华为防火墙USG6000通过WEB图形界面配置案例

网络拓扑图

在这里插入图片描述

通过WEB方式登录到防火墙

在这里插入图片描述

登录成功

在这里插入图片描述

配置防火墙使内网用户通过PAT方式上网

防火墙上新建一个Nat Pool,供内网用户以NAT方式访问外网
在这里插入图片描述
配置Nat策略
在这里插入图片描述
配置策略,使得trust区域可以访问untrust区域
在这里插入图片描述
配置默认路由,指向R1
在这里插入图片描述
设置到达Nat Pool的静态路由,指向一个空接口,防止路由黑洞
在这里插入图片描述

配置防火墙使得外网用户能访问企业DMZ区域的FTP服务器(双向nat)

先配置服务器对外静态映射
在这里插入图片描述
防火墙上配置一个策略,使得untrust区域能访问DMZ区域
在这里插入图片描述
配置nat pool地址池,目的是作为外网用户访问内网服务器后nat的内网地址
在这里插入图片描述
配置一个nat策略。注意,这个nat策略和内网nat外网有所不同!!!
在这里插入图片描述
最后配置一个到达服务器对外地址的静态路由,防止路由黑洞
在这里插入图片描述
WEB界面配置完成

内网用户与FTP-Server配置

  • PC1
    在这里插入图片描述
  • FTP-Server
    在这里插入图片描述

配置代码

  • FW
dis current-configuration  显示防火墙的运行配置
[USG6000V1]dis current-configuration 
2020-12-02 05:10:12.380 
!Software Version V500R005C10SPC300
#
sysname FW
 l2tp domain suffix-separator @
#
 ipsec sha2 compatible enable
#
undo telnet server enable
undo telnet ipv6 server enable
#
 update schedule location-sdb weekly Sun 04:29
#
 firewall defend action discard
#
 banner enable
#
 user-manage web-authentication security port 8887
 undo privacy-statement english
 undo privacy-statement chinese
page-setting
 user-manage security version tlsv1.1 tlsv1.2
password-policy
 level high
user-manage single-sign-on ad
user-manage single-sign-on tsm
user-manage single-sign-on radius
user-manage auto-sync online-user
#
 web-manager security version tlsv1.1 tlsv1.2
 web-manager enable
 web-manager security enable
#
firewall dataplane to manageplane application-apperceive default-action drop
#
 undo ips log merge enable
#
 decoding uri-cache disable
#
 feedback type threat-log enable
 feedback type pdns enable
#
 update schedule ips-sdb daily 01:03
 update schedule av-sdb daily 01:03
 update schedule sa-sdb daily 01:03
 update schedule cnc daily 01:03
 update schedule file-reputation daily 01:03
#
ip vpn-instance default
 ipv4-family
#
ip-link check enable
ip-link name Linktest vpn-instance default
 destination 0.0.0.0/0.0.0.0 interface GigabitEthernet0/0/0 mode icmp next-hop 1
.1.1.2
#
ip address-set FTP_Server type object
 address 0 10.1.2.100 mask 32
#
 time-range worktime
  period-range 08:00:00 to 18:00:00 working-day
#
ike proposal default
 encryption-algorithm aes-256 aes-192 aes-128
 dh group14
 authentication-algorithm sha2-512 sha2-384 sha2-256
 authentication-method pre-share
 integrity-algorithm hmac-sha2-256
 prf hmac-sha2-256
#
aaa
 authentication-scheme default
 authentication-scheme admin_local
 authentication-scheme admin_radius_local
 authentication-scheme admin_hwtacacs_local
 authentication-scheme admin_ad_local
 authentication-scheme admin_ldap_local
 authentication-scheme admin_radius
 authentication-scheme admin_hwtacacs
 authentication-scheme admin_ad
 authorization-scheme default
 accounting-scheme default
 domain default
  service-type internetaccess ssl-vpn l2tp ike
  internet-access mode password
  reference user current-domain
 manager-user audit-admin
  password cipher @%@%Zrwy:l}UIX`r(g+IY`OVqb^q${
    
