華為防火墻配置手冊 華為USG防火墻NAT配置

拓?fù)鋱D
場景:
你是公司的網(wǎng)絡(luò)管理員。公司使用網(wǎng)絡(luò)防火墻隔離成三個(gè)區(qū)域。現(xiàn)在要將DMZ區(qū)域中的一臺(tái)服務(wù)器(IP地址:10.0.3.3)提供的telnet服務(wù)發(fā)布出去,對外公開的地址是10.0.10.20、24.并且內(nèi)部網(wǎng)絡(luò)Trust區(qū)域的用戶通過Easy-IP的方式訪問外部區(qū)域。其它方向的訪問被禁止。
在交換機(jī)上將G0/0/1與G0/0/21接口定義到vlan11,將G0/0/2與G0/0/22接口定義到vlan12,將G0/0/3與G0/0/23接口定義到vlan13.分別規(guī)劃了三個(gè)網(wǎng)段。
學(xué)習(xí)任務(wù)
步驟一.基本配置與IP編址
首先給三個(gè)路由器配置地址信息。
[Huawei]sysname R1
[R1]interface g0/0/1
[R1-GigabitEthernet0/0/1]ip add 10.0.10.124
[R1-GigabitEthernet0/0/1]desc this portconnect to S1-G0/0/1
[R1-GigabitEthernet0/0/1]interfaceloopback0
[R1-LoopBack0]ip add 10.0.1.1 24
[R1-LoopBack0]q
[Huawei]sysname R2
[R2]interface g0/0/1
[R2-GigabitEthernet0/0/1]ip add 10.0.20.224
[R2-GigabitEthernet0/0/1]desc this portconnect to S1-G0/0/2
[R2-GigabitEthernet0/0/1]interfaceloopback0
[R2-LoopBack0]ip add 10.0.2.2 24
[R2-LoopBack0]q
[Huawei]sysname R3
[R3]interface g0/0/1
[R3-GigabitEthernet0/0/1]ip add 10.0.30.324
[R3-GigabitEthernet0/0/1]desc this portconnect to S1-G0/0/3
[R3-GigabitEthernet0/0/1]interfaceloopback0
[R3-LoopBack0]ip add 10.0.3.3 24
[R3-LoopBack0]q
給防火墻配置地址時(shí),G0/0/1配置10.0.20.254/24.
[SRG]sysname FW
13:06:03 2014/07/08
[FW]interface g0/0/1
13:06:30 2014/07/08
[FW-GigabitEthernet0/0/1]ip add 10.0.20.25424
13:07:01 2014/07/08
[FW-GigabitEthernet0/0/1]desc this portconnect to S1-G0/0/22
13:07:52 2014/07/08
[FW-GigabitEthernet0/0/1]interface g0/0/0
13:08:23 2014/07/08
[FW-GigabitEthernet0/0/0]dis this
13:08:31 2014/07/08
#
interface GigabitEthernet0/0/0
alias GE0/MGMT
ipaddress 192.168.0.1 255.255.255.0
dhcpselect interface
dhcpserver gateway-list 192.168.0.1
#
return
[FW-GigabitEthernet0/0/0]undo ip add
13:08:42 2014/07/08
Info: The DHCP server configuration on thisinterface will be deleted.
[FW-GigabitEthernet0/0/0]display this
13:08:46 2014/07/08
#
interface GigabitEthernet0/0/0
alias GE0/MGMT
#
return
[FW-GigabitEthernet0/0/0]ip add 10.0.10.25424
13:09:29 2014/07/08
[FW-GigabitEthernet0/0/0]desc this portconnect to S1-G0/0/21
13:10:05 2014/07/08
[FW-GigabitEthernet0/0/0]interface G0/0/2
13:10:15 2014/07/08
[FW-GigabitEthernet0/0/2]ip add 10.0.30.25424
13:10:28 2014/07/08
[FW-GigabitEthernet0/0/2]desc this portconnect to S1-G0/0/23
13:10:53 2014/07/08
[FW-GigabitEthernet0/0/2]q
交換機(jī)上需要按照需求定義vlan
[Huawei]sysname S1
[S1]vlan batch 11 to 13
Info: This operation may take a fewseconds. Please wait for a moment...done.
