The practical case of the project on the second day of the special training camp

        

  • Firewall theoretical knowledge (must remember)
  1. Classification of firewalls
  1. packet filtering firewall

   Just write the ACL on the router

  1. proxy firewall

   Equivalent to a rental agency

   Disadvantages: slow

  1. Stateful Inspection Firewall

  After a data packet arrives at the firewall, if the policy allows it to pass, it will be allowed to pass. And create a stateful entry.

Advantages: fast processing of subsequent packets, high security

  1. firewall mode

  1. routing pattern
  2. transparent mode
  3. blend mode

  1. Regional division

firewall zone type

priority

connected area

UNTRUST

5

External network interface

TRUST

85

Intranet interface

DMZ

50

server

LOCAL

100

traffic to my firewall itself

Inbound from low to high

Outbound from high to low

Note: Priority ranges from 1-100

  • experimental topology

  • Experimental requirements

  • Experimental configuration
  1. Define the zone type of the firewall

<SRG>system-view // Enter the system view

[SRG]undo info-center enable // Close the center output command

[SRG]sysname FW // The name is FW

[FW]firewall zone trust // Define the trust zone

[FW-zone-trust]add interface g0/0/1 // add interface g0/0/1

[FW-zone-trust]quit

[FW]firewall zone dmz // Define DMZ area

[FW-zone-dmz]add interface g0/0/3 // add interface g0/0/3

[FW-zone-dmz]quit

[FW]firewall zone untrust // Define an untrusted zone

[FW-zone-untrust]add interface g0/0/2 // add interface g0/0/2

[FW-zone-untrust]quit

  1. Configure the IP address of the firewall

[FW]interface g0/0/1

[FW-GigabitEthernet0/0/1]ip address 172.16.2.1 24

[FW-GigabitEthernet0/0/1]quit

[FW]interface g0/0/3

[FW-GigabitEthernet0/0/3]ip address 172.16.1.1 24

[FW-GigabitEthernet0/0/3]quit

[FW]interface g0/0/2

[FW-GigabitEthernet0/0/2]ip address 100.1.1.1 24

[FW-GigabitEthernet0/0/2]quit

  1. Configure the IP address of the terminal

Configuration of hotel room computer

Configuration of hotel web server

Configuration of external network equipment

  1. Test network connectivity

The first step: whether 172.16.2.2 can access 172.16.1.2

Through the above output, you can see that it is not working, and let it go through the following command

[FW]firewall packet-filter default permit interzone trust untrust direction outbound

// The priority of trust is 85, and the priority of untrust is 5. It is called outbound from high to low, so the data from trust to untrust is released

[FW]firewall packet-filter  default permit interzone trust dmz direction outbound

// The priority of trust is 85, and the priority of DMZ is 50. It is called outbound from high to low, so the data from trust to DMZ is released.

Step 2: Test it again

We can see that we can access

  1. NAT

[FW]nat-policy interzone trust untrust outbound //NAT policy is from trusted zone to untrusted zone

[FW-nat-policy-interzone-trust-untrust-outbound]policy 1  //策略1

[FW-nat-policy-interzone-trust-untrust-outbound-1]policy source any // All users below

[FW-nat-policy-interzone-trust-untrust-outbound-1]policy destination any // Access all networks

[FW-nat-policy-interzone-trust-untrust-outbound-1]action source-nat   //作NAT

[FW-nat-policy-interzone-trust-untrust-outbound-1]easy-ip GigabitEthernet 0/0/2  //用esay IP

[FW-nat-policy-interzone-trust-untrust-outbound-1]quit

[FW-nat-policy-interzone-trust-untrust-outbound]quit

Students who want to participate in Teacher Liu's training camp, please add VX at the bottom of the article,

Guess you like

Origin blog.csdn.net/lwljh134/article/details/132361095