H3C F1050防火墙 配置如下 想咨询一下是哪里配置有问题。内部网络上传没有问题。谢谢
[BEGIN] 2022-05-11 10:15:43
Connecting to 10.10.10.4:23...
Connection established.
To escape to local shell, press 'Ctrl+Alt+]'.
******************************************************************************
* Copyright (c) 2004-2018 New H3C Technologies Co., Ltd. All rights reserved.*
* Without the owner's prior written consent, *
* no decompiling or reverse-engineering shall be allowed. *
******************************************************************************
login: admin
Password:
login: admin
Password:
<ZZDS-FW>dis cur
#
version 7.1.064, Release 9323P19
#
sysname ZZDS-FW
#
clock timezone Lisbon add 00:00:00
clock protocol none
#
context Admin id 1
#
ip vpn-instance management
route-distinguisher 1000000000:1
vpn-target 1000000000:1 import-extcommunity
vpn-target 1000000000:1 export-extcommunity
#
telnet server enable
#
irf mac-address persistent timer
irf auto-update enable
undo irf link-delay
irf member 1 priority 10
irf member 2 priority 5
#
security-zone intra-zone default permit
#
security-policy disable
#
session synchronization dns http
#
track 1 nqa entry admin test reaction 1
#
dialer-group 1 rule ip permit
dialer-group 2 rule ip permit
dialer-group 3 rule ip permit
dialer-group 4 rule ip permit
dialer-group 5 rule ip permit
dialer-group 6 rule ip permit
dialer-group 7 rule ip permit
dialer-group 8 rule ip permit
dialer-group 9 rule ip permit
#
ip unreachables enable
ip ttl-expires enable
#
dns proxy enable
ip host ***.*** 192.168.0.16
ip host ***.*** 192.168.0.8
#
lldp global enable
lldp compliance cdp
#
password-recovery enable
#
vlan 1
#
vlan 10
#
vlan 12
#
vlan 14
#
vlan 16
#
vlan 18 to 19
#
vlan 140
#
vlan 200
#
irf-port 1/1
port group interface GigabitEthernet1/0/22
port group interface GigabitEthernet1/0/23
#
irf-port 2/2
port group interface GigabitEthernet2/0/22
port group interface GigabitEthernet2/0/23
#
object-group ip address 192.168.0.0
description server-ip-group
0 network subnet 192.168.0.0 255.255.255.0
#
object-group ip address 192.168.0.7
description 192.168.0.7
0 network host address 192.168.0.7
#
object-group ip address 192.168.9.111
description 192.168.9.111
0 network host address 192.168.9.111
#
object-group ip address add-server
70 network host address 192.168.0.5
#
object-group ip address add_server
0 network host address 192.168.0.8
10 network host address 192.168.0.7
20 network host address 192.168.0.31
30 network host address 192.168.0.20
40 network host address 192.168.0.30
50 network host address 192.168.0.16
60 network host address 192.168.0.13
80 network host address 192.168.0.14
90 network host address 192.168.11.4
100 network host address 192.168.100.1
110 network host address 202.202.202.226
111 network host address 113.106.95.197
120 network host address 192.168.0.9
130 network host address 192.168.0.5
140 network host address 192.168.0.6
150 network host address 192.168.0.218
160 network host address 192.168.0.207
170 network host address 192.168.0.32
180 network host address 192.168.0.18
190 network host address 192.168.0.200
200 network host address 192.168.0.12
210 network host address 192.168.0.17
220 network host address 10.10.10.5
230 network host address 192.168.0.22
240 network host address 192.168.0.19
250 network host address 192.168.0.228
260 network host address 192.168.0.33
#
object-group ip address "vlan 10"
description 192.168.0.0
0 network subnet 192.168.0.0 255.255.255.0
#
object-group ip address "VLAN 12"
description VLAN 12 (192.168.2.0θ¶̩
0 network range 192.168.2.100 192.168.2.240
0 network exclude 192.168.2.101
0 network exclude 192.168.2.105
0 network exclude 192.168.2.200
#
object-group ip address "vlan 14"
description zztzkg wifi network
0 network subnet 192.168.4.0 255.255.255.0
0 network exclude 192.168.4.0
#
object-group ip address "vlan 16"
description zzds wifi network
0 network host address 192.168.7.37
#
object-group ip address "Vlan 19"
description vlan19 £¨192.168.9.0£©
0 network range 192.168.9.100 192.168.9.131
10 network range 192.168.9.133 192.168.9.240
#
object-group ip address vlan18
description vlan18 £¨192.168.8.0£©
0 network range 192.168.8.100 192.168.8.240
#
object-group service service_port
0 service tcp destination eq 8080
10 service tcp destination eq 5656
