我有一台U防火墙,开了两个虚拟防火墙,internet和vpn1 ,现在 10

wanghongs 2143

{{ttag.title}}
我有一台防火墙,开了两个虚拟防火墙,internet和vpn1 ,现在就是我想实现trust(VPN1)可以访问untrust (internet) ,怎么配置呢???

解决该疑问,预计可以帮助到 18122 人!

回帖即可获得
2S豆
,被楼主采纳即奖励20S豆+悬赏奖励10S豆+10分钟内回帖奖励10S豆 [已过期] ,了解更多S豆奖励信息

完善手机号和公司名称,让服务更省心更便捷!立即完善

多简单 发表于 2017-12-18 16:14
  
U防火墙数哪家的防火墙;

现在就是我想实现trust(VPN1)可以访问untrust --- 这个的意思是分支的用户通过总部去上网吗?
南瓜山吴彦祖 发表于 2017-12-18 16:59
  
给个逻辑拓扑看看
wanghongs 发表于 2017-12-18 17:31
  
网络设备实施包括出口防火墙USG5530、生产区核心交换机C4506E、DMZ接入交换机ZXR5952、容灾区接入交换机ZXR5952。两台USG5530硬件防火墙通过虚拟防火墙的形式模拟成4台防火墙。分别命名为Internet-1、Internet-2、VPN-1、VPN-2,其中Internet-1、Internet-2用于连接Internet出口和DMZ区域接入交换机,VPN-1、VPN-2用于连接社保核心路由器和生产区核心交换机。生产区与DMZ区实现逻辑隔离。两个隔离区域各运行OSPF区域0,交换路由信息。DMZ区域服务器的网关设置在DMZ接入交换机上,通过VRRP实现网关冗余。生产区及容灾区的业务网关设置在生产区核心交换机上通过HSRP实现网关冗余,在C4506-1、C4506-2、容灾区ZXR5952上通过MSTP实现链路冗余。


