zoukankan      html  css  js  c++  java
  • IPsec

    FW1:

    interface GigabitEthernet1/0/0
     undo shutdown
     ip address 192.168.1.254 255.255.255.0
     service-manage http permit
     service-manage https permit
     service-manage ping permit
     service-manage ssh permit
     service-manage snmp permit
     service-manage telnet permit
    #
    interface GigabitEthernet1/0/1
     undo shutdown
    #
    interface GigabitEthernet1/0/2
     undo shutdown
     ip address 1.1.1.1 255.255.255.0
     service-manage http permit
     service-manage https permit
     service-manage ping permit
     service-manage ssh permit
     service-manage snmp permit
     service-manage telnet permit
     ipsec policy map
    #

    firewall zone trust
     set priority 85
     add interface GigabitEthernet0/0/0
     add interface GigabitEthernet1/0/0
    #
    firewall zone untrust
     set priority 5
     add interface GigabitEthernet1/0/2

    ip route-static 192.168.2.0 255.255.255.0 1.1.1.2

    security-policy
     default action permit

    创建acl列表:

    acl number 3000
     rule 5 permit ip source 192.168.1.0 0.0.0.255 destination 192.168.2.0 0.0.0.255

    配置时适当修改ip和接口

     

    以下是策略的详细明细:

    dis firewall session table ver

     

     

    把大的策略关了,改写为详细明细

    其中有UDP协议,用命令写的时候写不上,所以在浏览器里创建一个服务

    在策略里写上service 500

    在FW1上连一个云

     

     FW2:

     interface GigabitEthernet1/0/0
     undo shutdown
     ip address 1.1.1.2 255.255.255.0
     service-manage http permit
     service-manage https permit
     service-manage ping permit
     service-manage ssh permit
     service-manage snmp permit
     service-manage telnet permit
     ipsec policy map
    #
    interface GigabitEthernet1/0/1
     undo shutdown
     ip address 192.168.2.254 255.255.255.0
     service-manage http permit
     service-manage https permit
     service-manage ping permit
     service-manage ssh permit
     service-manage snmp permit
     service-manage telnet permit

    firewall zone trust
     set priority 85
     add interface GigabitEthernet0/0/0
     add interface GigabitEthernet1/0/1
    #
    firewall zone untrust
     set priority 5
     add interface GigabitEthernet1/0/0

     ip route-static 192.168.1.0 255.255.255.0 1.1.1.1

     security-policy
     default action permit

    acl number 3000

     rule 5 permit ip source 192.168.2.0 0.0.0.255 destination 192.168.1.0 0.0.0.255

    IPsec和FW2一样,注意IP地址和接口

    其余配置和FW1一样

  • 相关阅读:
    Springboot配置异常错误页
    Springboot进行hibernate-vidator数据验证
    Springboot模拟https安全访问(使用Java提供的keytool命令生成证书)
    Springboot的项目如何打成war包
    Springboot的开发环境(dev)、测试环境(beta)和生产环境(product)打包部署
    使用Maven构建的Springboot父子工程的项目打包部署
    Springboot整合Spring的.xm配置文件
    Springboot使用MessageSource读取资源文件
    Springboot使用内置对象HttpServletRequest、HttpServletResponse
    Springboot的控制层结合@PathVariable的使用
  • 原文地址:https://www.cnblogs.com/mqqq/p/11455427.html
Copyright © 2011-2022 走看看