vyos 基础配置

vyos 基础配置

http://www.lowefamily.com.au/2015/11/29/using-a-vyos-router-with-hyper-v/1/
http://thomasvochten.com/archive/2015/03/labv2-part1/
http://www.letmefix-it.com/2016/07/07/vyos-nat-configuration-1-to-1/
https://github.com/rharmonson/richtech/wiki/Vyos-Firewall

1 基本配置
#配置外网接口
set interfaces ethernet eth0 address 10.0.1.32/24
set interfaces ethernet eth0 description public

#配置内网接口
set interfaces ethernet eth1 address 192.168.100.1/24 set interfaces ethernet eth1 description private #指定静态路由 set protocols static route 0.0.0.0/0 next-hop 10.0.1.1 distance 1
#启动ssh服务器
set service ssh port 29922

#设置主机名
set system host-name vyos-master

#设备时区 set system time-zone Asia/Shanghai
#提交修改
commit

#保存到启动文件
save
Saving configuration to '/config/config.boot'...

#回退
rollback 
2 NAT
Source NAT
1 The internal IP addresses we want to translate
2 The outgoing interface to perform the translation on
3 The external IP address to translate to

# 内网开放访问外网权限
set nat source rule 100 outbound-interface eth0
set nat source rule 100 source address 192.168.100.0/24 set nat source rule 100 translation address masquerade # 不使用防火墙外网地址,指派特定外网ip 10.0.1.100 set interfaces ethernet eth0 address 10.0.1.100/24 set nat source rule 100 outbound-interface eth0 set nat source rule 100 source address 192.168.100.0/24 set nat source rule 100 translation address 10.0.1.100 # 内网主机数量大时,使用地址池,推荐每256台主机分配1个外网地址 ...... set nat source rule 100 translation address 10.0.1.101-10.0.1.132 # NAT Reflection 这个没搞懂是做什么用的? set nat source rule 110 description 'NAT Reflection: INSIDE' set nat source rule 110 destination address 192.168.100.0/24 set nat source rule 110 outbound-interface eth1 set nat source rule 110 source address 192.168.100.0/24 set nat source rule 110 translation address masquerade
Destination NAT
1 The interface traffic will be coming in on
2 The protocol and port we wish to forward
3 The IP address of the internal system we wish to forward traffic to

端口映射
# 10.0.1.100:80 -> 192.168.100.101:80
set nat destination rule 10 description 'Port Forward: 10.0.1.100:80 to 192.168.100.101:80'
set nat destination rule 10 inbound-interface eth0 set nat destination rule 10 destination address 10.0.1.100 set nat destination rule 10 destination port 80 set nat destination rule 10 protocol tcp set nat destination rule 10 translation address 192.168.100.101 set nat destination rule 10 translation port 80 # 10.0.1.100:29922 -> 192.168.100.101:22 set nat destination rule 20 description 'Port Forward: 10.0.1.100:29922 to 192.168.100.101:22' set nat destination rule 20 inbound-interface eth0 set nat destination rule 20 destination address 10.0.1.100 set nat destination rule 20 destination port 29922 set nat destination rule 20 protocol tcp set nat destination rule 20 translation address 192.168.100.101 set nat destination rule 20 translation port 22 # 注意防火墙要增加规则放行22, 80的通讯 ip映射 set interfaces ethernet eth0 address 10.0.1.200/24 # 10.0.1.200 -> 192.168.100.102 set nat destination rule 30 description 'NAT 1 to 1: 10.0.1.200 to 192.168.100.102' set nat destination rule 30 inbound-interface eth0 set nat destination rule 30 destination address 10.0.1.200 set nat destination rule 30 translation address 192.168.100.102 set nat source rule 30 description 'NAT 1 to 1: 10.0.1.200 to 192.168.100.102' set nat source rule 30 outbound-interface eth1 set nat source rule 30 source address 192.168.100.102 set nat source rule 30 translation address 10.0.1.200
3 FIREWALL
# public区域包含外网接口,private区域包含内网接口,
set zone-policy zone public interface eth0
set zone-policy zone private interface eth1

# 防火墙所有端口禁ping
set firewall all-ping disable # 防火墙初始策略 # 默认丢弃所有包 set firewall name private-public default-action drop # private -> public 方向的防火墙策略 # 规则1 匹配成功的请求,允许建立与关联 set firewall name private-public rule 1 action accept set firewall name private-public rule 1 state established enable set firewall name private-public rule 1 state related enable # 规则2 匹配失败的请求,记录日志 set firewall name private-public rule 2 action drop set firewall name private-public rule 2 log enable set firewall name private-public rule 2 state invalid enable # 规则9999 匹配失败的请求,记录日志 set firewall name private-public rule 9999 action drop set firewall name private-public rule 9999 log enable # 规则100 允许ping set firewall name private-public rule 100 action accept set firewall name private-public rule 100 log enable set firewall name private-public rule 100 protocol icmp # 规则200 允许http https set firewall name private-public rule 200 action accept set firewall name private-public rule 200 destination port 80,443 set firewall name private-public rule 200 log enable set firewall name private-public rule 200 protocol tcp # 规则300 允许22(ssh), 29922 set firewall name private-public rule 300 action accept set firewall name private-public rule 300 destination port 22,29922 set firewall name private-public rule 300 log enable set firewall name private-public rule 300 protocol tcp # 规则200 允许来自10.0.1.0/24的dns请求 set firewall name private-public rule 600 action accept set firewall name private-public rule 600 destination port 53 set firewall name private-public rule 600 log enable set firewall name private-public rule 600 protocol tcp_udp set firewall name private-public rule 600 source address 10.0.1.0/24 # private-public规则集作用于从private到public的访问,效果是允许ping外网ip,允许到外网80,443的请求,允许来自10.0.1.0/24子网到外网的dns请求 set zone-policy zone public from private firewall name private-public # public -> private方向的防火墙策略 set firewall name public-private default-action drop set firewall name public-private rule 1 action accept set firewall name public-private rule 1 state established enable set firewall name public-private rule 1 state related enable set firewall name public-private rule 2 action drop set firewall name public-private rule 2 log enable set firewall name public-private rule 2 state invalid enable # 规则100 允许80, 443, 22, 29922的请求 set firewall name public-private rule 100 action accept set firewall name public-private rule 100 destination port 80,443,22,29922 set firewall name public-private rule 100 log enable set firewall name public-private rule 100 protocol tcp set firewall name public-private rule 9999 action drop set firewall name public-private rule 9999 log enable # public-private规则集作用于从public到private的访问,允许到内网映射端口80,443,22,29922的访问,如ssh -p 29922 10.0.1.100, http://10.0.1.100 set zone-policy zone private from public firewall name public-private

 

====================== End

 

  • 0
    点赞
  • 6
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值