防火墙虚拟系统综合实验1

一、实验目的及拓扑

实验目的:防火墙FW1及虚拟墙VFR_A和VRF_B分别连接外网、内网服务器端和内网客户端,将内网服务器通过nat server向外网宣告,使外网能够访问服务器端,同时内网也能够访问服务器,网络拓扑及接口地址规划如下:

二、基本配置

1、接口地址配置:防火墙接口地址外网为.12,内网虚拟墙侧均为.254,内网PC1和server均为.10,外网PC为.105,如图所示配置相应接口地址及终端地址

2、新建虚拟系统并将防火墙各接口分配规划如下:

vsys enable

resource-class r0

vsys name VFR_A 1

assign interface GigabitEthernet1/0/1

assign resource-class r0

vsys name VRF_B 2

assign interface GigabitEthernet1/0/2

FW1\]dis ip vpn-instance int Total VPN-Instances configured : 4 VPN-Instance Name and ID : VFR_A, 1 Interface Number : 2 Interface list : GigabitEthernet1/0/1, Virtual-if1 VPN-Instance Name and ID : VFR_B, 3 Interface Number : 1 Interface list : Virtual-if3 VPN-Instance Name and ID : VRF_B, 2 Interface Number : 2 Interface list : GigabitEthernet1/0/2, Virtual-if2 VPN-Instance Name and ID : default, 21 Interface Number : 1 Interface list : GigabitEthernet0/0/0 3、防火墙各接口区域规划如下: \[FW1\]dis zone local priority is 100 interface of the zone is (0): # trust priority is 85 interface of the zone is (2): GigabitEthernet0/0/0 Virtual-if0 # untrust priority is 5 interface of the zone is (1): GigabitEthernet1/0/0 # dmz priority is 50 interface of the zone is (0): # vpn-instance VFR_A local priority is 100 interface of the zone is (0): # vpn-instance VFR_A trust priority is 85 interface of the zone is (0): # vpn-instance VFR_A untrust priority is 5 interface of the zone is (1): Virtual-if1 # vpn-instance VFR_A dmz priority is 50 interface of the zone is (1): GigabitEthernet1/0/1 # vpn-instance VRF_B local priority is 100 interface of the zone is (0): # vpn-instance VRF_B trust priority is 85 interface of the zone is (1): GigabitEthernet1/0/2 # vpn-instance VRF_B untrust priority is 5 interface of the zone is (1): Virtual-if2 # vpn-instance VRF_B dmz priority is 50 interface of the zone is (0): # vpn-instance VFR_B local priority is 100 interface of the zone is (0): # vpn-instance VFR_B trust priority is 85 interface of the zone is (0): # vpn-instance VFR_B untrust priority is 5 interface of the zone is (0): # vpn-instance VFR_B dmz priority is 50 interface of the zone is (0): # 三、详细配置 1、路由配置: 在根系统上配置路由使外网能够访问内网服务器端、使内网客户端访问内网服务器端,使内网能够访问外网 # ip route-static 0.0.0.0 0.0.0.0 100.1.121.1 ip route-static 192.168.13.0 255.255.255.0 vpn-instance VFR_A ip route-static 192.168.14.0 255.255.255.0 vpn-instance VRF_B # 在两个虚拟系统设置路由使其能够访问根系统 # ip route-static 0.0.0.0 0.0.0.0 public # 2、安全策略配置 根系统 \[FW1-policy-security\]dis th # security-policy rule name LOCAL_TO_ANY source-zone local action permit rule name INT_TO_SER source-zone untrust destination-zone trust source-address 100.1.15.0 mask 255.255.255.0 destination-address 192.168.13.0 mask 255.255.255.0 action permit # 虚拟系统连接服务器端 security-policy rule name OUT_TO_DMZ source-zone untrust destination-zone dmz source-address 192.168.14.0 mask 255.255.255.0 destination-address 192.168.13.0 mask 255.255.255.0 action permit rule name INT_TO_SER source-zone untrust destination-zone dmz source-address 100.1.15.0 mask 255.255.255.0 destination-address 192.168.13.0 mask 255.255.255.0 action permit rule name LOCAL_TO_ANY source-zone local action permit # 3、nat server配置 nat server 1 global 100.1.121.100 inside 192.168.13.10 no-reverse 四、结果验证 内网pc访问服务器 PC\>tracert 192.168.13.10 traceroute to 192.168.13.10, 8 hops max (ICMP), press Ctrl+C to stop 1 \* \* \* 2 \* \* \* 3 192.168.13.10 \<1 ms \<1 ms 16 ms 外网pc访问服务器 PC\>tracert 100.1.121.100 traceroute to 100.1.121.100, 8 hops max (ICMP), press Ctrl+C to stop 1 100.1.15.1 32 ms 47 ms 46 ms 2 100.1.121.12 63 ms 62 ms 63 ms 3 \* \* \* 4 100.1.121.100 78 ms 63 ms 62 ms

相关推荐
小乐笙2 分钟前
笔记:纯真 IP 库使用
运维·网络·tcp/ip
计算机安禾3 分钟前
【计算机网络】第8篇:IPv6协议设计的审慎与激进——地址空间、扩展头与邻居发现
网络·计算机网络
咖喱o9 分钟前
DHCP
linux·运维·服务器·网络
IMPYLH20 分钟前
Linux 的 touch 命令
linux·运维·服务器·bash
uestcwhc31 分钟前
服务器定时发送邮件设置
运维·服务器
雷工笔记39 分钟前
MES 系统设备管理模块详细设计方案
大数据·运维·网络
wangchunting40 分钟前
VMware17 使用Rocky Linux 9.7系统
linux·运维·服务器
xhbh6661 小时前
端口转发是什么?如何设置端口转发?
网络·流量转发·端口流量转发
S1998_1997111609•X1 小时前
论恶意注入污染蜜罐进程函数值取仺⺋以集团犯罪获取数据爬虫的轮系依据
网络·数据库·爬虫·网络协议·百度
我不是立达刘宁宇2 小时前
基础文件操作
运维