华为防火墙USG6000:NAT和NAT Server配置案例


网络拓扑图

华为防火墙USG6000通过WEB图形界面配置案例_网络

通过WEB方式登录到防火墙

通过Web方式登录USG6000V:​教程​

华为防火墙USG6000通过WEB图形界面配置案例_内网_02

登录成功

华为防火墙USG6000通过WEB图形界面配置案例_内网_03

配置防火墙使内网用户通过PAT方式上网

防火墙上新建一个Nat Pool,供内网用户以NAT方式访问外网

华为防火墙USG6000通过WEB图形界面配置案例_华为_04

配置Nat策略

华为防火墙USG6000通过WEB图形界面配置案例_内网_05

配置策略,使得trust区域可以访问untrust区域

华为防火墙USG6000通过WEB图形界面配置案例_内网_06

配置默认路由,指向R1

华为防火墙USG6000通过WEB图形界面配置案例_安全_07

设置到达Nat Pool的静态路由,指向一个空接口,防止路由黑洞

华为防火墙USG6000通过WEB图形界面配置案例_华为_08

配置防火墙使得外网用户能访问企业DMZ区域的FTP服务器(双向nat)

先配置服务器对外静态映射

华为防火墙USG6000通过WEB图形界面配置案例_华为_09

防火墙上配置一个策略,使得untrust区域能访问DMZ区域

华为防火墙USG6000通过WEB图形界面配置案例_华为_10

配置nat pool地址池,目的是作为外网用户访问内网服务器后nat的内网地址

华为防火墙USG6000通过WEB图形界面配置案例_网络_11

配置一个nat策略。注意,这个nat策略和内网nat外网有所不同!!!

华为防火墙USG6000通过WEB图形界面配置案例_内网_12

最后配置一个到达服务器对外地址的静态路由,防止路由黑洞

华为防火墙USG6000通过WEB图形界面配置案例_内网_13

WEB界面配置完成

内网用户与FTP-Server配置

  • PC1
    华为防火墙USG6000通过WEB图形界面配置案例_华为_14
  • FTP-Server
    华为防火墙USG6000通过WEB图形界面配置案例_内网_15

配置代码

  • FW
dis current-configuration  显示防火墙的运行配置
[USG6000V1]dis current-configuration 
2020-12-02 05:10:12.380
!Software Version V500R005C10SPC300
#
sysname FW
l2tp domain suffix-separator @
#
ipsec sha2 compatible enable
#
undo telnet server enable
undo telnet ipv6 server enable
#
update schedule location-sdb weekly Sun 04:29
#
firewall defend action discard
#
banner enable
#
user-manage web-authentication security port 8887
undo privacy-statement english
undo privacy-statement chinese
page-setting
user-manage security version tlsv1.1 tlsv1.2
password-policy
level high
user-manage single-sign-on ad
user-manage single-sign-on tsm
user-manage single-sign-on radius
user-manage auto-sync online-user
#
web-manager security version tlsv1.1 tlsv1.2
web-manager enable
web-manager security enable
#
firewall dataplane to manageplane application-apperceive default-action drop
#
undo ips log merge enable
#
decoding uri-cache disable
#
feedback type threat-log enable
feedback type pdns enable
#
update schedule ips-sdb daily 01:03
update schedule av-sdb daily 01:03
update schedule sa-sdb daily 01:03
update schedule cnc daily 01:03
update schedule file-reputation daily 01:03
#
ip vpn-instance default
ipv4-family
#
ip-link check enable
ip-link name Linktest vpn-instance default
destination 0.0.0.0/0.0.0.0 interface GigabitEthernet0/0/0 mode icmp next-hop 1
.1.1.2
#
ip address-set FTP_Server type object
address 0 10.1.2.100 mask 32
#
time-range worktime
period-range 08:00:00 to 18:00:00 working-day
#
ike proposal default
encryption-algorithm aes-256 aes-192 aes-128
dh group14
authentication-algorithm sha2-512 sha2-384 sha2-256
authentication-method pre-share
integrity-algorithm hmac-sha2-256
prf hmac-sha2-256
#
aaa
authentication-scheme default
authentication-scheme admin_local
authentication-scheme admin_radius_local
authentication-scheme admin_hwtacacs_local
authentication-scheme admin_ad_local
authentication-scheme admin_ldap_local
authentication-scheme admin_radius
authentication-scheme admin_hwtacacs
authentication-scheme admin_ad
authorization-scheme default
accounting-scheme default
domain default
service-type internetaccess ssl-vpn l2tp ike
internet-access mode password
reference user current-domain
manager-user audit-admin
password cipher @%@%Zrwy:l}UIX`r(g+IY`OVqb^q${UL$9Sr[@{C_yFj6fV)b^tq@%@%
service-type web terminal
level 15