我现在主要是:VPN设备上短信认证,测试失败,显示连接网关失败,短信认证是用的WEBserver认证,短信网关的地址是电信外网IP,所以请教大家该怎么办呢

下面是防火墙的配置:
[QUZ-JYW-XXZX3F-H5500-FW002]
[QUZ-JYW-XXZX3F-H5500-FW002]dis cur
[QUZ-JYW-XXZX3F-H5500-FW002]dis current-configuration
10:29:20  2017/12/13
#
sysname QUZ-JYW-XXZX3F-H5500-FW002
#
l2tp domain suffix-separator @
#
info-center loghost source LoopBack0
info-center loghost 10.84.128.16 514 vpn-instance shebao
#
firewall packet-filter default permit interzone local trust direction inbound
firewall packet-filter default permit interzone local trust direction outbound
firewall packet-filter default permit interzone local untrust direction inbound
firewall packet-filter default permit interzone local untrust direction outbound
firewall packet-filter default permit interzone local dmz direction inbound
firewall packet-filter default permit interzone local dmz direction outbound
firewall packet-filter default permit interzone trust untrust direction inbound
firewall packet-filter default permit interzone trust untrust direction outbound
firewall packet-filter default permit interzone dmz untrust direction inbound
firewall packet-filter default permit interzone vpn-instance internet local trust direction inbound
firewall packet-filter default permit interzone vpn-instance internet local trust direction outbound
firewall packet-filter default permit interzone vpn-instance internet local untrust direction outbound
firewall packet-filter default permit interzone vpn-instance internet local dmz direction outbound
firewall packet-filter default permit interzone vpn-instance internet local zfwuntrust direction outbound
firewall packet-filter default permit interzone vpn-instance internet trust untrust direction outbound
firewall packet-filter default permit interzone vpn-instance internet trust zfwuntrust direction outbound
firewall packet-filter default permit interzone vpn-instance shebao local trust direction inbound
firewall packet-filter default permit interzone vpn-instance shebao local trust direction outbound
firewall packet-filter default permit interzone vpn-instance shebao local untrust direction outbound
firewall packet-filter default permit interzone vpn-instance shebao local dmz direction outbound
firewall packet-filter default permit interzone vpn-instance shebao local sslvpnuntrust direction inbound
firewall packet-filter default permit interzone vpn-instance shebao local sslvpnuntrust direction outbound
firewall packet-filter default permit interzone vpn-instance shebao trust untrust direction outbound
firewall packet-filter default permit interzone vpn-instance shebao trust sslvpnuntrust direction inbound
firewall packet-filter default permit interzone vpn-instance shebao trust sslvpnuntrust direction outbound
#
nat address-group 1 122.227.89.118 122.227.89.118
nat address-group 2 172.27.8.130 172.27.8.130
nat server 0 vpn-instance internet protocol tcp global 122.227.89.118 www inside 172.17.255.25 www vpn-instance internet
nat server 1 vpn-instance internet protocol tcp global 122.227.89.118 443 inside 172.17.255.25 443 vpn-instance internet
nat server 2 vpn-instance internet protocol tcp global 122.227.89.118 4430 inside 172.17.255.25 4430 vpn-instance internet
nat server 3 vpn-instance internet protocol tcp global 122.227.89.118 3389 inside 172.17.1.65 3389 vpn-instance internet
#
ip df-unreachables enable
#
ipv6
firewall ipv6 session link-state check
firewall ipv6 statistic system enable
#                                         
dns resolve
#
vrrp mode
#
vlan batch 1 5 51 to 52 59 95 to 96
#
undo firewall session link-state check tcp
undo firewall session link-state check icmp
#
#
firewall statistic system enable
#
undo dns proxy
#
license-server domain lic.huawei.com
#
web-manager enable
web-manager security enable port 1133
undo web-manager config-guide enable
#
user-manage web-authentication port 8888
#
ip vpn-instance internet                  
route-distinguisher 200:200
#
ip vpn-instance shebao
route-distinguisher 100:100
#
vlan 95
binding vpn-instance internet
#
acl number 3001
#
acl number 3002
rule 1 permit ip source 172.17.255.25 0
rule 2 permit ip destination 172.17.255.25 0
rule 3 permit tcp destination-port eq https
#
interface Vlanif51
description TO-FW001
ip binding vpn-instance shebao
ip address 10.84.255.6 255.255.255.252
#
interface Vlanif52
ip binding vpn-instance shebao
ip address 10.84.255.10 255.255.255.252  
ospf cost 65535
service-manage enable
service-manage ping permit
#
interface Vlanif95
description TO-FW001
