• 全部
  • 经验案例
  • 典型配置
  • 技术公告
  • FAQ
  • 漏洞说明
  • 全部
  • 全部
  • 大数据引擎
  • 知了引擎
产品线
搜索
取消
案例类型
发布者
是否解决
是否官方
时间
搜索引擎
匹配模式
高级搜索

FW

2022-02-16提问
  • 0关注
  • 1收藏,2738浏览
粉丝:0人 关注:0人

问题描述:

求大神帮忙把华三墙配置翻译成华三墙配置,谢谢!

组网及组网描述:

[915-FW-HW-6300-1]dis cu 11:25:21 2022/01/17 # l2tp domain suffix-separator @ # info-center loghost 10.84.48.4 514 # cpu-usage-mgmtplane alarm threshold enable cpu-usage-dataplane alarm threshold enable # undo hrp ospfv3-cost adjust-enable # ip df-unreachables enable # dhcp enable # undo firewall ipv6 statistic system enable # dns resolve dns server unnumbered interface Dialer0 dns server unnumbered interface Dialer1 dns server unnumbered interface GigabitEthernet0/0/7 undo dns transparent-proxy enable dns server bind interface GigabitEthernet0/0/0 preferred 202.96.209.133 alternate 202.96.209.5 dns server bind interface GigabitEthernet0/0/1 preferred 202.96.209.133 alternate 114.114.114.114 # firewall defend port-scan enable firewall defend ip-sweep enable # undo firewall statistic system enable # pki certificate access-control-policy default permit # ip-link check enable # undo dns proxy # license-server domain sdplsp.huawei.com # lldp enable # set disk-scan parameter attach off set disk-scan parameter cycle 0 set disk-scan parameter iostat 0 set disk-scan parameter speed 0 set disk-scan parameter switch off set disk-scan parameter parallel 0 undo disk-scan enable # user-manage web-authentication security port 8887 user-manage single-sign-on ad mode plug-in password-policy level high page-setting user-manage security version tlsv1 tlsv1.1 tlsv1.2 # undo firewall detect ftp # sysname 915-FW-HW-6300-1 # country CN # web-manager security version tlsv1 tlsv1.1 tlsv1.2 undo web-manager enable web-manager security enable port 8443 undo web-manager redirect https enable undo web-manager config-guide enable # undo update schedule ips-sdb enable undo update schedule av-sdb enable update schedule daily 00:59 # undo factory-configuration prohibit # bandwidth-limit destination-ip type udp max-speed 50 bandwidth-limit destination-ip type icmp max-speed 2000 anti-ddos syn-flood source-detect anti-ddos dns-request-flood source-detect mode basic anti-ddos dns-reply-flood source-detect anti-ddos sip-flood source-detect anti-ddos udp-flood dynamic-fingerprint-learn anti-ddos udp-frag-flood dynamic-fingerprint-learn anti-ddos https-flood source-detect anti-ddos http-flood source-detect mode basic # undo rbl-filter enable # rsa peer-public-key 10.10.10.1 public-key-code begin 30820109 02820100 B6D6F899 0F252523 CBACCA23 4C191933 0453DCC3 FF26B3D6 A48E103F 57589F89 0765EE95 E2830658 B8C20C09 A95467B7 8E168052 F7E0EF4E 85979518 700FB4E6 7C01B267 732D7555 0C67D14A F3DCDE3B 2096B003 A5B876BA E5F61D5A 2888BC74 D22E8DCA D0BC3C4A 4D922CA3 5A9FF6D9 CEAB111F A14FCB19 A3A17F0B 6B14FA81 6B5DE9B9 1F47BA0A 8D4E96EA D5DDD897 7CDBA863 36ABA937 0B817A86 69EAD3BF AA328882 AB09A055 65DAF864 3D936035 533BE74A CE9A3E60 01BDFD03 CF9B0B32 29EE7E94 11A1763A 2F9DDA14 3DE8C56F 37C85085 022F0F7D 567AE195 0AF473CD BEE76E37 C162657E 877EC766 1E3CD94D 61C31D19 DC7936B5 094A74D2 4F941E39 0203 010001 public-key-code end peer-public-key end # time-range worktime period-range 09:00:00 to 17:30:00 working-day # acl number 3000 rule 0 permit ip acl number 3001 rule 0 permit ip acl number 3002 rule 0 permit ip acl number 3003 rule 0 permit ip source 192.168.9.2 0 rule 1 permit ip destination 192.168.9.2 0 acl number 3004 rule 0 permit ip source 192.168.5.2 0 destination 192.168.1.1 0 rule 1 permit ip source 192.168.1.1 0 destination 192.168.5.2 0 acl number 3005 rule 0 permit ip source 192.168.50.1 0 destination 192.168.50.2 0 acl number 3006 rule 0 permit ip destination 10.86.152.0 0.0.0.255 acl number 3007 rule 0 permit ip destination 10.86.152.0 0.0.0.255 rule 1 permit ip source 