华为 USG6000 系列防火墙概览

本贴最后更新于 1416 天前,其中的信息可能已经时移俗易

防火墙概览系列又更新了! 本文会简单介绍下 huawei usg6000 的防火墙。

提示

输入 ‘?’ 号 可以命令提示,tab 补全命令,quit 或者 ctrl + z 可以退回上个层级

进入配置 configure 模式

system-view

hostname

sysname USG6000V2

提交配置,用来保存当前配置信息到系统的存储路径中

save all

获取 running 配置

display current-configuration all

interface

display interface
interface GigabitEthernet0/0/0
 undo shutdown
 ip binding vpn-instance default
 ip address 192.168.1.60 255.255.255.0
 service-manage http permit
 service-manage https permit
 service-manage ping permit
 service-manage ssh permit
 service-manage snmp permit
 service-manage telnet permit
 service-manage netconf permit

Logging

display logbuffer

address (group)

display ip address-set all
ip address-set hello type object
 address 0 11.10.1.0 mask 25
ip address-set ttttt type group
  description asdasd
  address range 10.10.12.2 10.10.12.10
  address address-set addr
  address address-set kkk
  address address-set uuu
  address range 10.10.123.2 10.10.123.10

service (group)

display ip service-set all
ip service-set fdf type object
    description tgasfasd
    service protocol tcp source-port 0 to 2 destination-port 0 to 65
    service protocol udp source-port 0 to 655 destination-port 0 to 65535
    service protocol tcp source-port 0 to 76 destination-port 88 to 999
    service protocol tcp source-port 666 destination-port 777 to 4564
    service protocol icmp icmp-type 8 9
    service protocol 111
    service protocol icmp icmp-type host-unreachable
ip service-set zxvasfasfsafa type group
    description asdasdsd
    service service-set ad
    service service-set ah
    service service-set bgp
    service service-set discard-tcp

zone

display zone
firewall zone trust
 set priority 85
 add interface GigabitEthernet0/0/0
firewall zone name aaa
 set priority 20

application

display application user-defined
sa
  user-defined-application name UD_3333
    description ada
    data-model browser-based
    label Productivity-LossEvasiveTunnelingSupports-VideoSocial-ApplicationsNetwork-StorageDatabase
    rule name zxc
    protocol tcp
    ip-address 2.2.2.2
    port 3333
    signature context packet direction both plain-string vva field General-Payload
    rule name aaz
    port 6600
    signature context packet direction request regular-expression "aaa?" field General-Payload
    rule name azxc
    ip-address 2.2.2.2
    port 55
    port 66
    port 44
    undo signature

policy

display security-policy all
security-policy
  rule name dfsd
    description fdsdfd
    source-zone trust
    source-zone local
    destination-zone aaa
    destination-zone untrust
    source-address address-set addr
    source-address address-set asdf
    destination-address address-set addr
    destination-address address-set fangcong
    service ad
    service ah
    application app HTML2JPG_Enterprise_Version
    application category Business_Systems sub-category Auth_Service
    application app-group dvsd
    time-range time1
    profile av zxcss
    profile ips web_server
    action permit
    policy logging
    session logging
    session aging-time 324
    long-link enable
    long-link aging-time 3243

timeRange

display time-range all
time-range abc
  period-range 01:30:00 to 23:00:00 Wed Tue Mon   
  absolute-range 00:00:00 2019/10/9 to 00:00:00 2019/10/10 
  absolute-range 00:00:00 2019/10/15 to 00:00:00 2019/10/24

huawei usg Configuring NAT

Static NAT (1 对 1)

使用 static nat 来进行目的地址转换

设备:cisco asa 192.168.1.204

接口:image.png

image.png

设备:huawei usg 192.168.1.205

接口:image.png

拓扑:

image.png

华为墙做 nat 墙

命令:

security-policy
rule name untrust_2_dmz_c0dbd
description create by NAP 97e5819c-2c2c-435b-9e29-5e40d8715f9a
source-zone untrust
destination-zone dmz
source-address address-set WS_172.16.205.1_32
destination-address address-set ws_10.1.206.1
service Any
action permit
nat server untrust_2_dmz_b9fe1 global 12.1.214.33 inside 10.1.206.1

cisco 设备上设置路由:

image.png

在 cisco 上 ping 12.1.214.33

转换结果

image.png

Source NAT

源 NAT 策略用于实现内网主机使用私网地址访问 Internet。系统会将内网主机报文的源 IP 由私网地址转换为公网地址。在配置时,转换前的源地址应选择私网地址或地址组(可多选),转换后的源地址可以使用 NAT 地址池或使用报文出接口的公网 IP 地址。

nat-policy
[USG6000V2-policy-nat]
rule name snat1
[USG6000V2-policy-nat-rule-snat1]
description test
[USG6000V2-policy-nat-rule-snat1]
destination-zone untrust
[USG6000V2-policy-nat-rule-snat1]
source-zone trust
[USG6000V2-policy-nat-rule-snat1]
source-address address-set WS_192.168.1.11_32
[USG6000V2-policy-nat-rule-snat1]
destination-address address-set WS_2.3.1.120_32
[USG6000V2-policy-nat-rule-snat1]
service TCP_241
[USG6000V2-policy-nat-rule-snat1]
action nat address-group test2            //test2为地址池里面的地址
[USG6000V2-policy-nat-rule-snat1]
Destination NAT

image.png

将公网 ip12.1.214.33 的 443 端口 映射到私有 ip 10.1.206.1 的 999

nat server untrust_2_dmz_b9fe1 protocol tcp  global 12.1.214.33 443 inside 10.1.206.1 9999

所以我们会通过 nat-server 的方式来进行 dnat 的配置

相关帖子

欢迎来到这里!

我们正在构建一个小众社区,大家在这里相互信任,以平等 • 自由 • 奔放的价值观进行分享交流。最终,希望大家能够找到与自己志同道合的伙伴,共同成长。

注册 关于
请输入回帖内容 ...