• 全部
  • 经验案例
  • 典型配置
  • 技术公告
  • FAQ
  • 漏洞说明
  • 全部
  • 全部
  • 大数据引擎
  • 知了引擎
产品线
搜索
取消
案例类型
发布者
是否解决
是否官方
时间
搜索引擎
匹配模式
高级搜索

ipSec如何设置

2021-03-11提问
  • 0关注
  • 1收藏,1033浏览
粉丝: 关注:

问题描述:

我公司现分两地办公,总部有独立IP地址,分公司没有ip地址,使用的是PPPOE拨号上网

总部使用设备是secpath f100-c60-winet,分公司使用设备为ER3200,如果进行IPSec设置,我自己设置了很多次都失败了。求大神指导

组网及组网描述:


最佳答案

粉丝:336人 关注:0人

看一下两边的感兴趣流,和nat设置

在防火墙的nat的acl中最前面写一条rule,将ipsec的感兴趣流deny掉,后面再匹配其他流量走nat

感兴趣流是两边的私网地址,NAT是修改出口的,先拒绝感兴趣流,再通过其他的

无名之辈 发表时间:2021-03-11 更多>>

刚兴趣的流量是什么意思呀?

发表时间:2021-03-11

我的NAT做的是pairpin

发表时间:2021-03-11

感兴趣流是两边的私网地址,NAT是修改出口的,先拒绝感兴趣流,再通过其他的

无名之辈 发表时间:2021-03-11
1 个回答
粉丝:97人 关注:1人

关键配置发出来看看,第一二阶段有没有起来

# version 7.1.064, Release 9524P35 # sysname mazida # context Admin id 1 # telnet server enable # irf mac-address persistent timer irf auto-update enable undo irf link-delay irf member 1 priority 1 # dhcp enable # dns server 219.141.140.10 # password-recovery enable # vlan 1 # object-group ip address 1 0 network host address 192.168.1.249 # object-group service jia 40 service tcp source eq 50001 destination eq 50001 50 service tcp source eq 65500 destination eq 65500 60 service tcp source eq 20081 destination eq 20081 70 service tcp source eq 51001 destination eq 51001 # dhcp server ip-pool mazida gateway-list 192.168.1.1 network 192.168.1.0 mask 255.255.255.0 dns-list 219.141.140.10 219.141.136.10 expired day 0 hour 12 # controller Cellular1/0/0 # interface NULL0 # interface Vlan-interface1 bandwidth 10000000 ip address 192.168.1.1 255.255.255.0 packet-filter 2001 inbound nat hairpin enable dhcp server apply ip-pool mazida # interface GigabitEthernet1/0/0 port link-mode route bandwidth 1000000 flow-control ip address 36.112.99.198 255.255.255.252 tcp mss 1300 packet-filter 3100 inbound nat outbound nat server protocol tcp global current-interface 20081 inside 192.168.1.249 20081 acl 3100 reversible rule ServerRule_1 nat server protocol tcp global current-interface 50001 inside 192.168.1.249 50001 acl 3100 reversible rule ServerRule_2 nat server protocol tcp global current-interface 51001 inside 192.168.1.249 51001 acl 3100 reversible rule ServerRule_3 nat server protocol tcp global current-interface 65500 inside 192.168.1.249 65500 acl 3100 reversible rule ServerRule_4 nat hairpin enable undo dhcp select server ipsec apply policy mazida # interface GigabitEthernet1/0/1 port link-mode route undo dhcp select server # interface GigabitEthernet1/0/2 port link-mode route ip address 192.168.50.1 255.255.255.0 undo dhcp select server # interface GigabitEthernet1/0/3 port link-mode route undo dhcp select server # interface GigabitEthernet1/0/4 port link-mode bridge flow-control # interface GigabitEthernet1/0/5 port link-mode bridge flow-control # interface GigabitEthernet1/0/6 port link-mode bridge flow-control # interface GigabitEthernet1/0/7 port link-mode bridge flow-control # security-zone name Local # security-zone name Trust # security-zone name DMZ # security-zone name Untrust # security-zone name Management import interface GigabitEthernet1/0/2 # security-zone name neiwang import interface Vlan-interface1 import interface GigabitEthernet1/0/4 vlan 1 import interface GigabitEthernet1/0/5 vlan 1 import interface GigabitEthernet1/0/6 vlan 1 import interface GigabitEthernet1/0/7 vlan 1 attack-defense apply policy anquan # security-zone name waiwang import interface GigabitEthernet1/0/0 attack-defense apply policy anquan # zone-pair security source Any destination neiwang # zone-pair security source Local destination neiwang packet-filter 2001 # zone-pair security source neiwang destination Any packet-filter 2001 # zone-pair security source neiwang destination Local packet-filter 2001 # zone-pair security source neiwang destination neiwang packet-filter 2001 # scheduler logfile size 16 # line class aux user-role network-operator # line class console