27 防火墙不同区域之间是如何通信

news2024/10/6 1:58:10

26 华三防火墙安全区域-CSDN博客


目标实现不同区域的通信


1 给防火墙配置IP地址

WEB页面配置IP地址


2 在PC机上配置对应对IP地址 (该要启用的接口一定要启用 IP地址 子网掩码 网关 一定要查看好)

3 将配置好的IP地址对应的不同接口加入到不同的区域上去

在WEB页面中可以新建区域

在命令行操作


4 测试实现防火墙到同网段的IP互通


5 创建防火墙中的对象目的是为了更好的管理策略.(对象的名字是啥 你的IP地址是地址还是网段)


网段 对象租 IP地址范围 主机IP地址 主机名 IP地址/子网掩码

  1. 网段:在计算机网络中,网段是指具有相同网络地址的一组主机的集合。一个网段可以包含多个主机,这些主机可以通过相同的网络地址进行通信。
  2. 对象租:对象租是指为了方便管理和配置,将主机、服务、IP地址等相关信息组织起来,并分配给特定的用户或用户组。通过对象租可以将相关的信息整理起来,方便进行管理和控制。
  3. IP地址范围:IP地址范围是指一段连续的IP地址,通常用于指定一组主机的可用IP地址。例如,192.168.0.1-192.168.0.10就表示从192.168.0.1到192.168.0.10的十个IP地址。
  4. 主机IP地址:主机IP地址是指网络中每个主机的唯一标识。通过IP地址,可以唯一确定一个主机的位置和身份。
  5. 主机名:主机名是指一个网络中的主机的名称。主机名通常用于方便用户记忆和使用,可以作为主机的别名使用。
  6. IP地址/子网掩码:IP地址和子网掩码一起使用,用于确定主机所在的子网络。IP地址用于标识主机的唯一性,而子网掩码用于指定子网络的范围。
  7. 防火墙对象:防火墙对象是防火墙中用于规则配置的一种概念。防火墙对象可以是一个IP地址、IP地址范围、主机名、网段等,用于标识网络中的特定主机或服务。通过配置防火墙对象,可以方便地进行规则的管理和控制,提高网络的安全性和管理效率。

对时间段的管理:


6 新建安全策略实现不同区域的互通

01 常规操作

02 服务



测试:

PC1 全互联所有网络


PC5 去往所有区域

[H3C]ping 10.58.142.254
Ping 10.58.142.254 (10.58.142.254): 56 data bytes, press CTRL_C to break
56 bytes from 10.58.142.254: icmp_seq=0 ttl=255 time=1.000 ms
56 bytes from 10.58.142.254: icmp_seq=1 ttl=255 time=0.000 ms
56 bytes from 10.58.142.254: icmp_seq=2 ttl=255 time=0.000 ms
56 bytes from 10.58.142.254: icmp_seq=3 ttl=255 time=0.000 ms
56 bytes from 10.58.142.254: icmp_seq=4 ttl=255 time=0.000 ms

--- Ping statistics for 10.58.142.254 ---
5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss
round-trip min/avg/max/std-dev = 0.000/0.200/1.000/0.400 ms
[H3C]%Jul  7 14:45:47:808 2024 H3C PING/6/PING_STATISTICS: Ping statistics for 10.58.142.254: 5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss, round-trip min/avg/max/std-dev = 0.000/0.200/1.000/0.400 ms.
ping 10.58.143.254
Ping 10.58.143.254 (10.58.143.254): 56 data bytes, press CTRL_C to break
56 bytes from 10.58.143.254: icmp_seq=0 ttl=255 time=1.000 ms
56 bytes from 10.58.143.254: icmp_seq=1 ttl=255 time=1.000 ms
56 bytes from 10.58.143.254: icmp_seq=2 ttl=255 time=1.000 ms
56 bytes from 10.58.143.254: icmp_seq=3 ttl=255 time=1.000 ms
56 bytes from 10.58.143.254: icmp_seq=4 ttl=255 time=1.000 ms

--- Ping statistics for 10.58.143.254 ---
5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss
round-trip min/avg/max/std-dev = 1.000/1.000/1.000/0.000 ms
[H3C]%Jul  7 14:45:54:615 2024 H3C PING/6/PING_STATISTICS: Ping statistics for 10.58.143.254: 5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss, round-trip min/avg/max/std-dev = 1.000/1.000/1.000/0.000 ms.

[H3C]
[H3C]ping 10.58.144.254
Ping 10.58.144.254 (10.58.144.254): 56 data bytes, press CTRL_C to break
56 bytes from 10.58.144.254: icmp_seq=0 ttl=255 time=1.000 ms
56 bytes from 10.58.144.254: icmp_seq=1 ttl=255 time=0.000 ms
56 bytes from 10.58.144.254: icmp_seq=2 ttl=255 time=0.000 ms
56 bytes from 10.58.144.254: icmp_seq=3 ttl=255 time=0.000 ms
56 bytes from 10.58.144.254: icmp_seq=4 ttl=255 time=0.000 ms

--- Ping statistics for 10.58.144.254 ---
5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss
round-trip min/avg/max/std-dev = 0.000/0.200/1.000/0.400 ms
[H3C]%Jul  7 14:46:05:772 2024 H3C PING/6/PING_STATISTICS: Ping statistics for 10.58.144.254: 5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss, round-trip min/avg/max/std-dev = 0.000/0.200/1.000/0.400 ms.