20 service tcp destination eq 9999
30 service tcp destination eq 8081
40 service tcp destination eq 5367
50 service tcp destination eq 81
60 service tcp destination eq 8888
70 service tcp destination eq 3389
80 service tcp destination eq 443
90 service tcp destination eq 5555
100 service tcp destination eq 1222
110 service tcp destination eq 10010
111 service tcp destination eq 10011
112 service tcp destination eq 10012
113 service tcp destination eq 10013
114 service tcp destination eq 10014
120 service tcp destination eq 10004
130 service tcp destination eq 8889
140 service tcp destination eq 6888
150 service tcp destination eq 11034
160 service tcp destination eq 10086
170 service tcp destination eq 3307
180 service tcp destination eq 8089
190 service tcp destination eq 5757
200 service tcp destination eq 6802
210 service tcp destination eq 23
220 service tcp destination eq 80
230 service tcp destination eq 4433
240 service tcp destination eq 4009
250 service udp destination eq 4009
260 service tcp destination eq 4430
270 service tcp destination eq 6666
280 service tcp destination eq 8443
281 service tcp destination eq 5280
282 service tcp destination eq 5222
283 service tcp destination eq 7777
284 service tcp destination eq 5269
285 service tcp destination eq 5369
286 service tcp destination eq 5469
287 service tcp destination eq 8010
288 service tcp destination eq 8050
289 service tcp destination eq 8060
290 service tcp destination eq 445
291 service tcp destination eq 7805
292 service tcp destination eq 22
293 service tcp destination eq 3999
294 service tcp destination eq 5366
#
stp global enable
#
policy-based-route pbr_internet permit node 10
if-match acl 3010
apply output-interface Dialer6
#
policy-based-route pbr_internet permit node 20
if-match acl 3020
apply output-interface Dialer8
#
policy-based-route pbr_internet permit node 50
if-match acl 3050
apply output-interface Dialer7
#
policy-based-route pbr_internet permit node 60
if-match acl 3060
apply output-interface Dialer6
#
policy-based-route pbr_internet permit node 80
if-match acl 3080
apply output-interface Dialer5
#
policy-based-route pbr_internet permit node 90
if-match acl 3090
apply output-interface Dialer4
#
policy-based-route pbr_internet permit node 100
if-match acl 3100
apply output-interface Dialer7
#
policy-based-route pbr_internet permit node 110
if-match acl 3110
apply next-hop 111.111.111.111
#
policy-based-route pbr_internet permit node 120
if-match acl 3200
apply output-interface Dialer5
apply output-interface Dialer8
#
nqa entry admin test
type icmp-echo
destination ip 111.111.111.111
frequency 100
next-hop ip 111.111.111.111
reaction 1 checked-element probe-fail threshold-type consecutive 5 action-type trigger-only
#
nqa schedule admin test start-time now lifetime forever
#
interface Bridge-Aggregation1
port access vlan 200
link-aggregation mode dynamic
#
interface Bridge-Aggregation2
port access vlan 10
link-aggregation mode dynamic
#
interface Dialer0
mtu 1492
ppp chap password cipher $c$3$YYjK/TZbs3u7yK65Z8AZlLstflQg+vZios3j
ppp chap user 075501313047@163.gd
ppp ipcp dns admit-any
ppp ipcp dns request
ppp pap local-user 075501313047@163.gd password cipher $c$3$++rcGFHOoXpjwq/G2pokradymqUJEp21yFTA
dialer bundle enable
dialer-group 1
dialer timer idle 0
dialer timer autodial 5
ip address ppp-negotiate
#
interface Dialer1
bandwidth 500000
mtu 1492
ppp chap password cipher $c$3$SrjBfLeosATN4m6MDatJBGu01kB1Q1Cp+G0e
ppp chap user 075504184000@163.gd
ppp pap local-user 075504184000@163.gd password cipher $c$3$wdQEye99p3oY64IQ93Vy4NATrR8bhtDXNhMf
dialer bundle enable
dialer-group 1
dialer timer idle 0
dialer timer autodial 60
ip address ppp-negotiate
tcp mss 1024
nat outbound 3000
#
interface Dialer2
bandwidth 500000
mtu 1492
ppp chap password cipher $c$3$Tx2PTTCzOF3upoiSlt8j1p8WpGWqOAZOXOH8
ppp chap user 075504116487@163.gd
ppp pap local-user 075504116487@163.gd password cipher $c$3$gzNw4n7L/J3HExYyWxs5t9Bl2R435vvnn7Uz
dialer bundle enable
dialer-group 1
dialer timer idle 0
dialer timer autodial 60
ip address ppp-negotiate
tcp mss 1024
nat outbound 3000
#
interface Dialer3
description FOR USE
bandwidth 500000
mtu 1492
ppp chap password cipher $c$3$UtjmGK7eKjZa9x4b1+4083W4oFUhCpP4KYmv
ppp chap user 075505866480@163.gd