10.86.152.0 0.0.0.255 acl number 3008 acl number 3009 rule 0 permit ip source 10.84.54.82 0 destination 182.92.23.54 0 rule 1 permit ip source 182.92.23.54 0 destination 10.84.54.82 0 acl number 3010 rule 0 permit ip source 192.168.5.1 0 destination 10.84.48.5 0 rule 1 permit ip source 10.84.48.5 0 destination 192.168.5.1 0 acl number 3011 acl number 3012 rule 0 permit ip source 10.84.50.12 0 destination 10.0.13.23 0 rule 1 permit ip source 10.0.13.23 0 destination 10.84.50.12 0 # interface Dialer0 link-protocol ppp ppp chap user ad82057327 ppp chap password cipher %$%$tW[cNW56C!#Dn/(^I~SI4&zq%$%$ ppp pap local-user ad82057327 password cipher %$%$`O[vJr7k/LLdYxYI3e2%.cZQ%$%$ ppp ipcp dns admit-any ip address ppp-negotiate reverse-route enable dialer user ad82057327 dialer bundle 1 bandwidth ingress 100000 threshold 80 bandwidth egress 100000 threshold 80 anti-ddos flow-statistic enable healthcheck link-group "icmp 114" # interface Dialer1 link-protocol ppp ppp chap user ad82495980 ppp chap password cipher %$%$qZ}^%BS-c"`r~A39UWK>;8/&%$%$ ppp pap local-user ad82495980 password cipher %$%$D$}~L#tI&-B~iZ#^`UF53KB9%$%$ ppp ipcp dns admit-any ip address ppp-negotiate reverse-route enable dialer user ad82495980 dialer bundle 2 bandwidth ingress 100000 threshold 80 bandwidth egress 100000 threshold 80 anti-ddos flow-statistic enable healthcheck link-group "icmp 114" # interface GigabitEthernet0/0/0 alias IP ip address 116.236.167.198 255.255.255.252 reverse-route nexthop 116.236.167.197 lldp enable lldp tlv-enable basic-tlv all service-manage http deny service-manage https deny service-manage ping deny service-manage ssh deny service-manage snmp deny service-manage telnet deny gateway 116.236.167.197 bandwidth ingress 200000 threshold 80 bandwidth egress 200000 threshold 80 anti-ddos flow-statistic enable anti-ddos syn-flood source-detect alert-rate 100 healthcheck link-group "icmp 114" # interface GigabitEthernet0/0/1 alias LAN ip address 192.168.5.1 255.255.255.0 lldp enable lldp tlv-enable basic-tlv all service-manage http permit service-manage https permit service-manage ping permit service-manage ssh permit service-manage snmp permit service-manage telnet permit # interface GigabitEthernet0/0/2 shutdown dhcp select interface dhcp server ip-range 192.168.50.11 192.168.50.254 dhcp server mask 255.255.255.0 dhcp server gateway-list 192.168.50.1 dhcp server dns-list 114.114.114.114 ipv6 enable undo ipv6 protocol enable lldp enable lldp tlv-enable basic-tlv all service-manage ping permit # interface GigabitEthernet0/0/3 pppoe-client dial-bundle-number 1 ipv4 alias A lldp enable lldp tlv-enable basic-tlv all # interface GigabitEthernet0/0/4 pppoe-client dial-bundle-number 2 ipv4 alias B lldp enable lldp tlv-enable basic-tlv all # interface GigabitEthernet0/0/5 shutdown alias ͣ ip address 10.255.2.227 255.255.255.248 lldp enable lldp tlv-enable basic-tlv all service-manage http permit service-manage https permit service-manage ping permit gateway 10.255.2.225 bandwidth ingress 15000 bandwidth egress 15000 # interface GigabitEthernet0/0/6 alias 50M ip address 10.255.14.142 255.255.255.252 lldp enable lldp tlv-enable basic-tlv all service-manage http permit service-manage https permit service-manage ping permit bandwidth ingress 50000 bandwidth egress 50000 # interface GigabitEthernet0/0/7 shutdown ipv6 enable undo ipv6 protocol enable dhcp client enable lldp enable lldp tlv-enable basic-tlv all undo service-manage enable # interface NULL0 # firewall zone local set priority 100 # firewall zone trust set priority 85 add interface GigabitEthernet0/0/1 # firewall zone untrust set priority 5 add interface Dialer0 add interface Dialer1 add interface GigabitEthernet0/0/0 add interface GigabitEthernet0/0/3 add interface GigabitEthernet0/0/4 # firewall zone dmz set priority 50

