首页 > 其他分享 >双出口网络

双出口网络

时间:2024-10-23 17:49:55浏览次数:6  
标签:admin ip GigabitEthernet0 网络 出口 default user interface

1、网络拓扑图

双出口网络_sed

2、核心配置

1)定义感应兴趣流

acl number 3000  

rule 5 permit ip source 192.168.1.0 0.0.0.255  

acl number 3001  

rule 5 permit ip source 192.168.2.0 0.0.0.255 

2)流分类

traffic classifier c2 operator or

if-match acl 3001

traffic classifier c1 operator or

if-match acl 3000

3)流行为

traffic behavior b2

redirect ip-nexthop 200.1.1.1

traffic behavior b1

redirect ip-nexthop 100.1.1.1

4)流策略

traffic policy p1

classifier c1 behavior b1

classifier c2 behavior b2

5)接口应用

interface GigabitEthernet0/0/0

ip address 100.1.1.2 255.255.255.0  

nat outbound 2000

3、详细配置

R4:

<r1>display current-configuration  

[V200R003C00]

#

sysname r1

#

snmp-agent local-engineid 800007DB03000000000000

snmp-agent  

#

clock timezone China-Standard-Time minus 08:00:00

#

portal local-server load portalpage.zip

#

drop illegal-mac alarm

#

set cpu-usage threshold 80 restore 75

#

acl number 2000  

rule 5 permit  

acl number 2001  

rule 5 permit  

#

acl number 3000  

rule 5 permit ip source 192.168.1.0 0.0.0.255  

acl number 3001  

rule 5 permit ip source 192.168.2.0 0.0.0.255  

#

traffic classifier c2 operator or

if-match acl 3001

traffic classifier c1 operator or

if-match acl 3000

#

traffic behavior b2

redirect ip-nexthop 200.1.1.1

traffic behavior b1

redirect ip-nexthop 100.1.1.1

#

traffic policy p1

classifier c1 behavior b1

classifier c2 behavior b2

#

aaa  

authentication-scheme default

authorization-scheme default

accounting-scheme default

domain default  

domain default_admin  

local-user admin password cipher %$%$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$

local-user admin service-type http

#

firewall zone Local

priority 15

#

interface GigabitEthernet0/0/0

ip address 100.1.1.2 255.255.255.0  

nat outbound 2000

#

interface GigabitEthernet0/0/1

ip address 200.1.1.2 255.255.255.0  

nat outbound 2001

#

interface GigabitEthernet0/0/2

ip address 10.1.1.2 255.255.255.0  

traffic-policy p1 inbound

#

interface NULL0

#

ip route-static 0.0.0.0 0.0.0.0 100.1.1.1

ip route-static 0.0.0.0 0.0.0.0 200.1.1.1

ip route-static 192.168.1.0 255.255.255.0 10.1.1.1

ip route-static 192.168.2.0 255.255.255.0 10.1.1.1

#

user-interface con 0

authentication-mode password

user-interface vty 0 4

user-interface vty 16 20

#

wlan ac

#

return

<r1>

FW1:

[USG6000V1]display current-configuration  

2024-10-23 09:29:01.590  

!Software Version V500R005C10SPC300

#

sysname USG6000V1

#

l2tp domain suffix-separator @

#

ipsec sha2 compatible enable

#

undo telnet server enable

undo telnet ipv6 server enable

#

update schedule location-sdb weekly Sun 03:42

#

firewall defend action discard

#

banner enable

#

user-manage web-authentication security port 8887

undo privacy-statement english

undo privacy-statement chinese

page-setting

user-manage security version tlsv1.1 tlsv1.2

password-policy

level high

user-manage single-sign-on ad

user-manage single-sign-on tsm

user-manage single-sign-on radius

user-manage auto-sync online-user

#

web-manager security version tlsv1.1 tlsv1.2

web-manager enable

web-manager security enable

#

firewall dataplane to manageplane application-apperceive default-action drop

#

undo ips log merge enable

#

decoding uri-cache disable

#

update schedule ips-sdb daily 01:13

update schedule av-sdb daily 01:13

update schedule sa-sdb daily 01:13

update schedule cnc daily 01:13

update schedule file-reputation daily 01:13

#

ip vpn-instance default

ipv4-family

#

time-range worktime

 period-range 08:00:00 to 18:00:00 working-day

#

ike proposal default

encryption-algorithm aes-256 aes-192 aes-128

dh group14

authentication-algorithm sha2-512 sha2-384 sha2-256

authentication-method pre-share

integrity-algorithm hmac-sha2-256

prf hmac-sha2-256

#

aaa

authentication-scheme default

authentication-scheme admin_local

authentication-scheme admin_radius_local

authentication-scheme admin_hwtacacs_local

authentication-scheme admin_ad_local

authentication-scheme admin_ldap_local

authentication-scheme admin_radius

authentication-scheme admin_hwtacacs

authentication-scheme admin_ad

authorization-scheme default

accounting-scheme default

domain default

 service-type internetaccess ssl-vpn l2tp ike

 internet-access mode password

 reference user current-domain

manager-user audit-admin

 password cipher @%@%afIVP2\$W$1y@3HkgM#WZSZ#K52'6U9M!M$>1:AO)Ys:SZ&Z@%@%

 service-type web terminal

 level 15


manager-user api-admin

 password cipher @%@%Ts-^M~V8'+^BCRWr214H\]Tvw1<':Q~D#2sz={~~o9PB]Ty\@%@%

 level 15


manager-user admin

 password cipher @%@%s*KmUfKtiF'*e%6rn<SBDwrO#,jJ)]WF/M)i4t6C't4,wrRD@%@%

 service-type web terminal

 level 15


role system-admin

role device-admin

role device-admin(monitor)

