实验需求:
如图所示,PC1为公司内部网络设备,AR1为出口设备,在FW1和FW2上配置双机热备,当网络正常时PC1访问AR1路径为FW1-AR1,当FW1出现故障后,切换路径为FW2-AR1。
实现目的:
了解防火墙双机热备的配置
实验步骤:
1、配置ip地址
FW1:
interface GigabitEthernet1/0/1
ip address 10.1.100.1 255.255.255.0
interface GigabitEthernet1/0/0
ip address 100.1.1.1 255.255.255.0
interface GigabitEthernet1/0/2
ip address 12.1.1.1 255.255.255.0
FW2:
interface GigabitEthernet1/0/1
ip address 10.1.100.2 255.255.255.0
interface GigabitEthernet1/0/0
ip address 100.1.1.2 255.255.255.0
interface GigabitEthernet1/0/2
ip address 12.1.1.2 255.255.255.0
AR1:
interface GigabitEthernet0/0/0
ip address 100.1.1.3 255.255.255.0
interface LoopBack0
ip address 1.1.1.1 255.255.255.255
2、将接口加入安全区域
FW1:
firewall zone trust
add interface GigabitEthernet1/0/1
firewall zone untrust
add interface GigabitEthernet1/0/0
firewall zone dmz
add interface GigabitEthernet1/0/2
FW2:
firewall zone trust
add interface GigabitEthernet1/0/1
firewall zone untrust
add interface GigabitEthernet1/0/0
firewall zone dmz
add interface GigabitEthernet1/0/2
3、配置静态路由,实现AR1和PC的互通。
FW1:
ip route-static 1.1.1.1 32 100.1.1.3
FW2:
ip route-static 1.1.1.1 32 100.1.1.3
AR1:
IP route-static 10.1.100.0 24 100.1.1.254 //AR1访问内部PC的下一跳为vrrp vrid2的虚拟ip
4、配置VRRP,将FW1设置为主设备,FW2设置为备用设备。
FW1:
interface GigabitEthernet1/0/1
vrrp vrid 1 virtual-ip 10.1.100.254 active
interface GigabitEthernet1/0/0
vrrp vrid 2 virtual-ip 100.1.1.254 active
FW2:
interface GigabitEthernet1/0/1
vrrp vrid 1 virtual-ip 10.1.100.254 standby
interface GigabitEthernet1/0/0
vrrp vrid 2 virtual-ip 100.1.1.254 standby
4、配置安全策略,允许心跳接口之间交互HRP报文。
FW1:
security-policy
rule name local_dmz
source-zone dmz
source-zone local
destination-zone dmz
destination-zone local
service protocol udp destination-port 18514 //放行hrp报文,目的端口为udp 18514
action permit
FW2:
security-policy
rule name local_dmz
source-zone dmz
source-zone local
destination-zone dmz
destination-zone local
service protocol udp destination-port 18514
action permit
5、配置HRP(配置HRP的目的是为了实现主设备故障后,备用设备能够平滑接替主设备的工作)
FW1:
hrp interface G1/0/2 remote 12.1.1.2
hrp enable
FW2:
hrp interface g1/0/2 remote 12.1.1.1
hrp enable
在FW1上查看HRP的状态:
HRP_M[FW1]display hrp state
Role: active, peer: standby //此处表示本设备状态为主,邻居为备用设备
Running priority: 45000, peer: 45000
Backup channel usage: 0.00%
Stable time: 0 days, 0 hours, 6 minutes
Last state change information: 2023-03-28 7:13:26 HRP link changes to up.
查看FW1的VRRP状态。
HRP_M[FW1]display vrrp brief
2023-03-28 07:23:32.950
Total:2 Master:2 Backup:0 Non-active:0
VRID State Interface Type Virtual IP
----------------------------------------------------------------
1 Master GE1/0/1 Vgmp 10.1.100.254
2 Master GE1/0/0 Vgmp 100.1.1.254
通过以上输出,可知FW1的上下行接口都为vrrp的主设备。
6、配置放行PC访问AR1流量的安全策略
FW1:
security-policy
rule name trust_untrust
source-zone trust
destination-zone untrust
action permit
在FW1上配置了安全策略,设备会自动通过HRP将对应的安全策略配置同步到备用设备上。
在FW2查看设备的安全策略:
HRP_S[FW2]display security-policy rule name trust_untrust
2023-03-28 07:25:17.240
(0 times matched)
rule name trust_untrust
source-zone trust
destination-zone untrust
action permit
通过以上输出,可以得知FW2通过HRP自动备份了FW1的安全策略。
7、测试(使用PC1访问AR1的环回口)
查看FW1的会话表:
HRP_M[FW1]display firewall session table
2023-03-28 07:26:30.340
Current Total Sessions : 8
icmp VPN: public --> public 10.1.100.100:20121 --> 1.1.1.1:2048
udp VPN: public --> public 12.1.1.2:16384 --> 12.1.1.1:18514
udp VPN: public --> public 12.1.1.1:49152 --> 12.1.1.2:18514
icmp VPN: public --> public 10.1.100.100:19353 --> 1.1.1.1:2048
icmp VPN: public --> public 10.1.100.100:20377 --> 1.1.1.1:2048
icmp VPN: public --> public 10.1.100.100:19609 --> 1.1.1.1:2048
icmp VPN: public --> public 10.1.100.100:19865 --> 1.1.1.1:2048
udp VPN: public --> public 12.1.1.2:49152 --> 12.1.1.1:18514
流量通过FW1访问AR1,产生了ICMP的会话表项。
查看FW2的会话表:
HRP_S[FW2]display firewall session table
2023-03-28 07:27:29.090
Current Total Sessions : 8
icmp VPN: public --> public Remote 10.1.100.100:40089 --> 1.1.1.1:2048
udp VPN: public --> public 12.1.1.1:16384 --> 12.1.1.2:18514
udp VPN: public --> public 12.1.1.1:49152 --> 12.1.1.2:18514
icmp VPN: public --> public Remote 10.1.100.100:39833 --> 1.1.1.1:2048
icmp VPN: public --> public Remote 10.1.100.100:40857 --> 1.1.1.1:2048
icmp VPN: public --> public Remote 10.1.100.100:40601 --> 1.1.1.1:2048
icmp VPN: public --> public Remote 10.1.100.100:41113 --> 1.1.1.1:2048
udp VPN: public --> public 12.1.1.2:49152 --> 12.1.1.1:18514
流量并不会经过FW2,但是FW2可以通过HRP备份会话表项信息,来实现主备的平滑切换。
需要更多项目使用或数通考试题目的 ,点赞+私 ,找鹏哥领取资料!!