这是华为的配置:2 l' |9 a+ A/ r6 g Y; c
#
, h9 ]7 m ?0 y9 ~- w" D2 |" Vacl number 20008 \$ t0 g% B$ W2 G) H' x8 C2 y
rule 0 permit source 172.16.14.1 0
$ e* M V# D. y rule 1 permit source 172.16.1.0 0.0.0.255
( ^, y, Y! ^# r, | f0 r rule 3 permit source 172.16.2.1 0* _, E; f9 S! E) J( L% a( _/ Z! ~
rule 4 permit source 172.16.2.13 07 [2 X1 J, f# D
rule 5 permit source 172.16.10.0 0.0.0.255" g* R$ f) R) @2 b% o$ {& @
rule 6 permit source 172.16.16.2 0' y- F& h8 o8 W) ~: j% v |4 }
rule 7 permit source 172.16.2.2 0
4 h' [. o6 z' |* ?3 ~" C* O rule 8 permit source 172.16.14.50 0
& E0 l, ?# @8 w* X$ t rule 10 deny
( f( b% E0 R0 O K `9 ]acl number 2001
# p& j* e% f* l( a/ h9 c rule 0 permit source 172.16.12.51 0% N& Q( a g+ b4 L; d
rule 5 deny2 }( e/ j( h. m6 G% z, K$ B4 Q w
acl number 20024 U: h4 U7 `, t
rule 0 permit source 172.16.12.61 0
. P( e7 P" P! {; Y8 g rule 5 deny
0 x7 D5 P, q" w$ Kacl number 2003: k2 s. r8 f- \% F
rule 0 permit source 172.15.10.4 0% [3 f0 R& ~. \0 `5 v9 u
rule 5 deny6 P3 I7 o0 ] ]$ t& @7 @+ ^
#" K% a6 L c" u& n- X$ X2 u2 @
acl number 3000
/ F3 V8 I' ?3 G description dmz-trust
8 R' } ]( q/ H7 b1 n rule 0 permit tcp source 172.16.12.61 0 destination 172.16.10.71 0 destination-port eq 4008
7 m' {! F4 D& ?5 u7 c* P) O rule 1 permit tcp source 172.16.12.61 0 destination 172.16.10.71 0 destination-port eq 8898
/ x5 o+ X# K; ^ rule 2 permit tcp source 172.16.12.61 0 destination 172.16.10.71 0 destination-port eq 8868% _6 i. Z5 e) t( C" H( v3 K
rule 3 permit tcp source 172.16.12.61 0 destination 172.16.10.71 0 destination-port eq 8858
7 P/ V7 l; r. l) m- _% C; t0 u rule 4 permit tcp source 172.16.12.61 0 destination 172.16.14.155 0 destination-port eq 4008
5 r$ e5 Y) v: R! J2 l rule 5 permit tcp source 172.16.12.61 0 destination 172.16.14.155 0 destination-port eq 8898+ W& B0 ]8 M/ y9 E2 Y9 k/ z3 U
rule 6 permit tcp source 172.16.12.61 0 destination 172.16.14.155 0 destination-port eq 8868. R2 t5 ?- c1 l6 w" a3 }3 O
rule 7 permit tcp source 172.16.12.61 0 destination 172.16.14.155 0 destination-port eq 8858: \5 ?$ i/ y W$ L
rule 8 permit tcp source 172.16.12.51 0 destination 172.16.10.71 0 destination-port eq 4003# i6 s t, z+ }2 n. L, G
rule 9 permit tcp source 172.16.12.61 0 destination 172.16.10.71 0 destination-port eq ftp
- B* M- l& ^! G/ M7 S rule 10 permit tcp source 172.16.12.61 0 destination 172.16.10.51 0 destination-port eq ftp
5 ]9 ^9 ^ G+ C. N; D- t4 _ rule 11 permit tcp source 172.16.12.61 0 destination 172.16.14.155 0 destination-port eq ftp
