温馨提示×

温馨提示×

您好,登录后才能下订单哦!

密码登录×
登录注册×
其他方式登录
点击 登录注册 即表示同意《亿速云用户服务条款》

6-华为防火墙:配置基于源IP地址的NAT

发布时间:2020-06-13 22:09:22 来源:网络 阅读:2117 作者:第七_感 栏目:安全技术

6-华为防火墙:配置基于源IP地址的NAT
一、实验一:配置No-Pat
1、基本配置略:
2、R1开启Telnet功能:
[R1]user-interface vty 0 4
[R1-ui-vty0-4]authentication-mode password ?
<cr>Please press ENTER to execute command
[R1-ui-vty0-4]authentication-mode password
Please configure the login password (maximum length 16):cisco
[R1-ui-vty0-4]user privilege level 15
3、配置Trust到Untrust的Zone间策略:
[SRG]policy interzone trust untrust outbound
[SRG-policy-interzone-trust-untrust-outbound]policy create-mode auto-sort enable
[SRG-policy-interzone-trust-untrust-outbound]policy 5
[SRG-policy-interzone-trust-untrust-outbound-5]policy source 192.168.1.0 mask 24
[SRG-policy-interzone-trust-untrust-outbound-5]policy destination 202.100.1.0 mask 24
[SRG-policy-interzone-trust-untrust-outbound-5]policy service service-set telnet
[SRG-policy-interzone-trust-untrust-outbound-5]policy service service-set icmp
[SRG-policy-interzone-trust-untrust-outbound-5]action permit
4、NAT未部署前地址未转换:
<R2>telnet 202.100.1.1
Login authentication
Password:cisco

5、配置no-pat:
[SRG]nat address-group 1 202.100.1.10 202.100.1.20 //创建地址组
[SRG]nat-policy interzone trust untrust outbound //创建Zone间NAT策略
[SRG-nat-policy-interzone-trust-untrust-outbound]policy 0
[SRG-nat-policy-interzone-trust-untrust-outbound-0]policy source 192.168.1.0 mask 24 //需要转换的源地址段
[SRG-nat-policy-interzone-trust-untrust-outbound-0]address-group 1 no-pat //转换后的地址组,并且不转换到端口
[SRG-nat-policy-interzone-trust-untrust-outbound-0]action source-nat //执行源转换动作
测试:
<R2>telnet 202.100.1.1

查看防火墙会话转换:
[SRG]display firewall session table verbose //源端口50573,转换后端口依然是50573

查看防火墙Map:
[SRG]display firewall server-map

二:实验二:配置PAT,有外部地址池的端口转换
[SRG-nat-policy-interzone-trust-untrust-outbound-0]undo address-group
[SRG-nat-policy-interzone-trust-untrust-outbound-0]address-group 1
测试:
<R2>telnet 202.100.1.1
[SRG]display firewall session table verbose

三、实验三:配置Easy-IP,转换192.168.1.2到USG的g0/0/0接口地址
[SRG]nat-policy interzone trust untrust outbound
[SRG-nat-policy-interzone-trust-untrust-outbound-1]policy 0
[SRG-nat-policy-interzone-trust-untrust-outbound-0]undo address-group
[SRG-nat-policy-interzone-trust-untrust-outbound-0]easy-ip GigabitEthernet 0/0/0
测试:
[SRG]display firewall session table verbose

向AI问一下细节

免责声明:本站发布的内容(图片、视频和文字)以原创、转载和分享为主,文章观点不代表本网站立场,如果涉及侵权请联系站长邮箱:is@yisu.com进行举报,并提供相关证据,一经查实,将立刻删除涉嫌侵权内容。

AI