ppp pap local-user 075505866480@163.gd password cipher $c$3$c8cnQeWAx5y/UsUwr2dYTzkHytT4WQEb+Vks
dialer bundle enable
dialer-group 1
dialer timer idle 0
dialer timer autodial 60
ip address ppp-negotiate
tcp mss 1024
nat outbound 3000
#
interface Dialer4
description FOR USE
bandwidth 500000
mtu 1492
ppp chap password cipher $c$3$77DMDuNHhazhZ83jGNT1QwIX5xn2+IGwbT28
ppp chap user 075507557551@163.gd
ppp pap local-user 075507557551@163.gd password cipher $c$3$MCUyfCIVGbq/Xcxi0Zcq7aK6a8LMunk01sDD
dialer bundle enable
dialer-group 1
dialer timer idle 0
dialer timer autodial 60
ip address ppp-negotiate
tcp mss 1024
nat outbound 3000
#
interface Dialer5
description FOR USE
bandwidth 1000000
mtu 1492
ppp chap password cipher $c$3$WnOE3aiLe0SHp35cUPI1zHF465nTrgvfJb8R
ppp chap user 075505424374@163.gd
ppp ipcp dns admit-any
ppp ipcp dns request
ppp pap local-user 075505424374@163.gd password cipher $c$3$z6A4dH74ncGFZoQIXgKo93h+k7Ta9BXLpZnV
dialer bundle enable
dialer-group 9
dialer timer idle 0
dialer timer autodial 5
ip address ppp-negotiate
tcp mss 1024
nat outbound 3000
#
interface Dialer6
description FOR USE
bandwidth 500000
mtu 1492
ppp chap password cipher $c$3$jahymyz7+wn6Qrn1D/BQpyaMfk6zhubjG7Hj
ppp chap user 075501313047@163.gd
ppp pap local-user 075501313047@163.gd password cipher $c$3$FSlrBxgtKxDsvQdyVZ7mA3O9rISDf4ndYt2c
dialer bundle enable
dialer-group 7
dialer timer idle 0
dialer timer autodial 5
ip address ppp-negotiate
tcp mss 1024
nat outbound 3000
#
interface Dialer7
description FOR USE
bandwidth 500000
mtu 1492
ppp chap password cipher $c$3$Z2bGuLHGv1bXrx6Wyb1M2ONB/U6qmr6Xr2JX
ppp chap user 075503480872@163.gd
ppp ipcp dns admit-any
ppp ipcp dns request
ppp pap local-user 075503480872@163.gd password cipher $c$3$UL8Fka5LCTc8q21qcmKuV3KeBU9zyGVYhV5g
dialer bundle enable
dialer-group 1
dialer timer idle 0
dialer timer autodial 5
ip address ppp-negotiate
tcp mss 1024
nat outbound 3000
#
interface Dialer8
description FOR USE
bandwidth 500000
mtu 1492
ppp chap password cipher $c$3$yvuYNnmSN1+SCH46mFuSwi0MM9hbylHcaomo
ppp chap user 075503082136@163.gd
ppp ipcp dns admit-any
ppp ipcp dns request
ppp pap local-user 075503082136@163.gd password cipher $c$3$zXXFlAg/2jxjrAW7Jg6yK9K4f2G1Dd0zjXxk
dialer bundle enable
dialer-group 1
dialer timer idle 0
dialer timer autodial 5
ip address ppp-negotiate
tcp mss 1024
nat outbound 3000
#
interface Dialer9
mtu 1492
ppp chap user 075503082136@163.gd
ppp ipcp dns admit-any
ppp ipcp dns request
dialer bundle enable
dialer-group 8
dialer timer idle 0
dialer timer autodial 5
ip address ppp-negotiate
#
interface NULL0
#
interface Vlan-interface1
#
interface Vlan-interface10
nat hairpin enable
ip policy-based-route pbr_internet
#
interface Vlan-interface19
#
interface Vlan-interface140
pppoe-client dial-bundle-number 4
#
interface Vlan-interface200
ip address 10.10.10.4 255.255.255.0
nat hairpin enable
ip policy-based-route pbr_internet
#
interface GigabitEthernet1/0/0
port link-mode route
ip binding vpn-instance management
#
interface GigabitEthernet1/0/1
port link-mode route
description dialer 1 075504184000@163.gd
pppoe-client dial-bundle-number 1
#
interface GigabitEthernet1/0/2
port link-mode route
description dialer 2 075504116487@163.gd
pppoe-client dial-bundle-number 2
#
interface GigabitEthernet1/0/3
port link-mode route
description dialer3 075505866480@163.gd
pppoe-client dial-bundle-number 3
#
interface GigabitEthernet1/0/5
port link-mode route
pppoe-client dial-bundle-number 0
#
interface GigabitEthernet1/0/6
port link-mode route
description link to 40M special line
shutdown
ip address 202.202.202.226 255.255.255.224
tcp mss 1024
nat outbound 3000
nat server protocol tcp global 202.202.202.228 80 inside 192.168.0.8 80
nat server protocol tcp global 202.202.202.228 81 inside 192.168.0.8 81
nat server protocol tcp global 202.202.202.228 4430 inside 192.168.0.6 443
nat server protocol tcp global 202.202.202.228 5222 inside 192.168.0.8 5222
nat server protocol tcp global 202.202.202.228 5269 inside 192.168.0.8 5269
nat server protocol tcp global 202.202.202.228 5280 inside 192.168.0.8 5280
nat server protocol tcp global 202.202.202.228 5367 inside 192.168.0.32 5367
nat server protocol tcp global 202.202.202.228 5369 inside 192.168.0.8 5369
