原文链接:(华为配置篇)防火墙USG6000实现服务器的负载均衡
实验拓扑
实验需求
小智公司内建设了一个网站,由于网站的访问量很大,为了实现访问的可靠性,在内部部署了三台同等性能的服务器做负载均衡,内网及外网所有用户均可通过企业申请的公网地址访问。
VLAN与IP地址规划
区域 | 项目 | VLAN | IP地址 | 备注 |
Trust区域 | 内网用户1 | 10 | 192.168.10.0/24 | 网关:192.168.10.254 |
内网用户2 | 20 | 192.168.20.0/24 | 网关:192.168.20254 | |
内网用户3 | 30 | 192.168.30.0/24 | 网关:192.168.30.254 | |
内网核心交换机与防火墙对接 | 88 | 192.168.88.0/30 | 防火墙:192.168.88.1/30 交换机:192.168.88.2/30 | |
防火墙管理 | N/A | 192.168.250.0/24 | 账号:admin 密码:Qw!@123123 | |
DMZ区域 | Server1 | N/A | 172.16.254.101/24 | 网关:172.168.254.254 虚拟IP:202.163.32.3/29 |
Server2 | N/A | 172.16.254.102/24 | ||
Server3 | N/A | 172.16.254.103/24 | ||
Untrust区域 | 防火墙与运营商ISP对接 | N/A | 202.163.32.0/29 | 防火墙:202.163.32.2/29 ISP:202.163.32.1/26 |
ISP | N/A | 69.38.43.0/30 | 模拟外网客户端地址,loopback0:114.114.114.114 |
配置过程
配置防火墙接口地址并加入安全区域
接口 | G0/0/0 | G1/0/0 | G1/0/1 | G1/0/2 |
安全区域 | Trust | DMZ | Untrust | Trust |
IP地址 | 192.168.250.100/24 | 172.16.254.254/24 | 202.163.32.2/29 | 192.168.88.1/30 |
#
interface GigabitEthernet0/0/0
ip address 192.168.250.100 255.255.255.0
alias GE0/METH
service-manage all permit
#
interface GigabitEthernet1/0/0
description DMZ
ip address 172.16.254.254 255.255.255.0
service-manage ping permit
#
interface GigabitEthernet1/0/1
description untrust
ip address 202.163.32.2 255.255.255.248
gateway 202.163.32.1
#
interface GigabitEthernet1/0/2
description trust
ip address 192.168.88.1 255.255.255.252
service-manage ping permit
#
#
firewall zone trust
add interface GigabitEthernet0/0/0
add interface GigabitEthernet1/0/2
#
firewall zone untrust
add interface GigabitEthernet1/0/1
#
firewall zone dmz
add interface GigabitEthernet1/0/0
#
配置防火墙安全策略
内外网用户trust/untrust区域到服务器集群DMZ的安全策略
允许Internet用户访问内网的Web服务器,策略的目的地址为虚拟服务器的IP地址202.163.32.3/29。
配置local到任意区域的安全策略
用于管理员管理调试;
用于防火墙向实际服务器发送健康探测icmp报文。
配置内网用户上网的安全策略
允许用内网户访问Internet。
策略规则名 | u&t_D_202.163.32.3 | manager | nat |
源区域 | Untrust/trust | local | trust |
源地址/地区 | any | any | any |
目的区域 | DMZ | any | any |
目的地址/地区 | 202.163.32.3/32 | any | Untrust |
动作 | permit | permit | permit |
#
security-policy
rule name u&t_D_202.163.32.3
source-zone trust
source-zone untrust
destination-zone dmz
destination-address 202.163.32.3 mask 255.255.255.255
action permit
rule name l_D_Server
description icmp
source-zone local
destination-zone dmz
destination-address 172.16.254.101 mask 255.255.255.255
destination-address 172.16.254.102 mask 255.255.255.255
destination-address 172.16.254.103 mask 255.255.255.255
action permit
rule name manager
source-zone local
action permit
rule name nat
source-zone trust
destination-zone untrust
action permit
#
配置实服务器组/虚拟服务器
#
slb
group 0 Server_Group
metric weight-roundrobin
health-check type icmp
rserver 0 rip 172.16.254.101 port 80 weight 1
rserver 1 rip 172.16.254.102 port 80 weight 1
rserver 2 rip 172.16.254.103 port 80 weight 1
action optimize
vserver 0 vs-202.163.32.3
vip 0 202.163.32.3
protocol tcp
vport 80
group Server_Group
#
服务器配置IP地址及开启HTTP服务
ISP及外网客户端配置
#
interface GigabitEthernet0/0/1
ip address 202.163.32.1 255.255.255.248
#
interface GigabitEthernet0/0/2
ip address 69.38.43.1 255.255.255.252
#
interface LoopBack0
ip address 114.114.114.114 255.255.255.255
#
内网设备交换机及路由配置
内网交换机
#
sysname Trust-SW
#
vlan batch 10 20 30 88
#
interface Vlanif10
ip address 192.168.10.254 255.255.255.0
#
interface Vlanif20
ip address 192.168.20.254 255.255.255.0
#
interface Vlanif30
ip address 192.168.30.254 255.255.255.0
#
interface Vlanif88
ip address 192.168.88.2 255.255.255.252
#
interface GigabitEthernet0/0/1
port link-type access
port default vlan 88
#
interface GigabitEthernet0/0/2
port link-type access
port default vlan 10
#
interface GigabitEthernet0/0/3
port link-type access
port default vlan 20
#
interface GigabitEthernet0/0/4
port link-type access
port default vlan 30
#
interface GigabitEthernet0/0/5
port link-type access
port default vlan 30
#
ip route-static 0.0.0.0 0.0.0.0 192.168.88.1
#
防火墙
#
ip route-static 192.168.10.0 255.255.255.0 192.168.88.2
ip route-static 192.168.20.0 255.255.255.0 192.168.88.2
ip route-static 192.168.30.0 255.255.255.0 192.168.88.2
#
内网终端
配置完成后测试
查看静态Server-map表
存在相应表项证明服务器负载均衡功能配置成功。
外网客户端访问服务器
内网终端访问服务器
内网终端访问互联网
查看服务器流量占比
测试一段时间后,在实服务器组列表中看到流量占百分比。