大家好!F-1000-S-AI防火墙,能不能指定某个IP段用电信的网上网?,现在这个配置,大家上网都是用的移动的网上的。
F-1000-S-AI防火墙配置如下:
#
version 5.20, Release 3732
#
sysname F-1000
#
undo voice vlan mac-address 00e0-bb00-0000
#
domain default enable system
#
undo alg dns
undo alg rtsp
undo alg h323
undo alg sip
undo alg sqlnet
undo alg pptp
undo alg ils
undo alg nbt
undo alg msn
undo alg qq
undo alg tftp
undo alg sccp
undo alg gtp
#
session synchronization enable
#
undo password-recovery enable
#
blacklist enable
#
time-range moring 08:15 to 12:00 working-day Sat
time-range workingx 13:30 to 17:45 working-day Sat
#
acl number 2000
rule 0 permit source 192.168.8.44 0
acl number 2002
rule 0 permit source 192.168.19.0 0.0.0.255
acl number 2005
description deny wan
rule 10 deny source 192.168.21.0 0.0.0.255
#
vlan 1
#
vlan 1000
#
domain system
access-limit disable
state active
idle-cut disable
self-service-url disable
#
pki domain default
crl check disable
#
traffic classifier classifier_1 operator and
if-match acl 2002
traffic classifier test operator and
if-match acl 2002
#
traffic behavior behavior_1
#
policy-based-route test1 permit node 2
if-match acl 2002
apply ip-precedence network
apply output-interface GigabitEthernet0/3
apply ip-address next-hop 183.64.3.1
apply default output-interface GigabitEthernet0/1
apply ip-address default next-hop 183.183.2.1
#
user-group system
group-attribute allow-guest
#
local-user ghjtc
password cipher $c$3$JCtHMAN2XMwa2pj++IaE39Ij/iJB4nOnciFgmMRw
authorization-attribute level 3
service-type ssh telnet terminal
service-type web
local-user h3c
password cipher $c$3$KFx1SuW7wDdRpJp5aWSDVaKdLfLgP3v+G9aeBC1u
authorization-attribute level 3
service-type ssh telnet terminal
service-type web
local-user zcxxk
password cipher $c$3$Xj79xAOpW7knRREhPLnJwRtztkukA/3x
service-type ssh telnet
#
interface NULL0
#
interface LoopBack0
#
interface Vlan-interface1000
ip address 172.168.10.254 255.255.255.0
#
interface GigabitEthernet0/0
port link-mode route
ip address 192.168.0.1 255.255.255.0
#
interface GigabitEthernet0/1
port link-mode route
description TO-yidongchukou
nat outbound 2005
nat outbound 2000
nat server protocol tcp global 183.183.2.2 443 inside 10.0.0.77 443
nat server protocol tcp global 183.183.2.2 4430 inside 10.0.0.77 4430
nat server protocol tcp global 183.183.2.2 8080 inside 10.0.0.99 8080
nat server 1 protocol udp global current-interface 500 inside 10.0.0.222 500
nat server 2 protocol udp global current-interface 4500 inside 10.0.0.222 4500
nat server 3 protocol tcp global current-interface 10443 inside 10.0.0.222 443
nat server 4 protocol tcp global current-interface 2222 inside 10.0.0.222 2222
nat server protocol tcp global 183.183.2.2 9090 inside 10.0.0.66 9090
nat server protocol tcp global 183.183.2.2 9080 inside 10.0.0.66 9080
nat server protocol tcp global 183.183.2.2 60080 inside 10.0.0.67 www
ip address 183.183.2.2 255.255.255.0
#
interface GigabitEthernet0/2
port link-mode route
description TO-S7506e
ip address 100.100.100.2 255.255.255.0
#
interface GigabitEthernet0/3
port link-mode route
description TO-dianxinchukou
nat outbound 2005
nat outbound 2000
nat server protocol tcp global 183.64.3.3 4430 inside 10.0.0.77 4430
nat server protocol tcp global 183.64.3.3 8080 inside 10.0.0.99 8080
nat server protocol tcp global 183.64.3.3 443 inside 10.0.0.77 443
nat server protocol tcp global 183.64.3.3 5000 inside 10.0.0.99 8080
nat server protocol tcp global 183.64.3.3 9090 inside 10.0.0.66 9090