nat server protocol tcp global 202.202.202.228 5469 inside 192.168.0.8 5469
nat server protocol tcp global 202.202.202.228 5656 inside 192.168.0.8 5656
nat server protocol tcp global 202.202.202.228 7777 inside 192.168.0.8 7777
nat server protocol tcp global 202.202.202.228 8007 inside 192.168.0.21 8007
nat server protocol tcp global 202.202.202.228 8060 inside 192.168.0.8 8060
nat server protocol tcp global 202.202.202.228 8080 inside 192.168.0.8 80
nat server protocol tcp global 202.202.202.228 8081 inside 192.168.0.32 8081
nat server protocol tcp global 202.202.202.228 8443 inside 192.168.0.8 8443
nat server protocol tcp global 202.202.202.228 8888 inside 192.168.0.8 8888
nat server protocol tcp global 202.202.202.228 9999 inside 192.168.0.8 9999
nat server protocol tcp global 202.202.202.229 80 inside 192.168.0.13 5757
nat server protocol tcp global 202.202.202.229 88 inside 192.168.0.33 88
nat server protocol tcp global 202.202.202.229 3999 inside 192.168.0.7 3999
nat server protocol tcp global 202.202.202.229 4009 inside 192.168.0.6 4009
nat server protocol tcp global 202.202.202.229 4430 inside 192.168.0.6 4430
nat server protocol tcp global 202.202.202.229 5222 inside 192.168.0.218 5222
nat server protocol tcp global 202.202.202.229 5269 inside 192.168.0.218 5269
nat server protocol tcp global 202.202.202.229 5280 inside 192.168.0.218 5280
nat server protocol tcp global 202.202.202.229 5366 inside 192.168.0.20 5366
nat server protocol tcp global 202.202.202.229 5367 inside 192.168.0.20 5367
nat server protocol tcp global 202.202.202.229 5369 inside 192.168.0.218 5369
nat server protocol tcp global 202.202.202.229 5469 inside 192.168.0.218 5469
nat server protocol tcp global 202.202.202.229 5555 inside 192.168.0.8 5555
nat server protocol tcp global 202.202.202.229 5656 inside 192.168.0.19 5656
nat server protocol tcp global 202.202.202.229 6666 inside 192.168.0.31 6666
nat server protocol tcp global 202.202.202.229 7777 inside 192.168.0.218 7777
nat server protocol tcp global 202.202.202.229 8050 inside 192.168.0.33 80
nat server protocol tcp global 202.202.202.229 8060 inside 192.168.0.33 80
nat server protocol tcp global 202.202.202.229 8080 inside 192.168.0.218 8080
nat server protocol tcp global 202.202.202.229 8081 inside 192.168.0.20 8081
nat server protocol tcp global 202.202.202.229 8443 inside 192.168.0.218 8443
nat server protocol tcp global 202.202.202.229 8889 inside 192.168.0.30 8889
nat server protocol tcp global 202.202.202.229 9999 inside 192.168.0.218 9999
nat server protocol tcp global 202.202.202.230 5656 inside 192.168.0.228 5656
nat server protocol tcp global 202.202.202.230 5757 inside 192.168.0.13 5757
nat server protocol tcp global 202.202.202.230 6802 inside 192.168.0.5 6802
nat server protocol tcp global 202.202.202.230 8010 inside 192.168.0.17 8010
nat server protocol tcp global 202.202.202.230 8050 inside 192.168.0.17 8050
nat server protocol tcp global 202.202.202.230 8060 inside 192.168.0.17 8060
nat server protocol tcp global 202.202.202.230 8089 inside 192.168.0.5 8089
nat server protocol tcp global 202.202.202.230 8888 inside 192.168.0.13 8888
nat server protocol tcp global 202.202.202.231 80 inside 192.168.0.16 80
nat server protocol tcp global 202.202.202.231 8010 inside 192.168.0.16 8010
nat server protocol tcp global 202.202.202.231 8050 inside 192.168.0.16 8050
nat server protocol tcp global 202.202.202.231 8888 inside 192.168.0.16 8888
nat server protocol tcp global 202.202.202.232 21 inside 192.168.0.22 21
nat server protocol tcp global 202.202.202.232 5757 inside 192.168.0.12 80
nat server protocol tcp global 202.202.202.232 8080 inside 192.168.0.12 80
nat server protocol udp global 202.202.202.229 4009 inside 192.168.0.6 4009
#
interface GigabitEthernet1/0/7
port link-mode route
description new 50M special line
ip address 113.106.95.197 255.255.255.128
nat outbound 3000
nat server protocol tcp global 113.106.95.198 80 inside 192.168.0.8 80
nat server protocol tcp global 113.106.95.198 81 inside 192.168.0.8 81
nat server protocol tcp global 113.106.95.198 4430 inside 192.168.0.6 443
nat server protocol tcp global 113.106.95.198 5222 inside 192.168.0.8 5222
nat server protocol tcp global 113.106.95.198 5269 inside 192.168.0.8 5269