[H3C]ping 10.58.144.2
Ping 10.58.144.2 (10.58.144.2): 56 data bytes, press CTRL_C to break

--- Ping statistics for 10.58.144.2 ---
1 packet(s) transmitted, 0 packet(s) received, 100.0% packet loss
[H3C]%Jul  7 14:46:12:034 2024 H3C PING/6/PING_STATISTICS: Ping statistics for 10.58.144.2: 1 packet(s) transmitted, 0 packet(s) received, 100.0% packet loss.

[H3C]ping 10.58.144.2
Ping 10.58.144.2 (10.58.144.2): 56 data bytes, press CTRL_C to break
Request time out
Request time out

--- Ping statistics for 10.58.144.2 ---
3 packet(s) transmitted, 0 packet(s) received, 100.0% packet loss
[H3C]%Jul  7 14:48:32:225 2024 H3C PING/6/PING_STATISTICS: Ping statistics for 10.58.144.2: 3 packet(s) transmitted, 0 packet(s) received, 100.0% packet loss.

[H3C]
[H3C]ping 192.168.1.254
Ping 192.168.1.254 (192.168.1.254): 56 data bytes, press CTRL_C to break
56 bytes from 192.168.1.254: icmp_seq=0 ttl=255 time=2.000 ms
56 bytes from 192.168.1.254: icmp_seq=1 ttl=255 time=0.000 ms
56 bytes from 192.168.1.254: icmp_seq=2 ttl=255 time=0.000 ms
56 bytes from 192.168.1.254: icmp_seq=3 ttl=255 time=0.000 ms
56 bytes from 192.168.1.254: icmp_seq=4 ttl=255 time=0.000 ms

--- Ping statistics for 192.168.1.254 ---
5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss
round-trip min/avg/max/std-dev = 0.000/0.400/2.000/0.800 ms
[H3C]%Jul  7 14:48:43:191 2024 H3C PING/6/PING_STATISTICS: Ping statistics for 192.168.1.254: 5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss, round-trip min/avg/max/std-dev = 0.000/0.400/2.000/0.800 ms.

[H3C]ping 192.168.1.1
Ping 192.168.1.1 (192.168.1.1): 56 data bytes, press CTRL_C to break
56 bytes from 192.168.1.1: icmp_seq=0 ttl=254 time=1.000 ms
56 bytes from 192.168.1.1: icmp_seq=1 ttl=254 time=0.000 ms
56 bytes from 192.168.1.1: icmp_seq=2 ttl=254 time=1.000 ms
56 bytes from 192.168.1.1: icmp_seq=3 ttl=254 time=0.000 ms
56 bytes from 192.168.1.1: icmp_seq=4 ttl=254 time=0.000 ms

--- Ping statistics for 192.168.1.1 ---
5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss
round-trip min/avg/max/std-dev = 0.000/0.400/1.000/0.490 ms
[H3C]%Jul  7 14:48:47:001 2024 H3C PING/6/PING_STATISTICS: Ping statistics for 192.168.1.1: 5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss, round-trip min/avg/max/std-dev = 0.000/0.400/1.000/0.490 ms.

[H3C]ping 192.168.3.254
Ping 192.168.3.254 (192.168.3.254): 56 data bytes, press CTRL_C to break
56 bytes from 192.168.3.254: icmp_seq=0 ttl=255 time=1.000 ms
56 bytes from 192.168.3.254: icmp_seq=1 ttl=255 time=0.000 ms
56 bytes from 192.168.3.254: icmp_seq=2 ttl=255 time=0.000 ms
56 bytes from 192.168.3.254: icmp_seq=3 ttl=255 time=0.000 ms
56 bytes from 192.168.3.254: icmp_seq=4 ttl=255 time=0.000 ms

--- Ping statistics for 192.168.3.254 ---
5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss
round-trip min/avg/max/std-dev = 0.000/0.200/1.000/0.400 ms
[H3C]%Jul  7 14:48:52:843 2024 H3C PING/6/PING_STATISTICS: Ping statistics for 192.168.3.254: 5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss, round-trip min/avg/max/std-dev = 0.000/0.200/1.000/0.400 ms.
ping 192.168.3.1
Ping 192.168.3.1 (192.168.3.1): 56 data bytes, press CTRL_C to break
56 bytes from 192.168.3.1: icmp_seq=0 ttl=254 time=1.000 ms
56 bytes from 192.168.3.1: icmp_seq=1 ttl=254 time=1.000 ms
56 bytes from 192.168.3.1: icmp_seq=2 ttl=254 time=1.000 ms
56 bytes from 192.168.3.1: icmp_seq=3 ttl=254 time=1.000 ms
56 bytes from 192.168.3.1: icmp_seq=4 ttl=254 time=1.000 ms

--- Ping statistics for 192.168.3.1 ---
5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss
round-trip min/avg/max/std-dev = 1.000/1.000/1.000/0.000 ms
[H3C]%Jul  7 14:48:56:515 2024 H3C PING/6/PING_STATISTICS: Ping statistics for 192.168.3.1: 5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss, round-trip min/avg/max/std-dev = 1.000/1.000/1.000/0.000 ms.