user-role network-admin # line class usb user-role network-operator # line class vty user-role network-operator # line aux 0 user-role network-admin # line con 0 authentication-mode scheme user-role network-admin # line vty 0 63 authentication-mode scheme user-role network-admin # ip route-static 0.0.0.0 0 36.112.99.197 # customlog format dpi ips customlog format dpi anti-virus # ssh server enable # arp static 192.168.1.8 1098-c3e3-24d6 1 GigabitEthernet1/0/5 arp static 192.168.1.13 8091-33c9-b18f 1 GigabitEthernet1/0/5 # acl basic 2001 rule 0 permit # acl basic 2100 rule 0 permit # acl advanced 3000 rule 0 permit tcp source 192.168.1.0 0.0.0.255 destination 192.168.0.0 0.0.0.255 rule 5 permit tcp source 192.168.0.0 0.0.0.255 destination 192.168.1.0 0.0.0.255 # acl advanced 3100 rule 0 permit tcp destination-port eq 65500 rule 5 permit tcp destination-port eq 50001 rule 10 permit tcp destination-port eq 20081 rule 15 permit tcp destination-port eq 51001 # radius session-control enable # domain system # domain mazida authentication lan-access none authorization lan-access none # aaa session-limit ftp 16 aaa session-limit telnet 16 aaa session-limit ssh 16 domain default enable system # role name level-0 description Predefined level-0 role # role name level-1 description Predefined level-1 role # role name level-2 description Predefined level-2 role # role name level-3 description Predefined level-3 role # role name level-4 description Predefined level-4 role # role name level-5 description Predefined level-5 role # role name level-6 description Predefined level-6 role # role name level-7 description Predefined level-7 role # role name level-8 description Predefined level-8 role # role name level-9 description Predefined level-9 role # role name level-10 description Predefined level-10 role # role name level-11 description Predefined level-11 role # role name level-12 description Predefined level-12 role # role name level-13 description Predefined level-13 role # role name level-14 description Predefined level-14 role # user-group system # user-group mazida # local-user admin class manage password hash $h$6$zpb5lalSDsE1MBc+$7w0pnigFHJ6Yybr7hGk5fKiIPckiIxOcf+FoTtnUKQJPKhgM8bMHhzIb+zBxIbybuNNJ12/QdvWPPyEzTTMrCw== service-type telnet http https authorization-attribute user-role level-3 authorization-attribute user-role network-admin authorization-attribute user-role network-operator # local-user ֣ class network group mazida bind-attribute mac 9cfc-e87b-9dd7 authorization-attribute user-role network-operator # session statistics enable session top-statistics enable # ipsec logging packet enable # ipsec transform-set mazida_IPv4_10 esp encryption-algorithm des-cbc esp authentication-algorithm md5 pfs dh-group1 # ipsec policy-template mazida 10 transform-set mazida_IPv4_10 local-address 36.112.99.198 ike-profile mazida_IPv4_10 # ipsec policy mazida 10 isakmp template mazida # application global statistics enable # ike dpd interval 10 on-demand # ike profile mazida_IPv4_10 keychain mazida_IPv4_10 exchange-mode aggressive local-identity address 192.168.1.1 match remote identity address 0.0.0.0 0.0.0.0 match local address GigabitEthernet1/0/0 proposal 1 # ike proposal 1 authentication-algorithm md5 # ike keychain mazida_IPv4_10 match local address GigabitEthernet1/0/0 pre-shared-key address 0.0.0.0 0.0.0.0 key cipher $c$3$rMJ8Jc+kzq2ZxXpR61tFeJsfSoRWz/cXyWUF0g== # ip http enable ip https enable # blacklist logging enable # attack-defense policy anquan scan detect level medium action drop logging syn-flood detect non-specific syn-flood action logging ack-flood detect non-specific ack-flood action logging syn-ack-flood detect non-specific syn-ack-flood action logging rst-flood detect non-specific rst-flood action logging fin-flood detect non-specific fin-flood action logging udp-flood detect non-specific