Got it

User isolation

Created: Apr 26, 2020 11:38:26Latest reply: Apr 26, 2020 12:08:32 525 2 0 0 0
  Rewarded HiCoins: 0 (problem resolved)

Hello all,

To ensure security for user communication data, we hope that users connect to the WLAN through the same AP cannot directly communicate with each other. How do we configure the isolation function on the AC6005? Thank you!

Featured Answers

Best answer

Recommended answer

Popeye_Wang
Admin Created Apr 26, 2020 11:39:45

Hi,

The wireless user isolation function (configured using the user-isolate { l2 | all } command in the traffic profile view) can be implemented at Layer 2 or at both Layer 2 and Layer 3. The following table describes the configuration methods based on the forwarding mode.


Forwarding Mode

AC as the User Gateway

AC Not as the User Gateway

Direct forwarding

Run the user-isolate l2 or user-isolate all command.

  • When connecting to a WLAN through the same AP, users in the same service VLAN are isolated at Layer 2, and those in different service VLANs can communicate with each other at Layer 3.

  • When connecting to a WLAN through different APs, users are not isolated at either Layer 2 or Layer 3 regardless of whether they are in the same VLAN. In this case, to enable Layer 2 user isolation, configure port isolation on all devices located between the APs and aggregation point.

Run the user-isolate l2 or user-isolate all command.

  • When connecting to a WLAN through the same AP, users in the same service VLAN are isolated at Layer 2, and those in different service VLANs can communicate with each other at Layer 3.

  • When connecting to a WLAN through different APs, users are not isolated at either Layer 2 or Layer 3 regardless of whether they are in the same VLAN. In this case, to enable Layer 2 user isolation, configure port isolation on all devices located between the APs and aggregation point.

Tunnel forwarding

  • Run the user-isolate l2 command. Users in the same service VLAN are isolated at Layer 2, and those in different service VLANs can communicate with each other at Layer 3 regardless of whether they connect to a WLAN through the same AP.

  • Run the user-isolate all command. Users are isolated at both Layer 2 and Layer 3 regardless of whether they connect to a WLAN through the same AP or are in the same service VLAN.

Run the user-isolate l2 or user-isolate all command. Users in the same service VLAN are isolated at Layer 2, and those in different service VLANs can communicate with each other at Layer 3 regardless of whether they connect to a WLAN through the same AP.

View more
  • x
  • convention:

All Answers

Hi,

The wireless user isolation function (configured using the user-isolate { l2 | all } command in the traffic profile view) can be implemented at Layer 2 or at both Layer 2 and Layer 3. The following table describes the configuration methods based on the forwarding mode.


Forwarding Mode

AC as the User Gateway

AC Not as the User Gateway

Direct forwarding

Run the user-isolate l2 or user-isolate all command.

  • When connecting to a WLAN through the same AP, users in the same service VLAN are isolated at Layer 2, and those in different service VLANs can communicate with each other at Layer 3.

  • When connecting to a WLAN through different APs, users are not isolated at either Layer 2 or Layer 3 regardless of whether they are in the same VLAN. In this case, to enable Layer 2 user isolation, configure port isolation on all devices located between the APs and aggregation point.

Run the user-isolate l2 or user-isolate all command.

  • When connecting to a WLAN through the same AP, users in the same service VLAN are isolated at Layer 2, and those in different service VLANs can communicate with each other at Layer 3.

  • When connecting to a WLAN through different APs, users are not isolated at either Layer 2 or Layer 3 regardless of whether they are in the same VLAN. In this case, to enable Layer 2 user isolation, configure port isolation on all devices located between the APs and aggregation point.

Tunnel forwarding

  • Run the user-isolate l2 command. Users in the same service VLAN are isolated at Layer 2, and those in different service VLANs can communicate with each other at Layer 3 regardless of whether they connect to a WLAN through the same AP.

  • Run the user-isolate all command. Users are isolated at both Layer 2 and Layer 3 regardless of whether they connect to a WLAN through the same AP or are in the same service VLAN.

Run the user-isolate l2 or user-isolate all command. Users in the same service VLAN are isolated at Layer 2, and those in different service VLANs can communicate with each other at Layer 3 regardless of whether they connect to a WLAN through the same AP.

View more
  • x
  • convention:

Procedure:
Configuring unidirectional isolation on interfaces
1. Run:
system-view
The system view is displayed.

2. (Optional) Run:
port-isolate mode { l2 | all }
Interface isolation is configured.
By default, ports are isolated at Layer 2 but can communicate at Layer 3.
3. Run:
interface interface-type interface-number
The Ethernet interface view is displayed.
4. Run:
am isolate { interface-type interface-number }&<1-8>
Unidirectional isolation is configured on the Ethernet interface.

By default, the unidirectional isolation function is disabled.

Note:
If interface A is isolated from interface B unidirectionally, packets sent from interface A cannot reach interface B, but packets sent from interface B can reach interface A.

Configuring an interface isolation group:
1. Run:
system-view
The system view is displayed.
2. (Optional) Run:
port-isolate mode { l2 | all }
Interface isolation is configured.
By default, ports are isolated at Layer 2 but can communicate at Layer 3.
3. Run:
interface interface-type interface-number
The Ethernet interface view is displayed.
4. Run:
port-isolate enable [ group group-id ]
Interface isolation is enabled on the Ethernet interface.

By default, interface isolation is disabled.
Note:
Interfaces in an interface isolation group are isolated from each other, but interfaces in different interface isolation groups can communicate. If group-id is not specified, interfaces are added to interface isolation group 1.

Configuring management interface isolation.
1. Run:
system-view
The system view is displayed.
2. Run:
management-port isolate enable
Management interface isolation is enabled.

By default, management interfaces are not isolated from service interfaces.
Note:
The AC6005 does not support management interface isolation.
3. Run:
management-plane isolate enable
Service interfaces are isolated from the management interface.

By default, service interfaces can access the management interface
Note:
The AC6005 does not have an MEth interface; therefore, it does not support service interface access to the management interface.

https://support.huawei.com/enterprise/en/doc/EDOC1000154080?section=j008

View more
  • x
  • convention:

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.