• 全部
  • 经验案例
  • 典型配置
  • 技术公告
  • FAQ
  • 漏洞说明
  • 全部
  • 全部
  • 大数据引擎
  • 知了引擎
产品线
搜索
取消
案例类型
发布者
是否解决
是否官方
时间
搜索引擎
匹配模式
高级搜索

SecPathF1800-A 防火墙0332.28(08)BT限流典型配置

2006-08-31 发表
  • 0关注
  • 0收藏 743浏览
粉丝: 关注:

F1800-A 防火墙BT限流典型配置

 

一、组网需求:

两个PC,PC1作为BT客户端下载。PC2作为BT的服务器。

PC2上安装BT服务器软件 MYBT SERVER。PC2和PC1上分别安装一个BT客户端软件,如BITTORRENT 4.0。

对于trust-untrust域间ip为2.2.2.2用户除外的所有用户做BT限流,10:00~10:05的带宽为 400kbps,其他时间为 200kbps 。

二、组网图

F1800-A  VRP版本:0332.26(08)

三、配置步骤:

[F1800-A]display current-configuration                                         

#                                                                              

acl number 2001                                     // 定义ACL组                               

 rule 0 deny source 2.2.2.2 0                                                  

 rule 1 permit                                                                 

#                                                                              

 sysname F1800-A                                                         

#                                                  // 域间安全策略         

 firewall packet-filter default permit interzone local trust direction inbound 

 firewall packet-filter default permit interzone local trust direction outbound

 firewall packet-filter default permit interzone local untrust direction inbound

 firewall packet-filter default permit interzone local untrust direction outboun

d                                                                               

 firewall packet-filter default permit interzone local dmz direction inbound   

 firewall packet-filter default permit interzone local dmz direction outbound  

 firewall packet-filter default permit interzone trust untrust direction inbound

 firewall packet-filter default permit interzone trust untrust direction outboun

d                                                                               

 firewall packet-filter default permit interzone trust dmz direction inbound   

 firewall packet-filter default permit interzone trust dmz direction outbound  

 firewall packet-filter default permit interzone dmz untrust direction inbound 

 firewall packet-filter default permit interzone dmz untrust direction outbound

#                                                                              

 bypass switch-back auto                                                        

#                                                                              

 firewall mode route                                 // 防火墙工作模式                          

#                                                                               

 firewall statistic system enable                                              

 firewall p2p-car default-permit                    // 打开BT限流功能                          

 firewall p2p include bt                                                        

 firewall p2p include edonkey                                                  

 firewall p2p include thunder                                                  

 undo firewall p2p include fasttrack                                            

 undo firewall p2p include gnutella                                            

 undo firewall p2p include pplive                                              

 undo firewall p2p include ppstream                                            

 undo firewall p2p include bt-dht                                              

 undo firewall p2p include edk-kad                                             

 firewall p2p-car class 0 cir 200                      // 设定缺省BT带宽                        

 firewall p2p-car class 0 cir 400 1 timer             // 设定基于时间段的带宽                        

#                                                                              

interface Aux0                                                                 

 async mode flow                                                               

 link-protocol ppp                                                             

#                                                                              

interface Ethernet0/0/0                                                        

 ip address 2.2.2.1 255.255.255.0                                              

#                                                                              

interface Ethernet0/0/1                                                         

 ip address 1.1.1.1 255.255.255.0                                              

#                                                                              

interface Ethernet1/0/0                                                         

#                                                                              

interface Ethernet1/0/1                                                        

#                                                                               

interface Ethernet1/0/2                                                        

#                                                                              

interface Ethernet1/0/3                                                         

#                                                                              

interface Ethernet1/0/4                                                        

#                                                                              

interface Ethernet1/0/5                                                        

#                                                                              

interface Ethernet1/0/6                                                        

#                                                                               

interface Ethernet1/0/7                                                        

#                                                                              

interface GigabitEthernet2/0/0                                                 

#                                                                              

interface GigabitEthernet2/0/1                                                 

#                                                                               

interface NULL0                                                                

#                                                                              

 time-range timer 10:00 to 10:05 daily                  // 配置时间段                        

#                                                                              

firewall zone local                                                            

 set priority 100                                                               

#                                                                              

firewall zone trust                                    // 将端口加入安全域                        

 set priority 85                                                                

 add interface Ethernet0/0/0                                                   

#                                                                              

firewall zone untrust                                  // 将端口加入安全域                         

 set priority 5                                                                

 add interface Ethernet0/0/1                                                   

#                                                                               

firewall zone dmz                                                              

 set priority 50                                                               

#                                                                              

firewall interzone local trust                                                 

#                                                                              

firewall interzone local untrust                                               

#                                                                               

firewall interzone local dmz                                                   

#                                                                              

firewall interzone trust untrust                      // 域间配置限流带宽                          

 p2p-car 2001 class 0 inbound                                                  

 p2p-car 2001 class 0 outbound                                                 

#                                                                               

firewall interzone trust dmz                                                   

#                                                                              

firewall interzone dmz untrust                                                  

#                                                                              

aaa                                                                            

 authentication-scheme default                                                  

#                                                                              

 authorization-scheme default                                                  

#                                                                               

 accounting-scheme default                                                     

#                                                                              

 domain default                                                                

#                                                                               

#                                                                              

user-interface con 0                                                           

user-interface aux 0                                                           

user-interface vty 0 4                                                         

#                                                                              

return                             

 

四、配置关键点

1)域间安全策略用 packet filter default permit all  配置成全通

    2)设定基于时间端的带宽firewall p2p-car class 0 cir 400 1 timer时,Class number of P2P car需设置与初始的一样(为0)。

    3)通过display firewall p2p-car命令,查看限流设置:

[F1800-A]display firewall p2p-car                                                   

CLASS   ID      STATE     BANDTH(kbps)    TIME-RANGE                           

0       0       ACTIVE    200                                                  

0       1                 400             timer                                 

1       0       ACTIVE    100000                                               

2       0       ACTIVE    100000                                               

3       0       ACTIVE    100000                                                

4       0       ACTIVE    100000                                               

5       0       ACTIVE    100000                                               

6       0       ACTIVE    100000                                               

                  

若您有关于案例的建议,请反馈:

作者在2007-04-24对此案例进行了修订
0 个评论

该案例暂时没有网友评论

编辑评论

举报

×

侵犯我的权益 >
对根叔知了社区有害的内容 >
辱骂、歧视、挑衅等(不友善)

侵犯我的权益

×

泄露了我的隐私 >
侵犯了我企业的权益 >
抄袭了我的内容 >
诽谤我 >
辱骂、歧视、挑衅等(不友善)
骚扰我

泄露了我的隐私

×

您好,当您发现根叔知了上有泄漏您隐私的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您认为哪些内容泄露了您的隐私?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)

侵犯了我企业的权益

×

您好,当您发现根叔知了上有关于您企业的造谣与诽谤、商业侵权等内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到 pub.zhiliao@h3c.com 邮箱,我们会在审核后尽快给您答复。
  • 1. 您举报的内容是什么?(请在邮件中列出您举报的内容和链接地址)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
  • 3. 是哪家企业?(营业执照,单位登记证明等证件)
  • 4. 您与该企业的关系是?(您是企业法人或被授权人,需提供企业委托授权书)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

抄袭了我的内容

×

原文链接或出处

诽谤我

×

您好,当您发现根叔知了上有诽谤您的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您举报的内容以及侵犯了您什么权益?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

对根叔知了社区有害的内容

×

垃圾广告信息
色情、暴力、血腥等违反法律法规的内容
政治敏感
不规范转载 >
辱骂、歧视、挑衅等(不友善)
骚扰我
诱导投票

不规范转载

×

举报说明

提出建议

    +

亲~登录后才可以操作哦!

确定

亲~检测到您登陆的账号未在http://hclhub.h3c.com进行注册

注册后可访问此模块

跳转hclhub

你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作