udp-flood action logging icmp-flood detect non-specific icmp-flood action logging icmpv6-flood detect non-specific icmpv6-flood action logging dns-flood detect non-specific dns-flood action logging http-flood detect non-specific http-flood action logging sip-flood detect non-specific sip-flood action logging signature detect fragment action drop logging signature detect impossible action drop logging signature detect teardrop action drop logging signature detect tiny-fragment action drop logging signature detect ip-option-abnormal action drop logging signature detect smurf action drop logging signature detect traceroute action drop logging signature detect ping-of-death action drop logging signature detect large-icmp action drop logging signature detect large-icmpv6 action drop logging signature detect tcp-invalid-flags action drop logging signature detect tcp-null-flag action drop logging signature detect tcp-all-flags action drop logging signature detect tcp-syn-fin action drop logging signature detect tcp-fin-only action drop logging signature detect land action drop logging signature detect winnuke action drop logging signature detect udp-bomb action drop logging signature detect snork action drop logging signature detect fraggle action drop logging # netshare-control policy name 1 per-ip-shared max-terminals 1 source-zone neiwang # inspect block-source parameter-profile ips_block_default_parameter # inspect block-source parameter-profile url_block_default_parameter # inspect capture parameter-profile ips_capture_default_parameter # inspect logging parameter-profile av_logging_default_parameter log email # inspect logging parameter-profile ips_logging_default_parameter log email # inspect logging parameter-profile url_logging_default_parameter undo log syslog # inspect redirect parameter-profile av_redirect_default_parameter # inspect redirect parameter-profile ips_redirect_default_parameter # inspect redirect parameter-profile url_redirect_default_parameter # loadbalance snat-pool mazida ip range start 192.168.1.1 end 192.168.1.254 # traffic-policy rule 1 name xianzhi action qos profile xianzhi source-zone neiwang profile name xianzhi traffic-priority 7 bandwidth upstream guaranteed per-ip 5000 bandwidth upstream maximum per-ip 10000 bandwidth downstream guaranteed per-ip 5000 bandwidth downstream maximum per-ip 10000 # ip-mac binding enable ip-mac binding ipv4 192.168.1.8 mac-address 1098-c3e3-24d6 vlan 1 ip-mac binding ipv4 192.168.1.8 mac-address 1098-c3e3-24d6 # uapp-control policy name quanbu audit source-zone neiwang rule 1 any behavior any bhcontent any keyword include any action permit # security-policy ip rule 0 name neiwanghutong-0 action pass disable rule 1 name neiwang-Any-1 action pass counting enable source-zone neiwang rule 2 name Any-neiwang-2 action pass logging enable counting enable destination-zone neiwang destination-ip 1 # ips policy 1 object-dir server client severity-level high protect-target ApplicationSoftware MailClient protect-target Database ACCESS protect-target Database MS-SQL protect-target Database MySQL protect-target Database Oracle protect-target Database Other protect-target FTPServer Any protect-target MailServer LotusNotes protect-target NetworkProtocol FTP protect-target NetworkProtocol HTTP protect-target NetworkProtocol TELNET protect-target Other Other protect-target WebApplication Any protect-target WebApplication Blog protect-target WebApplication CMS protect-target WebApplication Other protect-target WebApplication PHP protect-target WebServer Any protect-target WebServer Other protect-target WebServer WebLogic attack-category Other Other attack-category Vulnerability SQLInjection attack-category Vulnerability XSS # ips logging parameter-profile ips_logging_default_parameter # anti-virus logging parameter-profile av_logging_default_parameter #