nat server protocol tcp global 113.106.95.198 5280 inside 192.168.0.8 5280
nat server protocol tcp global 113.106.95.198 5367 inside 192.168.0.32 5367
nat server protocol tcp global 113.106.95.198 5369 inside 192.168.0.8 5369
nat server protocol tcp global 113.106.95.198 5469 inside 192.168.0.8 5469
nat server protocol tcp global 113.106.95.198 5656 inside 192.168.0.8 5656
nat server protocol tcp global 113.106.95.198 7777 inside 192.168.0.8 7777
nat server protocol tcp global 113.106.95.198 8007 inside 192.168.0.21 8007
nat server protocol tcp global 113.106.95.198 8060 inside 192.168.0.8 8060
nat server protocol tcp global 113.106.95.198 8080 inside 192.168.0.8 80
nat server protocol tcp global 113.106.95.198 8081 inside 192.168.0.32 8081
nat server protocol tcp global 113.106.95.198 8443 inside 192.168.0.8 8443
nat server protocol tcp global 113.106.95.198 8888 inside 192.168.0.8 8888
nat server protocol tcp global 113.106.95.198 9999 inside 192.168.0.8 9999
nat server protocol tcp global 113.106.95.199 80 inside 192.168.0.13 5757
nat server protocol tcp global 113.106.95.199 88 inside 192.168.0.33 88
nat server protocol tcp global 113.106.95.199 3999 inside 192.168.0.7 3999
nat server protocol tcp global 113.106.95.199 4009 inside 192.168.0.6 4009
nat server protocol tcp global 113.106.95.199 4430 inside 192.168.0.6 4430
nat server protocol tcp global 113.106.95.199 5222 inside 192.168.0.218 5222
nat server protocol tcp global 113.106.95.199 5269 inside 192.168.0.218 5269
nat server protocol tcp global 113.106.95.199 5280 inside 192.168.0.218 5280
nat server protocol tcp global 113.106.95.199 5366 inside 192.168.0.20 5366
nat server protocol tcp global 113.106.95.199 5367 inside 192.168.0.20 5367
nat server protocol tcp global 113.106.95.199 5369 inside 192.168.0.218 5369
nat server protocol tcp global 113.106.95.199 5469 inside 192.168.0.218 5469
nat server protocol tcp global 113.106.95.199 5555 inside 192.168.0.8 5555
nat server protocol tcp global 113.106.95.199 5656 inside 192.168.0.19 5656
nat server protocol tcp global 113.106.95.199 6666 inside 192.168.0.31 6666
nat server protocol tcp global 113.106.95.199 7777 inside 192.168.0.218 7777
nat server protocol tcp global 113.106.95.199 8050 inside 192.168.0.33 80
nat server protocol tcp global 113.106.95.199 8060 inside 192.168.0.33 80
nat server protocol tcp global 113.106.95.199 8080 inside 192.168.0.218 8080
nat server protocol tcp global 113.106.95.199 8081 inside 192.168.0.20 8081
nat server protocol tcp global 113.106.95.199 8443 inside 192.168.0.218 8443
nat server protocol tcp global 113.106.95.199 8889 inside 192.168.0.30 8889
nat server protocol tcp global 113.106.95.199 9999 inside 192.168.0.218 9999
nat server protocol tcp global 113.106.95.200 5656 inside 192.168.0.228 5656
nat server protocol tcp global 113.106.95.200 5757 inside 192.168.0.13 5757
nat server protocol tcp global 113.106.95.200 6802 inside 192.168.0.5 6802
nat server protocol tcp global 113.106.95.200 8010 inside 192.168.0.17 8010
nat server protocol tcp global 113.106.95.200 8050 inside 192.168.0.17 8050
nat server protocol tcp global 113.106.95.200 8060 inside 192.168.0.17 8060
nat server protocol tcp global 113.106.95.200 8089 inside 192.168.0.5 8089
nat server protocol tcp global 113.106.95.200 8888 inside 192.168.0.13 8888
nat server protocol tcp global 113.106.95.201 80 inside 192.168.0.16 80
nat server protocol tcp global 113.106.95.201 8010 inside 192.168.0.16 8010
nat server protocol tcp global 113.106.95.201 8050 inside 192.168.0.16 8050
nat server protocol tcp global 113.106.95.201 8888 inside 192.168.0.16 8888
nat server protocol tcp global 113.106.95.202 21 inside 192.168.0.22 21
nat server protocol tcp global 113.106.95.202 5757 inside 192.168.0.12 80
nat server protocol tcp global 113.106.95.202 8080 inside 192.168.0.12 80
nat server protocol udp global 113.106.95.199 4009 inside 192.168.0.6 4009
#
interface GigabitEthernet1/0/8
port link-mode route
description dialer6 500M
pppoe-client dial-bundle-number 6
#
interface GigabitEthernet1/0/9
port link-mode route
description dialer7 500M
pppoe-client dial-bundle-number 7
#
interface GigabitEthernet1/0/10
port link-mode route
#
interface GigabitEthernet1/0/11
port link-mode route
description dialer5 500M