[H3C]ping 192.168.2.1
Ping 192.168.2.1 (192.168.2.1): 56 data bytes, press CTRL_C to break
56 bytes from 192.168.2.1: icmp_seq=0 ttl=254 time=1.000 ms
56 bytes from 192.168.2.1: icmp_seq=1 ttl=254 time=1.000 ms
56 bytes from 192.168.2.1: icmp_seq=2 ttl=254 time=1.000 ms
56 bytes from 192.168.2.1: icmp_seq=3 ttl=254 time=1.000 ms
56 bytes from 192.168.2.1: icmp_seq=4 ttl=254 time=1.000 ms

--- Ping statistics for 192.168.2.1 ---
5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss
round-trip min/avg/max/std-dev = 1.000/1.000/1.000/0.000 ms
[H3C]%Jul  7 14:49:01:531 2024 H3C PING/6/PING_STATISTICS: Ping statistics for 192.168.2.1: 5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss, round-trip min/avg/max/std-dev = 1.000/1.000/1.000/0.000 ms.

[H3C]ping 192.168.2.254
Ping 192.168.2.254 (192.168.2.254): 56 data bytes, press CTRL_C to break
56 bytes from 192.168.2.254: icmp_seq=0 ttl=255 time=1.000 ms
56 bytes from 192.168.2.254: icmp_seq=1 ttl=255 time=0.000 ms
56 bytes from 192.168.2.254: icmp_seq=2 ttl=255 time=0.000 ms
56 bytes from 192.168.2.254: icmp_seq=3 ttl=255 time=0.000 ms
56 bytes from 192.168.2.254: icmp_seq=4 ttl=255 time=0.000 ms

--- Ping statistics for 192.168.2.254 ---
5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss
round-trip min/avg/max/std-dev = 0.000/0.200/1.000/0.400 ms
%Jul  7 14:49:06:629 2024 H3C PING/6/PING_STATISTICS: Ping statistics for 192.168.2.254: 5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss, round-trip min/avg/max/std-dev = 0.000/0.200/1.000/0.400 ms.
[H3C]
[H3C]ping 192.168.0.1
Ping 192.168.0.1 (192.168.0.1): 56 data bytes, press CTRL_C to break
56 bytes from 192.168.0.1: icmp_seq=0 ttl=255 time=0.000 ms
56 bytes from 192.168.0.1: icmp_seq=1 ttl=255 time=0.000 ms
56 bytes from 192.168.0.1: icmp_seq=2 ttl=255 time=0.000 ms
56 bytes from 192.168.0.1: icmp_seq=3 ttl=255 time=0.000 ms
56 bytes from 192.168.0.1: icmp_seq=4 ttl=255 time=0.000 ms

--- Ping statistics for 192.168.0.1 ---
5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss
round-trip min/avg/max/std-dev = 0.000/0.000/0.000/0.000 ms
[H3C]%Jul  7 14:49:12:479 2024 H3C PING/6/PING_STATISTICS: Ping statistics for 192.168.0.1: 5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss, round-trip min/avg/max/std-dev = 0.000/0.000/0.000/0.000 ms.

[H3C]ping 192.168.0.43
Ping 192.168.0.43 (192.168.0.43): 56 data bytes, press CTRL_C to break

--- Ping statistics for 192.168.0.43 ---
1 packet(s) transmitted, 0 packet(s) received, 100.0% packet loss
[H3C]%Jul  7 14:49:17:622 2024 H3C PING/6/PING_STATISTICS: Ping statistics for 192.168.0.43: 1 packet(s) transmitted, 0 packet(s) received, 100.0% packet loss.

[H3C]
[H3C]ping 10.58.143.2
Ping 10.58.143.2 (10.58.143.2): 56 data bytes, press CTRL_C to break
56 bytes from 10.58.143.2: icmp_seq=0 ttl=254 time=1.000 ms
56 bytes from 10.58.143.2: icmp_seq=1 ttl=254 time=1.000 ms
56 bytes from 10.58.143.2: icmp_seq=2 ttl=254 time=1.000 ms
56 bytes from 10.58.143.2: icmp_seq=3 ttl=254 time=0.000 ms
56 bytes from 10.58.143.2: icmp_seq=4 ttl=254 time=1.000 ms

--- Ping statistics for 10.58.143.2 ---
5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss
round-trip min/avg/max/std-dev = 0.000/0.800/1.000/0.400 ms
[H3C]%Jul  7 14:49:32:076 2024 H3C PING/6/PING_STATISTICS: Ping statistics for 10.58.143.2: 5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss, round-trip min/avg/max/std-dev = 0.000/0.800/1.000/0.400 ms.