发表时间:2021-03-11 更多>>

# version 7.1.064, Release 9524P35 # sysname mazida # context Admin id 1 # telnet server enable # irf mac-address persistent timer irf auto-update enable undo irf link-delay irf member 1 priority 1 # dhcp enable # dns server 219.141.140.10 # password-recovery enable # vlan 1 # object-group ip address 1 0 network host address 192.168.1.249 # object-group service jia 40 service tcp source eq 50001 destination eq 50001 50 service tcp source eq 65500 destination eq 65500 60 service tcp source eq 20081 destination eq 20081 70 service tcp source eq 51001 destination eq 51001 # dhcp server ip-pool mazida gateway-list 192.168.1.1 network 192.168.1.0 mask 255.255.255.0 dns-list 219.141.140.10 219.141.136.10 expired day 0 hour 12 # controller Cellular1/0/0 # interface NULL0 # interface Vlan-interface1 bandwidth 10000000 ip address 192.168.1.1 255.255.255.0 packet-filter 2001 inbound nat hairpin enable dhcp server apply ip-pool mazida # interface GigabitEthernet1/0/0 port link-mode route bandwidth 1000000 flow-control ip address 36.112.99.198 255.255.255.252 tcp mss 1300 packet-filter 3100 inbound nat outbound nat server protocol tcp global current-interface 20081 inside 192.168.1.249 20081 acl 3100 reversible rule ServerRule_1 nat server protocol tcp global current-interface 50001 inside 192.168.1.249 50001 acl 3100 reversible rule ServerRule_2 nat server protocol tcp global current-interface 51001 inside 192.168.1.249 51001 acl 3100 reversible rule ServerRule_3 nat server protocol tcp global current-interface 65500 inside 192.168.1.249 65500 acl 3100 reversible rule ServerRule_4 nat hairpin enable undo dhcp select server ipsec apply policy mazida # interface GigabitEthernet1/0/1 port link-mode route undo dhcp select server # interface GigabitEthernet1/0/2 port link-mode route ip address 192.168.50.1 255.255.255.0 undo dhcp select server # interface GigabitEthernet1/0/3 port link-mode route undo dhcp select server # interface GigabitEthernet1/0/4 port link-mode bridge flow-control # interface GigabitEthernet1/0/5 port link-mode bridge flow-control # interface GigabitEthernet1/0/6 port link-mode bridge flow-control # interface GigabitEthernet1/0/7 port link-mode bridge flow-control # security-zone name Local # security-zone name Trust # security-zone name DMZ # security-zone name Untrust # security-zone name Management import interface GigabitEthernet1/0/2 # security-zone name neiwang import interface Vlan-interface1 import interface GigabitEthernet1/0/4 vlan 1 import interface GigabitEthernet1/0/5 vlan 1 import interface GigabitEthernet1/0/6 vlan 1 import interface GigabitEthernet1/0/7 vlan 1 attack-defense apply policy anquan # security-zone name waiwang import interface GigabitEthernet1/0/0 attack-defense apply policy anquan # zone-pair security source Any destination neiwang # zone-pair security source Local destination neiwang packet-filter 2001 # zone-pair security source neiwang destination Any packet-filter 2001 # zone-pair security source neiwang destination Local packet-filter 2001 # zone-pair security source neiwang destination neiwang packet-filter 2001 # scheduler logfile size 16 # line class aux user-role network-operator # line class console user-role network-admin # line class usb user-role network-operator # line class vty user-role network-operator # line aux 0 user-role network-admin # line con 0 authentication-mode scheme user-role network-admin # line vty 0 63 authentication-mode scheme user-role network-admin # ip route-static 0.0.0.0 0 36.112.99.197 # customlog format dpi ips customlog format dpi anti-virus # ssh server enable # arp static 192.168.1.8 1098-c3e3-24d6 1 GigabitEthernet1/0/5 arp static 192.168.1.13 8091-33c9-b18f 1 GigabitEthernet1/0/5 # acl basic 2001 rule 0 permit # acl basic 2100 rule 0 permit # acl advanced 3000 rule 0 permit tcp source 192.168.1.0 0.0.0.255 destination 192.168.0.0 0.0.0.255 rule 5 permit tcp source 192.168.0.0 0.0.0.255 destination 192.168.1.0 0.0.0.255 # acl advanced 3100 rule 0 permit tcp destination-port eq 65500 rule 5 permit tcp destination-port eq 50001 rule 10 permit tcp destination-port eq 20081 rule 15 permit tcp destination-port eq 51001 # radius session-control enable # domain system # domain mazida authentication lan-access none authorization lan-access none # aaa session-limit ftp 16 aaa session-limit telnet 16 aaa session-limit ssh 16 domain default enable system # role name level-0 description Predefined level-0 role # role name level-1 description Predefined level-1 role # role name level-2 description Predefined level-2 role # role name level-3 description Predefined level-3 role # role name level-4 description Predefined level-4 role # role name level-5 description Predefined level-5 role # role name level-6 description Predefined level-6 role # role name level-7 description Predefined level-7 role # role name level-8 description Predefined level-8 role # role name level-9 description Predefined level-9 role # role name level-10 description Predefined level-10 role # role name level-11 description Predefined level-11 role # role name level-12 description Predefined level-12 role # role name level-13 description Predefined level-13 role # role name level-14 description Predefined level-14 role # user-group system # user-group mazida # local-user admin class manage password hash $h$6$zpb5lalSDsE1MBc+$7w0pnigFHJ6Yybr7hGk5fKiIPckiIxOcf+FoTtnUKQJPKhgM8bMHhzIb+zBxIbybuNNJ12/QdvWPPyEzTTMrCw== service-type