USG5500 配置地址池和easy-ip双出口NAT

一、组网需求:

1、某公司购买了两个运营商的公网IP,使公司内部用户能够通过NAT访问互联网。但是向A运营商只购买一个公网IP,所以想配置为easy-ip的NAT模式。向B运营商购买了6公网IP(202.202.202.1-202.202.202.6),所有想配置为NAT地址池模式。

另外,同一个网段的内网,指定IP的机器不能访问互联网,其他IP可以访问互联网。

2、网络拓扑

3、数据规划

VLAN:vlan172(172.16.1.1/24),vlan192(192.168.1.1/24),vlan100(100.100.100.1/24)

SW1:G0/0/1:(vlan100),G0/0/2:(vlan192),G0/0/3:(vlan172),G0/0/4:(vlan192)

FW1:G0/0/1(100.100.100.2),G0/0/2(201.201.201.1/24),G0/0/3(202.202.202.1/24)

ISP1:G0/0/2(201.201.201.2/24),G0/0/0(203.203.203.2/24)

ISP2:G0/0/2(202.202.202.6/24),G0/0/0(203.203.203.3/24)

4、配置思路

汇聚层划分vlan,并配置IP,对应接口应用vlan

防火墙配置IP,域间安全策略,NAT

二、操作步骤

SW1交换机

1、配置vlan和接口

<Huawei>system-view 
[Huawei]sysname SW1
[SW1]vlan batch 172 192 100
[SW1]interface  Vlanif  172
[SW1-Vlanif172]ip address  172.16.1.1 24
[SW1-Vlanif172]q	
[SW1]interface  Vlanif  192
[SW1-Vlanif192]ip address  192.168.1.1 24
[SW1-Vlanif192]q
[SW1]interface  Vlanif  100
[SW1-Vlanif100]ip address  100.100.100.1 24
[SW1-Vlanif100]q
[SW1]interface  GigabitEthernet  0/0/2
[SW1-GigabitEthernet0/0/2]port link-type  access
[SW1-GigabitEthernet0/0/2]port default  vlan 192
[SW1-GigabitEthernet0/0/2]q
[SW1]interface  GigabitEthernet  0/0/4
[SW1-GigabitEthernet0/0/4]port link-type access
[SW1-GigabitEthernet0/0/4]port default  vlan 192
[SW1-GigabitEthernet0/0/4]q
[SW1]interface  GigabitEthernet  0/0/3
[SW1-GigabitEthernet0/0/3]port link-type access
[SW1-GigabitEthernet0/0/3]port default  vlan  172
[SW1-GigabitEthernet0/0/3]q
[SW1]interface  GigabitEthernet  0/0/1
[SW1-GigabitEthernet0/0/1]port link-type access
[SW1-GigabitEthernet0/0/1]port default  vlan  100
[SW1-GigabitEthernet0/0/1]q

2、添加路由

[SW1]ip route-static 0.0.0.0 0.0.0.0 100.100.100.2

FW1防火墙

1、配置接口IP地址

<SRG>system-view
[SRG]sysname FW1
[FW1]interface  GigabitEthernet  0/0/1
[FW1-GigabitEthernet0/0/1]ip address  100.100.100.2 24
[FW1-GigabitEthernet0/0/1]q
[FW1]interface  GigabitEthernet  0/0/2
[FW1-GigabitEthernet0/0/2]ip address  201.201.201.1 24
[FW1-GigabitEthernet0/0/2]q
[FW1]interface  GigabitEthernet  0/0/3
[FW1-GigabitEthernet0/0/3]ip address  202.202.202.1 24
[FW1-GigabitEthernet0/0/3]q

2、接口加入对应安全区域

[FW1]firewall zone trust
[FW1-zone-trust]add  interface  GigabitEthernet  0/0/1
[FW1-zone-trust]q
[FW1]firewall zone  untrust
[FW1-zone-untrust]add interface GigabitEthernet 0/0/2
[FW1-zone-untrust]add interface GigabitEthernet 0/0/3
[FW1-zone-untrust]q

3、配置域间安全策略,允许内网指定网点与公网进行报文交互,并拒绝指定内网IP不能与公网通信

[FW1]policy interzone  trust untrust outbound 
[FW1-policy-interzone-trust-untrust-outbound]policy 1
[FW1-policy-interzone-trust-untrust-outbound-1]policy source 192.168.1.20 0
[FW1-policy-interzone-trust-untrust-outbound-1]action  deny
[FW1-policy-interzone-trust-untrust-outbound-1]q
[FW1-policy-interzone-trust-untrust-outbound]policy 2
[FW1-policy-interzone-trust-untrust-outbound-2]policy  source 192.168.0.0 mask 16
[FW1-policy-interzone-trust-untrust-outbound-2]action  permit
[FW1-policy-interzone-trust-untrust-outbound-2]q	
[FW1-policy-interzone-trust-untrust-outbound]policy 3
[FW1-policy-interzone-trust-untrust-outbound-3]policy source 172.16.0.0 mask 16
[FW1-policy-interzone-trust-untrust-outbound-3]action  permit
[FW1-policy-interzone-trust-untrust-outbound-3]q
[FW1-policy-interzone-trust-untrust-outbound]q