5 E$ E9 D o5 V rule 12 permit tcp source 172.16.12.51 0 destination 172.16.14.155 0 destination-port eq ftp* ^4 V) [# i' c6 r, J: J
rule 13 permit tcp source 172.16.12.51 0 destination 172.16.10.71 0 destination-port eq ftp0 x% C0 T/ u8 b# Q9 z5 O
rule 14 permit tcp source 172.16.12.51 0 destination 172.16.10.51 0 destination-port eq ftp" g, q( a4 X9 Z; i0 Y% L7 Y
rule 15 permit tcp source 172.16.12.51 0 destination 172.16.14.155 0 destination-port eq 4003
! l% q1 o. x! W1 q( C& P rule 16 permit ospf
; r2 V7 E- g$ H' o- [$ T- y0 e7 f; v/ k rule 17 permit tcp source 172.16.12.51 0 destination 172.16.10.101 0 destination-port eq 8
! b7 _# g! e7 v$ \8 f rule 18 deny tcp; C& \0 B% c, d0 ^
acl number 3001
# ~: r! d0 K7 M- L description For Untrust-dmz) y& e' d$ {/ }6 f3 O
rule 0 permit tcp source 172.16.20.0 0.0.0.255 destination 172.16.12.51 0 destination-port eq 50009 Q# i0 O/ G& I0 S# w
rule 5 permit icmp
3 o* _% ]! W. ]0 S+ ~/ K rule 10 permit ospf ; U" R a: `' M
rule 15 deny tcp source 172.16.20.0 0.0.0.255" m6 [$ E2 i4 ]
acl number 3002
/ o5 Y; z; ?6 |% o description To_Yinlian2 e. ^1 |) F9 J; I0 N, @
rule 0 permit ip source 9.234.21.63 0 destination 144.234.97.33 0- d# p" ~, [) h0 u$ m6 E' q
rule 5 permit ip source 9.234.21.64 0 destination 144.234.97.33 0
5 `- E' N8 n$ A/ y# G: m rule 10 permit ip source 9.234.21.66 0 destination 144.234.97.33 0
$ X; d3 `/ }- H# q rule 15 deny ip8 E' |; [, I: X3 M$ ?9 {' O8 N
acl number 30033 f8 ^/ d, ~/ e0 \
description for Untrust-Trust0 O' m+ {1 }2 ?* ~! C( k. s
rule 0 permit ip source 10.78.72.70 0 destination 172.15.10.4 0
. h) M p& K7 v5 |. ~2 M0 Y9 Z, f rule 1 permit ip source 172.16.2.26 0 destination 172.16.10.111 0& |/ J9 e! a* w; Z; _1 ~( W
rule 2 permit ip source 172.16.2.26 0 destination 172.16.14.1 09 ^$ z: P# }+ d/ S
rule 3 permit ip source 10.78.72.153 0 destination 172.15.10.4 0
" s; l4 w0 K9 M/ A' M; O- w" P O rule 4 permit ip source 10.78.72.157 0 destination 172.15.10.4 05 y, W/ n( {. N, D5 H6 P, z
rule 5 permit ip source 192.168.100.43 0 destination 172.15.10.4 0: b8 M" }. S. ?, C" |
rule 6 permit ip source 10.16.2.7 0 destination 172.15.10.4 0
3 _/ S; m3 h7 ^3 U- ~, T3 M: ^ rule 7 permit ip source 10.16.2.5 0 destination 172.15.10.4 0% N5 r. S* y, ^ y# @
rule 8 permit ip source 10.16.2.6 0 destination 172.15.10.4 0
9 I: h4 e0 v0 Z8 i* F rule 9 permit ip source 10.16.2.8 0 destination 172.15.10.4 0
+ B+ A c0 j: |1 R4 x rule 11 permit ip source 10.139.25.26 0 destination 172.15.10.4 0$ z* Y8 E1 a! T* E& g" g& t0 f) L8 ~8 A
