防火墙nat的配置实验
实验目标:
1.源nat(内网能够访问公网)
2。内网服务器可以被公共网访问
配置思路如下:
1.防火墙的nat配置
1.区域,接口,ip配置
2.公网路由配置
3.nat配置
4.安全策略配置
5.黑洞路由
防火墙账号:
用户名:admin
密码:Admin@1234
[USG6000V1]dis security-policy rule all
2025-06-07 13:07:58.470
Total:1
RULE ID RULE NAME STATE ACTION HITS
——————————————————————————-
0 default enable deny 0
—————————————————————————
nat-policy
rule name to-isp
source-zone trust
destination-zone untrust
source-address 192.168.10.0 mask 255.255.255.0
action source-nat easy-ip
防火墙配置如下:
<USG6000V1>dis cu
2025-06-07 14:34:27.300
!Software Version V500R005C10SPC300
#
sysname USG6000V1
#
interface GigabitEthernet0/0/0
undo shutdown
ip binding vpn-instance default
ip address 192.168.0.1 255.255.255.0
alias GE0/METH
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 192.168.20.1 255.255.255.0
#
interface GigabitEthernet1/0/1
undo shutdown
ip address 192.168.10.1 255.255.255.0
#
interface GigabitEthernet1/0/2
undo shutdown
ip address 11.1.1.1 255.255.255.0
#
firewall zone local
set priority 100
#
firewall zone trust
set priority 85
add interface GigabitEthernet0/0/0
add interface GigabitEthernet1/0/1
#
firewall zone untrust
set priority 5
add interface GigabitEthernet1/0/2
#
firewall zone dmz
set priority 50
add interface GigabitEthernet1/0/0
#
ip route-static 0.0.0.0 0.0.0.0 11.1.1.254
ip route-static 11.1.1.0 255.255.255.0 NULL0
#
firewall detect ftp
#
nat server 0 protocol tcp global 11.1.1.100 www inside 192.168.20.10 www
nat server 1 protocol tcp global 11.1.1.100 ftp inside 192.168.20.20 ftp
#
security-policy
rule name to-isp
source-zone trust
destination-zone untrust
source-address 192.168.10.0 mask 255.255.255.0
action permit
rule name untrust-to-dmz
source-zone untrust
destination-zone dmz
destination-address 192.168.20.0 mask 255.255.255.0
service ftp
service http
action permit
#
nat-policy
rule name to-isp
source-zone trust
destination-zone untrust
source-address 192.168.10.0 mask 255.255.255.0
action source-nat easy-ip
AR1路由器配置如下:
<AR1>dis cu
[V200R003C00]
#
sysname AR1
#
firewall zone Local
priority 15
#
interface GigabitEthernet0/0/0
ip address 122.1.1.254 255.255.255.0
#
interface GigabitEthernet0/0/2
ip address 11.1.1.254 255.255.255.0
验证现象:
1.内网能够访问公网
2.内网访问外网防火墙做了nat,出口做的是easyip:11.1.1.1
3.ftp访问验证
4.1外网可以正常访问到内网的这台ftp服务器。
4.2外网可以正常访问内网映射的web服务器。
5.黑洞路由







中型wlan部署有线和无线实验
ospf的路由策略实验
路由过滤与路由策略实验
策略路由实验
企业通过dhcp中继自动获取ip地址原理分析
mpls部分php倒数第二跳抓包分析
mpls vpn ldp动态lsp配置
防火墙gre vpn隧道技术