最佳答案

粉丝:0人 关注:0人

 l2tp domain suffix-separator @
#
info-center loghost 10.84.48.4 514
#
cpu-usage-mgmtplane alarm threshold enable
cpu-usage-dataplane alarm threshold enable
#
undo hrp ospfv3-cost adjust-enable
#
ip df-unreachables enable
#
dhcp enable
#
undo firewall ipv6 statistic system enable
#
dns resolve
dns server unnumbered interface Dialer0
dns server unnumbered interface Dialer1
dns server unnumbered interface GigabitEthernet0/0/7
undo dns transparent-proxy enable
dns server bind interface GigabitEthernet0/0/0 preferred 202.96.209.133 alternate 202.96.209.5
dns server bind interface GigabitEthernet0/0/1 preferred 202.96.209.133 alternate 114.114.114.114
#
firewall defend port-scan enable
firewall defend ip-sweep enable
#
undo firewall statistic system enable
#
pki certificate access-control-policy default permit
#
ip-link check enable
#
undo dns proxy
#
license-server domain sdplsp.huawei.com
#
lldp enable
#
set disk-scan parameter attach off
set disk-scan parameter cycle 0
set disk-scan parameter iostat 0
set disk-scan parameter speed 0
set disk-scan parameter switch off
set disk-scan parameter parallel 0
undo disk-scan enable
#
user-manage web-authentication security port 8887
user-manage single-sign-on ad mode plug-in
password-policy
level high
page-setting
user-manage security version tlsv1 tlsv1.1 tlsv1.2
#
undo firewall detect ftp
#
sysname 915-FW-HW-6300-1
#
country CN
#
web-manager security version tlsv1 tlsv1.1 tlsv1.2
undo web-manager enable
web-manager security enable port 8443
undo web-manager redirect https enable
undo web-manager config-guide enable
#
undo update schedule ips-sdb enable
undo update schedule av-sdb enable
update schedule daily 00:59
#
undo factory-configuration prohibit
#
bandwidth-limit destination-ip type udp max-speed 50
bandwidth-limit destination-ip type icmp max-speed 2000
anti-ddos syn-flood source-detect
anti-ddos dns-request-flood source-detect mode basic
anti-ddos dns-reply-flood source-detect
anti-ddos sip-flood source-detect
anti-ddos udp-flood dynamic-fingerprint-learn
anti-ddos udp-frag-flood dynamic-fingerprint-learn
anti-ddos https-flood source-detect
anti-ddos http-flood source-detect mode basic
#
undo rbl-filter enable
#
rsa peer-public-key 10.10.10.1
public-key-code begin
30820109
02820100
B6D6F899 0F252523 CBACCA23 4C191933 0453DCC3 FF26B3D6 A48E103F 57589F89
0765EE95 E2830658 B8C20C09 A95467B7 8E168052 F7E0EF4E 85979518 700FB4E6
7C01B267 732D7555 0C67D14A F3DCDE3B 2096B003 A5B876BA E5F61D5A 2888BC74
D22E8DCA D0BC3C4A 4D922CA3 5A9FF6D9 CEAB111F A14FCB19 A3A17F0B 6B14FA81
6B5DE9B9 1F47BA0A 8D4E96EA D5DDD897 7CDBA863 36ABA937 0B817A86 69EAD3BF
AA328882 AB09A055 65DAF864 3D936035 533BE74A CE9A3E60 01BDFD03 CF9B0B32
29EE7E94 11A1763A 2F9DDA14 3DE8C56F 37C85085 022F0F7D 567AE195 0AF473CD
BEE76E37 C162657E 877EC766 1E3CD94D 61C31D19 DC7936B5 094A74D2 4F941E39
0203
010001
public-key-code end
peer-public-key end
#
time-range worktime