nat server protocol tcp global 183.64.3.3 9080 inside 10.0.0.66 9080
ip address 183.64.3.3 255.255.255.248
#
interface GigabitEthernet0/4
port link-mode route
#
interface GigabitEthernet0/5
port link-mode route
#
interface GigabitEthernet0/6
port link-mode route
#
interface GigabitEthernet0/7
port link-mode route
#
interface GigabitEthernet0/8
port link-mode route
#
interface GigabitEthernet0/9
port link-mode route
#
interface GigabitEthernet0/10
port link-mode route
#
interface GigabitEthernet0/11
port link-mode route
#
nqa entry admin test1
type icmp-echo
destination ip 183.183.2.1
frequency 100
history-record enable
next-hop 183.183.2.1
reaction 1 checked-element probe-fail threshold-type consecutive 5 action-type trigger-only
#
vd Root id 1
#
zone name Management id 0
priority 100
import interface GigabitEthernet0/0
zone name Local id 1
priority 100
zone name Trust id 2
priority 85
import interface GigabitEthernet0/2
zone name DMZ id 3
priority 50
zone name Untrust id 4
priority 5
import interface GigabitEthernet0/1
import interface GigabitEthernet0/3
switchto vd Root
object network subnet 192.168.14.90/255.255.255.0
subnet 192.168.14.90 255.255.255.0
zone name Management id 0
ip virtual-reassembly
zone name Local id 1
ip virtual-reassembly
zone name Trust id 2
ip virtual-reassembly
zone name DMZ id 3
ip virtual-reassembly
zone name Untrust id 4
ip virtual-reassembly
interzone source Management destination Management
interzone source Local destination Trust
rule 0 permit
source-ip any_address
destination-ip any_address
service any_service
rule enable
interzone source Trust destination Untrust
rule 0 permit
source-ip any_address
destination-ip any_address
service any_service
rule enable
interzone source Untrust destination Trust
rule 0 permit
source-ip any_address
destination-ip any_address
service any_service
rule enable
#
ip ip-prefix test index 10 permit 192.168.19.0 24
#
ip route-static 0.0.0.0 0.0.0.0 183.183.2.1 track 1
ip route-static 0.0.0.0 0.0.0.0 183.64.3.1 preference 70
ip route-static 10.0.0.0 255.255.255.0 100.100.100.1
ip route-static 192.168.2.0 255.255.255.0 100.100.100.1
ip route-static 192.168.3.0 255.255.255.0 100.100.100.1
ip route-static 192.168.4.0 255.255.255.0 100.100.100.1
ip route-static 192.168.5.0 255.255.255.0 100.100.100.1
ip route-static 192.168.6.0 255.255.255.0 100.100.100.1
ip route-static 192.168.7.0 255.255.255.0 100.100.100.1
ip route-static 192.168.8.0 255.255.255.0 100.100.100.1
ip route-static 192.168.9.0 255.255.255.0 100.100.100.1
ip route-static 192.168.10.0 255.255.255.0 100.100.100.1
ip route-static 192.168.11.0 255.255.255.0 100.100.100.1
ip route-static 192.168.12.0 255.255.255.0 100.100.100.1
ip route-static 192.168.13.0 255.255.255.0 100.100.100.1
ip route-static 192.168.14.0 255.255.255.0 100.100.100.1
ip route-static 192.168.15.0 255.255.255.0 100.100.100.1
ip route-static 192.168.16.0 255.255.255.0 100.100.100.1
ip route-static 192.168.17.0 255.255.255.0 100.100.100.1
ip route-static 192.168.18.0 255.255.255.0 100.100.100.1
ip route-static 192.168.19.0 255.255.255.0 100.100.100.1
ip route-static 192.168.20.0 255.255.255.0 100.100.100.1
ip route-static 192.168.21.0 255.255.255.0 100.100.100.1
ip route-static 192.168.50.0 255.255.255.0 100.100.100.1
#
track 1 nqa entry admin test1 reaction 1
#
nqa schedule admin test1 start-time now lifetime forever
#
ssh server enable
#
ip https port 4321
#
load xml-configuration