rule 13 permit ip source 10.143.10.183 0 destination 172.15.10.4 01 |# E) u5 B( L% s
rule 50 deny ip
1 Z$ l. x9 g9 ~+ ^acl number 3004
) }3 b0 P m: i/ t- h# S! q+ p( v rule 0 permit ip source 172.16.1.7 0 destination 172.16.10.111 0! Q ^- P7 j" G* a) ?3 J9 n; \; h
acl number 30058 i+ V- J& Z- ?. \8 X8 G, H2 Y8 E
description TO_dudubao
$ C2 P* }4 D9 `3 y" u+ K$ h) K/ ] rule 0 permit tcp destination 172.15.10.4 0 destination-port eq 6868
: v" o5 h4 b: u2 o# g5 U2 G/ B: | rule 1 permit tcp destination 172.15.10.4 0 destination-port eq ftp-data/ t! {- g7 S4 g5 T0 x: Q% e
rule 2 permit tcp destination 172.15.10.4 0 destination-port eq ftp' F7 f: R$ u3 {/ L- K8 |
acl number 3006
7 \% C. L( M* T( Z) _ rule 0 permit ip source 172.16.12.0 0.0.0.255 destination 10.0.1.0 0.0.0.2555 t1 V4 G# X) ^3 H2 Q' ]1 V
acl number 3007
+ Q7 x& ]3 n) }& c rule 0 deny ip source 172.16.12.0 0.0.0.255 destination 10.0.1.0 0.0.0.255
9 ]0 x2 W8 B* }- v& S( `$ b rule 1 permit ip source 172.16.12.0 0.0.0.255, R( L1 D* A+ M. l- ~
#
7 k5 \3 F/ k: E2 @: g' a+ B9 J sysname NB_Eudemon300-A! e4 I, ?& L/ x5 e5 r# Y; `- }
#
" U/ c4 a) Y# C. C, M super password level 3 cipher '._1D9P1YCQ=^Q`MAF4<1!!) Z9 X( a6 o/ h' X! r
#; A% |/ u2 u2 p, L' P) c
info-center loghost 172.16.10.192. c4 {9 i/ a( N, m& P+ o8 F
info-center loghost 172.16.10.111* }' y& ?& y) I# A3 |1 y
## k H" w: M3 M: f" X0 X
hrp enable
3 L8 F/ D. ~& U0 E8 ?$ J. `& ^$ Y# E hrp interface Ethernet2/0/7/ ~1 _: L7 G" J8 p+ ^
#
: J. _5 Y$ l: {' s5 f router id 172.16.1.3 $ F' m9 J' M$ X$ h9 u
#7 m% a# }# f. w& B- a/ |9 _! ?
firewall packet-filter default permit interzone local trust direction inbound
0 E3 g: B8 y4 P; I' [ firewall packet-filter default permit interzone local trust direction outbound A/ L# S, p4 O1 |2 ~1 r( M
firewall packet-filter default permit interzone local untrust direction inbound1 q4 L3 I" j8 @3 g8 m6 \
firewall packet-filter default permit interzone local untrust direction outbound
0 S. B0 |+ h% Z- f firewall packet-filter default permit interzone local dmz direction inbound' G/ ~, ?' k% v8 |' o. P
firewall packet-filter default permit interzone local dmz direction outbound
( w& D4 X: i# W: b firewall packet-filter default permit interzone local hrp direction inbound
9 j5 J, _- L9 ?) ~' v, \& O firewall packet-filter default permit interzone local hrp direction outbound8 s! b1 v( ?& a% \/ v
firewall packet-filter default permit interzone local gprs direction inbound