ip binding vpn-instance internet
ip address 172.17.255.18 255.255.255.252
#
interface Vlanif96
ip binding vpn-instance internet
ip address 172.17.255.13 255.255.255.252
ospf cost 65535
#
interface Cellular0/1/0
link-protocol ppp
#
interface GigabitEthernet0/0/0
alias GE0/MGMT
ip address 192.168.0.1 255.255.255.0
dhcp select interface
dhcp server gateway-list 192.168.0.1
#                                         
interface GigabitEthernet0/0/1
description TO-QUZ-JYW-CORE-XXZX3F-C4506-SW002
portswitch
port link-type trunk
undo port trunk permit vlan 1
port trunk permit vlan 52
#
interface GigabitEthernet0/0/2
description TO-ZFW
ip binding vpn-instance internet
ip address 172.27.8.130 255.255.255.128
#
interface GigabitEthernet0/0/3
#
interface GigabitEthernet0/0/4
#
interface GigabitEthernet0/0/5
combo enable fiber
description To-CHINANET
ip binding vpn-instance internet
ip address 122.227.89.118 255.255.255.252
#
interface GigabitEthernet0/0/6            
combo enable fiber
description TO-QUZ-JYW-DMZ-XXZX3F-Z5952-SW005
portswitch
port link-type trunk
undo port trunk permit vlan 1
port trunk permit vlan 96
#
interface GigabitEthernet0/0/7
combo enable fiber
description TO-QUZ-JYW-XXZX3F-H5500-FW001
portswitch
port link-type trunk
undo port trunk permit vlan 1
port trunk permit vlan 51 95
#
interface GigabitEthernet0/0/8
combo enable fiber
description TO-RPVPN.QUZ.ZJ-G1/8
ip binding vpn-instance shebao
ip address 10.84.255.45 255.255.255.252
service-manage enable
service-manage http permit
service-manage https permit              
service-manage ping permit
service-manage telnet permit
#
interface NULL0
#
interface LoopBack0
ip binding vpn-instance shebao
ip address 10.84.255.249 255.255.255.255
#
interface LoopBack1
ip binding vpn-instance internet
ip address 172.17.255.252 255.255.255.255
#
firewall zone local
set priority 100
#
firewall zone trust
set priority 85
add interface GigabitEthernet0/0/0
#
firewall zone untrust
set priority 5
#                                         
firewall zone dmz
set priority 50
#
firewall zone vpn-instance internet local
set priority 100
#
firewall zone vpn-instance internet trust
set priority 85
add interface GigabitEthernet0/0/7
add interface Vlanif95
add interface Vlanif96
#
firewall zone vpn-instance internet untrust
set priority 5
add interface GigabitEthernet0/0/5
#
firewall zone vpn-instance internet dmz
set priority 50
#
firewall zone vpn-instance internet name zfwuntrust
set priority 20
add interface GigabitEthernet0/0/2
#                                         
firewall zone vpn-instance shebao local
set priority 100
#
firewall zone vpn-instance shebao trust
set priority 85
add interface Vlanif51
add interface Vlanif52
#
firewall zone vpn-instance shebao untrust
set priority 5
add interface GigabitEthernet0/0/8
#
firewall zone vpn-instance shebao dmz
set priority 50
#
firewall zone vpn-instance shebao name sslvpnuntrust
set priority 25
detect ftp
detect rtsp
detect mgcp
detect sip
detect pptp
detect sqlnet                           
detect h323
detect qq
detect msn
detect netbios
#
firewall interzone vpn-instance internet trust untrust
detect ftp
detect mgcp
detect pptp
detect sip
detect sqlnet
detect h323
detect rtsp
detect qq
detect msn
detect netbios
detect icq
#
firewall interzone vpn-instance shebao trust untrust
detect ftp
detect mgcp
detect pptp
detect sip                              
detect sqlnet
detect h323
detect rtsp
detect qq
detect msn
detect netbios
detect icq
#
#
aaa
local-user admin password cipher %$%$HI`3)/[;i8)305'd_KJD*lcZ%$%$
local-user admin service-type web terminal telnet
local-user admin level 15
local-user huawei password cipher %$%$\>0{i&rVh5`t.}|;=D+]TK%$%$
local-user huawei service-type web telnet
local-user huawei level 15
authentication-scheme default
#
authorization-scheme default
#
accounting-scheme default
#
domain default                           
#
#
ospf 1 router-id 10.84.255.249 vpn-instance shebao
import-route direct
import-route static type 1
vpn-instance-capability simple
area 0.0.0.0
  network 10.84.255.10 0.0.0.0
  network 10.84.255.6 0.0.0.0
#
ospf 2 router-id 172.17.255.252 vpn-instance internet
default-route-advertise always
import-route direct
import-route static type 1
vpn-instance-capability simple
area 0.0.0.0
  network 172.17.255.18 0.0.0.0
  network 172.17.255.13 0.0.0.0
#
route-policy r1 permit node 1
if-match ip-prefix FX
route-policy r1 deny node 2
#                                         
nqa-jitter tag-version 1