pppoe-client dial-bundle-number 5
#
interface GigabitEthernet1/0/12
port link-mode route
#
interface GigabitEthernet1/0/13
port link-mode route
description dialer8 500M
pppoe-client dial-bundle-number 8
#
interface GigabitEthernet1/0/15
port link-mode route
description dialer9
#
interface GigabitEthernet1/0/21
port link-mode route
#
interface GigabitEthernet2/0/0
port link-mode route
#
interface GigabitEthernet2/0/5
port link-mode route
#
interface GigabitEthernet2/0/6
port link-mode route
#
interface GigabitEthernet2/0/7
port link-mode route
#
interface GigabitEthernet2/0/8
port link-mode route
#
interface GigabitEthernet2/0/9
port link-mode route
#
interface GigabitEthernet2/0/10
port link-mode route
#
interface GigabitEthernet2/0/11
port link-mode route
#
interface GigabitEthernet2/0/12
port link-mode route
#
interface GigabitEthernet2/0/13
port link-mode route
#
interface GigabitEthernet2/0/16
port link-mode route
#
interface GigabitEthernet2/0/17
port link-mode route
#
interface GigabitEthernet2/0/18
port link-mode route
#
interface GigabitEthernet2/0/19
port link-mode route
#
interface GigabitEthernet2/0/20
port link-mode route
#
interface GigabitEthernet2/0/21
port link-mode route
#
interface GigabitEthernet1/0/4
port link-mode bridge
port access vlan 140
#
interface GigabitEthernet1/0/14
port link-mode bridge
description to_SW-CORE_G1/3/0/1
port access vlan 200
#
interface GigabitEthernet1/0/16
port link-mode bridge
port access vlan 19
#
interface GigabitEthernet1/0/17
port link-mode bridge
port access vlan 12
#
interface GigabitEthernet1/0/18
port link-mode bridge
port access vlan 18
#
interface GigabitEthernet1/0/19
port link-mode bridge
port access vlan 14
#
interface GigabitEthernet1/0/20
port link-mode bridge
port access vlan 16
#
interface GigabitEthernet2/0/1
port link-mode bridge
#
interface GigabitEthernet2/0/2
port link-mode bridge
#
interface GigabitEthernet2/0/3
port link-mode bridge
#
interface GigabitEthernet2/0/4
port link-mode bridge
port access vlan 140
#
interface GigabitEthernet2/0/14
port link-mode bridge
description to_SW-CORE_G2/2/0/1
port access vlan 200
#
interface GigabitEthernet2/0/15
port link-mode bridge
port access vlan 10
port link-aggregation group 2
#
interface GigabitEthernet1/0/22
#
interface GigabitEthernet1/0/23
#
interface GigabitEthernet2/0/22
#
interface GigabitEthernet2/0/23
#
object-policy ip any_to_trust
rule 0 pass
#
object-policy ip local_to_trust
rule 0 pass
#
object-policy ip local_to_untrust
rule 0 pass
#
object-policy ip trust_to_local
rule 0 pass
#
object-policy ip trust_to_untrust
rule 0 pass
#
object-policy ip untrust-trust
#
object-policy ip untrust_to_trust
rule 0 pass destination-ip add_server service service_port logging counting
#
security-zone name Local
#
security-zone name Trust
import interface Vlan-interface10
import interface Vlan-interface19
import interface Vlan-interface200
import interface Bridge-Aggregation1 vlan 200
import interface Bridge-Aggregation2 vlan 10
import interface GigabitEthernet1/0/14 vlan 200
import interface GigabitEthernet1/0/16 vlan 19
import interface GigabitEthernet1/0/17 vlan 12
import interface GigabitEthernet1/0/18 vlan 18
import interface GigabitEthernet1/0/19 vlan 14
import interface GigabitEthernet1/0/20 vlan 16
import interface GigabitEthernet2/0/14 vlan 200
import interface GigabitEthernet2/0/15 vlan 10
#
security-zone name DMZ
#
security-zone name Untrust
import interface Dialer1
import interface Dialer2
import interface Dialer3
import interface Dialer4
import interface Dialer5
import interface Dialer6
import interface Dialer7
import interface Dialer8
import interface GigabitEthernet1/0/6
import interface GigabitEthernet1/0/7
import interface GigabitEthernet1/0/9
import interface GigabitEthernet1/0/11
import interface GigabitEthernet1/0/13
import interface GigabitEthernet1/0/15
import interface GigabitEthernet2/0/5
import interface GigabitEthernet2/0/6
import interface Vlan-interface140
import interface GigabitEthernet1/0/4 vlan 140
attack-defense apply policy policy
#
security-zone name Management
import interface GigabitEthernet1/0/0
#
zone-pair security source Any destination Any
#
zone-pair security source Local destination Trust
object-policy apply ip local_to_trust