period-range 09:00:00 to 17:30:00 working-day
#
acl number 3000
rule 0 permit ip
acl number 3001
rule 0 permit ip
acl number 3002
rule 0 permit ip
acl number 3003
rule 0 permit ip source 192.168.9.2 0
rule 1 permit ip destination 192.168.9.2 0
acl number 3004
rule 0 permit ip source 192.168.5.2 0 destination 192.168.1.1 0
rule 1 permit ip source 192.168.1.1 0 destination 192.168.5.2 0
acl number 3005
rule 0 permit ip source 192.168.50.1 0 destination 192.168.50.2 0
acl number 3006
rule 0 permit ip destination 10.86.152.0 0.0.0.255
acl number 3007
rule 0 permit ip destination 10.86.152.0 0.0.0.255
rule 1 permit ip source 10.86.152.0 0.0.0.255
acl number 3008
acl number 3009
rule 0 permit ip source 10.84.54.82 0 destination 182.92.23.54 0
rule 1 permit ip source 182.92.23.54 0 destination 10.84.54.82 0
acl number 3010
rule 0 permit ip source 192.168.5.1 0 destination 10.84.48.5 0
rule 1 permit ip source 10.84.48.5 0 destination 192.168.5.1 0
acl number 3011
acl number 3012
rule 0 permit ip source 10.84.50.12 0 destination 10.0.13.23 0
rule 1 permit ip source 10.0.13.23 0 destination 10.84.50.12 0
#
interface Dialer0
link-protocol ppp
ppp chap user ad82057327
ppp chap password cipher %$%$tW[cNW56C!#Dn/(^I~SI4&zq%$%$
ppp pap local-user ad82057327 password cipher %$%$`O[vJr7k/LLdYxYI3e2%.cZQ%$%$
ppp ipcp dns admit-any
ip address ppp-negotiate
reverse-route enable
dialer user ad82057327
dialer bundle 1
bandwidth ingress 100000 threshold 80
bandwidth egress 100000 threshold 80
anti-ddos flow-statistic enable
healthcheck link-group "icmp 114"
#
interface Dialer1
link-protocol ppp
ppp chap user ad82495980
ppp chap password cipher %$%$qZ}^%BS-c"`r~A39UWK>;8/&%$%$
ppp pap local-user ad82495980 password cipher %$%$D$}~L#tI&-B~iZ#^`UF53KB9%$%$
ppp ipcp dns admit-any
ip address ppp-negotiate
reverse-route enable
dialer user ad82495980
dialer bundle 2
bandwidth ingress 100000 threshold 80
bandwidth egress 100000 threshold 80
anti-ddos flow-statistic enable
healthcheck link-group "icmp 114"
#
interface GigabitEthernet0/0/0
alias IP
ip address 116.236.167.198 255.255.255.252
reverse-route nexthop 116.236.167.197
lldp enable
lldp tlv-enable basic-tlv all
service-manage http deny
service-manage https deny
service-manage ping deny
service-manage ssh deny
service-manage snmp deny
service-manage telnet deny
gateway 116.236.167.197
bandwidth ingress 200000 threshold 80
bandwidth egress 200000 threshold 80
anti-ddos flow-statistic enable
anti-ddos syn-flood source-detect alert-rate 100
healthcheck link-group "icmp 114"
#
interface GigabitEthernet0/0/1
alias LAN
ip address 192.168.5.1 255.255.255.0
lldp enable
lldp tlv-enable basic-tlv all
service-manage http permit
service-manage https permit
service-manage ping permit
service-manage ssh permit
service-manage snmp permit
service-manage telnet permit
#
interface GigabitEthernet0/0/2
shutdown
dhcp select interface
dhcp server ip-range 192.168.50.11 192.168.50.254
dhcp server mask 255.255.255.0
