[eNSP]华为防火墙基础——Local、DMZ、Trust、Untrust互联

设备清单:1台PC、2台路由器(AR2220)、1台防火墙(USG6000V)

试验拓扑:实验目的:实现trust、untrust、local、dmz区域互通。PC可以ping通R-1和R-2。

试验说明:PC在trust内、R-2在untrust内、R-1在dmz内。ip地址见拓扑。

配置开始:

R1的IP地址:

<R1>dis ip in br
Interface                         IP Address/Mask      Physical   Protocol  
GigabitEthernet0/0/0              172.16.0.1/24        up         up        
GigabitEthernet0/0/1              unassigned           down       down      
NULL0                             unassigned           up         up(s)    

R2的IP地址:

<R2>dis ip in br
Interface                         IP Address/Mask      Physical   Protocol  
GigabitEthernet0/0/0              10.0.0.2/24          up         up        
GigabitEthernet0/0/1              unassigned           down       down      
NULL0                             unassigned           up         up(s)  

FW的IP地址:  华为防火墙默认账号/密码:admin/Admin@123 登录后要修改密码。

<FW>dis ip in br
Interface                         IP Address/Mask      Physical   Protocol  
GigabitEthernet0/0/0              192.168.0.1/24       down       down      
GigabitEthernet1/0/0              192.168.1.254/24     up         up        
GigabitEthernet1/0/1              10.0.0.1/24          up         up        
GigabitEthernet1/0/2              172.16.0.1/24        up         up        
     

接着 在FW中将接口划入对应的区域:

[FW]firewall zone trust 
[FW-zone-trust]add interface GigabitEthernet 1/0/0

[FW]firewall zone untrust 
[FW-zone-untrust]add interface GigabitEthernet 1/0/1

[FW]firewall zone dmz 
[FW-zone-dmz]add interface GigabitEthernet 1/0/2

配置防火墙

[FW]int g 1/0/0
[FW-GigabitEthernet1/0/0]service-manage ping permit 
[FW-GigabitEthernet1/0/0]q
[FW]security-policy 
[FW-policy-security]rule name ping
[FW-policy-security-rule-ping]source-zone local untrust trust dmz 	
[FW-policy-security-rule-ping]destination-zone local untrust trust dmz 
//本意是让防护墙的区域互通,所以不做其他策略!
//工作中不建议这样配置!!!
[FW-policy-security-rule-ping]service icmp
[FW-policy-security-rule-ping]action permit 
[FW-policy-security-rule-ping]dis th
#
 rule name ping
  source-zone dmz
  source-zone local
  source-zone trust
  source-zone untrust
  destination-zone dmz
  destination-zone local
  destination-zone trust
  destination-zone untrust
  service icmp
  action permit
#
return

测试防火墙直连:

[FW]ping 192.168.1.1
  PING 192.168.1.1: 56  data bytes, press CTRL_C to break
    Reply from 192.168.1.1: bytes=56 Sequence=1 ttl=128 time=32 ms
    Reply from 192.168.1.1: bytes=56 Sequence=2 ttl=128 time=4 ms
    Reply from 192.168.1.1: bytes=56 Sequence=3 ttl=128 time=4 ms
    Reply from 192.168.1.1: bytes=56 Sequence=4 ttl=128 time=5 ms
    Reply from 192.168.1.1: bytes=56 Sequence=5 ttl=128 time=4 ms

  --- 192.168.1.1 ping statistics ---
    5 packet(s) transmitted
    5 packet(s) received
    0.00% packet loss
    round-trip min/avg/max = 4/9/32 ms

[FW]ping 10.0.0.2
  PING 10.0.0.2: 56  data bytes, press CTRL_C to break
    Reply from 10.0.0.2: bytes=56 Sequence=1 ttl=255 time=51 ms
    Reply from 10.0.0.2: bytes=56 Sequence=2 ttl=255 time=14 ms
    Reply from 10.0.0.2: bytes=56 Sequence=3 ttl=255 time=15 ms
    Reply from 10.0.0.2: bytes=56 Sequence=4 ttl=255 time=4 ms
    Reply from 10.0.0.2: bytes=56 Sequence=5 ttl=255 time=6 ms