#
zone-pair security source Local destination Untrust
object-policy apply ip local_to_untrust
#
zone-pair security source Trust destination Local
object-policy apply ip trust_to_local
#
zone-pair security source Trust destination Untrust
object-policy apply ip trust_to_untrust
#
zone-pair security source Untrust destination Trust
object-policy apply ip untrust_to_trust
#
scheduler logfile size 16
#
line class aux
user-role network-operator
#
line class console
user-role network-admin
#
line class vty
user-role network-operator
#
line aux 0
user-role network-admin
#
line aux 1
user-role network-operator
#
line con 0 1
user-role network-admin
#
line vty 0 4
authentication-mode scheme
user-role network-operator
#
line vty 5 63
user-role network-operator
#
ip route-static 0.0.0.0 0 Dialer4
ip route-static 0.0.0.0 0 Dialer6
ip route-static 0.0.0.0 0 Dialer7
ip route-static 0.0.0.0 0 111.111.111.111 track 1 preference 1
ip route-static 0.0.0.0 0 Dialer8
ip route-static 0.0.0.0 0 Dialer5
ip route-static 10.10.0.0 16 10.10.10.1
ip route-static 10.10.110.0 24 10.10.10.1
ip route-static 192.168.0.0 16 10.10.10.1
ip route-static 192.168.52.0 24 10.10.10.3
ip route-static 192.168.53.0 24 10.10.10.3
#
undo info-center enable
#
snmp-agent
snmp-agent local-engineid 800063A203703D15B78190
snmp-agent community write system!@#$%^&*
snmp-agent sys-info location ZZDS
snmp-agent sys-info version all
snmp-agent target-host trap address udp-domain 192.168.9.108 params securityname system!@#$%^&* v2c
#
ssh server enable
#
arp static 192.168.100.253 d461-fec4-9718
#
acl advanced 3000
rule 20 permit ip
#
acl advanced 3010
description dialer1
rule 40 deny ip source 202.202.202.228 0 destination 192.168.3.0 0.0.0.255
rule 45 deny ip source 202.202.202.228 0 destination 192.168.4.0 0.0.0.255
rule 50 deny ip source 202.202.202.228 0 destination 192.168.5.0 0.0.0.255
rule 55 deny ip source 202.202.202.228 0 destination 192.168.6.0 0.0.1.255
rule 60 deny ip source 202.202.202.229 0 destination 192.168.3.0 0.0.0.255
rule 65 deny ip source 202.202.202.229 0 destination 192.168.4.0 0.0.0.255
rule 70 deny ip source 202.202.202.229 0 destination 192.168.5.0 0.0.0.255
rule 80 permit ip source 192.168.7.0 0.0.0.255
rule 85 permit ip source 192.168.3.0 0.0.0.255
rule 95 permit ip source 192.168.5.0 0.0.0.255
#
acl advanced 3020
rule 20 permit ip source 192.168.2.0 0.0.0.255
#
acl advanced 3040
#
acl advanced 3050
description dialer2 for wifi zzkgtz36
rule 50 permit ip source 192.168.6.0 0.0.0.255
#
acl advanced 3060
description dialer3 for 36f chengfa
rule 80 permit ip source 192.168.8.0 0.0.0.255
#
acl advanced 3070
rule 0 permit ip source 192.168.52.0 0.0.0.255 logging
rule 5 permit ip source 192.168.53.0 0.0.0.255 logging
#
acl advanced 3080
description wifi "ZZDS" NETWORK
rule 90 permit ip source 192.168.4.0 0.0.0.255
rule 100 permit ip source 192.168.7.37 0
rule 110 permit ip source 192.168.6.141 0
#
acl advanced 3090
description FOR subnet 90
rule 10 deny ip source 192.168.9.122 0
rule 30 permit ip source 192.168.9.0 0.0.0.255
#
acl advanced 3100
description for wifi zzgroup
rule 10 permit ip source 192.168.3.0 0.0.0.255
#
acl advanced 3110
description special 50M
rule 30 permit ip source 192.168.0.0 0.0.0.255
#
acl advanced 3200
description use 9.122 test network
rule 10 permit ip source 192.168.9.122 0
#
domain system
#
aaa session-limit ftp 16
aaa session-limit telnet 16
aaa session-limit ssh 16
domain default enable system
#
role name level-0
description Predefined level-0 role
#
role name level-1
description Predefined level-1 role
#
role name level-2
description Predefined level-2 role
#
role name level-3
description Predefined level-3 role
#
role name level-4
description Predefined level-4 role
#
role name level-5
description Predefined level-5 role
#
role name level-6
description Predefined level-6 role
#
role name level-7
description Predefined level-7 role
#
role name level-8
description Predefined level-8 role
#
role name level-9
description Predefined level-9 role
#
role name level-10
description Predefined level-10 role
#
role name level-11
description Predefined level-11 role
#
role name level-12
description Predefined level-12 role
#
role name level-13
description Predefined level-13 role
#
role name level-14
description Predefined level-14 role