& j, H+ M1 a, v* Z3 t3 h firewall packet-filter default permit interzone local gprs direction outbound
" l, q" y0 o& \0 d g& a, s2 F firewall packet-filter default permit interzone local dudubao direction inbound
2 L* k9 _/ S8 }6 o; |3 Z firewall packet-filter default permit interzone local dudubao direction outbound
! z+ O9 Q& ~6 u5 h/ m firewall packet-filter default permit interzone trust untrust direction outbound
! y8 i: j1 i: v) s, e+ o( z* T# y firewall packet-filter default permit interzone trust dmz direction inbound
5 M! o T/ l3 x% E firewall packet-filter default permit interzone trust dmz direction outbound0 q; _* t& S$ c9 \ A8 h
firewall packet-filter default permit interzone trust gprs direction inbound. x1 P" t5 r) w6 } h; J& K
firewall packet-filter default permit interzone trust gprs direction outbound
/ B5 O( ?( `2 X3 T! A firewall packet-filter default permit interzone trust dudubao direction inbound2 a2 I. \ p+ j
firewall packet-filter default permit interzone trust dudubao direction outbound! x* M: c% Q: S* l$ T
firewall packet-filter default permit interzone dmz untrust direction inbound4 j( f+ }$ p" F% Q: Z4 P6 B
firewall packet-filter default permit interzone dmz untrust direction outbound
" E: s7 N0 f. ]! N6 c5 z firewall packet-filter default permit interzone dmz gprs direction inbound2 ]% c# z$ t3 P7 i
firewall packet-filter default permit interzone dmz gprs direction outbound
1 Y+ R7 z; y( Y& l$ s; m! D a firewall packet-filter default permit interzone dmz dudubao direction inbound
3 K2 u0 o b p( j9 Y firewall packet-filter default permit interzone dmz dudubao direction outbound
. @! P: e4 A' _8 ]7 b#/ X6 {# u7 p. H2 J
nat address-group 3 145.234.97.33 145.234.97.33
" m' B3 }3 C, R& u+ Y+ q7 `$ v nat address-group 5 144.234.97.33 144.234.97.33, \" o9 p- r0 k
nat server zone gprs global 144.234.97.33 inside 172.16.12.61
1 ~3 e( l2 Y1 C#3 X' n9 V- U$ }
bypass switch-back auto
/ S; T* E5 B2 v$ }#
2 p( E- h6 m4 `2 p firewall mode route; o4 p0 k6 I0 g3 f6 ]$ I3 m# x
#, S/ R9 i {5 l4 l4 ~ \
firewall defend ip-spoofing enable
6 @- f( _7 E9 [ firewall defend land enable
/ b: }. Z2 U4 Z" O firewall defend smurf enable* @0 o2 I! _7 X, J' V9 A* m# i% y
firewall defend fraggle enable
" N/ q% D5 a5 t# Q firewall defend winnuke enable$ a7 G3 r( T1 \) ]- E* N
firewall defend syn-flood enable5 r5 w3 [; Z) t% a; J
firewall defend udp-flood enable
' k C. q: M0 r. ]/ [ firewall defend icmp-redirect enable3 K, _. g7 H8 z" t5 I+ a& ?
