【H3C HCL Cloud Lab平台搭建防火墙做路由实现多网段内网PC访问外网】
A.搭建环境:
1.HCL Cloud Lab 5.10.0
2.Oracle VM VirtualBox 6.0.14
3.Windows 11操作系统
4.本地以太网卡:Killer E2600 Gigabit Ethernet Controller
(IP:192.168.8.126)
5.TP-LINK无线路由器(路由器IP:192.168.8.1)
B.网络拓扑图:

C.设备配置:
1.Host-Internet:(本地连接)
NIC:Realtek PCIe GbE Family Controller → FW-A:GE_0/2
2.SW-A:(交换机)
SW-A:GE_0/1 → GE_0/1
<H3C>sys //进入系统视图
[H3C]sysname SW-A //修改设备名称
[SW-A]vlan 10 //创建vlan10
[SW-A-vlan10]port GigabitEthernet 1/0/5 to GigabitEthernet 1/0/15 //将5-15端口划入vlan10
[SW-A-vlan10]vlan 11 //创建vlan11
[SW-A-vlan11]port GigabitEthernet 1/0/16 to GigabitEthernet 1/0/25 //将16-25端口划入vlan11
[SW-A-vlan11]vlan 100 //创建vlan100(业务数据通道)
[SW-A-vlan100]port GigabitEthernet 1/0/1 to GigabitEthernet 1/0/4 //将1-4端口划入vlan100
[SW-A-vlan100]interface vlan 100 //进入vlan100管理视图
[SW-A-Vlan-interface100]ip address 192.168.100.2 255.255.255.0 //配置vlan100的IP地址
[SW-A-Vlan-interface100]interface vlan 10 //进入vlan10管理视图
[SW-A-Vlan-interface10]ip address 192.168.10.1 255.255.255.0 //配置vlan10的IP地址
[SW-A-Vlan-interface10]interface vlan 11 //进入vlan20管理视图
[SW-A-Vlan-interface11]ip address 192.168.11.1 255.255.255.0 //配置vlan11的IP地址
[SW-A-Vlan-interface11]qu
[SW-A]ip route-static 0.0.0.0 0 192.168.100.1 //配置默认静态路由
2.FW-A:(防火墙)
FW-A:GE_0/1 → SW-A:GE_0/1
<H3C>sys //进入系统视图
[H3C]sysname FW-A //修改设备名称
[FW-A]interface GigabitEthernet 1/0/0 //进入端口管理视图
[FW-A-GigabitEthernet1/0/0]ip address 192.168.8.200 255.255.255.0 //配置端口IP地址(和本地链接一个网段)
[FW-A-GigabitEthernet1/0/0]nat outbound 2000 //根据访问规则,在外网端口出口方向设置地址转换
[FW-A-GigabitEthernet1/0/0]nat hairpin enable //开启端口回流
[FW-A-GigabitEthernet1/0/0]qu //退出端口管理视图
[FW-A]acl number 2000
[FW-A-acl-ipv4-basic-2000]rule 0 permit //配置规则(我这里设置为全部允许通过)
[FW-A-acl-ipv4-basic-2000]qu //退出端口管理视图
[FW-A]interface GigabitEthernet 1/0/1 //进入端口管理视图
[FW-A-GigabitEthernet1/0/1]ip address 192.168.100.1 255.255.255.0 //配置端口IP地址(业务管理)
[FW-A-GigabitEthernet1/0/1]qu //退出端口管理视图
[FW-A]dns server 114.114.114.114 //配置DNS服务器地址
[FW-A]ip route-static 0.0.0.0 0 192.168.8.1 //配置默认静态路由(所有连接下一条到路由器网关)
[FW-A]ip route-static 192.168.0.0 16 192.168.100.2 //配置内网业务通道路由
[FW-A]security-zone name Management //进入管理域
[FW-A-security-zone-Management]import interface GigabitEthernet 1/0/3 //将接口加入管理域(后期可以给1/0/3端口配置IP作为防火墙管理接口使用)
[FW-A-security-zone-Management]security-zone name trust //进入安全域
[FW-A-security-zone-Trust]import interface GigabitEthernet 1/0/1 //将内网接口加入安全域
[FW-A-security-zone-Trust]security-zone name untrust //进入非安全域
[FW-A-security-zone-Untrust]import interface GigabitEthernet 1/0/0 //将外网接口加入非安全域