[S1]interface g0/0/1
[S1-GigabitEthernet0/0/1]port link-typeaccess
[S1-GigabitEthernet0/0/1]port default vlan11
[S1]interface g0/0/2
[S1-GigabitEthernet0/0/2]port link-typeaccess
[S1-GigabitEthernet0/0/2]port default vlan12
[S1-GigabitEthernet0/0/2]interface g0/0/3
[S1-GigabitEthernet0/0/3]port link-typeaccess
[S1-GigabitEthernet0/0/3]port default vlan13
[S1-GigabitEthernet0/0/3]interface g0/0/21
[S1-GigabitEthernet0/0/21]port link-typeaccess
[S1-GigabitEthernet0/0/21]port default vlan11
[S1-GigabitEthernet0/0/21]interface g0/0/22
[S1-GigabitEthernet0/0/22]port link-typeaccess
[S1-GigabitEthernet0/0/22]port default vlan12
[S1-GigabitEthernet0/0/22]interface g0/0/23
[S1-GigabitEthernet0/0/23]port link-typeaccess
[S1-GigabitEthernet0/0/23]port default vlan13
步驟二.將接口配置到安全區(qū)域
防火墻默認(rèn)有四個(gè)區(qū)域,分別是“local”、“trust"、“untrust”、“dmz”。
實(shí)驗(yàn)中我們用到“trust”、'untrust"、“dmz”三個(gè)區(qū)域。將G0/0/0加入untrust區(qū)域、g/0/0/2加入dmz和g/0/0/1加入trust。
[FW]firewall zone trust
13:45:31 2014/07/08
[FW-zone-trust]dis this
13:45:35 2014/07/08
#
firewall zone trust
setpriority 85
addinterface GigabitEthernet0/0/0
#
return
[FW-zone-trust]undo add inter
[FW-zone-trust]undo add interface g0/0/0
13:46:01 2014/07/08
[FW-zone-trust]add interface g0/0/1
13:46:22 2014/07/08
[FW-zone-trust]firewall zone untrust
[FW-zone-untrust]add interface g0/0/0
13:47:24 2014/07/08
[[FW-zone-untrust]firewall zone dmz
13:48:06 2014/07/08
[FW-zone-dmz]add interface g0/0/2
13:48:13 2014/07/08
[FW-zone-dmz]q
默認(rèn)情況下,防火墻并不允許出local區(qū)域外的其它區(qū)域之間進(jìn)行通信。為了便于驗(yàn)證配置的正確性,我們首先將防火墻區(qū)域之間的默認(rèn)過濾規(guī)則配置為允許所有區(qū)域間通信。配置完成后在FW設(shè)備上測試連通性。
[FW]firewall packet-filter default permitall
13:51:19 2014/07/08
Warning:Setting the default packetfiltering to permit poses security risks. You
are advised to configure the securitypolicy based on the actual data flows. Are
you sure you want to continue?[Y/N]y
[FW]ping -c 1 10.0.10.1
13:51:56 2014/07/08
PING 10.0.10.1: 56 data bytes,press CTRL_C to break
Reply from 10.0.10.1: bytes=56 Sequence=1 ttl=255 time=90 ms
---10.0.10.1 ping statistics ---
1packet(s) transmitted
1packet(s) received
0.00% packet loss
round-trip min/avg/max = 90/90/90 ms
[FW]ping -c 1 10.0.20.2
13:52:08 2014/07/08
PING 10.0.20.2: 56 data bytes,press CTRL_C to break
Reply from 10.0.20.2: bytes=56 Sequence=1 ttl=255 time=400 ms
---10.0.20.2 ping statistics ---
1packet(s) transmitted
1packet(s) received
0.00% packet loss
round-trip min/avg/max = 400/400/400 ms
[FW]ping -c 1 10.0.30.3
13:52:18 2014/07/08