[H3C]ping 10.58.144.254
Ping 10.58.144.254 (10.58.144.254): 56 data bytes, press CTRL_C to break
56 bytes from 10.58.144.254: icmp_seq=0 ttl=255 time=0.000 ms
56 bytes from 10.58.144.254: icmp_seq=1 ttl=255 time=0.000 ms
56 bytes from 10.58.144.254: icmp_seq=2 ttl=255 time=0.000 ms
56 bytes from 10.58.144.254: icmp_seq=3 ttl=255 time=0.000 ms
56 bytes from 10.58.144.254: icmp_seq=4 ttl=255 time=0.000 ms

--- Ping statistics for 10.58.144.254 ---
5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss
round-trip min/avg/max/std-dev = 0.000/0.000/0.000/0.000 ms
[H3C]%Jul  7 14:49:49:818 2024 H3C PING/6/PING_STATISTICS: Ping statistics for 10.58.144.254: 5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss, round-trip min/avg/max/std-dev = 0.000/0.000/0.000/0.000 ms.

[H3C]ping 10.58.142.254
Ping 10.58.142.254 (10.58.142.254): 56 data bytes, press CTRL_C to break
56 bytes from 10.58.142.254: icmp_seq=0 ttl=255 time=1.000 ms
56 bytes from 10.58.142.254: icmp_seq=1 ttl=255 time=0.000 ms
56 bytes from 10.58.142.254: icmp_seq=2 ttl=255 time=0.000 ms
56 bytes from 10.58.142.254: icmp_seq=3 ttl=255 time=0.000 ms
56 bytes from 10.58.142.254: icmp_seq=4 ttl=255 time=0.000 ms

--- Ping statistics for 10.58.142.254 ---
5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss
round-trip min/avg/max/std-dev = 0.000/0.200/1.000/0.400 ms
[H3C]%Jul  7 14:49:56:110 2024 H3C PING/6/PING_STATISTICS: Ping statistics for 10.58.142.254: 5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss, round-trip min/avg/max/std-dev = 0.000/0.200/1.000/0.400 ms.

[H3C]ping 10.58.144.2
Ping 10.58.144.2 (10.58.144.2): 56 data bytes, press CTRL_C to break
Request time out

--- Ping statistics for 10.58.144.2 ---
2 packet(s) transmitted, 0 packet(s) received, 100.0% packet loss
[H3C]%Jul  7 14:50:24:092 2024 H3C PING/6/PING_STATISTICS: Ping statistics for 10.58.144.2: 2 packet(s) transmitted, 0 packet(s) received, 100.0% packet loss.

[H3C]
[H3C]ping 10.58.144.254
Ping 10.58.144.254 (10.58.144.254): 56 data bytes, press CTRL_C to break
56 bytes from 10.58.144.254: icmp_seq=0 ttl=255 time=1.000 ms
56 bytes from 10.58.144.254: icmp_seq=1 ttl=255 time=0.000 ms
56 bytes from 10.58.144.254: icmp_seq=2 ttl=255 time=0.000 ms
56 bytes from 10.58.144.254: icmp_seq=3 ttl=255 time=0.000 ms
56 bytes from 10.58.144.254: icmp_seq=4 ttl=255 time=0.000 ms

--- Ping statistics for 10.58.144.254 ---
5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss
round-trip min/avg/max/std-dev = 0.000/0.200/1.000/0.400 ms
[H3C]%Jul  7 14:50:28:920 2024 H3C PING/6/PING_STATISTICS: Ping statistics for 10.58.144.254: 5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss, round-trip min/avg/max/std-dev = 0.000/0.200/1.000/0.400 ms.