这里需要注意的是策略的执行顺序,默认是按照配置的先后顺序,而不是policy数字的大小。所以如果拒绝动作是后来才配置的,需要移动策略的顺序。(执行命令policy move policy-id1 { before | after } policy-id2,调整策略优先级。

4、配置NAT地址池,并允许端口转换,实现公网地址复用

[FW1]nat address-group 172 202.202.202.3 202.202.202.6

5、配置源NAT策略,实现内网指定网段访问公网时自动进行源地址转换

[FW1]nat-policy interzone trust untrust outbound
[FW1-nat-policy-interzone-trust-untrust-outbound]policy 1
[FW1-nat-policy-interzone-trust-untrust-outbound-1]action  source-nat
[FW1-nat-policy-interzone-trust-untrust-outbound-1]policy source 192.168.0.0 mask 16
[FW1-nat-policy-interzone-trust-untrust-outbound-1]easy-ip GigabitEthernet 0/0/2
[FW1-nat-policy-interzone-trust-untrust-outbound-1]q
[FW1-nat-policy-interzone-trust-untrust-outbound]policy 2
[FW1-nat-policy-interzone-trust-untrust-outbound-2]action  source-nat
[FW1-nat-policy-interzone-trust-untrust-outbound-2]policy source 172.16.0.0 mask 16
[FW1-nat-policy-interzone-trust-untrust-outbound-2]address-group 172
[FW1-nat-policy-interzone-trust-untrust-outbound-2]q
[FW1-nat-policy-interzone-trust-untrust-outbound]q

6、在防火墙配置缺省路由,使内网流量可以正常发送至ISP路由器

[FW1]ip route-static 0.0.0.0 0.0.0.0 201.201.201.2
[FW1]ip route-static 0.0.0.0 0.0.0.0 202.202.202.2
[FW1]ip route-static 192.168.0.0 16 100.100.100.1
[FW1]ip route-static 172.16.0.0 16 100.100.100.1

三、查看防火墙验证

1、防火墙NAT转发记录

[FW1]display firewall session table
16:37:35  2018/08/05
 Current Total Sessions : 10
  icmp  VPN:public --> public 172.16.1.10:19639[202.202.202.6:2079]-->203.203.203.10:2048
  icmp  VPN:public --> public 172.16.1.10:19895[202.202.202.6:2080]-->203.203.203.10:2048
  icmp  VPN:public --> public 172.16.1.10:20151[202.202.202.6:2081]-->203.203.203.10:2048
  icmp  VPN:public --> public 172.16.1.10:20407[202.202.202.6:2082]-->203.203.203.10:2048
  icmp  VPN:public --> public 172.16.1.10:20663[202.202.202.6:2083]-->203.203.203.10:2048
  icmp  VPN:public --> public 192.168.1.10:22455[201.201.201.1:2123]-->203.203.203.10:2048
  icmp  VPN:public --> public 192.168.1.10:22711[201.201.201.1:2124]-->203.203.203.10:2048
  icmp  VPN:public --> public 192.168.1.10:23223[201.201.201.1:2125]-->203.203.203.10:2048
  icmp  VPN:public --> public 192.168.1.10:23479[201.201.201.1:2126]-->203.203.203.10:2048
  icmp  VPN:public --> public 192.168.1.10:23735[201.201.201.1:2127]-->203.203.203.10:2048

2、域间安全策略命中次数,可以看到允许通过的IP次数和拒绝IP(192.268.1.20)的次数为5

[FW1]display policy interzone trust untrust outbound 
16:40:33  2018/08/05
policy interzone trust untrust outbound
 firewall default packet-filter is deny
 policy 1 (5 times matched)
  action deny 
  policy service service-set ip
  policy source 192.168.1.20 0
  policy destination any

 policy 2 (80 times matched)
  action permit 
  policy service service-set ip
  policy source 192.168.0.0 mask 16
  policy destination any

 policy 3 (38 times matched)
  action permit 
  policy service service-set ip
  policy source 172.16.0.0 mask 16
  policy destination any

四、补充说明

1、就算域间策略默认规则是放通的,但是如果手动指定的拒绝通过,还是无法访问的,比如trunk到untrunk 默认是允许的

[FW1]firewall  packet-filter default permit interzone trust untrust  direction outbound 

但是还是会被拒绝,可以看到拒绝命中条目增加了

[FW1]display policy interzone trust untrust outbound
17:09:35  2018/08/05
policy interzone trust untrust outbound
 firewall default packet-filter is permit
 policy 1 (34 times matched)
  action deny 
  policy service service-set ip
  policy source 192.168.1.20 0
  policy destination any

 policy 2 (80 times matched)
  action permit 
  policy service service-set ip
  policy source 192.168.0.0 mask 16
  policy destination any

 policy 3 (38 times matched)
  action permit 
  policy service service-set ip
  policy source 172.16.0.0 mask 16
  policy destination any

 

  • 7
    点赞
  • 92
    收藏
    觉得还不错? 一键收藏
  • 打赏
    打赏
  • 1
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论 1
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包

打赏作者

友人a笔记

你的鼓励将是我创作的最大动力

¥1 ¥2 ¥4 ¥6 ¥10 ¥20
扫码支付:¥1
获取中
扫码支付

您的余额不足,请更换扫码支付或充值

打赏作者

实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值