#
load tr069-configuration
#
user-interface con 0
authentication-mode scheme
user-interface vty 0 4
authentication-mode scheme
protocol inbound ssh
#
return
(0)
最佳答案
可以的,做PBR来实现,给你个配置过程案例:
policy-based-route p1 permit node 1
if-match acl 2000
apply default-next-hop 1.1.1.1 /第一条专线的下一跳/
policy-based-route p1 permit node 2
if-match acl 2001
apply default-next-hop 2.1.1.1 /第二条专线的下一跳/
acl number 2000
rule 1 permit source 172.16.1.0 0.0.0.255
rule 100 deny
acl number 2001
rule 1 permit source 200.198.253.0 0.0.0.255
rule 2 deny
interface GigabitEthernet0/0
ip policy-based-route p1
然后再设置两条线路的缺省路由
ip route-static 0.0.0.0 0.0.0.0 xxxx
ip route-static 0.0.0.0 0.0.0.0 xxxx
(0)
可以配置下策略路由,参考一下下面的配置
(1) 配置Router A
# 配置接口GigabitEthernet1/0/2和GigabitEthernet1/0/3的IP地址。
<RouterA> system-view
[RouterA] interface gigabitethernet 1/0/2
[RouterA-GigabitEthernet1/0/2] ip address 4.1.1.1 24
[RouterA-GigabitEthernet1/0/2] quit
[RouterA] interface gigabitethernet 1/0/3
[RouterA-GigabitEthernet1/0/3] ip address 5.1.1.1 24
[RouterA-GigabitEthernet1/0/3] quit
# 定义访问控制列表ACL 2000,用来匹配源地址为192.168.10.2的报文。
[RouterA] acl basic 2000
[RouterA-acl-ipv4-basic-2000] rule 10 permit source 192.168.10.2 0
[RouterA-acl-ipv4-basic-2000] quit
# 定义访问控制列表ACL 2001,用来匹配源地址为192.168.10.2的报文。
[RouterA] acl basic 2001
[RouterA-acl-ipv4-basic-2001] rule 10 permit source 192.168.10.3 0
[RouterA-acl-ipv4-basic-2001] quit
# 定义0号节点,指定所有源地址为192.168.10.2的报文的下一跳为4.1.1.2。
[RouterA] policy-based-route aaa permit node 0
[RouterA-pbr-aaa-0] if-match acl 2000
[RouterA-pbr-aaa-0] apply output-interface dialer 1
[RouterA-pbr-aaa-0] quit
[RouterA] policy-based-route aaa permit node 1
[RouterA-pbr-aaa-1] if-match acl 2001
[RouterA-pbr-aaa-1] apply output-interface dialer 2
[RouterA-pbr-aaa-1] quit
# 在防火墙内网口上应用转发策略路由,处理此接口接收的报文。
[RouterA] interface Vlan-interface 1
[RouterA-GigabitEthernet1/0/1] ip address 192.168.10.1 24
[RouterA-GigabitEthernet1/0/1] ip policy-based-route aaa
[RouterA-GigabitEthernet1/0/1] quit
(0)
好的,我试下,感谢
可以配置下策略路由,参考一下下面的配置 (1) 配置Router A # 配置接口GigabitEthernet1/0/2和GigabitEthernet1/0/3的IP地址,作为两个出口 <RouterA> system-view [RouterA] interface gigabitethernet 1/0/2 [RouterA-GigabitEthernet1/0/2] ip address 4.1.1.1 24 [RouterA-GigabitEthernet1/0/2] quit [RouterA] interface gigabitethernet 1/0/3 [RouterA-GigabitEthernet1/0/3] ip address 5.1.1.1 24 [RouterA-GigabitEthernet1/0/3] quit # 定义访问控制列表ACL 2000,用来匹配源地址为192.168.10.2的报文。 [RouterA] acl basic 2000 [RouterA-acl-ipv4-basic-2000] rule 10 permit source 192.168.10.2 0 [RouterA-acl-ipv4-basic-2000] quit # 定义访问控制列表ACL 2001,用来匹配源地址为192.168.10.3的报文。 [RouterA] acl basic 2001 [RouterA-acl-ipv4-basic-2001] rule 10 permit source 192.168.10.3 0 [RouterA-acl-ipv4-basic-2001] quit # 定义0号节点,指定所有源地址为192.168.10.2的报文的下一跳为4.1.1.2。 [RouterA] policy-based-route aaa permit node 0 [RouterA-pbr-aaa-0] if-match acl 2000 [RouterA-pbr-aaa-0] apply next-hop 4.1.1.2 [RouterA-pbr-aaa-0] quit # 定义1号节点,指定所有源地址为192.168.10.3的报文的下一跳为5.1.1.2。 [RouterA] policy-based-route aaa permit node 1 [RouterA-pbr-aaa-1] if-match acl 2001 [RouterA-pbr-aaa-1] apply next-hop 5.1.1.2 [RouterA-pbr-aaa-1] quit # 在防火墙内网口上应用转发策略路由,处理此接口接收的报文。 [RouterA] interface Vlan-interface 1 [RouterA-GigabitEthernet1/0/1] ip address 192.168.10.1 24 [RouterA-GigabitEthernet1/0/1] ip policy-based-route aaa [RouterA-GigabitEthernet1/0/1] quit
如果移动电信是那种固定的ip地址,以太网那种,做策略路由时指定下一跳地址,如果是PPPOE拨号这种,可以写出接口
好的,我试下,感谢
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明