  --- 10.0.0.2 ping statistics ---
    5 packet(s) transmitted
    5 packet(s) received
    0.00% packet loss
    round-trip min/avg/max = 4/18/51 ms

[FW]ping 172.16.0.1
  PING 172.16.0.1: 56  data bytes, press CTRL_C to break
    Reply from 172.16.0.1: bytes=56 Sequence=1 ttl=255 time=47 ms
    Reply from 172.16.0.1: bytes=56 Sequence=2 ttl=255 time=7 ms
    Reply from 172.16.0.1: bytes=56 Sequence=3 ttl=255 time=8 ms
    Reply from 172.16.0.1: bytes=56 Sequence=4 ttl=255 time=9 ms
    Reply from 172.16.0.1: bytes=56 Sequence=5 ttl=255 time=12 ms

  --- 172.16.0.1 ping statistics ---
    5 packet(s) transmitted
    5 packet(s) received
    0.00% packet loss
    round-trip min/avg/max = 7/16/47 ms

接着配置OSPF和OSPF防火墙策略:

[R1]ospf 1 router-id  1.1.1.1
[R1-ospf-1]area 0
[R1-ospf-1-area-0.0.0.0]network 172.16.0.1 0.0.0.0
[R2]ospf 1 router-id 2.2.2.2 
[R2-ospf-1]area 0
[R2-ospf-1-area-0.0.0.0]network 10.0.0.2 0.0.0.0
[FW]ospf 1 router-id 3.3.3.3
[FW-ospf-1]area 0
[FW-ospf-1-area-0.0.0.0]network 192.168.1.254 0.0.0.0
[FW-ospf-1-area-0.0.0.0]network 10.0.0.1 0.0.0.0
[FW-ospf-1-area-0.0.0.0]network 172.16.0.254 0.0.0.0

查看邻居是否建立:

[FW-ospf-1-area-0.0.0.0]dis ospf peer brief 

	 OSPF Process 1 with Router ID 3.3.3.3
		  Peer Statistic Information
 ----------------------------------------------------------------------------
 Area Id          Interface                        Neighbor id      State    
 0.0.0.0          GigabitEthernet1/0/1             2.2.2.2          Full        
 0.0.0.0          GigabitEthernet1/0/2             1.1.1.1          Full        
 ----------------------------------------------------------------------------

接下来配置防火墙的OSPF策略:

[FW]security-policy 
[FW-policy-security]rule name OSPF
[FW-policy-security-rule-OSPF]service ospf 
[FW-policy-security-rule-OSPF]source-zone local dmz untrust 
[FW-policy-security-rule-OSPF]destination-zone dmz local untrust 
[FW-policy-security-rule-OSPF]action permit 
[FW-policy-security-rule-OSPF]dis th
#
 rule name OSPF
  source-zone dmz
  source-zone local
  source-zone untrust
  destination-zone dmz
  destination-zone local
  destination-zone untrust
  service ospf
  action permit
#
return

最后测试PC是否能ping通路由器:

PC>ping 10.0.0.2

Ping 10.0.0.2: 32 data bytes, Press Ctrl_C to break
From 10.0.0.2: bytes=32 seq=1 ttl=254 time=31 ms
From 10.0.0.2: bytes=32 seq=2 ttl=254 time=16 ms

--- 10.0.0.2 ping statistics ---
  2 packet(s) transmitted
  2 packet(s) received
  0.00% packet loss
  round-trip min/avg/max = 16/23/31 ms


PC>ping 172.16.0.1

Ping 172.16.0.1: 32 data bytes, Press Ctrl_C to break
From 172.16.0.1: bytes=32 seq=1 ttl=254 time=16 ms
From 172.16.0.1: bytes=32 seq=2 ttl=254 time=15 ms
From 172.16.0.1: bytes=32 seq=3 ttl=254 time=16 ms

--- 172.16.0.1 ping statistics ---
  5 packet(s) transmitted
  5 packet(s) received
  0.00% packet loss
  round-trip min/avg/max = 0/12/16 ms

PC>

试验结束,仅以此来记录本人HCIE-Datacom备考中涉及的知识点,不用作任何教学。突发奇想,想做一个自己的博客,就这样开始了,之前的试验会慢慢补齐。请理性观看,如有错误希望指正!

  • 19
    点赞
  • 20
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值