网络安全-pppoe拨号-防火墙的负载分担-ensp

 

  • 实验名称:

防火墙应用有关实验

  • 实验拓扑图:

网络安全-pppoe拨号-防火墙的负载分担-ensp

  • 实验需求:

1.AR1是一台PPPoE服务器,内网防火墙通过拨号进行获得地址。

2.通过所学技术实现对内网PC机的访问外网的数据分流,实现防火墙的负载分担

 

  • 实验步骤:

  1、PPPOE

AR1

创建地址池

[ar1-ip-pool-pppoe1]net 61.67.1.0 m 24

创建虚拟模板

[ar1]int Virtual-Template 1

虚拟模板地址

[ar1-Virtual-Template1]ip address 61.67.1.11 24

模板认证模式chap

[ar1-Virtual-Template1]ppp authentication-mode chap

分配地址池中地址

[ar1-Virtual-Template1]remote address pool pppoe1

Aaa模式创建本地用户

[ar1-aaa]local-user user1 password cipher 123

设置服务类型ppp

[ar1-aaa]local-user user1 service-type ppp

绑定虚拟模板1

[ar1-GigabitEthernet0/0/1]pppoe-server bind virtual-template 1

 

 

 

[ar1]ip pool pppoe2

Info: It's successful to create an IP address pool.

[ar1-ip-pool-pppoe2]net 61.67.2.0 m 24

[ar1]int Virtual-Template 2

[ar1-Virtual-Template2]ip a 61.67.2.11 24

[ar1-Virtual-Template2]ppp authentication-mode chap

[ar1-Virtual-Template2]remote address pool pppoe2

[ar1]aaa

[ar1-aaa]local-user user2 password cipher 123

Info: Add a new user.

[ar1-aaa]local-user user2 service-type ppp

[ar1-aaa]int g 0/0/0

[ar1-GigabitEthernet0/0/0]pppoe-server bind virtual-template 2

 

FW1

 

 

[USG6000V1-Dialer1]dis th

#

interface Dialer1

 link-protocol ppp

 ppp chap user user1

 ppp chap password cipher 123

 ip address ppp-negotiate

 dialer user user1

 dialer bundle 1

#

将拨号接口加入trust

[USG6000V1-zone-untrust]add interface Dialer 1

对应接口加入对应安全区域

[USG6000V1-zone-dmz]add int g 1/0/0

[USG6000V1-zone-trust]add int g 1/0/1

 

 

FW2

 

[USG6000V1-Dialer2]dis th

#

interface Dialer2

 link-protocol ppp

 ppp chap user user2

 ppp chap password cipher %$%$QpbH6wWBd#ELQh~;Jx"!I4/Y%$%$

 ip address ppp-negotiate

 dialer user user2

 dialer bundle 2

#

 

将拨号接口加入trust

[USG6000V1-zone-untrust]add  interface  Dialer  2

对应接口加入对应安全区域

[USG6000V1-zone-dmz]add int g 1/0/0

[USG6000V1-zone-trust]add int g 1/0/1

 

2、防火墙的负载分担

Hrp进行主备同步

Fw1

[USG6000V1]hrp enable

HRP_M[USG6000V1]hrp int g 1/0/0 remote 192.168.12.2

Fw2

[USG6000V1]hrp  enable

HRP_M[USG6000V1]hrp int g 1/0/0 remote 192.168.12.1

由vgmp组管理vrrp备份组

 

Vrrp1

trust安全区域

Vrrp2

Trust安全区域

Fw1

HRP_M[USG6000V1-GigabitEthernet1/0/1]vrrp vrid 1 virtual-ip 192.168.1.254 24 act

ive

HRP_M[USG6000V1-GigabitEthernet1/0/1]vrrp vrid 2 virtual-ip 192.168.1.253 24 sta

ndby

 

Fw2

HRP_S[USG6000V1-GigabitEthernet1/0/1]vrrp vrid 1 virtual-ip 192.168.1.254 24 sta

ndby

HRP_S[USG6000V1-GigabitEthernet1/0/1]vrrp vrid 2 virtual-ip 192.168.1.253 24 act

ive

 

 

 

安全策略

HRP_M[USG6000V1]security-policy (+B)

 

HRP_M[USG6000V1-policy-security]rule name t_unt (+B)

 

HRP_M[USG6000V1-policy-security-rule-t_unt]source-zone trust  (+B)

HRP_M[USG6000V1-policy-security-rule-t_unt]destination-zone untrust  (+B)

HRP_M[USG6000V1-policy-security-rule-t_unt]action permit  (+B)

 

 

HRP_M[USG6000V1-policy-security]dis th

#

security-policy

 rule name t_unt

  source-zone trust

  destination-zone untrust

  action permit

#

Nat策略

 

HRP_M[USG6000V1-policy-nat]rule name t_un_nat (+B)

HRP_M[USG6000V1-policy-nat-rule-t_un_nat]destination-zone untrust  (+B)

HRP_M[USG6000V1-policy-nat-rule-t_un_nat]action nat easy-ip  (+B)

 

HRP_M[USG6000V1-policy-nat-rule-t_un_nat]dis th

#

 rule name t_un_nat

  destination-zone untrust

  action nat easy-ip

#

 

  • 结果测试

 

 

  • 实验心得:

[ar1]int Virtual-Template 2

[ar1-Virtual-Template2]ip address  61.67.1.12  24

Error: The specified address conflicts with another address.

[ar1-Virtual-Template2]ip address 61.67.1.10 24

Error: The specified address conflicts with another address.

此处创建了另一个地址池

 

对于这个实验,我在访问防火墙trust区域的接口的时候ping不通,做安全策略trust到local的,之后可以ping通