PING 10.0.30.3: 56 data bytes,press CTRL_C to break
Reply from 10.0.30.3: bytes=56 Sequence=1 ttl=255 time=410 ms
---10.0.30.3 ping statistics ---
1packet(s) transmitted
1packet(s) received
0.00% packet loss
round-trip min/avg/max = 410/410/410 ms
步驟三.配置靜態(tài)路由,實(shí)現(xiàn)網(wǎng)絡(luò)的連通性
在R2和R3上配置缺省路由,在FW上配置明確的靜態(tài)路由,實(shí)現(xiàn)三個(gè)loopback0接口之間的通信。R1無需定義缺省路由,原因是其作為internet設(shè)備,他不需要知道內(nèi)部和DMZ區(qū)域的私有網(wǎng)絡(luò)信息。
[R2]ip route-static 0.0.0.0 0 10.0.20.254
[R3]ip route-static 0.0.0.0 0 10.0.30.254
[FW]ip route-static 10.0.1.0 24 10.0.10.1
13:58:26 2014/07/08
[FW]ip route-static 10.0.2.0 24 10.0.20.2
13:58:40 2014/07/08
[FW]ip route-static 10.0.3.0 24 10.0.30.3
13:58:52 2014/07/08
在防火墻上測試與10.0.1.0、10.0.2.0、10.0.3.0之間的連通性。
[FW]ping -c 1 10.0.1.1
14:00:18 2014/07/08
PING 10.0.1.1: 56 data bytes,press CTRL_C to break
Reply from 10.0.1.1: bytes=56 Sequence=1 ttl=255 time=80 ms
---10.0.1.1 ping statistics ---
1packet(s) transmitted
1packet(s) received
0.00% packet loss
round-trip min/avg/max = 80/80/80 ms
[FW]ping -c 1 10.0.2.2
14:00:25 2014/07/08
PING 10.0.2.2: 56 data bytes,press CTRL_C to break
Reply from 10.0.2.2: bytes=56 Sequence=1 ttl=255 time=170 ms
---10.0.2.2 ping statistics ---
1packet(s) transmitted
1packet(s) received
0.00% packet loss
round-trip min/avg/max = 170/170/170 ms
[FW]ping -c 1 10.0.3.3
14:00:29 2014/07/08
PING 10.0.3.3: 56 data bytes,press CTRL_C to break
Reply from 10.0.3.3: bytes=56 Sequence=1 ttl=255 time=110 ms
---10.0.3.3 ping statistics ---
1packet(s) transmitted
1packet(s) received
0.00% packet loss
round-trip min/avg/max = 110/110/110 ms
目前配置下,所有區(qū)域之間可以通訊,不被檢查。但是由于當(dāng)前尚未定義NAT,外部區(qū)域不能與內(nèi)部和DMZ區(qū)域相互訪問。
步驟四.配置區(qū)域間的安全過濾
配置從Trust區(qū)域的部分網(wǎng)段10.0.2.3發(fā)往Untrust區(qū)域的數(shù)據(jù)包被放行。從Untrust區(qū)域發(fā)往DMZ目標(biāo)服務(wù)器10.0.3.3的telnet請求被放行。
[FW]firewall session link-state check
[FW]policy interzone trust untrust outbound
[FW-policy-interzone-trust-untrust-outbound]policy0
14:06:57 2014/07/08
[FW-policy-interzone-trust-untrust-outbound-0]policysource 10.0.2.0 0.0.0.255
14:07:18 2014/07/08
[FW-policy-interzone-trust-untrust-outbound-0]actionpermit
14:07:31 2014/07/08
[FW-policy-interzone-trust-untrust-outbound-0]q
14:07:40 2014/07/08
[FW-policy-interzone-trust-untrust-outbound]q
14:07:40 2014/07/08
]policy interzone dmz untrust inbound
14:09:01 2014/07/08
[FW-policy-interzone-dmz-untrust-inbound]policy0
14:09:08 2014/07/08
[FW-policy-interzone-dmz-untrust-inbound-0]policydestination 10.0.3.3 0