脚本

#
 version 7.1.064, Alpha 7164
#
 sysname FW-ZONE
#
context Admin id 1
#
 telnet server enable
#
 irf mac-address persistent timer
 irf auto-update enable
 undo irf link-delay
 irf member 1 priority 1
#
 xbar load-single
 password-recovery enable
 lpu-type f-series
#
vlan 1
#
object-group ip address ISP区域出口网关
 security-zone isp
 0 network host address 192.168.3.254
#
object-group ip address NASS区域02
 security-zone NASS
 0 network host address 10.58.144.254
#
object-group ip address NASS区域防护墙出口01
 security-zone NASS
 0 network host address 10.58.143.254
#
object-group ip address PC1
 security-zone Trust
 0 network host address 192.168.2.1
#
object-group ip address PC1防火墙出口网关
 description 防火墙内网区域地址
 security-zone Trust
 0 network host address 192.168.1.254
 object 0 description PC1
#
object-group ip address PC2
 security-zone Trust
 0 network host address 192.168.1.1
#
object-group ip address PC2防火墙出口网关
 description 防火墙内网区域地址
 security-zone Trust
 0 network host address 192.168.2.254
 object 0 description PC2
#
object-group ip address PC3
 security-zone Untrust
 0 network host address 10.58.142.2
#
object-group ip address PC4
 security-zone isp
 0 network host address 192.168.3.1
#
object-group ip address PC5
 security-zone NASS
 0 network host address 10.58.143.2
#
object-group ip address PC7
 security-zone NASS
 0 network host address 10.58.144.2
#
object-group ip address WEB
 security-zone DMZ
 0 network host address 192.168.0.45
#
object-group ip address 防护墙管理地址
 security-zone DMZ
 0 network host address 192.168.0.1
#
object-group ip address 防火墙外网出口网关
 security-zone Untrust
 0 network host address 10.58.142.254
#
interface NULL0
#
interface GigabitEthernet1/0/0
 port link-mode route
 combo enable copper
 ip address 192.168.1.254 255.255.255.0
 ip address 192.168.1.6 255.255.255.0 sub
 manage ping inbound
 manage ping outbound
#
interface GigabitEthernet1/0/1
 port link-mode route
 description 管理接口
 combo enable copper
 ip address 192.168.0.1 255.255.255.0
#
interface GigabitEthernet1/0/2
 port link-mode route
 combo enable copper
 ip address 192.168.2.254 255.255.255.0
 manage ping inbound
 manage ping outbound
#
interface GigabitEthernet1/0/3
 port link-mode route
 combo enable copper
 ip address 192.168.3.254 255.255.255.0
 manage ping inbound
 manage ping outbound
#
interface GigabitEthernet1/0/4
 port link-mode route
 combo enable copper
 shutdown
 manage ping inbound
 manage ping outbound
#
interface GigabitEthernet1/0/5
 port link-mode route
 combo enable copper
 ip address 10.58.142.254 255.255.255.0
 manage ping inbound
 manage ping outbound
#
interface GigabitEthernet1/0/6
 port link-mode route
 combo enable copper
 ip address 10.58.143.254 255.255.255.0
#
interface GigabitEthernet1/0/7
 port link-mode route
 combo enable copper
 ip address 10.58.144.254 255.255.255.0
#
interface GigabitEthernet1/0/8
 port link-mode route
 combo enable copper
#
interface GigabitEthernet1/0/9
 port link-mode route
 combo enable copper
#
interface GigabitEthernet1/0/10
 port link-mode route
 combo enable copper
#
interface GigabitEthernet1/0/11
 port link-mode route
 combo enable copper
#
interface GigabitEthernet1/0/12
 port link-mode route
 combo enable copper
#
interface GigabitEthernet1/0/13
 port link-mode route
 combo enable copper
#
interface GigabitEthernet1/0/14
 port link-mode route
 combo enable copper
#
interface GigabitEthernet1/0/15
 port link-mode route
 combo enable copper
#
interface GigabitEthernet1/0/16
 port link-mode route
 combo enable copper
#
interface GigabitEthernet1/0/17
 port link-mode route
 combo enable copper
#
interface GigabitEthernet1/0/18
 port link-mode route
 combo enable copper
#
interface GigabitEthernet1/0/19
 port link-mode route
 combo enable copper
#
interface GigabitEthernet1/0/20
 port link-mode route
 combo enable copper
#
interface GigabitEthernet1/0/21
 port link-mode route
 combo enable copper
#
interface GigabitEthernet1/0/22
 port link-mode route
 combo enable copper
#
interface GigabitEthernet1/0/23
 port link-mode route
 combo enable copper
#
security-zone name Local
#
security-zone name Trust
 import interface GigabitEthernet1/0/0
 import interface GigabitEthernet1/0/2
#
security-zone name DMZ
#
security-zone name Untrust
 import interface GigabitEthernet1/0/4
 import interface GigabitEthernet1/0/5
#
security-zone name Management
 import interface GigabitEthernet1/0/1
#
security-zone name hello
#
security-zone name isp
 import interface GigabitEthernet1/0/3
#
security-zone name ISP2
#
security-zone name NASS
 import interface GigabitEthernet1/0/6
 import interface GigabitEthernet1/0/7
#
zone-pair security source Trust destination Untrust
 packet-filter 3001
 packet-filter 3002
 packet-filter 3003
#
 scheduler logfile size 16
#
line class aux
 user-role network-operator
#
line class console
 user-role network-admin
#
line class tty
 user-role network-operator
#
line class vty
 user-role network-operator
#
line aux 0
 user-role network-admin
#
line con 0
 authentication-mode scheme
 user-role network-admin
#
line vty 0 4
 authentication-mode scheme
 user-role network-admin
#
line vty 5 63
 user-role network-operator
#
 info-center loghost 127.0.0.1 port 3301 format default
 info-center source CFGLOG loghost level informational
#
acl advanced 3002
 rule 0 permit ip source 192.168.1.0 0.0.0.255 destination 10.58.142.0 0.0.0.255
#
acl advanced 3003
 rule 0 permit ip source 192.168.2.0 0.0.0.255 destination 10.58.142.0 0.0.0.255
#
domain system
#
 aaa session-limit ftp 16
 aaa session-limit telnet 16
 aaa session-limit ssh 16
 domain default enable system
#
role name level-0
 description Predefined level-0 role
#
role name level-1
 description Predefined level-1 role
#
role name level-2
 description Predefined level-2 role
#
role name level-3
 description Predefined level-3 role
#
role name level-4
 description Predefined level-4 role
#
role name level-5
 description Predefined level-5 role
#
role name level-6
 description Predefined level-6 role
#
role name level-7
 description Predefined level-7 role
#
role name level-8
 description Predefined level-8 role
#
role name level-9
 description Predefined level-9 role
#
role name level-10
 description Predefined level-10 role
#
role name level-11
 description Predefined level-11 role
#
role name level-12
 description Predefined level-12 role
#
role name level-13
 description Predefined level-13 role
#
role name level-14
 description Predefined level-14 role
#
user-group system
#
local-user admin class manage
 password hash $h$6$1oUcwMteE/rJ72TU$RiIijBkXKTS+QDwyCS40a6wI7+ORtl3K3xG/SzalxsblSLJrjEj9QjXQ0uv2d4eScyDMjSAlxIKwHNHGAfPW8Q==
 service-type ssh telnet terminal http https
 authorization-attribute user-role level-3
 authorization-attribute user-role level-15
 authorization-attribute user-role network-admin
 authorization-attribute user-role network-operator
#
local-user root class manage
 password hash $h$6$0sgd0nnThKQb5NMG$ThvZMWskPhv5BMYnNLx7E47mdrCfB5cv22mcTbpamc+c33bvkUSN2O0BrLtPplBRmnCVCdPPJiS1hM29f0OCxw==
 access-limit 1000
 service-type ftp
 service-type pad ssh telnet terminal http https
 authorization-attribute work-directory slot1#flash:
 authorization-attribute user-role network-admin
#
 ip http enable
 ip https enable
#
security-policy ip
 rule 0 name PC1去往外网地址PC4
  action pass
  source-zone Trust
  destination-zone Untrust
  source-ip PC1
  destination-ip PC3
 rule 1 name PC1去往外网地址PC2
  action pass
  source-zone Trust
  destination-zone Trust
  source-ip PC1
  destination-ip PC2
 rule 2 name PC1去往ISP区域
  action pass
  source-zone Trust
  destination-zone isp
  source-ip PC1
  destination-ip PC4
 rule 3 name PC2去往外网地址PC4
  action pass
  source-zone Trust
  destination-zone Untrust
  source-ip PC2
  destination-ip PC3
 rule 4 name PC2去往PC1
  action pass
  source-zone Trust
  destination-zone Trust
  source-ip PC2
  destination-ip PC1
 rule 5 name PC2去往ISP区域
  action pass
  source-zone Trust
  destination-zone isp
  source-ip PC2
  destination-ip PC4
 rule 6 name 外网访问内网区域
  action pass
  source-zone Untrust
  destination-zone isp
  destination-zone Trust
  destination-zone DMZ
  source-ip PC3
  destination-ip PC1
  destination-ip PC2
  destination-ip PC4
  destination-ip 防护墙管理地址
 rule 7 name PC1去往外网地址NASS
  action pass
  source-zone Trust
  destination-zone NASS
  source-ip PC1
  destination-ip PC3
  destination-ip NASS区域02
  destination-ip NASS区域防护墙出口01
 rule 8 name PC2去往外网地址NASS
  action pass
  source-zone Trust
  destination-zone NASS
  source-ip PC2
  destination-ip PC3
  destination-ip NASS区域02
  destination-ip NASS区域防护墙出口01
  destination-ip PC5
  destination-ip PC7
#
return