dhcp server gateway-list 192.168.50.1
dhcp server dns-list 114.114.114.114
ipv6 enable
undo ipv6 protocol enable
lldp enable
lldp tlv-enable basic-tlv all
service-manage ping permit
#
interface GigabitEthernet0/0/3
pppoe-client dial-bundle-number 1 ipv4
alias A
lldp enable
lldp tlv-enable basic-tlv all
#
interface GigabitEthernet0/0/4
pppoe-client dial-bundle-number 2 ipv4
alias B
lldp enable
lldp tlv-enable basic-tlv all
#
interface GigabitEthernet0/0/5
shutdown
alias ͣ ip address 10.255.2.227 255.255.255.248
lldp enable
lldp tlv-enable basic-tlv all
service-manage http permit
service-manage https permit
service-manage ping permit
gateway 10.255.2.225
bandwidth ingress 15000
bandwidth egress 15000
#
interface GigabitEthernet0/0/6
alias 50M
ip address 10.255.14.142 255.255.255.252
lldp enable
lldp tlv-enable basic-tlv all
service-manage http permit
service-manage https permit
service-manage ping permit
bandwidth ingress 50000
bandwidth egress 50000
#
interface GigabitEthernet0/0/7
shutdown
ipv6 enable
undo ipv6 protocol enable
dhcp client enable
lldp enable
lldp tlv-enable basic-tlv all
undo service-manage enable
#
interface NULL0
#
firewall zone local
set priority 100
#
firewall zone trust
set priority 85
add interface GigabitEthernet0/0/1
#
firewall zone untrust
set priority 5
add interface Dialer0
add interface Dialer1
add interface GigabitEthernet0/0/0
add interface GigabitEthernet0/0/3
add interface GigabitEthernet0/0/4
#
firewall zone dmz
set priority 50
#
set priority 10
add interface GigabitEthernet0/0/5
add interface GigabitEthernet0/0/6
#
aaa
authentication-scheme default
authentication-scheme admin_local
authentication-scheme admin_radius_local
authentication-scheme admin_hwtacacs_local
authentication-scheme admin_ad_local
authentication-scheme admin_ldap_local
authentication-scheme admin_radius
authentication-scheme admin_hwtacacs
authentication-scheme admin_ad
authentication-scheme admin_ldap
authentication-scheme admin_securid
authentication-scheme admin_securid_local
#
authorization-scheme default
#
accounting-scheme default
#
manager-user password-modify enable
manager-user audit-admin
password cipher %@%@=k^]X&N\c6Gt4{I]8AI$`tkbDVy}!e\]:5^98#6!{)Z<0zql%@%@
service-type web
level 15
ssh authentication-type password
ssh service-type stelnet
authentication-scheme admin_local
#
manager-user admin
password cipher %@%@s0N,4e;H3')~,@7pPVJ2:LC:6!t4VB0,D9k2TU)>y&zR3RID%@%@
service-type web terminal ssh
level 15
ftp-directory hda1:
ssh authentication-type password
ssh service-type stelnet
authentication-scheme admin_local
#
domain default
service-type access internet-access
reference user current-domain
new-user deny-authentication
#
role system-admin
description system-admin
role device-admin
description device-admin
role device-admin(monitor)
description device-admin(monitor)
role audit-admin
description audit-admin
bind manager-user audit-admin role audit-admin
#
nqa-jitter tag-version 1