manager-user api-admin
password cipher @%@%RbIt"|>Pz2NW1b@+[5@*lAb@{Q@w,<X<\:FM\\"=aDmHAbCl@%@%
level 15

manager-user admin
password cipher @%@%/#t."\i!CN:fcaLL.SLY9e%>]n*,Vrv~4DZU.{&N6r8:e%A9@%@%
service-type web terminal
level 15

role system-admin
role device-admin
role device-admin(monitor)
role audit-admin
bind manager-user audit-admin role audit-admin
bind manager-user admin role system-admin
#
l2tp-group default-lns
#
interface GigabitEthernet0/0/0
undo shutdown
ip binding vpn-instance default
ip address 192.168.0.1 255.255.255.0
alias GE0/METH
service-manage http permit
service-manage https permit
service-manage ping permit
service-manage ssh permit
service-manage snmp permit
service-manage telnet permit
interface Virtual-if0
#
interface NULL0
#
firewall zone local
set priority 100
#
firewall zone trust
set priority 85
add interface GigabitEthernet0/0/0
#
firewall zone untrust
set priority 5
#
firewall zone dmz
set priority 50
#
ip route-static 0.0.0.0 0.0.0.0 GigabitEthernet1/0/2 1.1.1.2 track ip-link Linkt
est description 链路故障检测
ip route-static 1.1.1.100 255.255.255.255 NULL0 track ip-link Linktest
ip route-static 1.1.1.105 255.255.255.255 NULL0 track ip-link Linktest
#
undo ssh server compatible-ssh1x enable
ssh authentication-type default password
ssh server cipher aes256_ctr aes128_ctr
ssh server hmac sha2_256 sha1
ssh client cipher aes256_ctr aes128_ctr
ssh client hmac sha2_256 sha1
#
firewall detect ftp
#
nat server FTP zone untrust protocol tcp global 1.1.1.100 ftp inside 10.1.2.1 f
tp no-reverse unr-route
#
user-interface con 0
authentication-mode aaa
user-interface vty 0 4
authentication-mode aaa
protocol inbound ssh
user-interface vty 16 20
#
pki realm default
#
sa
#
location
#
nat address-group "Nat pool" 0
mode pat
section 0 1.1.1.105 1.1.1.106
#
nat address-group "DMZ pool" 1
mode pat
route enable
section 0 10.1.2.100 10.1.2.100
#
multi-linkif
mode proportion-of-weight
#
right-manager server-group
#
device-classification
device-group pc
device-group mobile-terminal
device-group undefined-group
#
user-manage server-sync tsm
#
security-policy
rule name FTP
description 外网访问FTP的安全策略
source-zone untrust
destination-zone dmz
service ftp
action permit
#
auth-policy
#
traffic-policy
#
policy-based-route
#
nat-policy
rule name Nat
source-zone trust
destination-zone untrust
action source-nat address-group "Nat pool"
rule name "DMZ NAT"
source-zone untrust
destination-zone dmz
destination-address address-set FTP_Server
service ftp
action source-nat address-group "DMZ pool"
#
quota-policy
#
pcp-policy
#
dns-transparent-policy
#
rightm-policy
#
return
  • R1
显示R1配置
interface GigabitEthernet0/0/0
ip address 1.1.1.2 255.255.255.0
#
interface GigabitEthernet0/0/1
ip address 12.1.1.1 255.255.255.0
#
interface GigabitEthernet0/0/2
#
interface NULL0
#
ospf 1 router-id 1.1.1.1
area 0.0.0.0
network 12.1.1.1 0.0.0.0
#
  • R2
显示R2配置
#
interface GigabitEthernet0/0/0
#
interface GigabitEthernet0/0/1
ip address 12.1.1.2 255.255.255.0
#
interface GigabitEthernet0/0/2
#
interface NULL0
#
ospf 1 router-id 2.2.2.2
area 0.0.0.0
network 12.1.1.2 0.0.0.0
#

官方参考文档

官方参考文档: ​​USG6000 NAT和NAT SERVER应用配置案例​

需要华为、H3C全方向认证资料和知名培训机构视频(IA、IP、IE)的同学关注公众号咨询哦。CSDN粉丝有福利!!!


欢迎关注微信公众号:新网工李白
“免费获取华为认证学习资料培训机构视频、软考学习资料和求职简历模板。”
华为防火墙USG6000通过WEB图形界面配置案例_网络_16