华为防火墙vsys高级用法

在这里插入图片描述
逻辑上简单看成下面这个图
在这里插入图片描述

再具分析就可以看成下面逻辑图
在这里插入图片描述

fw配置

vsys enable
开虚拟功能

这两个虚拟口必须先创建
interface GigabitEthernet1/0/2.10
interface GigabitEthernet1/0/2.20

vsys name a 1
assign interface GigabitEthernet1/0/2.10
assign interface GigabitEthernet1/0/0

vsys name b 2
assign interface GigabitEthernet1/0/2.20
assign interface GigabitEthernet1/0/1

interface GigabitEthernet1/0/0
undo shutdown
ip binding vpn-instance a
ip address 1.1.1.254 255.255.255.0

interface GigabitEthernet1/0/1
undo shutdown
ip binding vpn-instance b
ip address 2.2.2.254 255.255.255.0

interface GigabitEthernet1/0/2.10
vlan-type dot1q 10
ip binding vpn-instance a
ip address 192.168.1.254 255.255.255.0

interface GigabitEthernet1/0/2.20
vlan-type dot1q 20
ip binding vpn-instance b
ip address 192.168.2.254 255.255.255.0

interface Virtual-if0
ip address 172.16.0.1 255.255.255.0

interface Virtual-if1
ip address 172.16.0.2 255.255.255.0

interface Virtual-if2
ip address 172.16.0.3 255.255.255.0

firewall zone local
set priority 100

firewall zone trust
set priority 85
add interface GigabitEthernet0/0/0
add interface Virtual-if0

用ospf协议把防火墙周边的虚拟防火墙各接口网段打通
ospf 1 router-id 1.1.1.254 vpn-instance a
area 0.0.0.0
network 1.1.1.254 0.0.0.0
network 192.168.1.254 0.0.0.0

ospf 2 router-id 2.2.2.254 vpn-instance b
area 0.0.0.0
network 2.2.2.254 0.0.0.0
network 192.168.2.254 0.0.0.0

实例a的网段去网段192.168.2.0并且目的网段在实例b
ip route-static vpn-instance a 192.168.2.0 255.255.255.0 vpn-instance b
ip route-static vpn-instance b 192.168.1.0 255.255.255.0 vpn-instance a

虚拟系统a 配置
switch vsys a 1

interface GigabitEthernet1/0/0
undo shutdown
ip binding vpn-instance a
ip address 1.1.1.254 255.255.255.0

interface GigabitEthernet1/0/2.10
vlan-type dot1q 10
ip binding vpn-instance a
ip address 192.168.1.254 255.255.255.0

interface Virtual-if1
ip address 172.16.0.2 255.255.255.0

firewall zone local
set priority 100

firewall zone trust
set priority 85
add interface GigabitEthernet1/0/2.10

firewall zone untrust
set priority 5
add interface GigabitEthernet1/0/0
add interface Virtual-if1

security-policy
rule name trust-to-untrust
source-zone trust
destination-zone untrust
action permit

rule name untrust-to-trust //对端虚拟系统b访问过来放行
source-zone untrust
destination-zone trust
action permit

虚拟系统b配置
switch vsys b 2

interface GigabitEthernet1/0/1
undo shutdown
ip binding vpn-instance b
ip address 2.2.2.254 255.255.255.0

interface GigabitEthernet1/0/2.20
vlan-type dot1q 20
ip binding vpn-instance b
ip address 192.168.2.254 255.255.255.0

interface Virtual-if2
ip address 172.16.0.3 255.255.255.0

firewall zone local
set priority 100

firewall zone trust
set priority 85
add interface GigabitEthernet1/0/2.20

firewall zone untrust
set priority 5
add interface GigabitEthernet1/0/1
add interface Virtual-if2

security-policy
rule name trust-to-untrust
source-zone trust
destination-zone untrust
action permit

rule name untrust-to-trust //对端a虚拟系统访问过来
source-zone untrust
destination-zone trust
action permit

交换机配置

vlan batch 10 20

interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 10 20

interface GigabitEthernet0/0/2
port link-type access
port default vlan 10

interface GigabitEthernet0/0/3
port link-type access
port default vlan 20

路由器R1配置

interface GigabitEthernet0/0/0
ip address 1.1.1.1 255.255.255.0

ospf 1
area 0.0.0.0
network 1.1.1.1 0.0.0.0

路由器R2配置

interface GigabitEthernet0/0/0
ip address 2.2.2.2 255.255.255.0

ospf 1
area 0.0.0.0
network 2.2.2.2 0.0.0.0

最终实现pc1和pc2可以互通,并且可以各自己对端的路由器通

  • 9
    点赞
  • 17
    收藏
    觉得还不错? 一键收藏
  • 打赏
    打赏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包

打赏作者

项目工程师余工

你的鼓励将是我创作的最大动力

¥1 ¥2 ¥4 ¥6 ¥10 ¥20
扫码支付:¥1
获取中
扫码支付

您的余额不足,请更换扫码支付或充值

打赏作者

实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值