#
ip route-static 0.0.0.0 0.0.0.0 Dialer0
ip route-static 0.0.0.0 0.0.0.0 Dialer1
ip route-static 10.0.0.0 255.0.0.0 10.255.14.141
ip route-static 10.10.10.0 255.255.255.0 192.168.5.2
ip route-static 10.84.48.0 255.255.248.0 192.168.5.2
ip route-static 10.84.152.0 255.255.248.0 192.168.5.2
ip route-static 10.84.208.0 255.255.248.0 10.255.2.202
ip route-static 31.15.0.0 255.255.0.0 10.255.14.141
ip route-static 172.16.0.0 255.240.0.0 10.255.14.141
ip route-static 192.168.5.0 255.255.255.0 192.168.5.2
ip route-static 192.168.11.0 255.255.255.0 192.168.5.2
ip route-static 192.168.45.0 255.255.255.0 GigabitEthernet0/0/1 192.168.5.2
ip route-static 192.168.46.0 255.255.255.0 GigabitEthernet0/0/1 192.168.5.2
ip route-static 192.168.50.0 255.255.255.0 GigabitEthernet0/0/2
#
ntp-service unicast-server 114.118.7.163
#
stelnet server enable
ssh client first-time enable
ssh client 10.10.10.1 assign rsa-key 10.10.10.1
#
banner enable
#
undo dns proxy ipv6 enable
#
isp name "china mobile"
isp name "china mobile" set filename china-mobile.csv
isp name "china unicom"
isp name "china unicom" set filename china-unicom.csv
isp name "china telecom"
isp name "china telecom" set filename china-telecom.csv
isp name "china educationnet"
isp name "china educationnet" set filename china-educationnet.csv
#
user-interface con 0
authentication-mode password cipher %@%@+h*.3:=a-&JaBjVetbm'n3*!4!f32;9/Q)g"(M'SB~`>^90+%@%@
user-interface vty 0 4
authentication-mode aaa
#
ip address-set DNS1 type group
address 0 10.0.13.23 mask 32
address 1 10.0.13.24 mask 32
#
ip address-set server type group
address 0 10.84.48.2 mask 255.255.255.255
address 1 10.84.48.3 mask 255.255.255.255
address 2 10.84.48.4 mask 255.255.255.255
address 3 10.84.48.5 mask 255.255.255.255
address 4 10.84.48.7 mask 255.255.255.255
address 5 10.84.48.8 mask 255.255.255.255
address 6 10.84.48.9 mask 255.255.255.255
address 7 10.84.48.6 mask 255.255.255.255
#
ip address-set "192.168.45 Ctype object
address 0 192.168.45.0 mask 24
#
ip address-set "152 Ctype object
address 0 range 10.84.152.1 10.84.152.254
#
ip address-set "192.168.46 Ctype object
address 0 192.168.46.0 mask 24
#
ip address-set type object
address 0 10.255.2.202 mask 32
#
ip address-set ype object
address 0 10.84.208.0 mask 255.255.248.0
#
ip address-set "172.16 Btype object
address 0 172.16.0.0 mask 255.255.0.0
#
ip address-set "10 Atype object
address 0 10.0.0.0 mask 255.0.0.0
#
ip address-set "55 Ctype object
address 0 10.84.55.0 mask 255.255.255.0
#
ip address-set "192.168.11 Ctype object
address 0 range 192.168.11.1 192.168.11.254
#
ip address-set ͨype object
address 0 10.86.112.0 mask 255.255.248.0
address 1 10.255.12.66 mask 255.255.255.255
#
ip address-set "48 /21" type object
address 0 10.84.48.0 mask 21
#
ip address-set "192.168.50 Ctype object
address 0 192.168.50.0 mask 255.255.255.0
#
ip address-set "54 Ctype object
address 0 range 10.84.54.1 10.84.54.254
#
ip address-set "53 Ctype object
address 0 range 10.84.53.1 10.84.53.254
#
ip address-set "51 Ctype object
address 0 range 10.84.51.1 10.84.51.254
#
ip address-set "50 Ctype object
address 0 range 10.84.50.1 10.84.50.254
#
ip address-set "49 Ctype object
address 0 range 10.84.49.1 10.84.49.254
#
ip address-set "52 Ctype object
address 0 range 10.84.52.1 10.84.52.254
#
ip address-set "152 /21" type object
address 0 10.84.152.0 mask 21
#
ip address-set · type object
address 0 10.86.152.0 mask 255.255.248.0
#
ip address-set "48 Ctype object
address 0 10.84.48.0 mask 24
#
ip service-set BANPORT type object
service 0 protocol tcp source-port 0 to 65535 destination-port 22
service 1 protocol tcp source-port 0 to 65535 destination-port 23
service 2 protocol tcp source-port 0 to 65535 destination-port 445
service 3 protocol tcp source-port 0 to 65535 destination-port 139
service 4 protocol tcp source-port 0 to 65535 destination-port 1521
service 5 protocol tcp source-port 0 to 65535 destination-port 1433
service 6 protocol tcp source-port 0 to 65535 destination-port 3306
service 7 protocol tcp source-port 0 to 65535 destination-port 3389
service 8 protocol tcp source-port 0 to 65535 destination-port 135
service 9 protocol tcp source-port 0 to 65535 destination-port 137
service 10 protocol tcp source-port 0 to 65535 destination-port 138
#
slb
#
right-manager server-group
#
profile type url-filter name