firewall defend icmp-unreachable enable5 _3 [5 ~/ ]) ^; r5 E; U4 M
firewall defend ip-sweep enable * h& P( t& Y7 h2 d3 N. u6 H
firewall defend port-scan enable) q) z' f" P; J: n
firewall defend route-record enable0 n9 r9 I; b7 t% b. v
firewall defend ping-of-death enable
8 V- Q. O& A; N+ [2 s firewall defend teardrop enable
$ |6 a$ ?4 G% ~ g' x firewall defend tcp-flag enable4 y4 y& L6 ?0 T# {
firewall defend large-icmp enable, ?8 o) A4 m8 c+ V" |
#
- r4 v( f3 k9 O8 o firewall statistic system enable' ^1 ^3 w7 j9 ^5 c$ \
#
6 G, y# a+ P! w* ^4 wike proposal 1
/ y/ | e7 H. W& P0 q9 V! u8 c$ Z#
6 h* }# ]5 r+ F) G dike peer a7 K& P7 d3 G% C1 B' p( k
pre-shared-key cnnbtk
! m9 L9 ?/ M/ n, r7 v p& Z3 @9 l ike-proposal 11 L6 `" f5 V. s: _# O; ~
remote-address 119.57.5.5: B6 {" T# z* k$ s- Y
#
( j+ Q: K! h8 I$ x @# u kipsec proposal tran1
8 F/ V. }+ J0 k0 q#6 J; T! j: G, p9 x! y7 g4 F1 `6 j
ipsec policy map1 1 isakmp
) H5 G" n6 g1 l5 ? security acl 3006
9 | H( O" R2 f4 P! w pfs dh-group25 S% F! n) c3 ]3 l/ J" A' P7 |- N8 m/ P
ike-peer a
: {7 e+ R$ Q6 p# y& I% Q proposal tran1 - v7 k: f; ?$ F5 {9 H
local-address 60.12.194.14
* R- k. {" U, x. A& F c#
- M* ^/ X0 V" U3 Pinterface Aux0
- u* `/ u9 ?6 V. K async mode flow
h. `- R, @/ t5 U link-protocol ppp: F1 [$ y7 g0 l9 w
#" z! F4 B7 Q) R3 d+ L$ O
interface Ethernet0/0/0
, B2 ] f( S* V* `6 m2 ^#
. M8 D$ Z! l) Y$ Q( O0 t7 ~/ }interface Ethernet0/0/13 u& q* m g6 B s9 Q
#
5 n9 s! N7 e; `! ?$ Pinterface Ethernet2/0/08 a8 z; o) G0 ^6 }8 h
description To_S5624-A(1/0/24)
' Y) A; g9 I0 }* [( D7 {( A ip address 172.16.2.9 255.255.255.252; n$ j9 _6 S$ q3 J
ospf cost 100) E. z( ~! n( @& U( M
#
6 t5 E& h4 r$ w+ j* Ainterface Ethernet2/0/15 [7 @5 r; p+ L: J" w5 p
description To_Yinlian
7 P2 r r o8 }) e; [+ D4 I" Z# [. s ip address 145.234.132.154 255.255.255.252
& y& U2 `* K, g/ |#
: h, q* w# W2 \; N& pinterface Ethernet2/0/2
" w; A( y; c# x6 L4 O" c description To_S6506R_A(7/0/48)
* n; P I, N4 m7 { ip address 172.16.2.2 255.255.255.252$ y! c5 z4 R( `9 L/ c, {. ~
ospf cost 100
$ n7 B$ D3 H# i# J1 c#1 o, F* R4 X) p. ^
interface Ethernet2/0/3: N$ t, N( L/ \+ H1 U0 _
description To-dudubao; Y$ c4 J- c# N7 j H
ip address 60.12.194.14 255.255.255.240
4 H6 C D7 e3 I- e7 R1 ? ipsec policy map1
. Y* O) o) X. X) ~- L#
" D! y. \( }& R; e$ X- Z6 h# ^; Sinterface Ethernet2/0/43 d9 H5 [% E/ o: n) S, q+ @2 I
#
- L% o3 l- [0 K; K8 c6 J0 tinterface Ethernet2/0/5