telnet http https authorization-attribute user-role level-3 authorization-attribute user-role network-admin authorization-attribute user-role network-operator # local-user ֣ class network group mazida bind-attribute mac 9cfc-e87b-9dd7 authorization-attribute user-role network-operator # session statistics enable session top-statistics enable # ipsec logging packet enable # ipsec transform-set mazida_IPv4_10 esp encryption-algorithm des-cbc esp authentication-algorithm md5 pfs dh-group1 # ipsec policy-template mazida 10 transform-set mazida_IPv4_10 local-address 36.112.99.198 ike-profile mazida_IPv4_10 # ipsec policy mazida 10 isakmp template mazida # application global statistics enable # ike dpd interval 10 on-demand # ike profile mazida_IPv4_10 keychain mazida_IPv4_10 exchange-mode aggressive local-identity address 192.168.1.1 match remote identity address 0.0.0.0 0.0.0.0 match local address GigabitEthernet1/0/0 proposal 1 # ike proposal 1 authentication-algorithm md5 # ike keychain mazida_IPv4_10 match local address GigabitEthernet1/0/0 pre-shared-key address 0.0.0.0 0.0.0.0 key cipher $c$3$rMJ8Jc+kzq2ZxXpR61tFeJsfSoRWz/cXyWUF0g== # ip http enable ip https enable # blacklist logging enable # attack-defense policy anquan scan detect level medium action drop logging syn-flood detect non-specific syn-flood action logging ack-flood detect non-specific ack-flood action logging syn-ack-flood detect non-specific syn-ack-flood action logging rst-flood detect non-specific rst-flood action logging fin-flood detect non-specific fin-flood action logging udp-flood detect non-specific udp-flood action logging icmp-flood detect non-specific icmp-flood action logging icmpv6-flood detect non-specific icmpv6-flood action logging dns-flood detect non-specific dns-flood action logging http-flood detect non-specific http-flood action logging sip-flood detect non-specific sip-flood action logging signature detect fragment action drop logging signature detect impossible action drop logging signature detect teardrop action drop logging signature detect tiny-fragment action drop logging signature detect ip-option-abnormal action drop logging signature detect smurf action drop logging signature detect traceroute action drop logging signature detect ping-of-death action drop logging signature detect large-icmp action drop logging signature detect large-icmpv6 action drop logging signature detect tcp-invalid-flags action drop logging signature detect tcp-null-flag action drop logging signature detect tcp-all-flags action drop logging signature detect tcp-syn-fin action drop logging signature detect tcp-fin-only action drop logging signature detect land action drop logging signature detect winnuke action drop logging signature detect udp-bomb action drop logging signature detect snork action drop logging signature detect fraggle action drop logging # netshare-control policy name 1 per-ip-shared max-terminals 1 source-zone neiwang # inspect block-source parameter-profile ips_block_default_parameter # inspect block-source parameter-profile url_block_default_parameter # inspect capture parameter-profile ips_capture_default_parameter # inspect logging parameter-profile av_logging_default_parameter log email # inspect logging parameter-profile ips_logging_default_parameter log email # inspect logging parameter-profile url_logging_default_parameter undo log syslog # inspect redirect parameter-profile av_redirect_default_parameter # inspect redirect parameter-profile ips_redirect_default_parameter # inspect redirect parameter-profile url_redirect_default_parameter # loadbalance snat-pool mazida ip range start 192.168.1.1 end 192.168.1.254 # traffic-policy rule 1 name xianzhi action qos profile xianzhi source-zone neiwang profile name xianzhi traffic-priority 7 bandwidth upstream guaranteed per-ip 5000 bandwidth upstream maximum per-ip 10000 bandwidth downstream guaranteed per-ip 5000 bandwidth downstream maximum per-ip 10000 # ip-mac binding enable ip-mac binding ipv4 192.168.1.8 mac-address 1098-c3e3-24d6 vlan 1 ip-mac binding ipv4 192.168.1.8 mac-address 1098-c3e3-24d6 # uapp-control policy name quanbu audit source-zone neiwang rule 1 any behavior any bhcontent any keyword include any action permit # security-policy ip rule 0 name neiwanghutong-0 action pass disable rule 1 name neiwang-Any-1 action pass counting enable source-zone neiwang rule 2 name Any-neiwang-2 action pass logging enable counting enable destination-zone neiwang destination-ip 1 # ips policy 1 object-dir server client severity-level high protect-target ApplicationSoftware MailClient protect-target Database ACCESS protect-target Database MS-SQL protect-target Database MySQL protect-target Database Oracle protect-target Database Other protect-target FTPServer Any protect-target MailServer LotusNotes protect-target NetworkProtocol FTP protect-target NetworkProtocol HTTP protect-target NetworkProtocol TELNET protect-target Other Other protect-target WebApplication Any protect-target WebApplication Blog protect-target WebApplication CMS protect-target WebApplication Other protect-target WebApplication PHP protect-target WebServer Any protect-target WebServer Other protect-target WebServer WebLogic attack-category Other Other attack-category Vulnerability SQLInjection attack-category Vulnerability XSS # ips logging parameter-profile ips_logging_default_parameter # anti-virus logging parameter-profile av_logging_default_parameter #