 rule 8 name PC2去往外网地址NASS
  action pass
  source-zone Trust
  destination-zone NASS
  source-ip PC2
  destination-ip PC3
  destination-ip NASS区域02
  destination-ip NASS区域防护墙出口01
  destination-ip PC5
 
destination-ip PC7

  • rule 8: 这是规则的编号,表示这是第八条规则。
  • name PC2去往外网地址NASS: 规则的名称,表明这条规则是关于从PC2(可能是内部网络中的一台计算机)到NASS(可能是一个外部网络地址或服务)的流量。
  • action pass: 这条规则的行动是允许(pass),意味着符合此规则的流量将被放行。
  • source-zone Trust: 源区域(source-zone)是“Trust”,这通常表示源设备所在的网络区域被认为是可信任的。
  • destination-zone NASS: 目的区域(destination-zone)是NASS,这可能是一个特定的外部网络或服务区域。
  • source-ip PC2: 指定了流量的源IP地址是PC2。
  • destination-ip: 后面跟着的是多个目的IP地址,这些地址是允许PC2与之通信的目的地。这些地址可能代表不同的网络设备或服务:
    • PC3: 另一个内部或外部的计算机。
    • NASS区域02: NASS的第二个区域,可能是一个特定的子网或网络段。
    • NASS区域防护墙出口01: NASS区域的一个出口点,可能是一个防火墙或路由器。
    • PC5PC7: 其他两个计算机的IP地址。

 rule 10 name PC7-PC2
  action pass
  source-zone NASS
  destination-zone Trust
  source-ip PC7
  destination-ip PC1