* }4 r4 }3 I; {# c& p/ e/ ~$ b0 v7 C#2 b) Q( g, X9 ~+ N5 B6 p
interface Ethernet2/0/6
8 C, G2 v4 `8 E9 V#6 A6 D% f8 @5 U1 L
interface Ethernet2/0/7
3 X% e: b" B2 x5 X4 m4 N description To_Eudemon300-B_E2/0/7
0 c) z1 ~" J/ s, W ip address 172.16.2.201 255.255.255.248
- M, d, ~* f0 M% A$ T& K vrrp vrid 1 virtual-ip 172.16.2.2030 o. N: u; ?, h$ i
vrrp vrid 1 priority 150
" g0 s- J8 h1 m vrrp vrid 1 preempt-mode timer delay 60
/ D E/ ]: Q$ Z+ ?& s vrrp vrid 2 virtual-ip 172.16.2.204
' \* |4 u, k" F# W2 I#! {* `7 Y7 a' i* ?: b5 V
interface GigabitEthernet1/0/0
" N1 B9 m1 p* X0 v shutdown Q& \" D8 X2 \
#
" d6 f2 v" l2 a$ f* \; [interface GigabitEthernet1/0/1
2 N9 n- F' @ l" R3 ] description To_S5624-B(1/0/25)
" ^/ j$ u! i- @3 d. J ip address 172.16.2.25 255.255.255.2522 {/ T+ L7 @* [$ T& D8 b& U5 ]# I
ospf cost 5008 v Y, y* x9 S# j. Y5 `
#
3 Q! A0 {. d9 Z/ q: Jinterface NULL0- K5 y) \1 j9 O7 @5 ^
#
( b* ]) ~' `! e* [" b9 k/ D% ]) ?interface LoopBack0
1 B, F2 d% t& W ip address 172.16.1.3 255.255.255.2553 y; t% r- v9 E5 j" r' n/ `
#
) ~) {- S& ]% I3 e6 ?# ^1 Nfirewall zone local) U- g# @# B% c2 g
set priority 100
% @- n8 M5 \9 c. e$ d#- u# D( f( g# U& c7 [+ T0 x* z/ |+ [
firewall zone trust
2 E, ]. [* L. C1 @& a- ]. Q" }: S set priority 851 Q+ T9 b1 } z/ I# [0 n4 b* U
detect ftp2 v8 o% s0 t" {! z& b
add interface Ethernet2/0/2
# S5 y7 t! Z' O. P) \#2 z: \# y4 v# w* K
firewall zone untrust' M/ q7 r1 Z- R* j: d7 f
set priority 52 ]5 @$ C7 r3 V! K
detect ftp
) n1 E9 M) Z; _" h% s! v add interface GigabitEthernet1/0/1) K/ J6 J% O2 c7 N
#
2 H* R1 A d; Y8 ^firewall zone dmz5 E1 m h+ }! t. b& D
set priority 50
7 l( N8 L: K) M* f) V8 W, ~2 d; Y add interface Ethernet2/0/0
' y* @: F. N- [5 G+ ^, u#/ k: F1 I E8 F+ S, C( E" n
firewall zone name hrp8 m2 t, O) q$ Z
set priority 40* Y" H0 ?9 U% I9 j
add interface Ethernet2/0/76 w3 m$ S7 E$ S- p' \
#
" E+ T2 o( _8 K4 Kfirewall zone name gprs# p3 J: ]1 x6 x, P% w1 n8 H( c
set priority 45 Q& n- G3 e' q- L( z; i, v
detect ftp9 Z9 @% O- e+ _1 A/ s
add interface Ethernet2/0/1
6 m. q4 N( p. a% x: B#
3 K9 Z) c- {' W& Z- G* Afirewall zone name dudubao4 ?0 Z! ]( P4 \) I: q( h3 m
set priority 3 U ]0 \3 P, e3 \5 f7 }, L. @ f# S, K
detect ftp
7 K. ^/ G) C9 j! y) h add interface Ethernet2/0/38 `$ k( g9 R. |. ~
#
- s1 _4 @/ P1 V8 }" Afirewall interzone local trust- O2 {. j% \( A: n+ k: `1 y8 u
#
& H; C+ f! Y+ |) Mfirewall interzone local untrust + k; K/ @" @0 Y" D
