ensp配置USG5500防火墙

ensp配置USG5500防火墙

在这里插入图片描述
[FW]firewall packet-filter default permit all ——————这个是放行默认所有接口

FW1:首先实现内网PC1可以访问到路由器。需要的配置有配置接口地址,安全策略放行,NAT转换,默认路由指到下一跳
[FW1]dis cur
13:20:19 2022/04/04

interface GigabitEthernet0/0/0
alias GE0/MGMT
ip address 192.168.1.254 255.255.255.0
service-manage enable
service-manage http permit
service-manage https permit
service-manage ping permit
service-manage ssh permit
service-manage snmp permit
service-manage telnet permit

interface GigabitEthernet0/0/1
ip address 12.12.12.1 255.255.255.0
service-manage enable
service-manage http permit
service-manage https permit
service-manage ping permit
service-manage ssh permit
service-manage snmp permit
service-manage telnet permit

interface GigabitEthernet0/0/2

interface GigabitEthernet0/0/3

interface GigabitEthernet0/0/4

interface GigabitEthernet0/0/5

interface GigabitEthernet0/0/6

interface GigabitEthernet0/0/7

interface GigabitEthernet0/0/8

interface NULL0
alias NULL0

firewall zone local
set priority 100

firewall zone trust
set priority 85
add interface GigabitEthernet0/0/0

firewall zone untrust
set priority 5
add interface GigabitEthernet0/0/1

firewall zone dmz
set priority 50

aaa
local-user admin password cipher % % sA’mEjOqP*IooDS8mG]3[NE<% %
local-user admin service-type web terminal telnet
local-user admin level 15
authentication-scheme default

authorization-scheme default

accounting-scheme default

domain default

nqa-jitter tag-version 1

ip route-static 0.0.0.0 0.0.0.0 12.12.12.2

banner enable

user-interface con 0
authentication-mode none
user-interface vty 0 4
authentication-mode none
protocol inbound all

slb

right-manager server-group

sysname FW1

l2tp domain suffix-separator @

firewall packet-filter default permit interzone local trust direction inbound
firewall packet-filter default permit interzone local trust direction outbound
firewall packet-filter default permit interzone local untrust direction inbound
firewall packet-filter default permit interzone local untrust direction outboun
d
firewall packet-filter default permit interzone local dmz direction inbound
firewall packet-filter default permit interzone local dmz direction outbound
firewall packet-filter default permit interzone trust untrust direction inbound
firewall packet-filter default permit interzone trust untrust direction outboun
d
firewall packet-filter default permit interzone trust dmz direction inbound
firewall packet-filter default permit interzone trust dmz direction outbound
firewall packet-filter default permit interzone dmz untrust direction inbound
firewall packet-filter default permit interzone dmz untrust direction outbound

nat address-group 1 12.12.12.1 12.12.12.1

ip df-unreachables enable

firewall ipv6 session link-state check
firewall ipv6 statistic system enable

dns resolve

firewall statistic system enable

pki ocsp response cache refresh interval 0
pki ocsp response cache number 0

undo dns proxy

license-server domain lic.huawei.com

web-manager enable

policy interzone trust untrust outbound
policy 1
action permit

nat-policy interzone trust untrust outbound
policy 1
action source-nat ————注意:这里如果是no-nat会导致内网访问不成功
address-group 1

return

——————————————————————————————————
【FW1】配置ipsec vpn的参数和协商。注意需要关闭两边内网的NAT

[FW1]display current-configuration
16:00:33 2022/04/04

acl number 3000
rule 5 permit ip source 192.168.1.0 0.0.0.255 destination 192.168.2.0 0.0.0.255

ike proposal 1
dh group2
integrity-algorithm aes-xcbc-96

ike peer fw2
pre-shared-key % % +D(hUR47OOq%_^*DkdZ%[2)}% %
ike-proposal 1
remote-address 23.23.23.3

ipsec proposal test
esp authentication-algorithm sha1
esp encryption-algorithm aes

ipsec policy map 1 isakmp
security acl 3000
ike-peer fw2
proposal test

interface GigabitEthernet0/0/0
alias GE0/MGMT
ip address 192.168.1.254 255.255.255.0
service-manage enable
service-manage http permit
service-manage https permit
service-manage ping permit
service-manage ssh permit
service-manage snmp permit
service-manage telnet permit