14:09:37 2014/07/08
[FW-policy-interzone-dmz-untrust-inbound-0]policyservice service-set telnet
[FW-policy-interzone-dmz-untrust-inbound-0]actionpermit
14:09:55 2014/07/08
[FW-policy-interzone-dmz-untrust-inbound-0]q
14:09:55 2014/07/08
步驟五.配置Easy-Ip,實(shí)現(xiàn)Trust區(qū)域到Untrust區(qū)域的訪問。
配置使用Easy-IP,進(jìn)行NAT源地址轉(zhuǎn)換。并且將NAT與接口進(jìn)行綁定。
[FW-nat-policy-interzone-trust-untrust-outbound]policy0
[FW-nat-policy-interzone-trust-untrust-outbound-0]policysource 10.0.2.0 0.0.0.2
55
14:14:26 2014/07/08
[FW-nat-policy-interzone-trust-untrust-outbound-0]actionsource-nat
14:14:37 2014/07/08
[FW-nat-policy-interzone-trust-untrust-outbound-0]easy-ipg0/0/0
14:14:51 2014/07/08
[FW-nat-policy-interzone-trust-untrust-outbound-0]q
配置完成后,驗(yàn)證Trust區(qū)域與Untrust區(qū)域之間的訪問是否正常。
<R2>ping 10.0.1.1
PING 10.0.1.1: 56 data bytes,press CTRL_C to break
Request time out
Request time out
Request time out
Request time out
Request time out
---10.0.1.1 ping statistics ---
5packet(s) transmitted
0packet(s) received
100.00% packet loss
<R2>ping -a 10.0.2.2 10.0.1.1
PING 10.0.1.1: 56 data bytes,press CTRL_C to break
Reply from 10.0.1.1: bytes=56 Sequence=1 ttl=254 time=220 ms
Reply from 10.0.1.1: bytes=56 Sequence=2 ttl=254 time=100 ms
Reply from 10.0.1.1: bytes=56 Sequence=3 ttl=254 time=100 ms
Reply from 10.0.1.1: bytes=56 Sequence=4 ttl=254 time=120 ms
Reply from 10.0.1.1: bytes=56 Sequence=5 ttl=254 time=440 ms
---10.0.1.1 ping statistics ---
5packet(s) transmitted
5packet(s) received
0.00% packet loss
round-trip min/avg/max = 100/196/440 ms
注意,這里直接測試與10.0.1.1之間的連通性,顯示不通。使用擴(kuò)展ping,指定了發(fā)送數(shù)據(jù)包的源地址是10.0.2.2后,實(shí)現(xiàn)了連通性。原因是,直接發(fā)送數(shù)據(jù)包到10.0.1.1時(shí),數(shù)據(jù)包的源地址到10.0.1.1時(shí),數(shù)據(jù)包的源地址為10.0.20.2,該地址不屬于NAT轉(zhuǎn)換的客戶端地址范圍。
步驟六.將內(nèi)網(wǎng)服務(wù)器10.0.3.3發(fā)布出去
配置內(nèi)網(wǎng)服務(wù)器10.0.3.3的telnet服務(wù),映射到地址10.0.10.20
[FW]nat server protocol tcp global10.0.10.20 telnet inside 10.0.3.3 telnet
在R3上開啟Telnet功能,并在R1上測試,測試時(shí)需要注意,對外發(fā)布的地址為10.0.10.20,所以R1對10.0.3.3訪問時(shí),訪問的目標(biāo)地址為10.0.10.20。
[R3]user-interface vty 0 4
[R3-ui-vty0-4]authentication-mode password
Please configure the login password(maximum length 16):16
[R3-ui-vty0-4]set authentication password ?
cipher Set the password withcipher text
[R3-ui-vty0-4]set authentication passwordcip
[R3-ui-vty0-4]set authentication passwordcipher Huawei
[R3-ui-vty0-4]user privilege level 3
[R3-ui-vty0-4]q
<R1>telnet 10.0.10.20
Press CTRL_] to quit telnet mode
Trying 10.0.10.20 ...