#
ip ip-prefix FX index 10 permit 10.0.0.0 8 greater-equal 8 less-equal 32
#
ip route-static vpn-instance internet 0.0.0.0 0.0.0.0 122.227.89.117
ip route-static vpn-instance internet 10.0.0.0 255.0.0.0 172.27.8.129
ip route-static vpn-instance internet 172.0.0.0 255.0.0.0 172.27.8.129
ip route-static vpn-instance shebao 10.84.0.0 255.255.128.0 10.84.255.46
ip route-static vpn-instance shebao 10.84.128.0 255.255.192.0 10.84.255.46
ip route-static vpn-instance shebao 10.84.128.173 255.255.255.255 10.84.255.46
ip route-static vpn-instance shebao 10.84.129.0 255.255.255.0 10.84.255.46
ip route-static vpn-instance shebao 10.84.129.112 255.255.255.255 10.84.255.46
ip route-static vpn-instance shebao 10.84.134.0 255.255.255.0 10.84.255.46
ip route-static vpn-instance shebao 10.84.153.132 255.255.255.255 10.84.255.46
ip route-static vpn-instance shebao 10.84.153.133 255.255.255.255 10.84.255.46
ip route-static vpn-instance shebao 10.84.153.134 255.255.255.255 10.84.255.46
ip route-static vpn-instance shebao 10.84.192.0 255.255.224.0 10.84.255.46
ip route-static vpn-instance shebao 10.84.192.124 255.255.255.255 10.84.255.46
ip route-static vpn-instance shebao 10.84.192.125 255.255.255.255 10.84.255.46
ip route-static vpn-instance shebao 10.84.192.126 255.255.255.255 10.84.255.46
ip route-static vpn-instance shebao 10.84.192.149 255.255.255.255 10.84.255.46
ip route-static vpn-instance shebao 10.84.192.150 255.255.255.255 10.84.255.46
ip route-static vpn-instance shebao 10.87.1.140 255.255.255.255 10.84.255.46
ip route-static vpn-instance shebao 10.87.250.213 255.255.255.255 10.84.255.46
ip route-static vpn-instance shebao 10.87.253.67 255.255.255.255 10.84.255.46
#
snmp-agent
snmp-agent local-engineid 000007DB7F000001000001C2
snmp-agent community write  %$%$MI3$6R]leD[PN-8>~fW($SJA%$%$
snmp-agent sys-info contact R&D Huawei Technologies Co.,Ltd.
snmp-agent sys-info version v2c v3
#
stelnet server enable
#
banner enable
#
user-interface con 0
user-interface tty 2
authentication-mode password
modem both
user-interface vty 0 4
authentication-mode aaa
protocol inbound all
#
ip address-set 阳光政务服务器 type object
address 0 range 10.84.252.128 10.84.252.160
#
ip address-set 柯城区人社局 type object
address 0 range 10.84.145.66 10.84.145.96
#
ip address-set 江山人社局 type object
address 0 range 10.84.184.47 10.84.184.150
#
ip service-set dbserver vpn-instance shebao type object
service 1 protocol tcp destination-port 1512
service 2 protocol tcp destination-port 1521
#
ip service-set p_7001 type object
service 0 protocol tcp source-port 0 to 65535 destination-port 7001
#
dpi
#
slb
#
right-manager server-group
#
policy interzone vpn-instance internet trust untrust inbound
policy 1                                 
  action permit
  policy destination 172.17.255.25 mask 255.255.255.255
  policy destination 172.17.1.2 mask 255.255.255.255
  policy destination 172.17.1.65 mask 255.255.255.255
#
policy interzone vpn-instance shebao local untrust inbound
policy 1
  action permit
  policy source 10.84.128.16 mask 255.255.255.255
#
policy interzone vpn-instance shebao trust untrust inbound
policy 1
  action permit
  policy source 10.84.128.22 mask 255.255.255.255
  policy source 10.84.139.195 mask 255.255.255.255
  policy source 10.84.129.1 mask 255.255.255.255
  policy source 10.84.128.16 mask 255.255.255.255
  policy source 10.84.200.121 mask 255.255.255.255
  policy source 10.87.253.67 mask 255.255.255.255
  policy source 10.84.128.21 mask 255.255.255.255
  policy source 10.84.128.15 mask 255.255.255.255
  policy source 10.84.128.120 mask 255.255.255.255
  policy source 10.84.192.124 mask 255.255.255.255
  policy source 10.84.192.125 mask 255.255.255.255
  policy source 10.84.192.126 mask 255.255.255.255
  policy source 10.84.192.149 mask 255.255.255.255
  policy source 10.84.192.150 mask 255.255.255.255
  policy source 10.84.129.112 mask 255.255.255.255
  policy source 10.87.250.213 mask 255.255.255.255
  policy source 10.84.129.88 mask 255.255.255.255
  policy source 10.84.129.89 mask 255.255.255.255
  policy source 10.84.129.93 mask 255.255.255.255
  policy source 10.84.129.87 mask 255.255.255.255
  policy source 10.84.134.0 mask 255.255.255.0
  policy source 10.84.128.11 mask 255.255.255.255
  policy source 10.84.193.0 mask 255.255.255.0
  policy source 10.84.153.132 mask 255.255.255.255
  policy source 10.84.153.133 mask 255.255.255.255
  policy source 10.84.153.134 mask 255.255.255.255
  policy source 10.84.129.144 mask 255.255.255.255
  policy source 10.84.129.149 mask 255.255.255.255
  policy destination 10.84.252.158 mask 255.255.255.255
  policy destination 10.84.252.128 mask 255.255.255.224
  policy destination 10.84.252.225 mask 255.255.255.255
  policy destination 10.84.252.154 mask 255.255.255.255
  policy destination 10.84.252.155 mask 255.255.255.255
  policy destination 10.84.252.156 mask 255.255.255.255
  policy destination 10.84.252.226 mask 255.255.255.255
  policy destination 10.84.252.227 mask 255.255.255.255
  policy destination 10.84.252.161 mask 255.255.255.255
  policy destination 10.84.252.228 mask 255.255.255.255
  policy destination 10.84.252.235 mask 255.255.255.255
  policy destination 10.84.252.163 mask 255.255.255.255
  policy destination 10.84.255.67 mask 255.255.255.255
  policy destination 10.84.255.66 mask 255.255.255.255
  policy destination 10.84.254.124 mask 255.255.255.255
  policy destination 10.84.254.125 mask 255.255.255.255
  policy destination 10.84.252.229 mask 255.255.255.255
  policy destination 10.84.252.230 mask 255.255.255.255
#
policy zone trust
policy 0
  action permit
#
policy zone untrust
policy 0
  action permit
#
nat-policy interzone vpn-instance internet trust untrust outbound
policy 1
  action source-nat
  policy source 172.16.0.0 mask 255.255.0.0
  policy source 172.17.0.0 mask 255.255.0.0
  address-group 1
#
nat-policy interzone vpn-instance internet trust zfwuntrust outbound
policy 1
  action source-nat
  policy source 172.16.0.0 mask 255.255.0.0
  policy source 172.17.0.0 mask 255.255.0.0
  address-group 2
#
return
[QUZ-JYW-XXZX3F-H5500-FW002]     

