• 全部
  • 经验案例
  • 典型配置
  • 技术公告
  • FAQ
  • 漏洞说明
  • 全部
  • 全部
  • 大数据引擎
  • 知了引擎
产品线
搜索
取消
案例类型
发布者
是否解决
是否官方
时间
搜索引擎
匹配模式
高级搜索

H3C防火墙F100-C-AI+导致佳能网络打印机无法扫描

2021-01-31提问
  • 0关注
  • 1收藏,1918浏览
粉丝:0人 关注:1人

问题描述:

网络结构如下:

目前导致的问题终端电脑远程调用佳能网络打印扫描功能,提示服务器无响应,无法使用。把防火墙绕开,佳能设备就可以正常使用,通过现场测试,把测试电脑直接连在核心交换机机20口,和打印机属于同一VLAN和同一网段,可以PING通,加载上防火墙,还是无法调用打印机服务。求大神提供解决方法?防火墙配置和交换机配置见附件TXT文档。


组网及组网描述:

边界设备:H3C-ER3100路由器

防火墙部署在路由器和交换机机中间,防火墙型号是:H3C-F100-C-AI

核心交换机型号:H3C-S5120-28P-LI

最佳答案

粉丝:19人 关注:3人

把防火墙策略全放了试试,终端如果和打印机在同一安全域记得放通同域策略

现在防火墙我通过配置查看,没有任何安全策略,加上防火墙默认配置,终端都是可以连接互联网,都是通的状态。当把防火墙断开时,所有终端就可以调用网络打印以及扫描服务了。

zhiliao_3du81y 发表时间:2021-01-31 更多>>

现在防火墙我通过配置查看,没有任何安全策略,加上防火墙默认配置,终端都是可以连接互联网,都是通的状态。当把防火墙断开时,所有终端就可以调用网络打印以及扫描服务了。

zhiliao_3du81y 发表时间:2021-01-31
3 个回答
zhiliao_3du81y 知了小白
粉丝:0人 关注:1人

防火墙版本较早,是这个version 5.20, Release 2209P26,具体在哪操作?全通策略配置操作劳烦发下,我目前防火墙的配置没有任何安全策略,详细见配置如下:

[fw]dis current-configuration
#
version 5.20, Release 2209P26
#
sysname fw
#
domain default enable system
#
telnet server enable
#
dar p2p signature-file flash:/p2p_default.mtd
#
vlan 1
#
vlan 10
description to hexin
#
domain system
access-limit disable
state active
idle-cut disable
self-service-url disable
#
user-group system
group-attribute allow-guest
#
local-user admin
password cipher $c$3$W1YxAfpVMZsGDe1UxUGBJEE3zlC/B2+35V6bdQ==
authorization-attribute level 3
service-type telnet
#
wlan rrm
dot11b mandatory-rate 1 2
dot11b supported-rate 5.5 11
dot11g mandatory-rate 1 2 5.5 11
dot11g supported-rate 6 9 12 18 24 36 48 54
#
cwmp
undo cwmp enable
#
interface Aux0
async mode flow
link-protocol ppp
#
interface Cellular0/0
async mode protocol
link-protocol ppp
#
interface Ethernet0/0
port link-mode route
#
interface Ethernet0/1
port link-mode route
ip address 192.168.100.2 255.255.255.0
#
interface NULL0
#
interface Vlan-interface1
ip address 192.168.1.1 255.255.255.0
#
interface Vlan-interface10
ip address 192.168.10.1 255.255.255.252
#
interface Ethernet0/2
port link-mode bridge
#
interface Ethernet0/3
port link-mode bridge
#
interface Ethernet0/4
port link-mode bridge
port access vlan 10
#
interface Ethernet0/5
port link-mode bridge
port access vlan 10
#
interface WLAN-Radio2/0
#
ip route-static 0.0.0.0 0.0.0.0 192.168.100.1
ip route-static 192.168.1.0 255.255.255.0 192.168.10.2
ip route-static 192.168.101.0 255.255.255.0 192.168.10.2
ip route-static 192.168.102.0 255.255.255.0 192.168.10.2
ip route-static 192.168.103.0 255.255.255.0 192.168.10.2
#
load xml-configuration
#
load tr069-configuration
#
user-interface tty 12
user-interface aux 0
user-interface vty 0 4
authentication-mode scheme
#
return

