Huawei Router Configuration: ACL, FTP Access, and Firewall Zones
This guide details a step‑by‑step Huawei router configuration that creates basic and advanced ACLs, defines time‑based FTP access, sets up firewall zones for internal and external networks, and verifies the resulting security policies using command‑line examples.
Configuration Approach Create basic ACLs on the router to classify users, enable basic FTP functions, and apply the ACLs to control access for different users.
Data Preparation Basic ACL number: 2001. Time‑range name for FTP access: ftp-access. Time‑range description: Saturday and Sunday from 14:00 to 18:00 between 2009‑01‑01 and 2011‑12‑31.
Operation Steps – Basic ACL and FTP
Configure time‑range:
system-view sysname Router [Router] time-range ftp-access from 0:0 2009/1/1 to 23:59 2011/12/31 [Router] time-range ftp-access 14:00 to 18:00 off-dayConfigure basic ACL:
acl number 2001 [Router-acl-basic-2001] rule permit source 172.16.105.0 0.0.1.255 [Router-acl-basic-2001] rule permit source 172.16.107.0 0.0.1.255 time-range ftp-access [Router-acl-basic-2001] quitEnable FTP and bind ACL: ftp acl 2001 Verification:
PC A (172.16.105.111) can FTP to 172.16.104.110.
PC B in subnet 2 (172.16.107.111) cannot FTP outside the defined time‑range, but can during allowed hours.
PC C (10.10.10.1) cannot FTP.
Advanced Security Zone Configuration
Define security zones for internal (company) and external networks, assign priorities, and bind interfaces:
system-view sysname Router [Router] firewall zone company [Router-zone-company] priority 12 [Router-zone-company] quit [Router] interface vlanif 100 [Router-Vlanif100] zone company [Router-Vlanif100] quit [Router] firewall zone external [Router-zone-external] priority 5 [Router-zone-external] quit [Router] interface gigabitEthernet 0/0/1 [Router-gigabitEthernet0/0/1] zone external [Router-gigabitEthernet0/0/1] quitEnable inter‑zone firewall and create advanced ACLs:
[Router] firewall interzone company external [Router-interzone-company-external] firewall enable [Router-interzone-company-external] quitACL 3001 – allow specific external user (202.39.2.3) to access internal servers:
[Router] acl 3001 [Router-acl-adv-3001] rule permit tcp source 202.39.2.3 0.0.0.0 destination 202.169.10.5 0.0.0.0 [Router-acl-adv-3001] rule permit tcp source 202.39.2.3 0.0.0.0 destination 202.169.10.6 0.0.0.0 [Router-acl-adv-3001] rule permit tcp source 202.39.2.3 0.0.0.0 destination 202.169.10.7 0.0.0.0 [Router-acl-adv-3001] rule deny ip [Router-acl-adv-3001] quitACL 3002 – allow internal servers to access the external network and block other internal users:
[Router] acl 3002 [Router-acl-adv-3002] rule permit ip source 202.169.10.5 0.0.0.0 [Router-acl-adv-3002] rule permit ip source 202.169.10.6 0.0.0.0 [Router-acl-adv-3002] rule permit ip source 202.169.10.7 0.0.0.0 [Router-acl-adv-3002] rule deny ip [Router-acl-adv-3002] quitApply packet‑filters to the inter‑zone firewall:
[Router] firewall interzone company external [Router-interzone-company-external] packet-filter 3001 inbound [Router-interzone-company-external] packet-filter 3002 outbound [Router-interzone-company-external] quitVerification of inter‑zone configuration: [Router] display firewall interzone company external Result shows the firewall enabled, default deny inbound, default permit outbound, and the two packet‑filters applied.
Configuration File Extract
# Router configuration file vlan batch 100 acl number 3001 rule 5 permit tcp source 202.39.2.3 0.0.0.0 destination 202.169.10.5 0.0.0.0 rule 10 permit tcp source 202.39.2.3 0.0.0.0 destination 202.169.10.6 0.0.0.0 rule 15 permit tcp source 202.39.2.3 0.0.0.0 destination 202.169.10.7 0.0.0.0 rule 20 deny ip acl number 3002 rule 5 permit ip source 202.169.10.5 0.0.0.0 rule 10 permit ip source 202.169.10.6 0.0.0.0 rule 15 permit ip source 202.169.10.7 0.0.0.0 rule 20 deny ip interface Vlanif100 ip address 202.169.10.1 255.255.255.0 zone company firewall zone company priority 12 firewall zone external priority 5 firewall interzone company external firewall enable packet-filter 3001 inbound packet-filter 3002 outbound interface Ethernet0/0/0 port link-type access port default vlan 100 interface GigabitEthernet0/0/1 ip address 129.39.10.8 255.255.255.0 zone external returnSigned-in readers can open the original source through BestHub's protected redirect.
This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactand we will review it promptly.
Practical DevOps Architecture
Hands‑on DevOps operations using Docker, K8s, Jenkins, and Ansible—empowering ops professionals to grow together through sharing, discussion, knowledge consolidation, and continuous improvement.
How this landed with the community
Was this worth your time?
0 Comments
Thoughtful readers leave field notes, pushback, and hard-won operational detail here.