发表时间:2021-03-11

# version 7.1.064, Release 9524P35 # sysname mazida # context Admin id 1 # telnet server enable # irf mac-address persistent timer irf auto-update enable undo irf link-delay irf member 1 priority 1 # dhcp enable # dns server 219.141.140.10 # password-recovery enable # vlan 1 # object-group ip address 1 0 network host address 192.168.1.249 # object-group service jia 40 service tcp source eq 50001 destination eq 50001 50 service tcp source eq 65500 destination eq 65500 60 service tcp source eq 20081 destination eq 20081 70 service tcp source eq 51001 destination eq 51001 # dhcp server ip-pool mazida gateway-list 192.168.1.1 network 192.168.1.0 mask 255.255.255.0 dns-list 219.141.140.10 219.141.136.10 expired day 0 hour 12 # controller Cellular1/0/0 # interface NULL0 # interface Vlan-interface1 bandwidth 10000000 ip address 192.168.1.1 255.255.255.0 packet-filter 2001 inbound nat hairpin enable dhcp server apply ip-pool mazida # interface GigabitEthernet1/0/0 port link-mode route bandwidth 1000000 flow-control ip address 36.112.99.198 255.255.255.252 tcp mss 1300 packet-filter 3100 inbound nat outbound nat server protocol tcp global current-interface 20081 inside 192.168.1.249 20081 acl 3100 reversible rule ServerRule_1 nat server protocol tcp global current-interface 50001 inside 192.168.1.249 50001 acl 3100 reversible rule ServerRule_2 nat server protocol tcp global current-interface 51001 inside 192.168.1.249 51001 acl 3100 reversible rule ServerRule_3 nat server protocol tcp global current-interface 65500 inside 192.168.1.249 65500 acl 3100 reversible rule ServerRule_4 nat hairpin enable undo dhcp select server ipsec apply policy mazida # interface GigabitEthernet1/0/1 port link-mode route undo dhcp select server # interface GigabitEthernet1/0/2 port link-mode route ip address 192.168.50.1 255.255.255.0 undo dhcp select server # interface GigabitEthernet1/0/3 port link-mode route undo dhcp select server # interface GigabitEthernet1/0/4 port link-mode bridge flow-control # interface GigabitEthernet1/0/5 port link-mode bridge flow-control # interface GigabitEthernet1/0/6 port link-mode bridge flow-control # interface GigabitEthernet1/0/7 port link-mode bridge flow-control # security-zone name Local # security-zone name Trust # security-zone name DMZ # security-zone name Untrust # security-zone name Management import interface GigabitEthernet1/0/2 # security-zone name neiwang import interface Vlan-interface1 import interface GigabitEthernet1/0/4 vlan 1 import interface GigabitEthernet1/0/5 vlan 1 import interface GigabitEthernet1/0/6 vlan 1 import interface GigabitEthernet1/0/7 vlan 1 attack-defense apply policy anquan # security-zone name waiwang import interface GigabitEthernet1/0/0 attack-defense apply policy anquan # zone-pair security source Any destination neiwang # zone-pair security source Local destination neiwang packet-filter 2001 # zone-pair security source neiwang destination Any packet-filter 2001 # zone-pair security source neiwang destination Local packet-filter 2001 # zone-pair security source neiwang destination neiwang packet-filter 2001 # scheduler logfile size 16 # line class aux user-role network-operator # line class console user-role network-admin # line class usb user-role network-operator # line class vty user-role network-operator # line aux 0 user-role network-admin # line con 0 authentication-mode scheme user-role network-admin # line vty 0 63 authentication-mode scheme user-role network-admin # ip route-static 0.0.0.0 0 36.112.99.197 # customlog format dpi ips customlog format dpi anti-virus # ssh server enable # arp static 192.168.1.8 1098-c3e3-24d6 1 GigabitEthernet1/0/5 arp static 192.168.1.13 8091-33c9-b18f 1 GigabitEthernet1/0/5 # acl basic 2001 rule 0 permit # acl basic 2100 rule 0 permit # acl advanced 3000 rule 0 permit tcp source 192.168.1.0 0.0.0.255 destination 192.168.0.0 0.0.0.255 rule 5 permit tcp source 192.168.0.0 0.0.0.255 destination 192.168.1.0 0.0.0.255 # acl advanced 3100 rule 0 permit tcp destination-port eq 65500 rule 5 permit tcp destination-port eq 50001 rule 10 permit tcp destination-port eq 20081 rule 15 permit tcp destination-port eq 51001 # radius session-control enable # domain system # domain mazida authentication lan-access none authorization lan-access none # aaa session-limit ftp 16 aaa session-limit telnet 16 aaa session-limit ssh 16 domain default enable system # role name level-0 description Predefined level-0 role # role name level-1 description Predefined level-1 role # role name level-2 description Predefined level-2 role # role name level-3 description Predefined level-3 role # role name level-4 description Predefined level-4 role # role name level-5 description Predefined level-5 role # role name level-6 description Predefined level-6 role # role name level-7 description Predefined level-7 role # role name level-8 description Predefined level-8 role # role name level-9 description Predefined level-9 role # role name level-10 description Predefined level-10 role # role name level-11 description Predefined level-11 role # role name level-12 description Predefined level-12 role # role name level-13 description Predefined level-13 role # role name level-14 description Predefined level-14 role # user-group system # user-group mazida # local-user admin class manage password hash $h$6$zpb5lalSDsE1MBc+$7w0pnigFHJ6Yybr7hGk5fKiIPckiIxOcf+FoTtnUKQJPKhgM8bMHhzIb+zBxIbybuNNJ12/QdvWPPyEzTTMrCw== service-type