role audit-admin

bind manager-user audit-admin role audit-admin

bind manager-user admin role system-admin

#

l2tp-group default-lns

#

interface GigabitEthernet0/0/0

undo shutdown

ip address 192.168.3.2 255.255.255.0

alias GE0/METH

#

interface GigabitEthernet1/0/0

undo shutdown

ip address 10.1.1.1 255.255.255.0

#

interface GigabitEthernet1/0/1

undo shutdown

#

interface GigabitEthernet1/0/2

undo shutdown

#

interface GigabitEthernet1/0/3

undo shutdown

#

interface GigabitEthernet1/0/4

undo shutdown

#

interface GigabitEthernet1/0/5

undo shutdown

#

interface GigabitEthernet1/0/6

undo shutdown

#

interface Virtual-if0

#

interface NULL0

#

firewall zone local

set priority 100

#

firewall zone trust

set priority 85

add interface GigabitEthernet0/0/0

#

firewall zone untrust

set priority 5

add interface GigabitEthernet1/0/0

#

firewall zone dmz

set priority 50

#

ip route-static 0.0.0.0 0.0.0.0 10.1.1.2

ip route-static 192.168.1.0 255.255.255.0 192.168.3.1

ip route-static 192.168.2.0 255.255.255.0 192.168.3.1

#

undo ssh server compatible-ssh1x enable

ssh authentication-type default password

ssh server cipher aes256_ctr aes128_ctr

ssh server hmac sha2_256 sha1

ssh client cipher aes256_ctr aes128_ctr

ssh client hmac sha2_256 sha1

#

firewall detect ftp

#

user-interface con 0

authentication-mode aaa

idle-timeout 0 0

user-interface vty 0 4

authentication-mode aaa

protocol inbound ssh

user-interface vty 16 20

#

pki realm default

#

sa

#

location

#

multi-linkif

mode proportion-of-weight

#

right-manager server-group

#

device-classification

device-group pc

device-group mobile-terminal

device-group undefined-group

#

user-manage server-sync tsm

#

security-policy

rule name intoout

 source-zone trust

 destination-zone untrust

 service ftp

 service http

 service icmp

 service ssh

 service telnet

 service tftp

 action permit

rule name outtoin

 source-zone untrust

 destination-zone trust

 service ftp

 service http

 service https

 service icmp

 service ssh

 service telnet

 action permit

#

auth-policy

#

traffic-policy

#

policy-based-route

#

nat-policy

#

quota-policy

#

pcp-policy

#

dns-transparent-policy

#

rightm-policy

#

return

[USG6000V1]

SW1:

<sw1>display current-configuration  

#

sysname sw1

#

vlan batch 10 20 30

#

cluster enable

ntdp enable

ndp enable

#

drop illegal-mac alarm

#

diffserv domain default

#

drop-profile default

#

aaa

authentication-scheme default

authorization-scheme default

accounting-scheme default

domain default

domain default_admin

local-user admin password simple admin

local-user admin service-type http

#

interface Vlanif1

#

interface Vlanif10

ip address 192.168.1.1 255.255.255.0

#

interface Vlanif20

ip address 192.168.2.1 255.255.255.0

#

interface Vlanif30

ip address 192.168.3.1 255.255.255.0

#

interface MEth0/0/1

#

interface GigabitEthernet0/0/1

port link-type access

port default vlan 30

#

interface GigabitEthernet0/0/2

port link-type access

port default vlan 10

#

interface GigabitEthernet0/0/3

port link-type access

port default vlan 20

#

interface GigabitEthernet0/0/4

#

interface GigabitEthernet0/0/5

#

interface GigabitEthernet0/0/6

#

interface GigabitEthernet0/0/7

#

interface GigabitEthernet0/0/8

#

interface GigabitEthernet0/0/9

#

interface GigabitEthernet0/0/10

#

interface GigabitEthernet0/0/11

#

interface GigabitEthernet0/0/12

#

interface GigabitEthernet0/0/13

#

interface GigabitEthernet0/0/14

#

interface GigabitEthernet0/0/15

#

interface GigabitEthernet0/0/16

#

interface GigabitEthernet0/0/17

#

interface GigabitEthernet0/0/18

#

interface GigabitEthernet0/0/19

#

interface GigabitEthernet0/0/20

#

interface GigabitEthernet0/0/21

#

interface GigabitEthernet0/0/22

#

interface GigabitEthernet0/0/23

#

interface GigabitEthernet0/0/24

#

interface NULL0

#

ip route-static 0.0.0.0 0.0.0.0 192.168.3.2

#

user-interface con 0

user-interface vty 0 4

#

return

<sw1> 


标签:admin,ip,GigabitEthernet0,网络,出口,default,user,interface
From: https://blog.51cto.com/u_13560030/12340994

