防火墙配置简要手册

一、电脑侧的配置(tftp server)

二、防火墙测配置:

1、查看防火墙的配置文件

dir

Directory of flash:/

1 -rw- 5527015 Mar 15 2011 11:33:46 system

2 -rw- 3819797 Mar 15 2011 11:34:25 http.zip

3 -rw- 3586 Jul 01 2011 11:27:43 config.cfg

15621 KB total (6484 KB free)

2、上传配置到防火墙

tftp 192.168.0.15 get newconfig.cfg config.cfg #192.168.0.15是上传电脑的地址

The file flash:/config.cfg exists. Overwrite it?[Y/N]:y #tftp server侧的保存文件

Verifying server file...

Server file verify ok.

Deleting the old file, please wait................

File will be transferred in binary mode.

Downloading file from remote tftp server, please wait........

TFTP: 3586 bytes received in 0 second(s).

File downloaded successfully.

3、重启防火墙,启动后的防火墙配置将自动改成脚本中的配置。

三、配置:

[H3C]dis cur

#

sysname H3C

#

firewall packet-filter enable

firewall packet-filter default permit # 开启防火墙的默认规则为允许

#

insulate

#

firewall statistic system enable

#

radius scheme system

server-type extended

#

domain system

#

local-user admin # 定义telnet、web的登录用户名和密码 password simple gdnr #用户名为admin,密码为gdnr

service-type telnet terminal

level 3

#

acl number 2000

rule 0 permit source 192.168.0.0 0.0.0.255 # 定义nat引用规则

#

acl number 3000 # 定义防火墙过滤规则

rule 0 permit tcp destination-port eq 3389

rule 1 permit tcp destination-port eq 9800

rule 2 permit tcp destination-port eq 9595

rule 3 permit tcp destination-port eq 1433

rule 4 permit tcp destination-port eq 10001

rule 5 permit tcp destination-port eq 5631

rule 6 permit tcp destination-port eq 5632

rule 7 permit tcp destination-port eq 19000

rule 8 permit tcp destination-port eq 3390

rule 9 permit tcp destination-port eq 9801

rule 10 permit tcp destination-port eq 9596

rule 11 permit tcp destination-port eq 1434

rule 12 permit tcp destination-port eq 10002

rule 13 permit tcp destination-port eq 5635

rule 14 permit tcp destination-port eq 5636

rule 15 permit tcp destination-port eq 19001

rule 16 permit tcp destination-port eq 2403

rule 17 permit tcp destination-port eq 2404

rule 18 permit tcp destination-port eq 2405

rule 19 permit tcp destination-port eq 5633

rule 20 permit tcp destination-port eq 5634

rule 21 permit tcp destination-port eq 3391

rule 22 permit icmp

rule 100 deny ip

#

interface Aux0

async mode flow

#

interface Ethernet0/0

description To-inside

ip address 192.168.0.254 255.255.255.0

#

interface Ethernet0/1

#

interface Ethernet0/2

#

interface Ethernet0/3

#

interface Ethernet1/0 # 定义内网口参数

description To_shuju # 定义外网口参数

ip address 10.35.21.42 255.255.255.0

firewall packet-filter 3000 inbound

nat outbound 2000 # 定义nat

nat server protocol tcp global 10.35.21.42 3389 inside 192.168.0.10 3389 # 定义nat 服务器映射