telnet http https authorization-attribute user-role level-3 authorization-attribute user-role network-admin authorization-attribute user-role network-operator # local-user ֣ class network group mazida bind-attribute mac 9cfc-e87b-9dd7 authorization-attribute user-role network-operator # session statistics enable session top-statistics enable # ipsec logging packet enable # ipsec transform-set mazida_IPv4_10 esp encryption-algorithm des-cbc esp authentication-algorithm md5 pfs dh-group1 # ipsec policy-template mazida 10 transform-set mazida_IPv4_10 local-address 36.112.99.198 ike-profile mazida_IPv4_10 # ipsec policy mazida 10 isakmp template mazida # application global statistics enable # ike dpd interval 10 on-demand # ike profile mazida_IPv4_10 keychain mazida_IPv4_10 exchange-mode aggressive local-identity address 192.168.1.1 match remote identity address 0.0.0.0 0.0.0.0 match local address GigabitEthernet1/0/0 proposal 1 # ike proposal 1 authentication-algorithm md5 # ike keychain mazida_IPv4_10 match local address GigabitEthernet1/0/0 pre-shared-key address 0.0.0.0 0.0.0.0 key cipher $c$3$rMJ8Jc+kzq2ZxXpR61tFeJsfSoRWz/cXyWUF0g== # ip http enable ip https enable # blacklist logging enable # attack-defense policy anquan scan detect level medium action drop logging syn-flood detect non-specific syn-flood action logging ack-flood detect non-specific ack-flood action logging syn-ack-flood detect non-specific syn-ack-flood action logging rst-flood detect non-specific rst-flood action logging fin-flood detect non-specific fin-flood action logging udp-flood detect non-specific udp-flood action logging icmp-flood detect non-specific icmp-flood action logging icmpv6-flood detect non-specific icmpv6-flood action logging dns-flood detect non-specific dns-flood action logging http-flood detect non-specific http-flood action logging sip-flood detect non-specific sip-flood action logging signature detect fragment action drop logging signature detect impossible action drop logging signature detect teardrop action drop logging signature detect tiny-fragment action drop logging signature detect ip-option-abnormal action drop logging signature detect smurf action drop logging signature detect traceroute action drop logging signature detect ping-of-death action drop logging signature detect large-icmp action drop logging signature detect large-icmpv6 action drop logging signature detect tcp-invalid-flags action drop logging signature detect tcp-null-flag action drop logging signature detect tcp-all-flags action drop logging signature detect tcp-syn-fin action drop logging signature detect tcp-fin-only action drop logging signature detect land action drop logging signature detect winnuke action drop logging signature detect udp-bomb action drop logging signature detect snork action drop logging signature detect fraggle action drop logging # netshare-control policy name 1 per-ip-shared max-terminals 1 source-zone neiwang # inspect block-source parameter-profile ips_block_default_parameter # inspect block-source parameter-profile url_block_default_parameter # inspect capture parameter-profile ips_capture_default_parameter # inspect logging parameter-profile av_logging_default_parameter log email # inspect logging parameter-profile ips_logging_default_parameter log email # inspect logging parameter-profile url_logging_default_parameter undo log syslog # inspect redirect parameter-profile av_redirect_default_parameter # inspect redirect parameter-profile ips_redirect_default_parameter # inspect redirect parameter-profile url_redirect_default_parameter # loadbalance snat-pool mazida ip range start 192.168.1.1 end 192.168.1.254 # traffic-policy rule 1 name xianzhi action qos profile xianzhi source-zone neiwang profile name xianzhi traffic-priority 7 bandwidth upstream guaranteed per-ip 5000 bandwidth upstream maximum per-ip 10000 bandwidth downstream guaranteed per-ip 5000 bandwidth downstream maximum per-ip 10000 # ip-mac binding enable ip-mac binding ipv4 192.168.1.8 mac-address 1098-c3e3-24d6 vlan 1 ip-mac binding ipv4 192.168.1.8 mac-address 1098-c3e3-24d6 # uapp-control policy name quanbu audit source-zone neiwang rule 1 any behavior any bhcontent any keyword include any action permit # security-policy ip rule 0 name neiwanghutong-0 action pass disable rule 1 name neiwang-Any-1 action pass counting enable source-zone neiwang rule 2 name Any-neiwang-2 action pass logging enable counting enable destination-zone neiwang destination-ip 1 # ips policy 1 object-dir server client severity-level high protect-target ApplicationSoftware MailClient protect-target Database ACCESS protect-target Database MS-SQL protect-target Database MySQL protect-target Database Oracle protect-target Database Other protect-target FTPServer Any protect-target MailServer LotusNotes protect-target NetworkProtocol FTP protect-target NetworkProtocol HTTP protect-target NetworkProtocol TELNET protect-target Other Other protect-target WebApplication Any protect-target WebApplication Blog protect-target WebApplication CMS protect-target WebApplication Other protect-target WebApplication PHP protect-target WebServer Any protect-target WebServer Other protect-target WebServer WebLogic attack-category Other Other attack-category Vulnerability SQLInjection attack-category Vulnerability XSS # ips logging parameter-profile ips_logging_default_parameter # anti-virus logging parameter-profile av_logging_default_parameter #