category pre-defined subcategory-id 155 action block
category pre-defined subcategory-id 157 action block
category pre-defined subcategory-id 158 action block
category pre-defined subcategory-id 231 action block
category pre-defined subcategory-id 232 action block
category pre-defined subcategory-id 159 action block
category pre-defined subcategory-id 254 action block
category pre-defined subcategory-id 160 action block
category pre-defined subcategory-id 237 action block
category pre-defined subcategory-id 239 action block
default action block
#
sa
#
location
#
agile-network
#
api
#
device-classification
device-group pc
device-group mobile-terminal
device-group undefined-group
#
security-policy
default policy logging
rule name "ban port"
policy logging
session logging
source-zone untrust
destination-zone local
destination-zone trust
service BANPORT
action deny
rule name "server to intranet"
policy logging
source-zone trust
destination-zone ר source-address address-set server
destination-address address-set "10 A
destination-address address-set "172.16 B
action permit
rule name "server to internet"
policy logging
session logging
source-zone trust
destination-zone untrust
source-address address-set server
action deny
rule name "Other to Internet"
policy logging
destination-zone untrust
source-address address-set "192.168.11 C
source-address address-set "192.168.45 C
source-address address-set "192.168.46 C
action permit
rule name "local dev to intranet"
policy logging
source-zone trust
source-zone local
destination-zone ר source-address 10.10.10.0 mask 255.255.255.0
source-address 192.168.0.0 mask 255.255.0.0
destination-address address-set "10 A
destination-address address-set "172.16 B
action deny
rule name "local to Intranet"
policy logging
source-zone trust
source-zone local
destination-zone ר action permit
rule name "local to Internet"
policy logging
source-zone trust
source-zone local
destination-zone untrust
action permit
rule name "to trust"
policy logging
destination-zone trust
destination-zone local
action permit
#
auth-policy
#
traffic-policy
#
policy-based-route
rule name BYODWIFI
ingress-interface GigabitEthernet0/0/1
source-address address-set "152 C
action pbr egress-interface GigabitEthernet0/0/5 next-hop 10.255.2.225
#
nat-policy
rule name caobao
destination-zone ר destination-address address-set ·
action nat easy-ip
rule name beiji
destination-zone ר destination-address 10.86.120.0 mask 255.255.248.0
destination-address 10.255.12.70 mask 255.255.255.255
action nat easy-ip
rule name 709
destination-zone ר destination-address 10.86.128.0 mask 255.255.248.0
destination-address 10.255.12.74 mask 255.255.255.255
action nat easy-ip
rule name 1076
destination-zone ר destination-address 10.86.136.0 mask 255.255.248.0
destination-address 10.255.12.78 mask 255.255.255.255
action nat easy-ip
rule name tongyong
disable
source-zone trust
destination-zone ר destination-address address-set ͨ action nat easy-ip
rule name "to intranet"
destination-zone ר destination-address address-set "10 A
destination-address address-set "172.16 B
action no-nat
rule name "Other to internet"
source-zone trust
destination-zone untrust
source-address address-set "192.168.11 C
source-address address-set "192.168.45 C
source-address address-set "192.168.46 C
action nat easy-ip
rule name "to internet"
destination-zone untrust
action nat easy-ip
rule name "to trust"
destination-zone trust
action no-nat
#
proxy-policy
#
quota-policy
#
multi-interface
add interface Dialer0 priority 4
add interface Dialer1 priority 4
add interface GigabitEthernet0/0/0 priority 6
mode proportion-of-bandwidth
#
healthcheck link-group 1 "icmp 114"
destination 114.114.114.114 protocol ICMP
tx-interval 10
healthcheck link-group 2 "icmp 8.8"
destination 8.8.8.8 protocol ICMP
tx-interval 10
healthcheck link-group 3 "baidu http"
destination 123.125.114.144 protocol HTTP
tx-interval 10
times 2
healthcheck link-group 4 "icmp 10.0.13.23"
destination 10.0.13.23 protocol ICMP
tx-interval 10
#
return

