命令行 首先配置 PC1: 接下来配置两个交换机的接口,连接PC的那些接口设置成 在防火墙上创建 把每个 配置到这里,每个 接下来只需要对不同区域设置对应需求的安全策略即可实现精细化管控 验证结果如下: 如果是内网的 验证结果: 防火墙web端配置PC1
、PC2
、PC3
、PC4
、R1
、R2
、R3
的接口,IP地址,掩码,网关
PC2:
PC3:
R1: sys un in en sysname R1 int e0/0/0 ip address 192.168.70.7 24 dis this quit
R2: sys un in en sysname R2 int e0/0/0 ip address 192.168.77.7 24 dis this quit
R3: sys un in en sysname R3 int e0/0/0 ip address 177.7.7.7 24 dis this quit
Access
口,通往防火墙的接口设置成Trunk
口,以及创建vlan
区并把接口划分到对应的vlan
区LSW1: sys un in en sysname LSW1 vlan batch 7 17 int e0/0/2 port link-type access port de vlan 7 dis this int e0/0/3 port link-type access port de vlan 7 dis this int e0/0/4 port link-type access port de vlan 17 quit dis port vlan int e0/0/1 port link-type trunk port trunk allow-pass vlan 7 17 dis this quit dis port vlan
LSW2: sys un in en sysname LSW2 vlan 10 int e0/0/2 port link-type access port de vlan 10 dis this int e0/0/1 port link-type trunk port trunk allow-pass vlan 10 dis this quit dis port vlan
vlan
,接着对防火墙上的接口进行设置配置,GE 1/0/0
、GE 1/0/1
口配置成Trunk
口,GE 1/0/2
、GE 1/0/3
配置成Access
口并允许对应vlan
通过,然后新建逻辑接口
并分入对应的vlan
FW: sys un in en vlan batch 7 10 17 70 77 dis port vlan int g1/0/0 portswitch port link-type trunk port trunk allow-pass vlan 7 17 dis this int g1/0/1 portswitch port link-type trunk port trunk allow-pass vlan 10 dis this int g1/0/2 portswitch port link-type access port de vlan 70 dis this int g1/0/3 portswitch port link-type access port de vlan 77 dis this quit dis ip int brief interface vlanif 7 ip address 192.168.7.1 24 service-manage ping permit dis this quit interface vlanif 10 ip address 192.168.10.1 24 service-manage ping permit dis this quit interface vlanif 17 ip address 192.168.17.1 24 service-manage ping permit dis this quit interface vlanif 70 ip address 192.168.70.1 24 service-manage ping permit dis this quit interface vlanif 77 ip address 192.168.70.1 24 service-manage ping permit dis this quit dis port vlan
vlan
都建立对应的区域,并把对应的逻辑接口
划分到对应的区域,以实现精细化管控FW: sys firewall zone name vlan7 set priority 75 add int Vlanif7 dis this quit firewall zone name vlan10 set priority 77 add int Vlanif10 dis this quit firewall zone name vlan17 set priority 76 add int Vlanif17 dis this quit firewall zone name vlan70 set priority 78 add int Vlanif70 dis this quit firewall zone name vlan77 set priority 79 add int Vlanif77 dis this quit
vlan
的PC就可以访问各自的网关了,验证结果如下:
vlan7-PC1:
vlan17-PC3:
vlan10-PC4:
vlan70-R1:
vlan77-R2:
相同区域可以访问,不同区域不能访问,验证结果如下:
FW; sys security-policy rule name vlan7_to_vlan17 source-zone vlan7 destination-zone vlan17 service icmp action permit dis this
其他的就不演示了,不同区域的设置对应的安全策略即可实现精细化管控PC
想要访问外网的地址,做个NAT源地址转换
,做个策略,再在外网口上设置一条缺省路由
即可FW: sys firewall zone trust add int g1/0/0 add int g1/0/1 add int g1/0/2 add int g1/0/3 dis this quit firewall zone untrust add int g1/0/4 dis this quit int g1/0/4 ip address 177.7.7.1 24 dis this quit ip route-static 0.0.0.0 0 177.7.7.7 nat-policy rule bane vlan7_nat_untrust source-zone vlan7 egress-int g1/0/4 action nat easy-ip dis this quit quit
本网页所有视频内容由 imoviebox边看边下-网页视频下载, iurlBox网页地址收藏管理器 下载并得到。
ImovieBox网页视频下载器 下载地址: ImovieBox网页视频下载器-最新版本下载
本文章由: imapbox邮箱云存储,邮箱网盘,ImageBox 图片批量下载器,网页图片批量下载专家,网页图片批量下载器,获取到文章图片,imoviebox网页视频批量下载器,下载视频内容,为您提供.
阅读和此文章类似的: 全球云计算