第四篇:華為防火牆USG5500-企業雙ISP出口


需求:
(1)技術部IP地址自動獲取,網段為192.168.10.0/24,該部門訪問Internet的報文正常情況下流入鏈路ISP1。
總經辦IP地址自動獲取,網段為192.168.20.0/24,該部門訪問Internet的報文正常情況下流入鏈路ISP2。

(2)技術部和總經辦所在鏈路互為備份,當某部門的鏈路(以下稱主鏈路)出現故障時,流量切換到另一部門所在的鏈路(以下稱備鏈路)上。

(3)開SYN Flood、UDP Flood和ICMP Flood攻擊防范功能.。

 

 

 

一、ISP1配置:
#
interface Ethernet0/0/0
ip address 10.50.10.1 255.255.255.0
#
interface GigabitEthernet0/0/0
ip address 100.1.12.2 255.255.255.0
二、ISP2配置:
interface Ethernet0/0/0
ip address 10.50.20.1 255.255.255.0
#
interface GigabitEthernet0/0/1
ip address 200.1.12.2 255.255.255.0

 

三、USG5500配置:
#
acl number 2001
rule 5 permit source 192.168.10.0 0.0.0.255
rule 100 deny
#
acl number 2002
rule 5 permit source 192.168.20.0 0.0.0.255
rule 100 deny
#

 

interface GigabitEthernet0/0/1
ip address 100.1.12.1 255.255.255.0
#
interface GigabitEthernet0/0/2
ip address 200.1.12.1 255.255.255.0
#
interface GigabitEthernet0/0/3
ip address 192.168.10.1 255.255.255.0
ip policy-based-route 10
dhcp select interface
dhcp server gateway-list 192.168.10.1
dhcp server dns-list 114.114.114.114 10.50.10.10
dhcp server domain-name huawei.com
#
interface GigabitEthernet0/0/4
ip address 192.168.20.1 255.255.255.0
ip policy-based-route 20
dhcp select interface
dhcp server gateway-list 192.168.20.1
dhcp server dns-list 114.114.114.114 10.50.20.20
dhcp server domain-name huawei.com
#

 

firewall zone trust
set priority 85
add interface GigabitEthernet0/0/3
add interface GigabitEthernet0/0/4
#

 

#
firewall zone name isp1
set priority 15
add interface GigabitEthernet0/0/1
#
firewall zone name isp2
set priority 20
add interface GigabitEthernet0/0/2
#

 

#
ip route-static 0.0.0.0 0.0.0.0 100.1.12.2 track ip-link 2
ip route-static 0.0.0.0 0.0.0.0 200.1.12.2 track ip-link 1
#

 

#
policy-based-route 10 permit node 5
if-match acl 2001
apply ip-address next-hop 100.1.12.2
policy-based-route 20 permit node 5
if-match acl 2002
apply ip-address next-hop 200.1.12.2
#
firewall packet-filter default permit interzone trust isp1 direction outbound
firewall packet-filter default permit interzone trust isp2 direction outbound
#nat-policy interzone trust isp1 outbound

policy 1
action source-nat
easy-ip GigabitEthernet0/0/1
#
nat-policy interzone trust isp2 outbound
policy 1
action source-nat
easy-ip GigabitEthernet0/0/2
#

firewall defend syn-flood enable
firewall defend udp-flood enable
firewall defend icmp-flood enable
firewall defend icmp-flood base-session max-rate 5

return


免責聲明!

本站轉載的文章為個人學習借鑒使用,本站對版權不負任何法律責任。如果侵犯了您的隱私權益,請聯系本站郵箱yoyou2525@163.com刪除。



 
粵ICP備18138465號   © 2018-2025 CODEPRJ.COM