nat server protocol tcp global 10.35.21.42 9800 inside 192.168.0.10 9800

nat server protocol tcp global 10.35.21.42 9595 inside 192.168.0.10 9595

nat server protocol tcp global 10.35.21.42 1433 inside 192.168.0.10 1433

nat server protocol tcp global 10.35.21.42 10001 inside 192.168.0.10 10001

nat server protocol tcp global 10.35.21.42 5631 inside 192.168.0.10 5631

nat server protocol tcp global 10.35.21.42 5632 inside 192.168.0.10 5632

nat server protocol tcp global 10.35.21.42 19000 inside 192.168.0.10 19000

nat server protocol tcp global 10.35.21.42 3390 inside 192.168.0.11 3390

nat server protocol tcp global 10.35.21.42 9801 inside 192.168.0.11 9801

nat server protocol tcp global 10.35.21.42 9596 inside 192.168.0.11 9596

nat server protocol tcp global 10.35.21.42 1434 inside 192.168.0.11 1434

nat server protocol tcp global 10.35.21.42 10002 inside 192.168.0.11 10002

nat server protocol tcp global 10.35.21.42 5635 inside 192.168.0.11 5635

nat server protocol tcp global 10.35.21.42 5636 inside 192.168.0.11 5636

nat server protocol tcp global 10.35.21.42 19001 inside 192.168.0.11 19001

nat server protocol tcp global 10.35.21.42 2403 inside 192.168.0.12 2403

nat server protocol tcp global 10.35.21.42 2404 inside 192.168.0.12 2404

nat server protocol tcp global 10.35.21.42 2405 inside 192.168.0.12 2405

nat server protocol tcp global 10.35.21.42 5633 inside 192.168.0.12 5633

nat server protocol tcp global 10.35.21.42 5634 inside 192.168.0.12 5634

nat server protocol tcp global 10.35.21.42 3391 inside 192.168.0.12 3391

#

interface Ethernet1/1

#

interface Ethernet1/2

#

interface NULL0

#

firewall zone local

set priority 100

#

firewall zone trust # 将内部网口加入到信任区

add interface Ethernet0/0

set priority 85

#

firewall zone untrust # 将外部网口加入到非信任区

add interface Ethernet1/0

set priority 5

firewall zone DMZ

set priority 50

#

firewall interzone local trust

#

firewall interzone local untrust

#

firewall interzone local DMZ

#

firewall interzone trust untrust

#

firewall interzone trust DMZ

#

firewall interzone DMZ untrust

#

undo info-center enable

#

ip route-static 0.0.0.0 0.0.0.0 10.35.21.254 preference 60

#

firewall defend ip-spoofing # 启用防攻击类型 firewall defend land

firewall defend smurf

firewall defend fraggle

firewall defend winnuke

firewall defend icmp-redirect

firewall defend icmp-unreachable

firewall defend source-route

firewall defend route-record

firewall defend tracert

firewall defend ping-of-death

firewall defend tcp-flag

firewall defend ip-fragment

firewall defend large-icmp

firewall defend teardrop

firewall defend ip-sweep

firewall defend port-scan

firewall defend arp-spoofing

firewall defend arp-flood

firewall defend frag-flood

firewall defend syn-flood enable

firewall defend udp-flood enable

firewall defend icmp-flood enable # 设置外网网关

user-interface con 0

user-interface aux 0

user-interface vty 0 4 # 定义telnet认证模式 authentication-mode scheme

一、电脑侧的配置(tftp server)

二、防火墙测配置:

1、查看防火墙的配置文件

dir

Directory of flash:/

1 -rw- 5527015 Mar 15 2011 11:33:46 system

2 -rw- 3819797 Mar 15 2011 11:34:25 http.zip

3 -rw- 3586 Jul 01 2011 11:27:43 config.cfg

15621 KB total (6484 KB free)

2、上传配置到防火墙

tftp 192.168.0.15 get newconfig.cfg config.cfg #192.168.0.15是上传电脑的地址

The file flash:/config.cfg exists. Overwrite it?[Y/N]:y #tftp server侧的保存文件

Verifying server file...

Server file verify ok.

Deleting the old file, please wait................

File will be transferred in binary mode.

Downloading file from remote tftp server, please wait........

TFTP: 3586 bytes received in 0 second(s).

File downloaded successfully.

3、重启防火墙,启动后的防火墙配置将自动改成脚本中的配置。

三、配置:

[H3C]dis cur

#

sysname H3C

#

firewall packet-filter enable

firewall packet-filter default permit # 开启防火墙的默认规则为允许

#

insulate

#

firewall statistic system enable

#

radius scheme system

server-type extended

#

domain system

#

local-user admin # 定义telnet、web的登录用户名和密码 password simple gdnr #用户名为admin,密码为gdnr

service-type telnet terminal

level 3

#

acl number 2000

rule 0 permit source 192.168.0.0 0.0.0.255 # 定义nat引用规则

#

acl number 3000 # 定义防火墙过滤规则

rule 0 permit tcp destination-port eq 3389

rule 1 permit tcp destination-port eq 9800

rule 2 permit tcp destination-port eq 9595

rule 3 permit tcp destination-port eq 1433

rule 4 permit tcp destination-port eq 10001

rule 5 permit tcp destination-port eq 5631

rule 6 permit tcp destination-port eq 5632

rule 7 permit tcp destination-port eq 19000

rule 8 permit tcp destination-port eq 3390

rule 9 permit tcp destination-port eq 9801

rule 10 permit tcp destination-port eq 9596

rule 11 permit tcp destination-port eq 1434

rule 12 permit tcp destination-port eq 10002

rule 13 permit tcp destination-port eq 5635

rule 14 permit tcp destination-port eq 5636

rule 15 permit tcp destination-port eq 19001

rule 16 permit tcp destination-port eq 2403

rule 17 permit tcp destination-port eq 2404

rule 18 permit tcp destination-port eq 2405

rule 19 permit tcp destination-port eq 5633

rule 20 permit tcp destination-port eq 5634

rule 21 permit tcp destination-port eq 3391

rule 22 permit icmp

rule 100 deny ip

#

interface Aux0

async mode flow

#

interface Ethernet0/0

description To-inside

ip address 192.168.0.254 255.255.255.0

#

interface Ethernet0/1

#

interface Ethernet0/2

#

interface Ethernet0/3

#

interface Ethernet1/0 # 定义内网口参数

description To_shuju # 定义外网口参数

ip address 10.35.21.42 255.255.255.0

firewall packet-filter 3000 inbound

nat outbound 2000 # 定义nat

nat server protocol tcp global 10.35.21.42 3389 inside 192.168.0.10 3389 # 定义nat 服务器映射