相关文章

  • 基于卷积神经网络的瓶盖状态识别系统,resnet50,mobilenet模型【pytorch框架+python源码
    更多目标检测和图像分类识别项目可看我主页其他文章功能演示:卷积神经网络,瓶盖状态识别系统,resnet50,mobilenet【pytorch框架,python】_哔哩哔哩_bilibili(一)简介基于卷积神经网络的瓶盖状态识别系统是在pytorch框架下实现的,这是一个完整的项目,包括代码,数据集,训练好的模型权重,......
  • 20222316 2024-2025-1 《网络与系统攻防技术》实验二实验报告
    一、实验内容1.学习总结——后门与免杀1)后门基本概念后门就是不经过正常认证流程而访问系统的通道。狭义后门:特指潜伏于操作系统中专门做后门的一个程序,“坏人”可以连接这个程序,远程执行各种指令。后面类型有编译器后门、操作系统后门、应用程序后门、潜伏于操作系统中或......
  • 20222324 石国力 《网络与系统攻防技术》 实验二
    1.实验内容(1)使用netcat获取主机操作Shell,cron启动某项任务(2)使用socat获取主机操作Shell,任务计划启动(3)使用MSFmeterpreter(或其他软件)生成可执行文件(后门),利用ncat或socat传送到主机并运行获取主机Shell(4)使用MSFmeterpreter(或其他软件)生成获取目标主机音频、摄像头、......
  • 网络通讯
    unity的请求类UnityWebRequest静态类创建(UnityWebRequest.Get())的Request是自带DownloadHandler和UploadHandler的而构造创建(newUnityWebRequest())是没有的,需要自己手动创建赋值,否则无法正常上传与接收数据异常情况.net实现服务器用于上传文件时,返回413错误提示上传文......
  • 网站漏扫:守护网络安全的关键防线
    网站loudong扫描,简称漏扫,是一种针对网站进行loudong检测的安全服务。网站loudong扫描在网络安全中占据着至关重要的地位。网站漏扫在及时发现和修复loudong方面发挥着关键作用通过对网站和系统的全面扫描,能够快速识别出各种潜在的loudong,如通过对网站和系统的全面扫描,能够快速识别......
  • 邮件安全网关厂商哪个好?靠谱邮件实力上榜中国网络安全行业全景册
    靠谱邮件依托在邮件云安全领域20余年的深耕,凭借丰富的邮件安全产品矩阵、持续的技术创新能力和专业的售后服务,实力上榜网络安全行业媒体FreeBuf发布的《CCSIP2023中国网络安全行业全景册》,受到行业的高度认可,成为企业认可选择的邮件网关厂商。据悉本次全景册由FreeBuf咨询顾......
  • 【上海普陀区】内向猫网络中大型手游项目招【cocos中高级程序员】15-20K
    一、你的日常1、玩转CocosCreator引擎,让你的手游客户端不仅会跑还能跳恰恰。编写那些让人看想玩的设计文档,然后用代码实现你的幽默感。2、你的代码就像段子手,质量高到让人捧腹,测试起来笑果十足。别忘了,优化代码就像减肥,得持续进行,让游戏跑得比兔子还快。3、开发或使用Cocos扩......
  • CDN内容分发网络
    认识CDN◼什么是CDN呢?CDN称之为内容分发网络(ContentDeliveryNetwork或ContentDistributionNetwork,缩写:CDN)CDN它是一组分布在不同地理位置的服务器相互连接形成的网络系统。通过这个网络系统,将Web内容存放在距离用户最近的服务器。可以更快、更可靠地将Web内......
  • 网站漏扫:守护网络安全的关键防线
    网站漏洞扫描,简称漏扫,是一种针对网站进行漏洞检测的安全服务。网站漏洞扫描在网络安全中占据着至关重要的地位。网站漏扫在及时发现和修复漏洞方面发挥着关键作用通过对网站和系统的全面扫描,能够快速识别出各种潜在的漏洞,如SQL注入、XSS跨站点脚本、上传漏洞等常见的WEB漏......
  • 20222310 2024-2025-1 《网络与系统攻防技术》实验三实验报告
    一、实验内容1.正确使用msf编码器,veil-evasion,自己利用shellcode编程等免杀工具或技巧(1)正确使用msf编码器,使用msfvenom生成如jar之类的其他文件(2)学会使用veil,加壳工具(3)能够使用C+shellcode编程2.通过组合应用各种技术实现恶意代码免杀成功实现了免杀的,简单语言描述原理,不......