华为防火墙USG6000通过WEB图形界面配置案例 您所在的位置:网站首页 防火墙怎么设置才能上网 华为防火墙USG6000通过WEB图形界面配置案例

华为防火墙USG6000通过WEB图形界面配置案例

2024-07-18 00:03| 来源: 网络整理| 查看: 265

华为防火墙USG6000:NAT和NAT Server配置案例 网络拓扑图通过WEB方式登录到防火墙登录成功配置防火墙使内网用户通过PAT方式上网配置防火墙使得外网用户能访问企业DMZ区域的FTP服务器(双向nat)内网用户与FTP-Server配置配置代码官方参考文档

网络拓扑图

在这里插入图片描述

通过WEB方式登录到防火墙

通过Web方式登录USG6000V:教程 在这里插入图片描述

登录成功

在这里插入图片描述

配置防火墙使内网用户通过PAT方式上网

防火墙上新建一个Nat Pool,供内网用户以NAT方式访问外网 在这里插入图片描述 配置Nat策略 在这里插入图片描述 配置策略,使得trust区域可以访问untrust区域 在这里插入图片描述 配置默认路由,指向R1 在这里插入图片描述 设置到达Nat Pool的静态路由,指向一个空接口,防止路由黑洞 在这里插入图片描述

配置防火墙使得外网用户能访问企业DMZ区域的FTP服务器(双向nat)

先配置服务器对外静态映射 在这里插入图片描述 防火墙上配置一个策略,使得untrust区域能访问DMZ区域 在这里插入图片描述 配置nat pool地址池,目的是作为外网用户访问内网服务器后nat的内网地址 在这里插入图片描述 配置一个nat策略。注意,这个nat策略和内网nat外网有所不同!!! 在这里插入图片描述 最后配置一个到达服务器对外地址的静态路由,防止路由黑洞 在这里插入图片描述 WEB界面配置完成