#
user-group system
#
local-user admin class manage
password hash $h$6$e9SQGgK5B30z2IBh$17sWFYGClk9Zc/tucy23+1eVkAy8VnvgueTtOwb19tYNbEuACmONqlLziax0Z76N13hsaZ4V9pzh5CW2t2RdpA==
service-type ssh telnet terminal https
authorization-attribute user-role level-3
authorization-attribute user-role network-admin
authorization-attribute user-role network-operator
#
ip https enable
#
attack-defense policy policy
scan detect level medium action drop logging
syn-flood detect ip 202.202.202.228 threshold 1000 action logging drop
syn-flood detect ip 202.202.202.229 threshold 1000 action logging drop
syn-flood detect ip 202.202.202.230 threshold 1000 action logging drop
syn-flood detect ip 202.202.202.231 threshold 1000 action logging drop
syn-flood detect ip 202.202.202.232 threshold 1000 action logging drop
#
url-filter policy teamview
default-action permit
category teamview action drop logging
add blacklist 1 host text ***.***
#
url-filter category teamview severity 2000
rule 1 host text teamviewer
description teamview
#
app-profile 0_IPv4
url-filter apply policy teamview
#
inspect block-source parameter-profile ips_block_default_parameter
#
inspect block-source parameter-profile url_block_default_parameter
#
loadbalance action ##defaultactionforllbipv4##%%autocreatedbyweb%% type link-generic
forward all
#
loadbalance policy ##defaultpolicyforllbipv4##%%autocreatedbyweb%% type link-generic
default-class action ##defaultactionforllbipv4##%%autocreatedbyweb%%
#
virtual-server ##defaultvsforllbipv4##%%autocreatedbyweb%% type link-ip
virtual ip address 0.0.0.0 0
lb-policy ##defaultpolicyforllbipv4##%%autocreatedbyweb%%
service enable
#
traffic-policy
rule name "vlan 10"
action qos profile "vlan 10"
source-address address-set "vlan 10"
rule name "vlan 12"
action qos profile other
source-address address-set "VLAN 12"
rule name oher
action qos profile other
source-address address-set "vlan 14"
source-address address-set "Vlan 19"
source-address address-set vlan18
rule name wifi
action qos profile wifi
source-address address-set "vlan 16"
profile name other
bandwidth upstream maximum per-ip 10000
bandwidth downstream maximum per-ip 15000
profile name vlan12
bandwidth upstream maximum per-ip 10000
bandwidth downstream maximum per-ip 10000
profile name "vlan 10"
bandwidth downstream guaranteed 50000
bandwidth downstream maximum 50000
bandwidth upstream guaranteed 50000
bandwidth upstream maximum 50000
traffic-priority 7
bandwidth upstream maximum per-ip 20000
bandwidth downstream maximum per-ip 20000
profile name wifi
traffic-priority 7
connection-limit count per-ip 1000
bandwidth upstream maximum per-ip 8000
bandwidth downstream maximum per-ip 10000
#
security-policy ip
rule 0 name 192.168.0.7
action pass
counting enable
profile 0_IPv4
source-zone Trust
destination-zone Untrust
rule 1 name ips
action pass
counting enable
source-zone Untrust
destination-zone Trust
rule 2 name trust2local
action pass
counting enable
source-zone Trust
destination-zone Local
rule 3 name local2trust
action pass
counting enable
source-zone Local
destination-zone Trust
#
ips policy ips
object-dir server client
action block-source drop permit reset
signature override all drop logging
protect-target OperationSystem Windows
protect-target NetworkDevice Other
protect-target NetworkDevice Cisco
protect-target OfficeSoftware MicrosoftOffice
protect-target WebServer Any
protect-target WebServer Other
protect-target WebServer WebLogic
protect-target Database MS-SQL
protect-target Database MySQL
protect-target Database Oracle
protect-target Database ACCESS
protect-target WebApplication Any
protect-target WebApplication Other
protect-target WebApplication PHP
protect-target ApplicationSoftware Other
protect-target ApplicationSoftware IM
protect-target ApplicationSoftware Security
protect-target Browser InternetExplorer
protect-target NetworkProtocol HTTP
protect-target NetworkProtocol FTP
protect-target Other Other
attack-category Vulnerability SQLInjection
attack-category Vulnerability XSS
attack-category Vulnerability RemoteCodeExecution
#
return
<ZZDS-FW>quit
Connection closing...Socket close.
Connection closed by foreign host.
[END] 2022-05-11 10:16:09
三层交换机做网关,F1050防火墙做外网出口
(0)
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
暂无评论