发表时间:2021-03-11

编辑答案

你正在编辑答案

如果你要对问题或其他回答进行点评或询问,请使用评论功能。

分享扩散:

提出建议

    +

亲~登录后才可以操作哦!

确定

亲~检测到您登陆的账号未在http://hclhub.h3c.com进行注册

注册后可访问此模块

跳转hclhub

你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作

举报

×

侵犯我的权益 >
对根叔社区有害的内容 >
辱骂、歧视、挑衅等(不友善)

侵犯我的权益

×

泄露了我的隐私 >
侵犯了我企业的权益 >
抄袭了我的内容 >
诽谤我 >
辱骂、歧视、挑衅等(不友善)
骚扰我

泄露了我的隐私

×

您好,当您发现根叔知了上有泄漏您隐私的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您认为哪些内容泄露了您的隐私?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)

侵犯了我企业的权益

×

您好,当您发现根叔知了上有关于您企业的造谣与诽谤、商业侵权等内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到 pub.zhiliao@h3c.com 邮箱,我们会在审核后尽快给您答复。
  • 1. 您举报的内容是什么?(请在邮件中列出您举报的内容和链接地址)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
  • 3. 是哪家企业?(营业执照,单位登记证明等证件)
  • 4. 您与该企业的关系是?(您是企业法人或被授权人,需提供企业委托授权书)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

抄袭了我的内容

×

原文链接或出处

诽谤我

×

您好,当您发现根叔知了上有诽谤您的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您举报的内容以及侵犯了您什么权益?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

对根叔社区有害的内容

×

垃圾广告信息
色情、暴力、血腥等违反法律法规的内容
政治敏感
不规范转载 >
辱骂、歧视、挑衅等(不友善)
骚扰我
诱导投票

不规范转载

×

举报说明