0
点赞
收藏
分享

微信扫一扫

华为防火墙:双机热备,上下行连接交换机

网络需求:

两台FW的业务接口都工作在二层,上下行分别连接交换机。FW的上下行业务接口都加入到VLAN10和VLAN20中。现在希望两台FW以主备备份方式工作。正常情况下,流量通过FW_A转发。当FW_A出现故障时,流量通过FW_B转发,保证业务不中断。

华为防火墙:双机热备,上下行连接交换机_双机热备

1.完成网络基本配置。

FW_A

FW_B

# 将FW_A上下行业务接口都切换成二层接口,并加入VLAN10和VLAN20。将FW_B上下行业务接口都切换成二层接口,并加入VLAN10和VLAN20。

[FW_A] vlan batch 10 20
[FW_A] interface GigabitEthernet 1/0/3
[FW_A-GigabitEthernet1/0/3] portswitch
[FW_A-GigabitEthernet1/0/3] port link-type trunk
[FW_A-GigabitEthernet1/0/3] port trunk allow-pass vlan 10 20
[FW_A-GigabitEthernet1/0/3] undo port trunk allow-pass vlan 1
[FW_A-GigabitEthernet1/0/3] quit
[FW_A] interface GigabitEthernet 1/0/7
[FW_A-GigabitEthernet1/0/7] portswitch
[FW_A-GigabitEthernet1/0/7] port link-type trunk
[FW_A-GigabitEthernet1/0/7] port trunk allow-pass vlan 10 20
[FW_A-GigabitEthernet1/0/7] undo port trunk allow-pass vlan 1
[FW_A-GigabitEthernet1/0/7] quit
[FW_B] vlan batch 10 20
[FW_B] interface GigabitEthernet 1/0/3
[FW_B-GigabitEthernet1/0/3] portswitch
[FW_B-GigabitEthernet1/0/3] port link-type trunk
[FW_B-GigabitEthernet1/0/3] port trunk allow-pass vlan 10 20
[FW_B-GigabitEthernet1/0/3] undo port trunk allow-pass vlan 1
[FW_B-GigabitEthernet1/0/3] quit
[FW_B] interface GigabitEthernet 1/0/7
[FW_B-GigabitEthernet1/0/7] portswitch
[FW_B-GigabitEthernet1/0/7] port link-type trunk
[FW_B-GigabitEthernet1/0/7] port trunk allow-pass vlan 10 20
[FW_B-GigabitEthernet1/0/7] undo port trunk allow-pass vlan 1
[FW_B-GigabitEthernet1/0/7] quit

# 配置FW心跳口的IP地址。

[FW_A] interface GigabitEthernet 1/0/2
[FW_A-GigabitEthernet1/0/2] ip address 10.10.0.1 24
[FW_A-GigabitEthernet1/0/2] quit
[FW_B] interface GigabitEthernet 1/0/2
[FW_B-GigabitEthernet1/0/2] ip address 10.10.0.2 24
[FW_B-GigabitEthernet1/0/2] quit

# 将FW各接口加入相应的安全区域。

[FW_A] firewall zone trust
[FW_A-zone-trust] add interface GigabitEthernet 1/0/7
[FW_A-zone-trust] quit
[FW_A] firewall zone dmz
[FW_A-zone-dmz] add interface GigabitEthernet 1/0/2
[FW_A-zone-dmz] quit
[FW_A] firewall zone untrust
[FW_A-zone-untrust] add interface GigabitEthernet 1/0/3
[FW_A-zone-untrust] quit
[FW_B] firewall zone trust
[FW_B-zone-trust] add interface GigabitEthernet 1/0/7
[FW_B-zone-trust] quit
[FW_B] firewall zone dmz
[FW_B-zone-dmz] add interface GigabitEthernet 1/0/2
[FW_B-zone-dmz] quit
[FW_B] firewall zone untrust
[FW_B-zone-untrust] add interface GigabitEthernet 1/0/3
[FW_B-zone-untrust] quit

2.配置双机热备功能。

FW_A

FW_B

# 在FW_A上配置VGMP组监控VLAN。在FW_B上配置VGMP组监控VLAN,并配置本设备为备用设备。

[FW_A] hrp track vlan 10
[FW_A] hrp track vlan 20
[FW_B] hrp track vlan 10
[FW_B] hrp track vlan 20
[FW_B] hrp standby-device

# 在FW上指定心跳口并启用双机热备功能。

[FW_A] hrp interface GigabitEthernet 1/0/2 remote 10.10.0.2 
[FW_A] hrp enable
[FW_B] hrp interface GigabitEthernet 1/0/2 remote 10.10.0.1 
[FW_B] hrp enable

3.在FW_A上配置安全策略。双机热备状态成功建立后,FW_A的安全策略配置会自动备份到FW_B上。

HRP_M[FW_A] security-policy
HRP_M[FW_A-policy-security] rule name policy_sec1
HRP_M[FW_A-policy-security-rule-policy_sec1] source-zone trust
HRP_M[FW_A-policy-security-rule-policy_sec1] destination-zone untrust
HRP_M[FW_A-policy-security-rule-policy_sec1] action permit

4.在FW1上配置安全策略。双机热备状态成功建立后,FW1的安全策略配置会自动备份到FW2上。

# 配置安全策略,允许内网用户访问Internet。

HRP_M[FW_A] security-policy
HRP_M[FW_A-policy-security] rule name policy_sec1
HRP_M[FW_A-policy-security-rule-policy_sec1] source-zone trust
HRP_M[FW_A-policy-security-rule-policy_sec1] destination-zone untrust
HRP_M[FW_A-policy-security-rule-policy_sec1] action permit

5.在FW1上配置NAT策略。双机热备状态成功建立后,FW1的NAT策略配置会自动备份到FW2上。

# 配置NAT策略,当内网用户访问Internet时,将源地址由10.3.0.0/16网段转换为地址池中的地址(1.1.1.2-1.1.1.5)。

HRP_M[FW1] nat address-group group1
HRP_M[FW1-address-group-group1] section 0 1.1.1.2 1.1.1.5
HRP_M[FW1-address-group-group1] quit
HRP_M[FW1] nat-policy
HRP_M[FW1-policy-nat] rule name policy_nat1
HRP_M[FW1-policy-nat-rule-policy_nat1] source-zone trust
HRP_M[FW1-policy-nat-rule-policy_nat1] destination-zone untrust
HRP_M[FW1-policy-nat-rule-policy_nat1] source-address 10.3.0.0 16
HRP_M[FW1-policy-nat-rule-policy_nat1] action source-nat address-group group1

完成效果

华为防火墙:双机热备,上下行连接交换机_双机热备_02


举报

相关推荐

0 条评论