#
object-group ip address ISP

 security-zone isp
 0 network host address 192.168.3.254
#              
object-group ip address NASS02
 security-zone NASS
 0 network host address 10.58.144.254
#
object-group ip address NASSǽ01
 security-zone NASS
 0 network host address 10.58.143.254
#
object-group ip address PC1
 security-zone Trust
 0 network host address 192.168.2.1
#
object-group ip address PC1ǽ

 description ǽ

 security-zone Trust
 0 network host address 192.168.1.254
 object 0 description PC1
#
object-group ip address PC2
 security-zone Trust
 0 network host address 192.168.1.1
#
object-group ip address PC2ǽ

 description ǽ

 security-zone Trust
 0 network host address 192.168.2.254
 object 0 description PC2
#
object-group ip address PC3
 security-zone Untrust
 0 network host address 10.58.142.2
#
object-group ip address PC4
 security-zone isp
 0 network host address 192.168.3.1
#
object-group ip address PC5
 security-zone NASS
 0 network host address 10.58.143.2
#
object-group ip address PC7
 security-zone NASS
 0 network host address 10.58.144.2
#
object-group ip address WEB
 security-zone DMZ
 0 network host address 192.168.0.45
#

object-group ip address PC3
 security-zone Untrust
 0 network host address 10.58.142.2

  • object-group ip address PC3: 这行定义了一个名为"PC3"的IP地址对象组。对象组是网络设备上用来组织和分组相关网络对象(如IP地址、MAC地址等)的一种方式。

  • security-zone Untrust: 这行指定了"PC3"对象组所属的安全区域是"Untrust"。在许多网络策略中,"Untrust"区域通常指的是不受信任的网络区域,可能是外部网络或互联网。

  • 0 network host address 10.58.142.2: 这行指定了对象组"PC3"包含的具体网络对象。这里的"0"可能是一个索引或标识符,用于唯一标识对象组内的条目。"network host"表明这是一个针对特定主机的网络条目。"address 10.58.142.2"指定了这个对象组包含的具体IP地址,即10.58.142.2。

本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处:http://www.coloradmin.cn/o/1903849.html

如若内容造成侵权/违法违规/事实不符,请联系多彩编程网进行投诉反馈,一经查实,立即删除!

相关文章

关于忠诚:忠于自己的良知、理想、信念

关于忠诚: 当我们面对公司、上司、爱人、恋人、合作伙伴还是某件事,会纠结离开还是留下,这里我们要深知忠诚的定义,我们不是忠诚于某个人、某件事、或者某个机构,而是忠诚于自己的良知,忠诚于自己的理想和…

【计算机毕业设计】020基于weixin小程序订餐系统

🙊作者简介:拥有多年开发工作经验,分享技术代码帮助学生学习,独立完成自己的项目或者毕业设计。 代码可以私聊博主获取。🌹赠送计算机毕业设计600个选题excel文件,帮助大学选题。赠送开题报告模板&#xff…

分班结果老师怎么发给家长?

分班结果老师怎么发给家长? 随着新学期的脚步渐近,老师们的工作也变得愈发繁忙。从准备教学计划到整理课程材料,每一项任务都不容小觑。而其中,分班结果的告知工作,更是让不少老师头疼不已。传统的分班通知方式&#…

【电路笔记】-AB类放大器

AB类放大器 文章目录 AB类放大器1、概述2、AB类放大器介绍3、AB类放大器效率4、偏置方法4.1 电压偏置4.2 分压网络4.3 电位器偏置4.4 二极管偏置5、二极管网络和电流源6、AB类放大器的电源分配7、总结1、概述 A类放大器提供非常好的输出线性度,这意味着可以忠实地再现信号,但…

Linux——进程间通信一(共享内存、管道、systrem V)

一、进程间通信介绍 1.1、进程间通信的概念和意义 进程间通信(IPC interprocess communication)是一组编程接口,让不同进程之间相互传递、交换信息(让不同的进程看到同一份资源) 数据传输:一个进程需要将它的数据发送给另外一个进程 资源共享:多个进程之间共享同样…

webGL可用的14种3D文件格式,但要具体问题具体分析。

hello,我威斯数据,你在网上看到的各种炫酷的3d交互效果,背后都必须有三维文件支撑,就好比你网页的时候,得有设计稿源文件一样。WebGL是一种基于OpenGL ES 2.0标准的3D图形库,可以在网页上实现硬件加速的3D图…

世界人工智能大会中“数据+标注”相关的关键词浅析

标注猿的第79篇原创 一个用数据视角看AI世界的标注猿 大家好,我是AI数据标注猿刘吉,一个用数据视角看AI世界的标注猿。 在国家级数据标注基地建设任务下发后的两个月时间里,全国各地政府、各个高校都快速行动了起来,数据行…