interface GigabitEthernet0/0/1
ip address 12.12.12.1 255.255.255.0
ipsec policy map
service-manage enable
service-manage http permit
service-manage https permit
service-manage ping permit
service-manage ssh permit
service-manage snmp permit
service-manage telnet permit

interface GigabitEthernet0/0/2

interface GigabitEthernet0/0/3

interface GigabitEthernet0/0/4

interface GigabitEthernet0/0/5

interface GigabitEthernet0/0/6

interface GigabitEthernet0/0/7

interface GigabitEthernet0/0/8

interface NULL0
alias NULL0

firewall zone local
set priority 100

firewall zone trust
set priority 85
add interface GigabitEthernet0/0/0

firewall zone untrust
set priority 5
add interface GigabitEthernet0/0/1

firewall zone dmz
set priority 50

aaa
local-user admin password cipher % % sA’mEjOqP*IooDS8mG]3[NE<% %
local-user admin service-type web terminal telnet
local-user admin level 15
authentication-scheme default

authorization-scheme default

accounting-scheme default

domain default

nqa-jitter tag-version 1

ip route-static 0.0.0.0 0.0.0.0 12.12.12.2

banner enable

user-interface con 0
authentication-mode none
user-interface vty 0 4
authentication-mode none
protocol inbound all

slb

right-manager server-group

sysname FW1

l2tp domain suffix-separator @

firewall packet-filter default permit interzone local trust direction inbound
firewall packet-filter default permit interzone local trust direction outbound
firewall packet-filter default permit interzone local untrust direction inbound
firewall packet-filter default permit interzone local untrust direction outboun
d
firewall packet-filter default permit interzone local dmz direction inbound
firewall packet-filter default permit interzone local dmz direction outbound
firewall packet-filter default permit interzone trust untrust direction inbound
firewall packet-filter default permit interzone trust untrust direction outboun
d
firewall packet-filter default permit interzone trust dmz direction inbound
firewall packet-filter default permit interzone trust dmz direction outbound
firewall packet-filter default permit interzone dmz untrust direction inbound
firewall packet-filter default permit interzone dmz untrust direction outbound

nat address-group 1 12.12.12.1 12.12.12.1

ip df-unreachables enable

firewall ipv6 session link-state check
firewall ipv6 statistic system enable

dns resolve

firewall statistic system enable

pki ocsp response cache refresh interval 0
pki ocsp response cache number 0

undo dns proxy

license-server domain lic.huawei.com

web-manager enable

policy interzone local untrust inbound
policy 1

policy interzone trust untrust inbound
policy 1
action permit
policy source 192.168.2.0 0.0.0.255
policy destination 192.168.1.0 0.0.0.255

policy interzone trust untrust outbound
policy 1
action permit

nat-policy interzone trust untrust outbound
policy 1
action no-nat
policy destination 192.168.2.0 mask 24
address-group 1

policy 0

policy 2
action source-nat
address-group 1

return
[FW1]

——————————————————————————————————————
【FW3】

[FW3]dis cur
16:08:52 2022/04/04

stp region-configuration
region-name f0eedc15704f
active region-configuration

acl number 3000
rule 5 permit ip source 192.168.2.0 0.0.0.255 destination 192.168.1.0 0.0.0.255

ike proposal 1
dh group2
integrity-algorithm aes-xcbc-96

ike peer fw1
pre-shared-key % % /d=U~a/WfP!1Jg9:/DyQ[@7.% %
ike-proposal 1
remote-address 12.12.12.1

ipsec proposal test
esp authentication-algorithm sha1
esp encryption-algorithm aes

ipsec policy map 1 isakmp
security acl 3000
ike-peer fw1
proposal test

interface GigabitEthernet0/0/0
alias GE0/MGMT
ip address 192.168.2.254 255.255.255.0
service-manage enable
service-manage http permit
service-manage https permit
service-manage ping permit
service-manage ssh permit
service-manage snmp permit
service-manage telnet permit

interface GigabitEthernet0/0/1
ip address 23.23.23.3 255.255.255.0
ipsec policy map
service-manage enable
service-manage http permit
service-manage https permit
service-manage ping permit
service-manage ssh permit
service-manage snmp permit
service-manage telnet permit

