.100 0
rule 100 deny ip logging
quit
# 应用ACL
ip http acl name MGMT_ACCESS
ip https acl name MGMT_ACCESS
# 启用服务
ip http enable
ip https enable
# 保存配置
save force
还是不行 Advanced IPv4 ACL named http_acl, 2 rules, "http/https access control" ACL's step is 5 rule 0 permit ip source 172.16.113.0 0.0.0.255 rule 10 deny ip dis ip https HTTPS port: 443 SSL server policy : Not configured Certificate access-control-policy : Not configured ACL: http_acl(basic) Operation status : Enabled dis acl name http_acl Advanced IPv4 ACL named http_acl, 2 rules, "http/https access control" ACL's step is 5 rule 0 permit ip source 172.16.113.0 0.0.0.255 rule 10 deny ip dis tcp *: TCP connection with authentication Local Addr:port Foreign Addr:port State Slot PCB 0.0.0.0:22 0.0.0.0:0 LISTEN 0 0xffffffffffffffa2 0.0.0.0:80 0.0.0.0:0 LISTEN 0 0xffffffffffffffa3 0.0.0.0:443 0.0.0.0:0 LISTEN 0 0xffffffffffffffa5 192.168.100.2:22 172.16.113.211:54494 ESTABLISHED 0 0x0000000000005fb8 192.168.100.2:443 172.16.113.211:54241 FIN_WAIT_2 0 0x0000000000005fac 192.168.100.2:443 172.16.113.211:54298 FIN_WAIT_2 0 0x0000000000005fb5 220.176.42.234:443 172.16.113.211:54625 ESTABLISHED 0 0x0000000000005fce 220.176.42.234:443 172.16.113.211:54626 ESTABLISHED 0 0x0000000000005fcf 220.176.42.234:443 172.16.113.211:54632 ESTABLISHED 0 0x0000000000005fd1 192.168.100.2:443 172.16.113.211:54732 ESTABLISHED 0 0x0000000000005fe9 192.168.100.2:443 172.16.113.211:54733 ESTABLISHED 0 0x0000000000005fea 192.168.100.2:443 172.16.113.211:54734 ESTABLISHED 0 0x0000000000005feb
策略没有命中,登录正常
dis acl name http_acl Advanced IPv4 ACL named http_acl, 2 rules, "http/https access control" ACL's step is 5 rule 0 permit ip source 172.16.113.0 0.0.0.255 rule 10 deny ip ip http acl name http_acl ip https acl name http_acl ip http enable ip https enable web new-style dis tcp 192.168.100.2:443 172.16.113.211:54733 ESTABLISHED 0 0x0000000000005fea
dis acl name http_acl Advanced IPv4 ACL named http_acl, 2 rules, "http/https access control" ACL's step is 5 rule 0 permit ip source 172.16.113.0 0.0.0.255 rule 10 deny ip ip http acl name http_acl ip https acl name http_acl ip http enable ip https enable web new-style dis tcp 192.168.100.2:443 172.16.113.211:54733 ESTABLISHED 0 0x0000000000005fea
dis ip http HTTP port: 80 ACL: http_acl(basic) Operation status : Enabled
undo ip http acl undo acl basic name http_acl # 创建新 ACL acl basic name HTTP_MGMT_ACL description "HTTP Management Access" rule 5 permit source 172.16.113.0 0.0.0.255 logging rule 10 permit source 192.168.1.100 0 logging # 添加特定管理主机 rule 100 deny logging # 拒绝所有其他IP quit # 应用 ACL ip http acl name HTTP_MGMT_ACL # 启用 HTTP 服务 ip http enable
打开你的电脑,在浏览器输入知了社区,找到这个帖子,要么在别人下面评论,要么点我的头像。
通过源IP对Web用户进行控制,仅允许来自10.110.100.52的Web用户访问设备。
图7-2 对Device的HTTP用户进行ACL控制
# 定义基本访问控制列表。
<Sysname> system-view
[Sysname] acl basic 2030 match-order config
[Sysname-acl-ipv4-basic-2030] rule 1 permit source 10.110.100.52 0
# 引用访问控制列表,仅允许来自10.110.100.52的Web用户访问设备。
[Sysname] ip http acl 2030
在Host B上打开浏览器,输入https://10.110.110.66,按下回车,打开Web用户登录界面,输入用户名和密码后,按下<登录>按钮,进入设备配置管理Web界面。在Host A上打开浏览器,输入https://10.110.110.66,按下回车,打开Web用户登录界面,输入用户名和密码后,按下<登录>按钮,无法进入设备配置管理Web界面。
我用模拟器做是可以的,主要配置如下:
acl ba 2000
rule permit source 172.16.113.0 0.0.0.255
ip http acl 2000
ip http enable
ip https acl 2000
ip https enable
就是没有匹配上啊,不排查干嘛呢
就是没有匹配上啊,不排查干嘛呢
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
undo ip http acl undo acl basic name http_acl # 创建新 ACL acl basic name HTTP_MGMT_ACL description "HTTP Management Access" rule 5 permit source 172.16.113.0 0.0.0.255 logging rule 10 permit source 192.168.1.100 0 logging # 添加特定管理主机 rule 100 deny logging # 拒绝所有其他IP quit # 应用 ACL ip http acl name HTTP_MGMT_ACL # 启用 HTTP 服务 ip http enable