请教大神,这个2个网段下的电脑如何通信?需要怎么设置?
情况是这样的,我进行如下设置,F1000-730防火墙,
把1/0/1口设置成外网口192.168.100.123
把1/0/6口设置成外网口172.16.100.1 /24
把1/0/21口设置成外网口172.16.50.1 /24
对应安全区加入到对应区域了,现在需要PC2与PC3互通,经如下设置后,从172.16.50.5上能ping 通172.16.100.1,但是无法ping通172.16.100.5,是实际电脑配的,PC上都配置了对应网关,也开启了ping ,排除网关和电脑问题。同网段内测试能ping。
配置如下:
[H3C]dis curr
#
version 7.1.064, Release 8860P28
#
clock protocol none
#
context Admin id 1
#
telnet server enable
#
irf mac-address persistent timer
irf auto-update enable
undo irf link-delay
irf member 1 priority 1
#
dhcp enable
#
dns server 8.8.8.8
dns server 114.114.114.114
#
vlan 1
#
dhcp server ip-pool pool50
gateway-list 172.16.50.1
network 172.16.50.0 mask 255.255.255.0
dns-list 192.168.100.1 8.8.8.8
#
dhcp server ip-pool pool100
gateway-list 172.16.100.1
network 172.16.100.0 mask 255.255.255.0
dns-list 8.8.8.8 192.168.100.1
#
interface NULL0
#
interface GigabitEthernet1/0/0
port link-mode route
#
interface GigabitEthernet1/0/1
port link-mode route
description GuideWan Interface
bandwidth 10000000
ip address 192.168.100.123 255.255.255.0
dns server 192.168.100.1
manage ping inbound
manage ping outbound
gateway 192.168.100.1
#
interface GigabitEthernet1/0/2 ~1/0/5
port link-mode route
#
interface GigabitEthernet1/0/6
port link-mode route
description GuideLan Interface
ip address 172.16.100.1 255.255.255.0
manage ping inbound
manage ping outbound
gateway 172.16.100.1
#
interface GigabitEthernet1/0/7 ~1/0/20
port link-mode route
#
#
interface GigabitEthernet1/0/21
port link-mode route
ip address 172.16.50.1 255.255.255.0
manage ping inbound
manage ping outbound
gateway 172.16.50.1
#
interface GigabitEthernet1/0/22
port link-mode route
combo enable fiber
#
interface GigabitEthernet1/0/23
port link-mode route
combo enable fiber
#
interface GigabitEthernet1/0/24
port link-mode route
combo enable fiber
#
interface M-GigabitEthernet1/0/0
ip address 192.168.0.1 255.255.255.0
#
interface M-GigabitEthernet1/0/1
ip address 192.168.1.1 255.255.255.0
#
interface Ten-GigabitEthernet1/0/30
port link-mode route
#
interface Ten-GigabitEthernet1/0/31
port link-mode route
#
security-zone name Local
#
security-zone name Trust
import interface GigabitEthernet1/0/6
import interface GigabitEthernet1/0/21
#
security-zone name DMZ
#
security-zone name Untrust
import interface GigabitEthernet1/0/1
#
security-zone name Management
import interface M-GigabitEthernet1/0/0
import interface M-GigabitEthernet1/0/1
#
scheduler logfile size 16
#
line class aux
user-role network-operator
#
line class console
authentication-mode scheme
user-role network-admin
#
line class vty
user-role network-operator
#
line aux 0
user-role network-admin
#
line con 0
user-role network-admin
#
line vty 0 63
authentication-mode scheme
user-role network-admin
#
ip route-static 0.0.0.0 0 192.168.100.1
#
performance-management
#
arp ip-conflict log prompt
#
domain system
#
domain default enable system
#
l2tp-group 1 mode lns
allow l2tp virtual-template 1
undo tunnel authentication
tunnel name LNS
#
nat global-policy
rule name GlobalPolicyRule_1
description GuideNat
source-zone Trust
destination-zone Untrust
action snat easy-ip
rule name GlobalPolicyRule_4
source-zone Trust
destination-zone Trust
source-ip subnet 172.16.10.0 24
source-ip subnet 172.16.50.0 24
destination-ip subnet 172.16.50.0 24
destination-ip subnet 172.16.100.0 24
action snat no-nat
#
loadbalance isp file sda0:/lbispinfo_v1.5.tp
#
traffic-policy
rule 1 name GuideAVCPolicy
action qos profile guideavcprofile1
source-zone Trust
destination-zone DMZ
destination-zone Untrust
profile name guideavcprofile1
bandwidth downstream guaranteed 10000000
bandwidth downstream maximum 10000000
#
security-policy ip
rule 0 name GuideSecPolicy
action pass
source-zone Trust
destination-zone Untrust
destination-zone DMZ
rule 1 name DHCP
action pass
source-zone Local
source-zone Trust
source-zone Untrust
destination-zone Local
destination-zone Trust
destination-zone Untrust
service dhcp-server
service dhcp-client
service dhcp-relay
rule 3 name LO //测试不灵
action pass
source-zone Local
destination-zone Trust
rule 4 name 222222 //测试不灵
action pass
source-zone Trust
source-zone Untrust
destination-zone Untrust
destination-zone Trust
#
cloud-management server domain opstunnel-seccloud.h3c.com
#
return
(0)
最佳答案
网关设置成防火墙的接口地址,放通安全策略就可以互通了
(0)
安全区域都是trust 同一个的。 网关设置的也是防火墙接口地址,能ping 通对端防火墙出口地址,但是到不了下端PC
同一个安全域默认也是拒绝的
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
同一个安全域默认也是拒绝的