    UL$9Sr[@{
    
    C_yFj6fV)b^tq@%@%
  service-type web terminal
  level 15

 manager-user api-admin
  password cipher @%@%RbIt"|>Pz2NW1b@+[5@*lAb@{Q@w,<X<\:FM\\"=aDmHAbCl@%@%
  level 15

 manager-user admin
  password cipher @%@%/#t."\i!CN:fcaLL.SLY9e%>]n*,Vrv~4DZU.{
    
    &N6r8:e%A9@%@%
  service-type web terminal
  level 15

 role system-admin
 role device-admin
 role device-admin(monitor)
 role audit-admin
 bind manager-user audit-admin role audit-admin
 bind manager-user admin role system-admin
#
l2tp-group default-lns
#
interface GigabitEthernet0/0/0
 undo shutdown
 ip binding vpn-instance default
 ip address 192.168.0.1 255.255.255.0
 alias GE0/METH
 service-manage http permit
 service-manage https permit
 service-manage ping permit
 service-manage ssh permit
 service-manage snmp permit
 service-manage telnet permit
interface Virtual-if0
#
interface NULL0
#
firewall zone local
 set priority 100
#
firewall zone trust
 set priority 85
 add interface GigabitEthernet0/0/0
#
firewall zone untrust
 set priority 5
#
firewall zone dmz
 set priority 50
#
ip route-static 0.0.0.0 0.0.0.0 GigabitEthernet1/0/2 1.1.1.2 track ip-link Linkt
est description 链路故障检测
ip route-static 1.1.1.100 255.255.255.255 NULL0 track ip-link Linktest
ip route-static 1.1.1.105 255.255.255.255 NULL0 track ip-link Linktest
#
undo ssh server compatible-ssh1x enable
ssh authentication-type default password
ssh server cipher aes256_ctr aes128_ctr
ssh server hmac sha2_256 sha1
ssh client cipher aes256_ctr aes128_ctr
ssh client hmac sha2_256 sha1
#
firewall detect ftp
#
 nat server FTP zone untrust protocol tcp global 1.1.1.100 ftp inside 10.1.2.1 f
tp no-reverse unr-route
#
user-interface con 0
 authentication-mode aaa
user-interface vty 0 4
 authentication-mode aaa
 protocol inbound ssh
user-interface vty 16 20
#
pki realm default
#
sa
#
location
#
nat address-group "Nat pool" 0
 mode pat
 section 0 1.1.1.105 1.1.1.106
#
nat address-group "DMZ pool" 1
 mode pat
 route enable
 section 0 10.1.2.100 10.1.2.100
#
multi-linkif
 mode proportion-of-weight
#
right-manager server-group
#
device-classification
 device-group pc
 device-group mobile-terminal
 device-group undefined-group
#
user-manage server-sync tsm
#
security-policy
 rule name FTP
  description 外网访问FTP的安全策略
  source-zone untrust
  destination-zone dmz
  service ftp
  action permit
#
auth-policy
#
traffic-policy
#
policy-based-route
#
nat-policy
 rule name Nat
  source-zone trust
  destination-zone untrust
  action source-nat address-group "Nat pool"
 rule name "DMZ NAT"
  source-zone untrust
  destination-zone dmz
  destination-address address-set FTP_Server
  service ftp
  action source-nat address-group "DMZ pool"
#
quota-policy
#
pcp-policy
#
dns-transparent-policy
#
rightm-policy
#
return
  • R1
  显示R1配置
interface GigabitEthernet0/0/0
 ip address 1.1.1.2 255.255.255.0 
#
interface GigabitEthernet0/0/1
 ip address 12.1.1.1 255.255.255.0 
#
interface GigabitEthernet0/0/2
#
interface NULL0
#
ospf 1 router-id 1.1.1.1 
 area 0.0.0.0 
  network 12.1.1.1 0.0.0.0 
#
  • R2
  显示R2配置
#
interface GigabitEthernet0/0/0
#
interface GigabitEthernet0/0/1
 ip address 12.1.1.2 255.255.255.0 
#
interface GigabitEthernet0/0/2
#
interface NULL0
#
ospf 1 router-id 2.2.2.2 
 area 0.0.0.0 
  network 12.1.1.2 0.0.0.0 
#

官方参考文档

官方参考文档: USG6000 NAT和NAT SERVER应用配置案例

猜你喜欢

转载自blog.csdn.net/weixin_44309905/article/details/110489418