内网用户与FTP-Server配置 PC1 在这里插入图片描述FTP-Server 在这里插入图片描述 配置代码 FW dis current-configuration 显示防火墙的运行配置 [USG6000V1]dis current-configuration 2020-12-02 05:10:12.380 !Software Version V500R005C10SPC300 # sysname FW l2tp domain suffix-separator @ # ipsec sha2 compatible enable # undo telnet server enable undo telnet ipv6 server enable # update schedule location-sdb weekly Sun 04:29 # firewall defend action discard # banner enable # user-manage web-authentication security port 8887 undo privacy-statement english undo privacy-statement chinese page-setting user-manage security version tlsv1.1 tlsv1.2 password-policy level high user-manage single-sign-on ad user-manage single-sign-on tsm user-manage single-sign-on radius user-manage auto-sync online-user # web-manager security version tlsv1.1 tlsv1.2 web-manager enable web-manager security enable # firewall dataplane to manageplane application-apperceive default-action drop # undo ips log merge enable # decoding uri-cache disable # feedback type threat-log enable feedback type pdns enable # update schedule ips-sdb daily 01:03 update schedule av-sdb daily 01:03 update schedule sa-sdb daily 01:03 update schedule cnc daily 01:03 update schedule file-reputation daily 01:03 # ip vpn-instance default ipv4-family # ip-link check enable ip-link name Linktest vpn-instance default destination 0.0.0.0/0.0.0.0 interface GigabitEthernet0/0/0 mode icmp next-hop 1 .1.1.2 # ip address-set FTP_Server type object address 0 10.1.2.100 mask 32 # time-range worktime period-range 08:00:00 to 18:00:00 working-day # ike proposal default encryption-algorithm aes-256 aes-192 aes-128 dh group14 authentication-algorithm sha2-512 sha2-384 sha2-256 authentication-method pre-share integrity-algorithm hmac-sha2-256 prf hmac-sha2-256 # aaa authentication-scheme default authentication-scheme admin_local authentication-scheme admin_radius_local authentication-scheme admin_hwtacacs_local authentication-scheme admin_ad_local authentication-scheme admin_ldap_local authentication-scheme admin_radius authentication-scheme admin_hwtacacs authentication-scheme admin_ad authorization-scheme default accounting-scheme default domain default service-type internetaccess ssl-vpn l2tp ike internet-access mode password reference user current-domain manager-user audit-admin password cipher @%@%Zrwy:l}UIX`r(g+IY`OVqb^q${UL$9Sr[@{C_yFj6fV)b^tq@%@% service-type web terminal level 15 manager-user api-admin password cipher @%@%RbIt"|>Pz2NW1b@+[5@*lAb@{Q@w,]n*,Vrv~4DZU.{&N6r8:e%A9@%@% service-type web terminal level 15 role system-admin role device-admin role device-admin(monitor) role audit-admin bind manager-user audit-admin role audit-admin bind manager-user admin role system-admin # l2tp-group default-lns # interface GigabitEthernet0/0/0 undo shutdown ip binding vpn-instance default ip address 192.168.0.1 255.255.255.0 alias GE0/METH service-manage http permit service-manage https permit service-manage ping permit service-manage ssh permit service-manage snmp permit service-manage telnet permit interface Virtual-if0 # interface NULL0 # firewall zone local set priority 100 # firewall zone trust set priority 85 add interface GigabitEthernet0/0/0 # firewall zone untrust set priority 5 # firewall zone dmz set priority 50 # ip route-static 0.0.0.0 0.0.0.0 GigabitEthernet1/0/2 1.1.1.2 track ip-link Linkt est description 链路故障检测 ip route-static 1.1.1.100 255.255.255.255 NULL0 track ip-link Linktest ip route-static 1.1.1.105 255.255.255.255 NULL0 track ip-link Linktest # undo ssh server compatible-ssh1x enable ssh authentication-type default password ssh server cipher aes256_ctr aes128_ctr ssh server hmac sha2_256 sha1 ssh client cipher aes256_ctr aes128_ctr ssh client hmac sha2_256 sha1 # firewall detect ftp # nat server FTP zone untrust protocol tcp global 1.1.1.100 ftp inside 10.1.2.1 f tp no-reverse unr-route # user-interface con 0 authentication-mode aaa user-interface vty 0 4 authentication-mode aaa protocol inbound ssh user-interface vty 16 20 # pki realm default # sa # location # nat address-group "Nat pool" 0 mode pat section 0 1.1.1.105 1.1.1.106 # nat address-group "DMZ pool" 1 mode pat route enable section 0 10.1.2.100 10.1.2.100 # multi-linkif mode proportion-of-weight # right-manager server-group # device-classification device-group pc device-group mobile-terminal device-group undefined-group # user-manage server-sync tsm # security-policy rule name FTP description 外网访问FTP的安全策略 source-zone untrust destination-zone dmz service ftp action permit # auth-policy # traffic-policy # policy-based-route # nat-policy rule name Nat source-zone trust destination-zone untrust action source-nat address-group "Nat pool" rule name "DMZ NAT" source-zone untrust destination-zone dmz destination-address address-set FTP_Server service ftp action source-nat address-group "DMZ pool" # quota-policy # pcp-policy # dns-transparent-policy # rightm-policy # return R1 显示R1配置 interface GigabitEthernet0/0/0 ip address 1.1.1.2 255.255.255.0 # interface GigabitEthernet0/0/1 ip address 12.1.1.1 255.255.255.0 # interface GigabitEthernet0/0/2 # interface NULL0 # ospf 1 router-id 1.1.1.1 area 0.0.0.0 network 12.1.1.1 0.0.0.0 # R2 显示R2配置 # interface GigabitEthernet0/0/0 # interface GigabitEthernet0/0/1 ip address 12.1.1.2 255.255.255.0 # interface GigabitEthernet0/0/2 # interface NULL0 # ospf 1 router-id 2.2.2.2 area 0.0.0.0 network 12.1.1.2 0.0.0.0 # 官方参考文档

官方参考文档: USG6000 NAT和NAT SERVER应用配置案例

需要华为、H3C全方向认证资料和知名培训机构视频(IA、IP、IE)的同学关注公众号咨询哦。CSDN粉丝有福利!!!

欢迎关注微信公众号:新网工李白 “免费获取华为认证学习资料培训机构视频、软考学习资料和求职简历模板。” 在这里插入图片描述在这里插入图片描述



【本文地址】

公司简介

联系我们

今日新闻

    推荐新闻

    专题文章
      CopyRight 2018-2019 实验室设备网 版权所有