//以下配置防火墙各域之间的访问规则,为简便操作,继续使用ACL2000规则,全部放行
[FW-A-security-zone-Untrust]zone-pair security source Local destination Trust //进入Local到Trust的通道规则
[FW-A-zone-pair-security-Local-Trust]packet-filter 2000
[FW-A-zone-pair-security-Local-Trust]zone-pair security source Trust destination Local
[FW-A-zone-pair-security-Trust-Local]packet-filter 2000
[FW-A-zone-pair-security-Trust-Local]zone-pair security source Local destination Untrust
[FW-A-zone-pair-security-Local-Untrust]packet-filter 2000
[FW-A-zone-pair-security-Local-Untrust]zone-pair security source Untrust destination Local
[FW-A-zone-pair-security-Untrust-Local]packet-filter 2000
[FW-A-zone-pair-security-Untrust-Local]zone-pair security source Trust destination Untrust
[FW-A-zone-pair-security-Trust-Untrust]packet-filter 2000
[FW-A-zone-pair-security-Trust-Untrust]zone-pair security source Untrust destination Trust
[FW-A-zone-pair-security-Untrust-Trust]packet-filter 2000
[FW-A-zone-pair-security-Untrust-Trust]
4.PC:(虚拟主机)
PC_1(IP:192.168.11.88;掩码:255.255.255.0;网关:192.168.11.1):GE_0/1 → SW-A:GE_0/16
PC_2(IP:192.168.10.99;掩码:255.255.255.0;网关:192.168.10.1):GE_0/1 → SW-A:GE_0/5
注:配置虚拟主机要启用“接口管理”,否则无法连通。
5.测试结果
[H3C]ping 202.99.166.4 //外网DNS服务器PING通
Ping 202.99.166.4 (202.99.166.4): 56 data bytes, press CTRL_C to break
56 bytes from 202.99.166.4: icmp_seq=0 ttl=241 time=28.678 ms
56 bytes from 202.99.166.4: icmp_seq=1 ttl=241 time=27.752 ms
56 bytes from 202.99.166.4: icmp_seq=2 ttl=241 time=30.466 ms
56 bytes from 202.99.166.4: icmp_seq=3 ttl=241 time=27.361 ms
56 bytes from 202.99.166.4: icmp_seq=4 ttl=241 time=22.915 ms
[H3C]ping 192.168.10.99 //内网设备1PING通
Ping 192.168.10.99 (192.168.10.99): 56 data bytes, press CTRL_C to break
56 bytes from 192.168.10.99: icmp_seq=0 ttl=255 time=0.122 ms
56 bytes from 192.168.10.99: icmp_seq=1 ttl=255 time=0.122 ms
56 bytes from 192.168.10.99: icmp_seq=2 ttl=255 time=0.265 ms
56 bytes from 192.168.10.99: icmp_seq=3 ttl=255 time=0.111 ms
56 bytes from 192.168.10.99: icmp_seq=4 ttl=255 time=0.104 ms
[H3C]ping 192.168.11.88 //内网设备2PING通
Ping 192.168.11.88 (192.168.11.88): 56 data bytes, press CTRL_C to break
56 bytes from 192.168.11.88: icmp_seq=0 ttl=254 time=2.386 ms
56 bytes from 192.168.11.88: icmp_seq=1 ttl=254 time=2.299 ms
56 bytes from 192.168.11.88: icmp_seq=2 ttl=254 time=1.953 ms
56 bytes from 192.168.11.88: icmp_seq=3 ttl=254 time=2.713 ms
56 bytes from 192.168.11.88: icmp_seq=4 ttl=254 time=3.163 ms
6.总结:
防火墙经本地以太网接入外网,防火墙将内外网及管理端口分别加入相应域中,再配置好各域之间的访问规则,就可以实现通过防火墙管理内外网访问了。