#
9 P5 ~' P% f2 S8 B Q4 vfirewall interzone local dmz% v n! V9 O+ b x
#
/ R c: K1 U4 B& Y/ ^firewall interzone local hrp \3 T* D/ Y, k A, Q
#
# @. r, X G6 S$ t5 Lfirewall interzone local gprs: g$ t, v# x, `
#
3 c0 R' ?( `8 v8 j! a1 {+ Hfirewall interzone local dudubao
2 {5 F8 q; R O. T+ @#
* R9 f& @. w" C1 _5 L% G! O% y0 H1 jfirewall interzone trust untrust' u, w: S% O8 h4 c9 H4 D0 I5 l5 H
packet-filter 3003 inbound
6 q* |. m2 t( ]* N: B detect ftp
7 |$ G$ v5 L' G( n#5 {0 d6 ?+ _! e8 q1 X3 X! G1 Z5 S
firewall interzone trust dmz L9 h; I( M9 C% v( Z& i8 c6 L
#
; G$ ^) u" J% b! }5 M) a; hfirewall interzone trust hrp- j E- n* t' G
#) u% ?6 }" m' R9 p: ]
firewall interzone trust gprs
9 C4 O# t' ~ r9 I0 A2 N" `, C, ^# e5 U nat outbound 2003 address-group 3
) L# K7 m% ?* \% A4 N5 q detect ftp
4 u" ^' K8 M4 P3 o u5 a1 U4 [- u#8 o5 e( H5 n: L7 D4 }. i) b8 X
firewall interzone trust dudubao
' Z# M! L* C; h% f packet-filter 3005 inbound # r- y1 E7 y, X9 J0 O- R
detect ftp
, @0 s6 k0 U3 X4 O; i' E#
! B. j* p$ Z8 a+ w3 b& tfirewall interzone dmz untrust
* a, c2 W4 r$ `% U' H#
- f. q9 H% }" ifirewall interzone hrp untrust5 V& p' m- L2 N% s* Q
#% Z5 M# ^" g) ^
firewall interzone untrust gprs' F0 l+ |1 f& G5 {. o( u) w" ^/ G1 D
#) b9 t. |" Y! w4 h3 S" j6 G
firewall interzone untrust dudubao
" S3 `# {) X/ d& a2 Q: }+ @#1 \- h' h, g* Z
firewall interzone dmz hrp
$ S3 H' |- N$ {) i! ~0 X8 h#
2 i7 U; i1 X; p" v# o) f/ h' ffirewall interzone dmz gprs7 p& ^% }. B! d) o$ ]
packet-filter 3002 inbound
9 v/ p1 h& H7 \; r9 m nat outbound 2002 address-group 58 y) _2 P% E7 |% S
detect ftp
1 E+ ^* n. ] T, B1 t9 f! ?9 L#
- P9 M( w! B, F1 W1 s2 Lfirewall interzone dmz dudubao" \( H7 t: t* C% _. Z( d
packet-filter 3006 outbound
$ W" B3 S6 @% l3 N#( U) p1 t; Q% b% X- O
firewall interzone hrp gprs
" [- Z$ r& z! T# y#
4 f% S% p+ y5 ?4 b8 W0 g5 ?firewall interzone hrp dudubao
3 ]1 B) u/ I8 D& o6 g#: {' x* X% g+ G; b/ m% W
firewall interzone gprs dudubao
, s; H; Y% j: G+ h- P0 O#% U" R/ e; F k: }1 E6 T
vrrp group 1' E9 l$ k9 Y% Y ]; _! U0 {. O
add interface Ethernet2/0/7 vrrp vrid 1 data
- g2 W4 g) ^! ~" x% g vrrp-group enable
* i6 S. R7 w- s) M vrrp-group priority 105 |# `5 l1 `6 }8 C1 Q! W) f# [
vrrp-group preempt delay 60/ U& Y% K7 W; z# Y
undo vrrp-group group-send$ O' j6 q/ E: e9 g7 P. D
vrrp group 20 j* l$ R) V$ S* G% |$ f6 ?; y9 Z
add interface Ethernet2/0/7 vrrp vrid 2 data$ U9 |8 N- M* y$ n( o