这是核心的配置 # version 5.20, Release 1513P62 # sysname hexin # irf mac-address persistent timer irf auto-update enable undo irf link-delay # domain default enable system # telnet server enable # loopback-detection enable # password-recovery enable # vlan 1 # vlan 10 description to fanghuoqiang # vlan 100 description jiankong # vlan 101 to 103 # radius scheme system # domain system access-limit disable state active idle-cut disable self-service-url disable # dhcp server ip-pool 101 network 192.168.101.0 mask 255.255.255.0 gateway-list 192.168.101.1 dns-list 222.74.1.200 222.74.126.230 expired day 0 hour 12 # dhcp server ip-pool 102 network 192.168.102.0 mask 255.255.255.0 gateway-list 192.168.102.1 dns-list 222.74.1.200 222.74.126.230 expired day 0 hour 12 # dhcp server ip-pool 103 network 192.168.103.0 mask 255.255.255.0 gateway-list 192.168.103.1 dns-list 222.74.1.200 222.74.126.230 expired day 0 hour 12 # user-group system # local-user admin password cipher $c$3$h/hO7p56ugdVitRYk0ZmZrgiRKBGermCJ8ezsw== authorization-attribute level 3 service-type telnet service-type web # interface NULL0 # interface Vlan-interface1 # interface Vlan-interface10 description to hulian ip address 192.168.10.2 255.255.255.252 # interface Vlan-interface100 ip address 192.168.1.254 255.255.255.0 # interface Vlan-interface101 ip address 192.168.101.1 255.255.255.0 # interface Vlan-interface102 ip address 192.168.102.1 255.255.255.0 dhcp select relay dhcp relay address-check enable # interface Vlan-interface103 ip address 192.168.103.1 255.255.255.0 # interface GigabitEthernet1/0/1 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/2 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/3 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/4 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/5 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/6 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/7 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/8 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/9 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/10 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/11 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/12 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/13 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/14 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/15 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/16 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/17 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/18 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/19 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/20 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/21 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/22 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/23 port access vlan 10 loopback-detection enable # interface GigabitEthernet1/0/24 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/25 port access vlan 102 # interface GigabitEthernet1/0/26 port access vlan 102 # interface GigabitEthernet1/0/27 port access vlan 102 # interface GigabitEthernet1/0/28 port access vlan 102 # ip route-static 0.0.0.0 0.0.0.0 192.168.10.1 # dhcp enable # load tr069-configuration # user-interface aux 0 user-interface vty 0 4 authentication-mode scheme user-interface vty 5 15 # return

zhiliao_3du81y 发表时间:2021-02-01 更多>>

设备防火墙功能就没开,默认是关闭的,这样的话就检查路由通不通就行了

求求给个采纳 发表时间:2021-01-31

路由是通着的,现在就是不能调用佳能设备的扫描服务,当把防火墙绕开时,终端互联网就不通了,但是佳能网络扫描服务正常了。

zhiliao_3du81y 发表时间:2021-01-31

路由是通的指的是终端能ping通打印机?

求求给个采纳 发表时间:2021-01-31

对啊

zhiliao_3du81y 发表时间:2021-02-01

这是核心的配置 # version 5.20, Release 1513P62 # sysname hexin # irf mac-address persistent timer irf auto-update enable undo irf link-delay # domain default enable system # telnet server enable # loopback-detection enable # password-recovery enable # vlan 1 # vlan 10 description to fanghuoqiang # vlan 100 description jiankong # vlan 101 to 103 # radius scheme system # domain system access-limit disable state active idle-cut disable self-service-url disable # dhcp server ip-pool 101 network 192.168.101.0 mask 255.255.255.0 gateway-list 192.168.101.1 dns-list 222.74.1.200 222.74.126.230 expired day 0 hour 12 # dhcp server ip-pool 102 network 192.168.102.0 mask 255.255.255.0 gateway-list 192.168.102.1 dns-list 222.74.1.200 222.74.126.230 expired day 0 hour 12 # dhcp server ip-pool 103 network 192.168.103.0 mask 255.255.255.0 gateway-list 192.168.103.1 dns-list 222.74.1.200 222.74.126.230 expired day 0 hour 12 # user-group system # local-user admin password cipher $c$3$h/hO7p56ugdVitRYk0ZmZrgiRKBGermCJ8ezsw== authorization-attribute level 3 service-type telnet service-type web # interface NULL0 # interface Vlan-interface1 # interface Vlan-interface10 description to hulian ip address 192.168.10.2 255.255.255.252 # interface Vlan-interface100 ip address 192.168.1.254 255.255.255.0 # interface Vlan-interface101 ip address 192.168.101.1 255.255.255.0 # interface Vlan-interface102 ip address 192.168.102.1 255.255.255.0 dhcp select relay dhcp relay address-check enable # interface Vlan-interface103 ip address 192.168.103.1 255.255.255.0 # interface GigabitEthernet1/0/1 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/2 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/3 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/4 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/5 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/6 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/7 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/8 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/9 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/10 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/11 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/12 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/13 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/14 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/15 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/16 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/17 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/18 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/19 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/20 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/21 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/22 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/23 port access vlan 10 loopback-detection enable # interface GigabitEthernet1/0/24 port access vlan 101 loopback-detection enable # interface GigabitEthernet1/0/25 port access vlan 102 # interface GigabitEthernet1/0/26 port access vlan 102 # interface GigabitEthernet1/0/27 port access vlan 102 # interface GigabitEthernet1/0/28 port access vlan 102 # ip route-static 0.0.0.0 0.0.0.0 192.168.10.1 # dhcp enable # load tr069-configuration # user-interface aux 0 user-interface vty 0 4 authentication-mode scheme user-interface vty 5 15 # return

zhiliao_3du81y 发表时间:2021-02-01
粉丝:10人 关注:7人

FW加区域并放通策略,FW默认拒绝区域互访

粉丝:135人 关注:6人

您好,请知:

主要还是防火墙的问题,以下是防火墙上的部署要点,请参考:

1、防火墙上涉及到的物理端口需加入安全域并放通安全策略或域间策略。

2、以下是防火墙上域间策略放通的参考命令:

[SSL_VPN]acl basic 2001

[SSL_VPN-acl-ipv4-basic-2001]rule 0 permit source any

[SSL_VPN-acl-ipv4-basic-2001]quit

[SSL_VPN]

[SSL_VPN]zone-pair security source trust destination untrust

[SSL_VPN-zone-pair-security-Trust-Untrust]packet-filter 2001

[SSL_VPN-zone-pair-security-Trust-Untrust]quit

[SSL_VPN]

[SSL_VPN]zone-pair security source untrust destination trust

[SSL_VPN-zone-pair-security-Untrust-Trust]packet-filter 2001

[SSL_VPN-zone-pair-security-Untrust-Trust]quit

[SSL_VPN]

[SSL_VPN]zone-pair security source trust destination local

[SSL_VPN-zone-pair-security-Trust-Local]packet-filter 2001

[SSL_VPN-zone-pair-security-Trust-Local]quit

[SSL_VPN]

[SSL_VPN]zone-pair security source local destination trust

[SSL_VPN-zone-pair-security-Local-Trust]packet-filter 2001

[SSL_VPN-zone-pair-security-Local-Trust]quit

[SSL_VPN]

[SSL_VPN]zone-pair security source untrust destination local

[SSL_VPN-zone-pair-security-Untrust-Local]packet-filter 2001

[SSL_VPN-zone-pair-security-Untrust-Local]quit

[SSL_VPN]

[SSL_VPN]zone-pair security source local destination untrust

[SSL_VPN-zone-pair-security-Local-Untrust]packet-filter 2001

[SSL_VPN-zone-pair-security-Local-Untrust]quit


3、进一步检查下防火墙上的端口互联和路由配置,确保路由可达。


编辑答案

你正在编辑答案

如果你要对问题或其他回答进行点评或询问,请使用评论功能。

分享扩散:

提出建议

    +

亲~登录后才可以操作哦!

确定

亲~检测到您登陆的账号未在http://hclhub.h3c.com进行注册

注册后可访问此模块

跳转hclhub

你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作

举报

×

侵犯我的权益 >
对根叔社区有害的内容 >
辱骂、歧视、挑衅等(不友善)

侵犯我的权益

×

泄露了我的隐私 >
侵犯了我企业的权益 >
抄袭了我的内容 >
诽谤我 >
辱骂、歧视、挑衅等(不友善)
骚扰我

泄露了我的隐私

×

您好,当您发现根叔知了上有泄漏您隐私的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您认为哪些内容泄露了您的隐私?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)

侵犯了我企业的权益

×

您好,当您发现根叔知了上有关于您企业的造谣与诽谤、商业侵权等内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到 pub.zhiliao@h3c.com 邮箱,我们会在审核后尽快给您答复。
  • 1. 您举报的内容是什么?(请在邮件中列出您举报的内容和链接地址)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
  • 3. 是哪家企业?(营业执照,单位登记证明等证件)
  • 4. 您与该企业的关系是?(您是企业法人或被授权人,需提供企业委托授权书)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

抄袭了我的内容

×

原文链接或出处

诽谤我

×

您好,当您发现根叔知了上有诽谤您的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您举报的内容以及侵犯了您什么权益?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

对根叔社区有害的内容

×

垃圾广告信息
色情、暴力、血腥等违反法律法规的内容
政治敏感
不规范转载 >
辱骂、歧视、挑衅等(不友善)
骚扰我
诱导投票

不规范转载

×

举报说明