419
Blacklist configuration example
Network requirements
As shown in
, Host A, Host B, and Host C are internal users, and external user Host D is
considered an attacker.
Configure Device to always filter packets from Host D, and to prevent internal users from guessing
passwords.
Figure 138
Network diagram
Configuration procedure
# Assign IP addresses to the interfaces of Device. (Details not shown.)
# Enable the blacklist feature.
<Device> system-view
[Device] blacklist enable
# Add the IP address of Host D 5.5.5.5 to the blacklist. Do not specify any aging time to make the entry
never age out.
[Device] blacklist ip 5.5.5.5
Verifying the configuration
If Host C tries to log in to Device through web for six times but fails to log in, the device blacklists Host
C. Use the
display blacklist all
command to view all added blacklist entries.
[Device] display blacklist all
Blacklist information
------------------------------------------------------------------------------
Blacklist : enabled
Blacklist items : 2
------------------------------------------------------------------------------
IP Type Aging started Aging finished Dropped packets
YYYY/MM/DD hh:mm:ss YYYY/MM/DD hh:mm:ss
5.5.5.5 manual 2011/04/09 16:02:20 Never 0
192.168.1.4 manual 2011/04/09 16:02:26 2011/04/09 16:12:26 0
Internet
Device
Host C (Web user)
Vlan-int2
Vlan-int1
Host A
Host B
Attacker
Host D
5.5.5.5/24
202.1.0.1/16
192.168.1.1/16
192.168.1.4/16