3 个回答
粉丝:51人 关注:5人

华三墙翻译华三墙?啥意思,这个做个附件吧,不分行太乱了

添加了附件,没显示

zhiliao_pVP8aH 发表时间:2022-02-16 更多>>

添加了附件,没显示

zhiliao_pVP8aH 发表时间:2022-02-16
粉丝:37人 关注:0人

题主意思是把这个没有自动换行的命令整理成一个正常的配置文件。这个估计大家都没空吧,题主还是自己一句一句抄写吧,建议。

编辑答案

你正在编辑答案

如果你要对问题或其他回答进行点评或询问,请使用评论功能。

分享扩散:

提出建议

    +

亲~登录后才可以操作哦!

确定

亲~检测到您登陆的账号未在http://hclhub.h3c.com进行注册

注册后可访问此模块

跳转hclhub

你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作

举报

×

侵犯我的权益 >
对根叔社区有害的内容 >
辱骂、歧视、挑衅等(不友善)

侵犯我的权益

×

泄露了我的隐私 >
侵犯了我企业的权益 >
抄袭了我的内容 >
诽谤我 >
辱骂、歧视、挑衅等(不友善)
骚扰我

泄露了我的隐私

×

您好,当您发现根叔知了上有泄漏您隐私的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您认为哪些内容泄露了您的隐私?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)

侵犯了我企业的权益

×

您好,当您发现根叔知了上有关于您企业的造谣与诽谤、商业侵权等内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到 pub.zhiliao@h3c.com 邮箱,我们会在审核后尽快给您答复。
  • 1. 您举报的内容是什么?(请在邮件中列出您举报的内容和链接地址)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
  • 3. 是哪家企业?(营业执照,单位登记证明等证件)
  • 4. 您与该企业的关系是?(您是企业法人或被授权人,需提供企业委托授权书)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

抄袭了我的内容

×

原文链接或出处

诽谤我

×

您好,当您发现根叔知了上有诽谤您的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您举报的内容以及侵犯了您什么权益?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

对根叔社区有害的内容

×

垃圾广告信息
色情、暴力、血腥等违反法律法规的内容
政治敏感
不规范转载 >
辱骂、歧视、挑衅等(不友善)
骚扰我
诱导投票

不规范转载

×

举报说明