【Linux】压缩命令——gzip,bzip2,xz

1.压缩文件的用途与技术 你是否有过文件太大,导致无法以正常的E-mail方式发送?又或学校、厂商要求使用CD或DVD来做数据归档之用,但是你的单一文件却都比这些传统的一次性存储媒介还要大,那怎么分成多块来刻录?还有&am…

局部静态变量实现的单例存在多个对象

文章目录 背景测试代码运行测试尝试打开编译器优化进一步分析 背景 业务中出现日志打印失效&#xff0c;发现是因为管理日志对象的单例在运行过程中存在了多例的情况。下面通过还原业务场景来分析该问题。 测试代码 /* A.h */ #ifndef CALSS_A #define CALSS_A#include <…

Docker 容器网络及其配置说明

Docker 容器网络及其配置说明 docker容器网络docker的4种网络模式bridge 模式container模式host 模式none 模式应用场景 docker 容器网络配置Linux 内核实现名称空间的创建创建 Network Namespace操作 Network Namespace 转移设备veth pair创建 veth pair实现 Network Namespac…

nature methods | 11种空间转录组学技术的系统性比较

—DOI: 10.1038/s41592-024-02325-3 Systematic comparison of sequencing-based spatial transcriptomic methods 学习了一下空间转录组技术怎么做benchmark&#xff0c;从多个的角度去考虑目前技术的性能&#xff0c;受益良多。但该研究缺少对10X Visium HD的测评&#xff…

mac怎么压缩pdf文件大小,mac压缩pdf文件大小不改变清晰度

在数字化时代&#xff0c;pdf格式因其良好的兼容性和稳定性&#xff0c;成为了文档分享和传输的首选。然而&#xff0c;随着文件内容的丰富&#xff0c;pdf文件的体积也越来越大&#xff0c;给存储和传输带来了不小的困扰。本文将揭秘几种简单有效的pdf文件压缩方法&#xff0c…

python爬虫入门(一)之HTTP请求和响应

一、爬虫的三个步骤&#xff08;要学习的内容&#xff09; 1、获取网页内容 &#xff08;HTTP请求、Requests库&#xff09; 2、解析网页内容 &#xff08;HTML网页结构、Beautiful Soup库&#xff09; 3、存储或分析数据 b站学习链接&#xff1a; 【【Python爬虫】爆肝两…

Vue3基础知识:组合式API中的provide和inject,他们作用是什么?如何使用?以及案例演示

1.provide和inject相较于父子传递的不同在于provide,inject可以用于跨层级通信&#xff08;通俗易懂的讲就是可以实现爷孙之间的直接信息传递&#xff09;。 1.跨层级传递数据 1.在顶层组件通过provide函数提供数据 2.底层组件通过inject函数获取数据 演示一&#xff1a;跨…

vCenter登录失败报500错误:no healthy upstream

过了个周末登录vCenter的时候提示&#xff1a;HTTP状态500 - 内部服务器错误&#xff1b;重启服务后提示&#xff1a;no healthy upstream。如下图&#xff1a; 看到这个情况&#xff0c;肯定就是部分不服务异常了或者压根就没有启动。至于说因为啥异常还不得而知。想着登录管理…

MSPM0G3507——串口0从数据线传输变为IO口传输

默认的跳线帽时这样的&#xff0c;这样时是数据线传输 需要改成这样&#xff0c;即可用IO口进行数据传输

Spring IOC基于XML和注解管理Bean

IoC 是 Inversion of Control 的简写&#xff0c;译为“ 控制反转 ”&#xff0c;它不是一门技术&#xff0c;而是一种设计思想&#xff0c;是一个重要的面向对象编程法则&#xff0c;能够指导我们如何设计出 松耦合、更优良的程序。 Spring 通过 IoC 容器来管理所有 Java 对象…

【国产AI绘图】快手把“可图”大模型开源了,这是一款支持中文的SDXL模型

Kolors 是由 Kuaishou Kolors 团队&#xff08;快手可图&#xff09;开发的基于潜在扩散的大规模文本到图像生成模型。经过数十亿对文本图像的训练&#xff0c;Kolors 在视觉质量、复杂语义的准确性以及中英文字符的文本渲染方面&#xff0c;与开源和专有模型相比都具有显著优势…

【LInux】从动态库的加载深入理解页表机制

&#x1f490; &#x1f338; &#x1f337; &#x1f340; &#x1f339; &#x1f33b; &#x1f33a; &#x1f341; &#x1f343; &#x1f342; &#x1f33f; &#x1f344;&#x1f35d; &#x1f35b; &#x1f364; &#x1f4c3;个人主页 &#xff1a;阿然成长日记 …

YOLOv8改进---BiFPN特征融合

一、BiFPN原理 1.1 基本原理 BiFPN&#xff08;Bidirectional Feature Pyramid Network&#xff09;&#xff0c;双向特征金字塔网络是一种高效的多尺度特征融合网络&#xff0c;其基本原理概括分为以下几点&#xff1a; 双向特征融合&#xff1a;BiFPN允许特征在自顶向下和自…