H3C防火墙2区域配置案例
基于多年参与电力行业信息化的经验,H3C公司推出电力信息网络安全加固解决方案,该解决方案主要由对终端安全防护和安全管理中心等关键部件组成。那么H3C防火墙2区域是怎么配置的呢?下面跟yjbys小编一起来看看!
1、配置要求
1)防火墙的E0/2接口为TRUST区域,ip地址是:;
2)防火墙的'E1/2接口为UNTRUST区域,ip地址是:;
3)内网k1gz-0.html" target="_blank" >服务器对外网做一对一的地址映射,、分别映射为、;
4)内网服务器访问外网不做限制,外网访问内网只放通公网地址访问的1433端口和的80端口。
2、防火墙的配置脚本如下
dis cur
#
sysname H3CF100A
#
super password level 3 cipher 6aQ>Q57-$.I)0;4:(I41!!!
#
firewall packet-filter enable
firewall packet-filter default permit
#
insulate
#
nat static inside ip global ip
nat static inside ip global ip
#
firewall statistic system enable
#
radius scheme system
server-type extended
#
domain system
#
local-user net1980
password cipher ######
service-type telnet
level 2
#
aspf-policy 1
detect h323
detect sqlnet
detect rtsp
detect http
detect smtp
detect ftp
detect tcp
detect udp
#
object address
object address
#
acl number 3001
description out-inside
rule 1 permit tcp source 0 destination 0destination-port eq 1433
rule 2 permit tcp source 0 destination 0destination-port eq www
rule 1000 deny ip
acl number 3002
description inside-to-outside
rule 1 permit ip source 0
rule 2 permit ip source 0
rule 1000 deny ip
#
interface Aux0
async mode flow
#
interface Ethernet0/0
shutdown
#
interface Ethernet0/1
shutdown
#
interface Ethernet0/2
speed 100
duplex full
description to server
ip address
firewall packet-filter 3002 inbound
firewall aspf 1 outbound
#
interface Ethernet0/3
shutdown
#
interface Ethernet1/0
shutdown
#
interface Ethernet1/1
shutdown
#
interface Ethernet1/2
speed 100
duplex full
description to internet
ip address
firewall packet-filter 3001 inbound
firewall aspf 1 outbound
nat outbound static
#
interface NULL0
#
firewall zone local
set priority 100
#
firewall zone trust
add interface Ethernet0/2
set priority 85
#
firewall zone untrust
add interface Ethernet1/2
set priority 5
#
firewall zone DMZ
add interface Ethernet0/3
set priority 50
#
firewall interzone local trust
#
firewall interzone local untrust
#
firewall interzone local DMZ
#
firewall interzone trust untrust
#
firewall interzone trust DMZ
#
firewall interzone DMZ untrust
#
ip route-static preference 60
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode scheme
#