在eNSP软件中,进行如下操作搭建拓扑:
设备选取与放置:
从设备库拖出1台预启动路由器(R)放于左上角;
1台交换机(LSW1)置于中部偏左,用于连接内网客户端;
1台防火墙(FW1)在交换机右侧,作为网络安全隔离核心;
2台路由器(R2、R3),R3在右上角连接电信网络部分,R2在右中部连接联通网络部分;
6台PC,分别为Client1、Client2、电信DNS模拟机、联通DNS模拟机、百度web - 1模拟机、百度web - 2模拟机,按对应关系连接到交换机或路由器接口。
设备连接:
Client1的Ethernet0/0/0连交换机LSW1的Ethernet0/0/2;
Client2的Ethernet0/0/0连交换机LSW1的Ethernet0/0/3;
交换机LSW1的GE1/0/0连防火墙FW1的GE1/0/0;
防火墙FW1的GE1/0/1连路由器R3的GE0/0/0,GE1/0/2连路由器R2的GE0/0/0,GE0/0/1连Cloud1;
路由器R3的GE0/0/1连电信DNS模拟机的Ethernet0/0/0,GE0/0/2连百度web - 1模拟机的Ethernet0/0/0;
路由器R2的GE0/0/1连联通DNS模拟机的Ethernet0/0/0,GE0/0/2连百度web - 2模拟机的Ethernet0/0/0。
system - view
vlan 10
interface Ethernet0/0/2
port link - type access
port default vlan 10
quit
interface Ethernet0/0/3
port link - type access
port default vlan 10
quit
interface GigabitEthernet1/0/0
port link - type trunk
port trunk allow - pass vlan 10
quit
interface Vlanif10
ip address 192.168.1.254 255.255.255.0
quit
system - view
interface GigabitEthernet1/0/0
ip address 192.168.1.253 255.255.255.0
quit
interface GigabitEthernet1/0/1
ip address 13.0.0.1 255.255.255.0
quit
interface GigabitEthernet1/0/2
ip address 12.0.0.1 255.255.255.0
quit
firewall zone trust
add interface GigabitEthernet1/0/0
quit
firewall zone untrust
add interface GigabitEthernet1/0/1
add interface GigabitEthernet1/0/2
quit
security - policy
rule name trust_to_untrust
source - zone trust
destination - zone untrust
source - address 192.168.1.0 0.0.0.255
action permit
quit
nat address - group 1
address 13.0.0.10 13.0.0.20
quit
acl number 2000
rule 5 permit source 192.168.1.0 0.0.0.255
quit
nat outbound 2000 address - group 1
system - view
interface GigabitEthernet0/0/0
ip address 13.0.0.2 255.255.255.0
quit
interface GigabitEthernet0/0/1
ip address 110.1.1.2 255.255.255.0
quit
interface GigabitEthernet0/0/2
ip address 110.1.1.2 255.255.255.0
quit
ip route - static 110.1.1.0 255.255.255.0 GigabitEthernet0/0/2
ip route - static 100.1.1.0 255.255.255.0 GigabitEthernet0/0/1
system - view
interface GigabitEthernet0/0/0
ip address 12.0.0.2 255.255.255.0
quit
interface GigabitEthernet0/0/1
ip address 280.1.1.2 255.255.255.0
quit
interface GigabitEthernet0/0/2
ip address 210.1.1.2 255.255.255.0
quit
ip route - static 210.1.1.0 255.255.255.0 GigabitEthernet0/0/2
ip route - static 280.1.1.0 255.255.255.0 GigabitEthernet0/0/1
interface GigabitEthernet1/0/1
nat server protocol tcp global current - interface 8080 inside 192.168.1.2 80
quit
acl number 3000
rule 5 permit ip source 192.168.1.1 0 destination 110.1.1.1 0
rule 10 deny ip source 192.168.1.1 0 destination 280.1.1.1 0
quit
security - policy
rule name acl_test
source - zone trust
destination - zone untrust
source - address 192.168.1.1 0
destination - address 110.1.1.1 0 280.1.1.1 0
action permit
rule - name - reference acl 3000
quit
acl number 2001
rule 5 permit source 192.168.1.0 0.0.0.255
quit
traffic - statistic enable
interface GigabitEthernet1/0/1
traffic - statistic inbound acl 2001
traffic - statistic outbound acl 2001
quit
acl number 3001
rule 5 deny url - category 1001 destination - zone untrust
quit
security - policy
rule name app_filter
source - zone trust
destination - zone untrust
source - address 192.168.1.0 0.0.0.255
action deny
rule - name - reference acl 3001
quit
ips - policy name my_ips_policy
rule 1001 signature - id 1000001 action block
quit
security - policy
rule name ips_protection
source - zone trust
destination - zone untrust
source - address 192.168.1.0 0.0.0.255
action permit
ips - policy my_ips_policy
quit
qos car - outbound interface GigabitEthernet1/0/1 cir 1024000 cbs 1024000
qos car - outbound interface GigabitEthernet1/0/2 cir 1024000 cbs 1024000
交换机LSW1:
acl number 3002
rule 5 permit tcp destination - port range 5000 5010
quit
qos car - inbound acl 3002 cir 512000 cbs 512000 priority 7
防火墙FW1:
acl number 3003
rule 5 permit tcp destination - port range 5000 5010
quit
qos car - inbound acl 3003 cir 512000 cbs 512000 priority 7
ike proposal 10
encryption - algorithm aes - 256
authentication - algorithm sha2 - 256
dh group14
authentication - method pre - shared - key
integrity - algorithm hmac - sha2 - 256
prf hmac - sha2 - 256
quit
ike peer my_ike_peer
exchange - mode main
pre - shared - key cipher mypassword
ike - proposal 10
remote - address 200.200.200.200
quit
ipsec proposal my_ipsec_proposal
encapsulation - mode tunnel
transform - protocol esp
esp encryption - algorithm aes - 256
esp authentication - algorithm sha2 - 256
quit
ipsec policy my_ipsec_policy 10 isakmp
security acl 3004
ike - peer my_ike_peer
proposal my_ipsec_proposal
quit
acl number 3004
rule 5 permit ip source 192.168.1.0 0.0.0.255 destination 10.0.0.0 0.0.0.255
quit
interface GigabitEthernet1/0/1
ipsec policy my_ipsec_policy
quit
info - center enable
info - center loghost 192.168.1.250
info - center source default channel 1 log level warning