interface GigabitEthernet0/0/2

interface GigabitEthernet0/0/3

interface GigabitEthernet0/0/4

interface GigabitEthernet0/0/5

interface GigabitEthernet0/0/6

interface GigabitEthernet0/0/7

interface GigabitEthernet0/0/8

interface NULL0
alias NULL0

firewall zone local
set priority 100

firewall zone trust
set priority 85
add interface GigabitEthernet0/0/0

firewall zone untrust
set priority 5
add interface GigabitEthernet0/0/1

firewall zone dmz
set priority 50

aaa
local-user admin password cipher % % o#ro#KyHH#T=\T#<ul~*[>5,% %
local-user admin service-type web terminal telnet
local-user admin level 15
authentication-scheme default

authorization-scheme default

accounting-scheme default

domain default

nqa-jitter tag-version 1

ip route-static 0.0.0.0 0.0.0.0 23.23.23.2

banner enable

user-interface con 0
authentication-mode none
user-interface vty 0 4
authentication-mode none
protocol inbound all

slb

right-manager server-group

sysname FW3

l2tp domain suffix-separator @

firewall packet-filter default permit interzone local trust direction inbound
firewall packet-filter default permit interzone local trust direction outbound
firewall packet-filter default permit interzone local untrust direction inbound
firewall packet-filter default permit interzone local untrust direction outboun
d
firewall packet-filter default permit interzone local dmz direction inbound
firewall packet-filter default permit interzone local dmz direction outbound
firewall packet-filter default permit interzone trust untrust direction inbound
firewall packet-filter default permit interzone trust untrust direction outboun
d
firewall packet-filter default permit interzone trust dmz direction inbound
firewall packet-filter default permit interzone trust dmz direction outbound
firewall packet-filter default permit interzone dmz untrust direction inbound
firewall packet-filter default permit interzone dmz untrust direction outbound

nat address-group 2 23.23.23.3 23.23.23.3

ip df-unreachables enable

firewall ipv6 session link-state check
firewall ipv6 statistic system enable

dns resolve

firewall statistic system enable

pki ocsp response cache refresh interval 0
pki ocsp response cache number 0

undo dns proxy

license-server domain lic.huawei.com

web-manager enable

policy interzone local untrust inbound
policy 1
action permit

policy interzone trust untrust inbound
policy 1
action permit
policy source 192.168.1.0 0.0.0.255
policy destination 192.168.2.0 0.0.0.255

nat-policy interzone trust untrust outbound
policy 2
action no-nat
policy destination 192.168.1.0 mask 24

policy 3
action source-nat
address-group 2

return

  • 3
    点赞
  • 23
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
eNSP配置防火墙USG5500的NAT,可以按照以下步骤进行操作: 1. 首先,使用命令`dis cu`查询防火墙配置文件,找到NAT部分的配置信息。根据引用\[2\]中的描述,可以看到防火墙配置文件中有关数据包过滤的配置。 2. 在配置文件中找到需要进行NAT的接口,例如Trust区域的接口。根据引用\[3\]中的描述,可以看到防火墙的接口地址分配情况,其中192.168.5.1是Trust区域的地址。 3. 针对需要进行NAT的接口,使用命令`nat outbound`进行配置。根据具体需求,可以选择不同的NAT类型,例如静态NAT、动态NAT或PAT(端口地址转换)。 4. 配置NAT规则,指定源地址和目的地址的转换方式。根据具体需求,可以使用命令`nat server`配置静态NAT规则,或使用命令`nat address-group`配置动态NAT规则。 5. 配置完成后,保存配置并应用到防火墙上。 需要注意的是,具体的NAT配置步骤可能会因为实验拓扑和需求的不同而有所差异。因此,在进行NAT配置时,建议参考eNSP提供的文档或教程,以确保正确配置防火墙的NAT功能。 #### 引用[.reference_title] - *1* *2* *3* [华为eNSP防火墙USG5500基本配置](https://blog.csdn.net/compression/article/details/127671075)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v91^insert_down1,239^v3^insert_chatgpt"}} ] [.reference_item] [ .reference_list ]
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值