Connected to 10.0.10.20 ...
Login authentication
本文出自 “思科實(shí)驗(yàn)linux” 博客,請務(wù)必保留此出處http://1054054.blog.51cto.com/1044054/1437509
相關(guān)文章
殺毒軟件排行榜2015 殺毒軟件2015免費(fèi)下載前十名
今天小編為大家?guī)淼氖菤⒍拒浖判邪?015:殺毒軟件2015免費(fèi)下載前十名,感興趣的朋友可以看一下2014-10-26無線路由器(WIFI網(wǎng)絡(luò))的輻射會(huì)對人體到底有沒有傷害
不論是筆記本還是手機(jī),現(xiàn)在幾乎離不開無線網(wǎng)絡(luò),那到底這些無線網(wǎng)絡(luò)對身體有沒有輻射傷害呢。下面我們來科普一下2012-05-11用手機(jī)當(dāng)無線路由器 無線AP 手機(jī)無線熱點(diǎn)的設(shè)置方法(圖文)
手機(jī)能上網(wǎng)?沒什么奇怪的,現(xiàn)在是共享的年代,我們要把手機(jī)也當(dāng)無線路由器,用來給其它的設(shè)備,比如手機(jī),本本上網(wǎng)。這對于出差在外時(shí)上網(wǎng)比較方便。流量多的話。也可以共2012-05-11百度安全組件怎么刪除?win7百度安全組件服務(wù)卸載方法
百度安全組件怎么刪除?想知道的朋友就和小編一起來看看win7百度安全組件服務(wù)卸載方法吧2014-07-20- bt4破解軟件(backtrack4)是一款完全免費(fèi)的便攜linux系統(tǒng),也是bt4的中文版本。它是目前網(wǎng)絡(luò)上最著名的攻擊平臺(tái),能夠非常方便的破解無線網(wǎng)絡(luò)密碼2013-04-14
- 很多人不知道路由器漏洞是非常危險(xiǎn)的,一旦攻擊者得手,網(wǎng)民的個(gè)人隱私信息、網(wǎng)銀資產(chǎn)等均面臨巨大威脅2014-06-18
百度衛(wèi)士怎么卸不掉?百度衛(wèi)士2種卸載方法
百度衛(wèi)士是百度推出的安全軟件,有時(shí)候這個(gè)殺毒軟件或安全軟件卸載起來真的比較麻煩,甚至無法卸載,怎么也刪除不掉。百度衛(wèi)士卸不掉刪不掉怎么處理呢?2014-07-07無線路由器當(dāng)無線AP(無線交換機(jī),無線熱點(diǎn))的設(shè)置方法
無線路由除了可以發(fā)射無線信號(hào)以外,也可以當(dāng)作一個(gè)無線交換機(jī)來用。用來接收其它的無線路由的信號(hào),再發(fā)射出去,相當(dāng)方便??梢园匆韵碌姆椒ㄔO(shè)置。2012-05-11- Peid是一款強(qiáng)大的查殼軟件,非常簡單易用。2010-10-25
如何利用P2P終結(jié)者軟件限制別人網(wǎng)速?P2P終結(jié)者斷網(wǎng)限速教程
很多時(shí)候我們大家在使用一個(gè)網(wǎng)絡(luò)資源,比如學(xué)校,單位等。那么如何限制別人的網(wǎng)速,提高自己的呢?下面小編就為大家講解如何利用P2P終結(jié)者軟件限制別人網(wǎng)速2016-08-22