这个实验基于华为eNSP模拟器搭建了一个典型的企业网络架构,核心是通过防火墙实现VLAN间通信控制与DHCP服务分发。拓扑中包含了以下关键设备:
提示:实验前请确保eNSP软件版本为V100R003C00或更高,USG6000V1防火墙镜像已正确加载。低版本可能缺少某些配置命令支持。
SW2的配置要点在于正确划分端口类型和VLAN归属:
bash复制[SW2]vlan batch 10 20 # 批量创建VLAN
[SW2]interface GigabitEthernet 0/0/2
[SW2-GigabitEthernet0/0/2]port link-type access # 配置为Access端口
[SW2-GigabitEthernet0/0/2]port default vlan 10 # 划入VLAN10
[SW2-GigabitEthernet0/0/3]port link-type access
[SW2-GigabitEthernet0/0/3]port default vlan 20
[SW2-GigabitEthernet0/0/1]port link-type trunk # 上联口配置为Trunk
[SW2-GigabitEthernet0/0/1]port trunk allow-pass vlan 10 20 # 允许VLAN10和20通过
验证命令:
bash复制display vlan # 查看VLAN划分情况
display interface brief # 检查端口状态
防火墙需要配置物理接口和子接口实现VLAN间路由:
bash复制[USG6000V1]interface GigabitEthernet 1/0/1.1 # 创建子接口
[USG6000V1-GigabitEthernet1/0/1.1]vlan-type dot1q 10 # 绑定VLAN10
[USG6000V1-GigabitEthernet1/0/1.1]ip address 172.16.1.254 24 # 配置IP
[USG6000V1-GigabitEthernet1/0/1.2]vlan-type dot1q 20
[USG6000V1-GigabitEthernet1/0/1.2]ip address 172.16.2.254 24
[USG6000V1-GigabitEthernet1/0/0]ip address 10.0.0.254 24 # DMZ接口
[USG6000V1-GigabitEthernet1/0/2]ip address 100.1.1.10 24 # 外网接口
关键点说明:
bash复制[USG6000V1]dhcp enable # 全局启用DHCP
部门A(VLAN10)地址池配置示例:
bash复制[USG6000V1]ip pool dhcp-a
[USG6000V1-ip-pool-dhcp-a]gateway-list 172.16.1.254
[USG6000V1-ip-pool-dhcp-a]network 172.16.1.0 mask 255.255.255.0
[USG6000V1-ip-pool-dhcp-a]dns-list 10.0.0.30
[USG6000V1-ip-pool-dhcp-a]excluded-ip-address 172.16.1.90 172.16.1.100
[USG6000V1-ip-pool-dhcp-a]static-bind ip-address 172.16.1.90 mac-address 5489-9863-1C0D
部门B(VLAN20)地址池关键差异:
bash复制[USG6000V1]interface GigabitEthernet 1/0/1.1
[USG6000V1-GigabitEthernet1/0/1.1]dhcp select global # 关联全局地址池
验证命令:
bash复制display ip pool name dhcp-a used # 查看地址分配情况
display dhcp server statistics # 查看DHCP服务统计
bash复制[USG6000V1]firewall zone name Trust_A
[USG6000V1-zone-Trust_A]set priority 70
[USG6000V1-zone-Trust_A]add interface GigabitEthernet 1/0/1.1
[USG6000V1]firewall zone name Trust_B
[USG6000V1-zone-Trust_B]set priority 80
[USG6000V1-zone-Trust_B]add interface GigabitEthernet 1/0/1.2
区域优先级说明:
通过命令行批量添加地址组成员:
bash复制[USG6000V1]ip address-set DMZ_Server type object
[USG6000V1-object-address-set-DMZ_Server]address 10.0.0.10 32
[USG6000V1-object-address-set-DMZ_Server]address 10.0.0.20 32
[USG6000V1-object-address-set-DMZ_Server]address 10.0.0.30 32
[USG6000V1-object-address-set-DMZ_Server]description "DMZ区域服务器集合"
注意:Web界面配置时,建议先规划好所有地址对象,再批量关联到地址组,可提高效率。
bash复制[USG6000V1]aaa
[USG6000V1-aaa]manager-user vtyadmin
[USG6000V1-aaa-manager-user-vtyadmin]password cipher admin@123
[USG6000V1-aaa-manager-user-vtyadmin]service-type telnet
[USG6000V1-aaa-manager-user-vtyadmin]level 3 # 对应service-admin角色
访问控制配置:
bash复制[USG6000V1]telnet server enable
[USG6000V1]user-interface vty 0 4
[USG6000V1-ui-vty0-4]protocol inbound telnet
[USG6000V1-ui-vty0-4]acl 2000 inbound # 引用ACL限制源IP
组织架构创建示例:
bash复制[USG6000V1]aaa
[USG6000V1-aaa]domain openlab
[USG6000V1-aaa-domain-openlab]authentication-scheme portal
[USG6000V1-aaa-domain-openlab]authorization-scheme default
[USG6000V1-aaa-domain-openlab]accounting-scheme default
用户组创建技巧:
允许管理员Telnet访问的策略配置:
bash复制[USG6000V1]security-policy
[USG6000V1-policy-security]rule name Admin_Telnet
[USG6000V1-policy-security-rule-Admin_Telnet]source-zone Trust_A
[USG6000V1-policy-security-rule-Admin_Telnet]destination-zone Local
[USG6000V1-policy-security-rule-Admin_Telnet]source-address 172.16.1.10 32
[USG6000V1-policy-security-rule-Admin_Telnet]action permit
配置非工作时间策略(工作日18:00-23:00):
bash复制[USG6000V1]time-range Non_Work_Time 18:00 to 23:00 working-day
关联到安全策略:
bash复制[USG6000V1-policy-security-rule-Ops_Internet]time-range Non_Work_Time
display security-policy rule all查看策略命中计数现象:客户端无法获取IP地址
排查步骤:
display dhcp enabledisplay ip pool name dhcp-adisplay current-configuration interface GigabitEthernet 1/0/1.1现象:VLAN10与VLAN20无法互通
排查步骤:
display port vlan GigabitEthernet 0/0/1display interface GigabitEthernet 1/0/1.1display security-policy rule all | include "Trust_A.*Trust_B"display routing-table | include 172.16现象:用户Portal认证失败
排查步骤:
display domain openlabdisplay access-user onlinedisplay logbuffer | include authentication在实际配置过程中,有几个关键点需要特别注意:
子接口与VLAN对应关系:创建子接口时务必确保dot1q标签与交换机端口的VLAN ID一致,这是通信的基础。有次实验就因为将GE1/0/1.1配成了VLAN20导致整个部门A无法上网。
DHCP排除范围:静态IP地址一定要加入排除列表,否则可能引发IP冲突。曾经遇到过财务部电脑突然断网,排查发现是DHCP分配了已被静态使用的IP。
策略顺序优化:防火墙策略是自上而下匹配的,建议将高频访问的策略(如DNS查询)放在前面,提升处理效率。可以通过display security-policy hit-count查看策略命中情况做优化。
对于想深入学习的同学,可以尝试以下扩展实验: