
组网要求:
如图所示,某公司拥有多个部门且位于不同网段,各部门均有访问Internet的需求。现要求用户通过二层交换机和防火墙访问外部网络,且要求防火墙作为用户的网关。
一、eNSP详解视频:
视频加载中...
二、IP设置:
1、FW1:GE1/0/1.1:192.168.1.1/24,GE1/0/1.2:192.168.2.1/24,GE1/0/2:200.0.0.2/24
AR1:GE0/0/0:200.0.0.1/24,loopback0:4.4.4.4/32
配置思路
1. 配置交换机基于接口划分VLAN,实现二层转发。
2. 配置防火墙作为用户的网关,通过子接口实现跨网段的三层转发。
3. 配置防火墙作为DHCP服务器,为用户PC分配IP地址。
4. 开启防火墙域间安全策略,使不同域的报文可以相互转发。
5. 配置防火墙PAT功能,使内网用户可以访问外部网络。
三、配置步骤:
步骤1 配置交换机
# 配置下行连接用户的接口。
<HUAWEI> system-view
[HUAWEI] sysname Switch
[Switch] vlan batch 2 3
[Switch] interface gigabitethernet 0/0/2
[Switch-GigabitEthernet0/0/2] port link-type access //配置接口接入类型为access
[Switch-GigabitEthernet0/0/2] port default vlan 2 //配置接口加入VLAN 2
[Switch-GigabitEthernet0/0/2] quit
[Switch] interface gigabitethernet 1/0/3
[Switch-GigabitEthernet0/0/3] port link-type access
[Switch-GigabitEthernet0/0/3] port default vlan 3
[Switch-GigabitEthernet0/0/3] quit
# 配置上行连接防火墙的接口。
[Switch] interface gigabitethernet 0/0/1
[Switch-GigabitEthernet0/0/1] port link-type trunk
[Switch-GigabitEthernet0/0/1] port trunk allow-pass vlan 2 3 //配置接口以trunk方式透传VLAN 2和VLAN 3
[Switch-GigabitEthernet0/0/1] quit
步骤2 配置防火墙
配置防火墙通过子接口终结VLAN,实现跨网段的三层转发。
# 配置终结子接口。
<USG6600> system-view
[USG6600] interface gigabitethernet 1/0/1.1
[USG6600-GigabitEthernet1/0/1.1] vlan-type dot1q 2
[USG6600-GigabitEthernet1/0/1.1] ip address 192.168.1.1 24
[USG6600-GigabitEthernet1/0/1.1] quit
[USG6600] interface gigabitethernet 1/0/1.2
[USG6600-GigabitEthernet1/0/1.2] vlan-type dot1q 3
[USG6600-GigabitEthernet1/0/1.2] ip address 192.168.2.1 24
[USG6600-GigabitEthernet1/0/1.2] quit
# 配置DHCP功能,为内网用户分配IP地址并指定DNS服务器地址。
[USG6600] dhcp enable
[USG6600] interface gigabitethernet 1/0/1.1
[USG6600-GigabitEthernet1/0/1.1] dhcp select interface //开启接口采用接口地址池的DHCP Server功
能
[USG6600-GigabitEthernet1/0/1.1] dhcp server dns-list 114.114.114.114 223.5.5.5 //配置的DNS
List 114.114.114.114是公用的DNS服务器地址,是不区分运营商的。在实际应用中,请根据运营商分配的DNS进行配置
[USG6600-GigabitEthernet1/0/1.1] quit
[USG6600] interface gigabitethernet 1/0/1.2
[USG6600-GigabitEthernet1/0/1.2] dhcp select interface
[USG6600-GigabitEthernet1/0/1.2] dhcp server dns-list 114.114.114.114 223.5.5.5
[USG6600-GigabitEthernet1/0/1.2] quit
# 配置公网接口的IP地址和静态路由。
[USG6600] interface gigabitethernet 1/0/2
[USG6600-GigabitEthernet1/0/2] ip address 200.0.0.2 255.255.255.0 //配置连接公网的接口GE0/0/2的IP地址200.0.0.2
[USG6600-GigabitEthernet1/0/2] quit
[USG6600] ip route-static 0.0.0.0 0.0.0.0 200.0.0.1 //配置静态缺省路由的下一跳指向公网提供的IP地址200.0.0.1
# 配置安全区域。
[USG6600]firewall zone trust //配置trust域
[USG6600-zone-trust] add interface gigabitethernet 1/0/1
[USG6600-zone-trust] add interface gigabitethernet 1/0/1.1
[USG6600-zone-trust] add interface gigabitethernet 1/0/1.2
[USG6600-zone-trust] quit
[USG6600] firewall zone untrust //配置untrust域
[USG6600-zone-untrust] add interface gigabitethernet 1/0/2
[USG6600-zone-untrust] quit
# 配置安全策略,允许域间互访。
[USG6600] security-policy
[USG6600-policy-security] rule name policy1
[USG6600-policy-security-rule-policy1] source-zone trust
[USG6600-policy-security-rule-policy1] destination-zone untrust
