需求:
(1)技術部IP地址自動獲取,網段為192.168.10.0/24,該部門訪問Internet的報文正常情況下流入鏈路ISP1。
總經辦IP地址自動獲取,網段為192.168.20.0/24,該部門訪問Internet的報文正常情況下流入鏈路ISP2。
(2)技術部和總經辦所在鏈路互為備份,當某部門的鏈路(以下稱主鏈路)出現故障時,流量切換到另一部門所在的鏈路(以下稱備鏈路)上。
(3)開SYN Flood、UDP Flood和ICMP Flood攻擊防范功能.。
一、ISP1配置:
#
interface Ethernet0/0/0
ip address 10.50.10.1 255.255.255.0
#
interface GigabitEthernet0/0/0
ip address 100.1.12.2 255.255.255.0
二、ISP2配置:
interface Ethernet0/0/0
ip address 10.50.20.1 255.255.255.0
#
interface GigabitEthernet0/0/1
ip address 200.1.12.2 255.255.255.0
三、USG5500配置:
#
acl number 2001
rule 5 permit source 192.168.10.0 0.0.0.255
rule 100 deny
#
acl number 2002
rule 5 permit source 192.168.20.0 0.0.0.255
rule 100 deny
#
interface GigabitEthernet0/0/1
ip address 100.1.12.1 255.255.255.0
#
interface GigabitEthernet0/0/2
ip address 200.1.12.1 255.255.255.0
#
interface GigabitEthernet0/0/3
ip address 192.168.10.1 255.255.255.0
ip policy-based-route 10
dhcp select interface
dhcp server gateway-list 192.168.10.1
dhcp server dns-list 114.114.114.114 10.50.10.10
dhcp server domain-name huawei.com
#
interface GigabitEthernet0/0/4
ip address 192.168.20.1 255.255.255.0
ip policy-based-route 20
dhcp select interface
dhcp server gateway-list 192.168.20.1
dhcp server dns-list 114.114.114.114 10.50.20.20
dhcp server domain-name huawei.com
#
firewall zone trust
set priority 85
add interface GigabitEthernet0/0/3
add interface GigabitEthernet0/0/4
#
#
firewall zone name isp1
set priority 15
add interface GigabitEthernet0/0/1
#
firewall zone name isp2
set priority 20
add interface GigabitEthernet0/0/2
#
#
ip route-static 0.0.0.0 0.0.0.0 100.1.12.2 track ip-link 2
ip route-static 0.0.0.0 0.0.0.0 200.1.12.2 track ip-link 1
#
#
policy-based-route 10 permit node 5
if-match acl 2001
apply ip-address next-hop 100.1.12.2
policy-based-route 20 permit node 5
if-match acl 2002
apply ip-address next-hop 200.1.12.2
#
firewall packet-filter default permit interzone trust isp1 direction outbound
firewall packet-filter default permit interzone trust isp2 direction outbound
#nat-policy interzone trust isp1 outbound
policy 1
action source-nat
easy-ip GigabitEthernet0/0/1
#
nat-policy interzone trust isp2 outbound
policy 1
action source-nat
easy-ip GigabitEthernet0/0/2
#
firewall defend syn-flood enable
firewall defend udp-flood enable
firewall defend icmp-flood enable
firewall defend icmp-flood base-session max-rate 5
return