vrrp-group enable
9 j# O& a: A# \" ~6 \ undo vrrp-group preempt
& C8 r/ u7 x1 I5 ~5 } undo vrrp-group group-send) I* l; A4 z5 M$ `& s+ F
#" f2 A2 ?4 x6 D. Z* Q
aaa
, r& c! [% M( Y+ t8 M6 K local-user huawei password cipher 1_`%CO&$8@7"+C5`;6XL!!!( v3 _/ {: Y9 t* E' Z
local-user huawei service-type terminal telnet ssh
" v& S6 S2 n/ ?" J, p8 P/ C7 n6 a local-user huawei level 1
+ ~# ~( V! B$ ?8 R9 l/ v1 o authentication-scheme default
s, u/ x6 Y. v3 ^# {0 {- d& K% Z6 v
authorization-scheme default
, {6 d$ m- P: m" x#
8 X' d1 m+ B# N) ~9 O( u9 V accounting-scheme default
9 Q' i- a% a! l! p. G#$ U6 O+ a6 X6 w% r: A
domain default/ f3 s! Z4 N. u- E% {! b
#2 o' R* {" j) E# I! Q7 v
#
x4 {- y. q, |9 ]% S" s' Q6 tospf 1
0 R7 _, u) P3 j; k4 F import-route static
; P! B) O+ N* [2 D- S# F( t4 R& { area 0.0.0.0" x( M) \* u5 V# U. F6 \' F
network 172.16.1.3 0.0.0.0
3 e8 R, p7 @0 G- B3 e& l* V network 172.16.2.0 0.0.0.39 v7 J4 k% Z, S2 d5 h
network 172.16.2.8 0.0.0.3
! z& a5 _0 N+ K/ c network 172.16.2.24 0.0.0.3
3 @. i0 e P* z9 P* q+ s: j6 t#7 Q! U* h0 R9 W
ip route-static 9.234.21.0 255.255.255.0 145.234.132.1535 F, s0 Y% Q+ @6 B+ d: Q& {
ip route-static 10.0.1.0 255.255.255.0 60.12.194.129
6 e: t( A9 P- a' q* ]& f/ K% n ip route-static 61.14.10.218 255.255.255.255 60.12.194.129& W2 V: h- e2 z" ^9 R
ip route-static 119.57.5.0 255.255.255.0 60.12.194.129
2 N$ s- y, U! Q$ I6 ~ ip route-static 172.15.10.4 255.255.255.255 172.16.2.1
# N+ r0 U# s9 [, C ip route-static 221.136.75.25 255.255.255.255 60.12.194.129
3 s- H; o8 Y4 V#
; G* J% k6 I+ {# z/ A- S snmp-agent! ^; p7 T. a1 S ^
snmp-agent local-engineid 000007DB7F00000100001BEE/ h' L S s* g' l, b+ l
snmp-agent community read nbcardro
1 P3 e% u$ w. Z snmp-agent sys-info version all
8 d0 w' d, G& w( {* A6 [4 V$ l3 @#
7 x2 @0 ]: Y/ m ssh server timeout 30+ P& l8 h0 p& e" ]. P3 ?& C8 l
ssh server rekey-interval 24
, n1 ]* _+ t8 x/ B) w ssh user huawei authentication-type password& _5 A; s( F7 m- z5 v9 z7 D
#3 P. Q# B. i" T3 d
user-interface con 0
! q& i/ `6 Z& ]" S authentication-mode aaa* ~" b3 X; t6 Z+ i# p% d
user-interface aux 0
! n; U% m5 B3 x$ m8 M authentication-mode none, W3 R K3 f$ o4 ]( e: s
user-interface vty 0 4
2 W/ a- d& p N; c' Z) A acl 2000 inbound
" ~5 r0 W3 R6 h g authentication-mode aaa" g$ d+ q$ M# e0 Y" K5 V: i: ]: S
idle-timeout 5 0
( R* K3 a5 K4 [# m- u#0 N, V+ w- D5 e6 K
return |