一、实验目的及拓扑
实验目的:防火墙FW1及虚拟墙VFR_A和VRF_B分别连接外网、内网服务器端和内网客户端,将内网服务器通过nat server向外网宣告,使外网能够访问服务器端,同时内网也能够访问服务器,网络拓扑及接口地址规划如下:

二、基本配置
1、接口地址配置:防火墙接口地址外网为.12,内网虚拟墙侧均为.254,内网PC1和server均为.10,外网PC为.105,如图所示配置相应接口地址及终端地址
2、新建虚拟系统并将防火墙各接口分配规划如下:
vsys enable
resource-class r0
vsys name VFR_A 1
assign interface GigabitEthernet1/0/1
assign resource-class r0
vsys name VRF_B 2
assign interface GigabitEthernet1/0/2
FW1\]dis ip vpn-instance int Total VPN-Instances configured : 4 VPN-Instance Name and ID : VFR_A, 1 Interface Number : 2 Interface list : GigabitEthernet1/0/1, Virtual-if1 VPN-Instance Name and ID : VFR_B, 3 Interface Number : 1 Interface list : Virtual-if3 VPN-Instance Name and ID : VRF_B, 2 Interface Number : 2 Interface list : GigabitEthernet1/0/2, Virtual-if2 VPN-Instance Name and ID : default, 21 Interface Number : 1 Interface list : GigabitEthernet0/0/0 3、防火墙各接口区域规划如下: \[FW1\]dis zone local priority is 100 interface of the zone is (0): # trust priority is 85 interface of the zone is (2): GigabitEthernet0/0/0 Virtual-if0 # untrust priority is 5 interface of the zone is (1): GigabitEthernet1/0/0 # dmz priority is 50 interface of the zone is (0): # vpn-instance VFR_A local priority is 100 interface of the zone is (0): # vpn-instance VFR_A trust priority is 85 interface of the zone is (0): # vpn-instance VFR_A untrust priority is 5 interface of the zone is (1): Virtual-if1 # vpn-instance VFR_A dmz priority is 50 interface of the zone is (1): GigabitEthernet1/0/1 # vpn-instance VRF_B local priority is 100 interface of the zone is (0): # vpn-instance VRF_B trust priority is 85 interface of the zone is (1): GigabitEthernet1/0/2 # vpn-instance VRF_B untrust priority is 5 interface of the zone is (1): Virtual-if2 # vpn-instance VRF_B dmz priority is 50 interface of the zone is (0): # vpn-instance VFR_B local priority is 100 interface of the zone is (0): # vpn-instance VFR_B trust priority is 85 interface of the zone is (0): # vpn-instance VFR_B untrust priority is 5 interface of the zone is (0): # vpn-instance VFR_B dmz priority is 50 interface of the zone is (0): # 三、详细配置 1、路由配置: 在根系统上配置路由使外网能够访问内网服务器端、使内网客户端访问内网服务器端,使内网能够访问外网 # ip route-static 0.0.0.0 0.0.0.0 100.1.121.1 ip route-static 192.168.13.0 255.255.255.0 vpn-instance VFR_A ip route-static 192.168.14.0 255.255.255.0 vpn-instance VRF_B # 在两个虚拟系统设置路由使其能够访问根系统 # ip route-static 0.0.0.0 0.0.0.0 public # 2、安全策略配置 根系统 \[FW1-policy-security\]dis th # security-policy rule name LOCAL_TO_ANY source-zone local action permit rule name INT_TO_SER source-zone untrust destination-zone trust source-address 100.1.15.0 mask 255.255.255.0 destination-address 192.168.13.0 mask 255.255.255.0 action permit # 虚拟系统连接服务器端 security-policy rule name OUT_TO_DMZ source-zone untrust destination-zone dmz source-address 192.168.14.0 mask 255.255.255.0 destination-address 192.168.13.0 mask 255.255.255.0 action permit rule name INT_TO_SER source-zone untrust destination-zone dmz source-address 100.1.15.0 mask 255.255.255.0 destination-address 192.168.13.0 mask 255.255.255.0 action permit rule name LOCAL_TO_ANY source-zone local action permit # 3、nat server配置 nat server 1 global 100.1.121.100 inside 192.168.13.10 no-reverse 四、结果验证 内网pc访问服务器 PC\>tracert 192.168.13.10 traceroute to 192.168.13.10, 8 hops max (ICMP), press Ctrl+C to stop 1 \* \* \* 2 \* \* \* 3 192.168.13.10 \<1 ms \<1 ms 16 ms 外网pc访问服务器 PC\>tracert 100.1.121.100 traceroute to 100.1.121.100, 8 hops max (ICMP), press Ctrl+C to stop 1 100.1.15.1 32 ms 47 ms 46 ms 2 100.1.121.12 63 ms 62 ms 63 ms 3 \* \* \* 4 100.1.121.100 78 ms 63 ms 62 ms