nat server protocol tcp global 10.35.21.42 9800 inside 192.168.0.10 9800

nat server protocol tcp global 10.35.21.42 9595 inside 192.168.0.10 9595

nat server protocol tcp global 10.35.21.42 1433 inside 192.168.0.10 1433

nat server protocol tcp global 10.35.21.42 10001 inside 192.168.0.10 10001

nat server protocol tcp global 10.35.21.42 5631 inside 192.168.0.10 5631

nat server protocol tcp global 10.35.21.42 5632 inside 192.168.0.10 5632

nat server protocol tcp global 10.35.21.42 19000 inside 192.168.0.10 19000

nat server protocol tcp global 10.35.21.42 3390 inside 192.168.0.11 3390

nat server protocol tcp global 10.35.21.42 9801 inside 192.168.0.11 9801

nat server protocol tcp global 10.35.21.42 9596 inside 192.168.0.11 9596

nat server protocol tcp global 10.35.21.42 1434 inside 192.168.0.11 1434

nat server protocol tcp global 10.35.21.42 10002 inside 192.168.0.11 10002

nat server protocol tcp global 10.35.21.42 5635 inside 192.168.0.11 5635

nat server protocol tcp global 10.35.21.42 5636 inside 192.168.0.11 5636

nat server protocol tcp global 10.35.21.42 19001 inside 192.168.0.11 19001

nat server protocol tcp global 10.35.21.42 2403 inside 192.168.0.12 2403

nat server protocol tcp global 10.35.21.42 2404 inside 192.168.0.12 2404

nat server protocol tcp global 10.35.21.42 2405 inside 192.168.0.12 2405

nat server protocol tcp global 10.35.21.42 5633 inside 192.168.0.12 5633

nat server protocol tcp global 10.35.21.42 5634 inside 192.168.0.12 5634

nat server protocol tcp global 10.35.21.42 3391 inside 192.168.0.12 3391

#

interface Ethernet1/1

#

interface Ethernet1/2

#

interface NULL0

#

firewall zone local

set priority 100

#

firewall zone trust # 将内部网口加入到信任区

add interface Ethernet0/0

set priority 85

#

firewall zone untrust # 将外部网口加入到非信任区

add interface Ethernet1/0

set priority 5

firewall zone DMZ

set priority 50

#

firewall interzone local trust

#

firewall interzone local untrust

#

firewall interzone local DMZ

#

firewall interzone trust untrust

#

firewall interzone trust DMZ

#

firewall interzone DMZ untrust

#

undo info-center enable

#

ip route-static 0.0.0.0 0.0.0.0 10.35.21.254 preference 60

#

firewall defend ip-spoofing # 启用防攻击类型 firewall defend land

firewall defend smurf

firewall defend fraggle

firewall defend winnuke

firewall defend icmp-redirect

firewall defend icmp-unreachable

firewall defend source-route

firewall defend route-record

firewall defend tracert

firewall defend ping-of-death

firewall defend tcp-flag

firewall defend ip-fragment

firewall defend large-icmp

firewall defend teardrop

firewall defend ip-sweep

firewall defend port-scan

firewall defend arp-spoofing

firewall defend arp-flood

firewall defend frag-flood

firewall defend syn-flood enable

firewall defend udp-flood enable

firewall defend icmp-flood enable # 设置外网网关

user-interface con 0

user-interface aux 0

user-interface vty 0 4 # 定义telnet认证模式 authentication-mode scheme


相关文章

  • 科达KDV8000B多点控制单元用户手册
  • 科达KDV8000B多点控制单元 用户手册 前 言 版本说明 读者对象 内容介绍 相关手册  本手册对应产品的版本为:KEDACOM视频会议系统V4.0_R3版本  视频会议操作人员  视频会议维护人员  工程安装人员  < ...查看


  • KDV8000B多点控制单元用户手册(R3)
  • KDV8000B多点控制单元 用户手册 产品版本:V4.0-R3版本 声明 苏州科达科技有限公司 版权所有,保留一切权利 未经本公司明确书面许可,不得以任何形式或通过任何电子或机械方式,复制或传播本文档的任何部分用于任何用途.在法律上,复制 ...查看


  • 手机说明书
  • ezoffice 3g版移动办公平台 用户使用手册 版本:ver1.1 万户网络技术有限公司 2009年12月 1. 系统安装 1.1 运行环境 ezoffice 3g版移动办公平台是基于pc版拓展而来的移动办公系统,用户必须是 ezoff ...查看


  • 天融信防火墙NGFW4000配置手册
  • 天融信防火墙NGFW4000快速配置手册 目 录 一. 防火墙的几种管理方式 . ............................................................................... ...查看


  • 消防安全手册
  • 消防安全手册 FIRE PREVENTION SAFETY HANDBOOK 酒店管理有限公司 消防安全手册 目录 1 1.员工火警(火灾)报警规程 234.酒店各部门火灾扑救.疏散规程 5.高.低压配电室火灾应急处理规程 6.锅炉房火灾应 ...查看


  • 2014年注册电气工程师发输变电专业考试大纲规范目录设计手册
  • 2014年注册电气工程师(发输变电)执业资格考试专业考试考试大纲 1.考试大纲 1.安全 1.1熟悉工程建设标准强制性条文(电力工程部分): 1.2掌握电力工程电气保护的要求和主要防护措施: 1.3掌握危险环境电力装置的设计要求: 1.4了 ...查看


  • 智能建筑毕业论文
  • 学院 毕 业 设 计(论 文) SNL/QR7.5.4-3 专 业 学生姓名 班 级 学 号 指导教师 完成日期 成绩评议 毕业设计(论文)任务书 指导教师意见 评阅教师意见 答辩小组评议意见 别墅型智能家居方案设计 摘要:智能家居是在家庭 ...查看


  • [法律法规]电信网络运行监督管理办法
  • [阅读全文] 电信网络运行监督管理办法工业和信息化部 为了加强电信网络运行监督管理,保障电信网络运行稳定可靠,预防电信网络运行事故发生,促进电信行业持续稳定发展,根据<中华人民共和国安全生产法>.<中华人民共和国电信条例& ...查看


  • 防火墙应用指导手册
  • 防火墙应用指导手册 防火墙应用指导手册 防火墙是为防止非法访问或保护专用网络而设计的一种系统.防火墙可用于硬件.软 件或二者的组合.防火墙常常被用于阻止非法的互联网用户访问接入互联网的专用网络. 本文将从防火墙的简介.种类.选择的方法.配置 ...查看


热门内容