[USG6600-policy-security-rule-policy1] source-address 192.168.0.0 mask 255.255.0.0
[USG6600-policy-security-rule-policy1] action permit
[USG6600-policy-security-rule-policy1] quit
[USG6600-policy-security] quit
# 配置PAT地址池,开启允许端口地址转换。
[USG6600] nat address-group addressgroup1
[USG6600-address-group-addressgroup1] section 0 200.0.0.2 200.0.0.2 //转换的公网IP地址
[USG6600-address-group-addressgroup1] quit
# 配置源PAT策略,实现私网指定网段访问公网时自动进行源地址转换。
[USG6600] nat-policy
[USG6600-policy-nat] rule name policy_nat1
[USG6600-policy-nat-rule-policy_nat1] source-zone trust
[USG6600-policy-nat-rule-policy_nat1] destination-zone untrust
[USG6600-policy-nat-rule-policy_nat1] source-address 192.168.0.0 mask 255.255.0.0 //允许进行PAT转换的源IP地址
[USG6600-policy-nat-rule-policy_nat1] action source-nat address-group addressgroup1
[USG6600-policy-nat-rule-policy_nat1] quit
[USG6600-policy-nat] quit
[USG6600] quit
步骤3
检查配置结果
配置PC1的IP地址为192.168.1.2/24,网关为192.168.1.1;PC2的IP地址为
192.168.2.2/24,网关为192.168.2.1。配置外网PC的IP地址为200.0.0.1/24,网关为200.0.0.2。配置完成后,PC1和PC2都可以Ping通外网的IP 200.0.0.1/24,PC1和PC2都可以访问 Internet。
PC>ping 4.4.4.4
Ping 4.4.4.4: 32 data bytes, Press Ctrl_C to break
From 4.4.4.4: bytes=32 seq=1 ttl=254 time=250 ms
From 4.4.4.4: bytes=32 seq=2 ttl=254 time=32 ms
<FW1> display firewall session table
2021-04-12 13:10:04.840
Current Total Sessions : 5
icmp VPN: public --> public 192.168.1.20:46918 [200.0.0.2:2060] --> 4.4.4.4:20
48
icmp VPN: public --> public 192.168.1.20:46662 [200.0.0.2:2059] --> 4.4.4.4:20
48
四、Switch的主要配置文件:
#
sysname Switch
#
vlan batch 2 to 3
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 2 to 3
#
interface GigabitEthernet0/0/2
port link-type access
port default vlan 2
#
interface GigabitEthernet0/0/3
port link-type access
port default vlan 3
#
return
五、FW1的主要配置文件:
#
Dhcp enable
#
interface GigabitEthernet1/0/1
#
interface GigabitEthernet1/0/1.1
vlan-type dot1q 2
ip address 192.168.1.1 255.255.255.0
dhcp select interface
dhcp server dns-list 114.114.114.114
#
interface GigabitEthernet1/0/1.2
vlan-type dot1q 3
ip address 192.168.2.1 255.255.255.0
dhcp select interface
dhcp server dns-list 114.114.114.114
#
interface GigabitEthernet1/0/2
ip address 200.0.0.2 255.255.255.0
#
firewall zone trust
set priority 85
add interface GigabitEthernet1/0/1
add interface GigabitEthernet1/0/1.1
add interface GigabitEthernet1/0/1.2
#
firewall zone untrust
set priority 5
add interface GigabitEthernet1/0/2
#
ip route-static 0.0.0.0 0.0.0.0 200.0.0.1
#
nat address-group addressgroup1
section 0 200.0.0.2 200.0.0.2
#
security-policy
rule name policy1
source-zone trust
destination-zone untrust
source-address 192.168.0.0 mask 255.255.0.0
action permit
#
nat-policy
rule name policy_nat1
source-zone trust
destination-zone untrust
source-address 192.168.0.0 mask 255.255.0.0
action source-nat address-group addressgroup1
#
return
六、AR1的主要配置文件:
#
sysname AR1
#
interface GigabitEthernet0/0/0
ip address 200.0.0.1 255.255.255.0
#
interface LoopBack0
ip address 4.4.4.4 255.255.255.255
#
return