AA.png (121.79 KB, 下载次数: 20)

AA.png
wanghongs 发表于 2017-12-18 17:32
  
恳求大家想想办法。。。。。。
wanghongs 发表于 2017-12-18 17:32
  
拓扑图已上 。。。。。。
tyjhz 发表于 2017-12-18 22:13
  
在防火墙上放通VPN出去的策略就可以了
深粉 发表于 2017-12-19 16:01
  
"现在就是我想实现trust(VPN1)可以访问untrust (internet) "
看你这个需求,我的理解是要允许vpn设备上公网,,,,如果我理解的没错的话,在接公网线路的网关设备上面放通相关规则即可(就把vpn设备看成是pc),如果做了相关策略还是不行的话,就在vpn同网段接一台pc 跟踪路由测试看看效果

等我来答:

换一批

发表新帖
热门标签
全部标签>
西北区每日一问
高手请过招
【 社区to talk】
每日一问
功能体验
安全效果
产品连连看
新版本体验
社区新周刊
纪元平台
GIF动图学习
技术盲盒
技术咨询
标准化排查
自助服务平台操作指引
信服课堂视频
安全攻防
玩转零信任
秒懂零信任
文档捉虫活动
故障笔记
答题自测
畅聊IT
专家问答
技术笔记
技术圆桌
在线直播
MVP
网络基础知识
安装部署配置
升级
上网策略
测试报告
日志审计
问题分析处理
流量管理
每日一记
运维工具
云计算知识
用户认证
原创分享
解决方案
sangfor周刊
VPN 对接
项目案例
SANGFOR资讯
专家分享
技术顾问
信服故事
SDP百科
功能咨询
终端接入
授权
设备维护
资源访问
地址转换
虚拟机
存储
迁移
加速技术
排障笔记本
产品预警公告
干货满满
信服圈儿
S豆商城资讯
技术争霸赛
「智能机器人」
追光者计划
深信服技术支持平台
社区帮助指南
答题榜单公布
2023技术争霸赛专题
通用技术
卧龙计划
华北区拉练
天逸直播
以战代练
技术晨报
山东区技术晨报
齐鲁TV
华北区交付直播
每周精选
2024年技术争霸赛
北京区每日一练
场景专题
排障那些事
升级&主动服务
高频问题集锦
POC测试案例
全能先锋系列
云化安全能力
故障案例库

本版版主

1
3
10

发帖

粉丝

关注

396
143
63

发帖

粉丝

关注

5
8
7

发帖

粉丝

关注

0
2
1

发帖

粉丝

关注

本版达人

新手61940...

本周建议达人

BGP网络

本周分享达人

BGP网络

本周提问达人