防火墙虚拟系统综合实验1

一、实验目的及拓扑

实验目的:防火墙FW1及虚拟墙VFR_A和VRF_B分别连接外网、内网服务器端和内网客户端,将内网服务器通过nat server向外网宣告,使外网能够访问服务器端,同时内网也能够访问服务器,网络拓扑及接口地址规划如下:

二、基本配置

1、接口地址配置:防火墙接口地址外网为.12,内网虚拟墙侧均为.254,内网PC1和server均为.10,外网PC为.105,如图所示配置相应接口地址及终端地址

2、新建虚拟系统并将防火墙各接口分配规划如下:

vsys enable

resource-class r0

vsys name VFR_A 1

assign interface GigabitEthernet1/0/1

assign resource-class r0

vsys name VRF_B 2

assign interface GigabitEthernet1/0/2

FW1\]dis ip vpn-instance int Total VPN-Instances configured : 4 VPN-Instance Name and ID : VFR_A, 1 Interface Number : 2 Interface list : GigabitEthernet1/0/1, Virtual-if1 VPN-Instance Name and ID : VFR_B, 3 Interface Number : 1 Interface list : Virtual-if3 VPN-Instance Name and ID : VRF_B, 2 Interface Number : 2 Interface list : GigabitEthernet1/0/2, Virtual-if2 VPN-Instance Name and ID : default, 21 Interface Number : 1 Interface list : GigabitEthernet0/0/0 3、防火墙各接口区域规划如下: \[FW1\]dis zone local priority is 100 interface of the zone is (0): # trust priority is 85 interface of the zone is (2): GigabitEthernet0/0/0 Virtual-if0 # untrust priority is 5 interface of the zone is (1): GigabitEthernet1/0/0 # dmz priority is 50 interface of the zone is (0): # vpn-instance VFR_A local priority is 100 interface of the zone is (0): # vpn-instance VFR_A trust priority is 85 interface of the zone is (0): # vpn-instance VFR_A untrust priority is 5 interface of the zone is (1): Virtual-if1 # vpn-instance VFR_A dmz priority is 50 interface of the zone is (1): GigabitEthernet1/0/1 # vpn-instance VRF_B local priority is 100 interface of the zone is (0): # vpn-instance VRF_B trust priority is 85 interface of the zone is (1): GigabitEthernet1/0/2 # vpn-instance VRF_B untrust priority is 5 interface of the zone is (1): Virtual-if2 # vpn-instance VRF_B dmz priority is 50 interface of the zone is (0): # vpn-instance VFR_B local priority is 100 interface of the zone is (0): # vpn-instance VFR_B trust priority is 85 interface of the zone is (0): # vpn-instance VFR_B untrust priority is 5 interface of the zone is (0): # vpn-instance VFR_B dmz priority is 50 interface of the zone is (0): # 三、详细配置 1、路由配置: 在根系统上配置路由使外网能够访问内网服务器端、使内网客户端访问内网服务器端,使内网能够访问外网 # ip route-static 0.0.0.0 0.0.0.0 100.1.121.1 ip route-static 192.168.13.0 255.255.255.0 vpn-instance VFR_A ip route-static 192.168.14.0 255.255.255.0 vpn-instance VRF_B # 在两个虚拟系统设置路由使其能够访问根系统 # ip route-static 0.0.0.0 0.0.0.0 public # 2、安全策略配置 根系统 \[FW1-policy-security\]dis th # security-policy rule name LOCAL_TO_ANY source-zone local action permit rule name INT_TO_SER source-zone untrust destination-zone trust source-address 100.1.15.0 mask 255.255.255.0 destination-address 192.168.13.0 mask 255.255.255.0 action permit # 虚拟系统连接服务器端 security-policy rule name OUT_TO_DMZ source-zone untrust destination-zone dmz source-address 192.168.14.0 mask 255.255.255.0 destination-address 192.168.13.0 mask 255.255.255.0 action permit rule name INT_TO_SER source-zone untrust destination-zone dmz source-address 100.1.15.0 mask 255.255.255.0 destination-address 192.168.13.0 mask 255.255.255.0 action permit rule name LOCAL_TO_ANY source-zone local action permit # 3、nat server配置 nat server 1 global 100.1.121.100 inside 192.168.13.10 no-reverse 四、结果验证 内网pc访问服务器 PC\>tracert 192.168.13.10 traceroute to 192.168.13.10, 8 hops max (ICMP), press Ctrl+C to stop 1 \* \* \* 2 \* \* \* 3 192.168.13.10 \<1 ms \<1 ms 16 ms 外网pc访问服务器 PC\>tracert 100.1.121.100 traceroute to 100.1.121.100, 8 hops max (ICMP), press Ctrl+C to stop 1 100.1.15.1 32 ms 47 ms 46 ms 2 100.1.121.12 63 ms 62 ms 63 ms 3 \* \* \* 4 100.1.121.100 78 ms 63 ms 62 ms

相关推荐
liebe1*13 分钟前
第七章 防火墙地址转换
运维·服务器·网络
好好学操作系统9 分钟前
autodl 保存 数据 跨区
linux·运维·服务器
dbitc12 分钟前
WIN11把WSL2移动安装目录
linux·运维·ubuntu·wsl
KingRumn12 分钟前
Linux同步机制之信号量
linux·服务器·网络
旺仔Sec12 分钟前
2026年度河北省职业院校技能竞赛“Web技术”(高职组)赛项竞赛任务
运维·服务器·前端
BullSmall33 分钟前
linux 根据端口查看进程
linux·运维·服务器
嘻哈baby42 分钟前
DDNS动态域名解析方案对比与实战配置
网络
嘻哈baby44 分钟前
Ansible自动化运维入门:从手工到批量部署
运维·自动化·ansible
内控王1 小时前
电力行业违规外联如何解决?
网络安全
Hard but lovely1 小时前
linux:----进程守护化(Daemon)&&会话的原理
linux·运维·服务器