这是华为的配置:0 f# O" M u' e& M
#) N7 s- g( [4 N
acl number 20008 i3 j% m$ d5 n6 k W. Z
rule 0 permit source 172.16.14.1 0! B* E1 Y4 ^, m
rule 1 permit source 172.16.1.0 0.0.0.255- @ q, x' t- ?" l
rule 3 permit source 172.16.2.1 06 x6 A: Q+ B( V3 k
rule 4 permit source 172.16.2.13 0 ], o/ s$ L' e/ @$ G/ h" a
rule 5 permit source 172.16.10.0 0.0.0.255
" l' U$ A8 @! N2 ~$ e% { rule 6 permit source 172.16.16.2 0, M" L- b. H6 x* {
rule 7 permit source 172.16.2.2 0% J" z9 l2 ^. o8 _% J( _% V; {& ^
rule 8 permit source 172.16.14.50 0" D/ S! @0 i( e+ Z1 y
rule 10 deny) q1 U. ^9 X3 S! |2 q8 @9 B3 O- J
acl number 2001- M7 N! ]& r$ X2 Z
rule 0 permit source 172.16.12.51 0# P9 m" K3 O% o) k6 J% m
rule 5 deny
5 B" N* K7 m/ e$ h9 Y; eacl number 2002+ C8 l Z9 z( R4 D3 @' @; t
rule 0 permit source 172.16.12.61 0
/ d5 Z9 Y* [3 ?0 f rule 5 deny
' t& \; p& ?5 c7 ]& b7 eacl number 2003# s3 c; d9 Z3 O/ D5 _
rule 0 permit source 172.15.10.4 0" L6 G6 Y! f0 [! ?# u& t
rule 5 deny( a* t5 e2 Q1 H9 ?! N
#! L& ?+ E, ~- `( u2 w& y
acl number 30004 `5 ]0 m: m, H
description dmz-trust
5 q0 P3 l. ]2 k' i6 s; B1 ~ rule 0 permit tcp source 172.16.12.61 0 destination 172.16.10.71 0 destination-port eq 4008
4 {9 L7 q' T$ U/ C# J$ p% y. _ rule 1 permit tcp source 172.16.12.61 0 destination 172.16.10.71 0 destination-port eq 88980 j5 q: C% O7 `# ?3 ~" P
rule 2 permit tcp source 172.16.12.61 0 destination 172.16.10.71 0 destination-port eq 8868
6 a4 q4 E3 c& [$ S* I% Z: W rule 3 permit tcp source 172.16.12.61 0 destination 172.16.10.71 0 destination-port eq 8858
- H' W9 @+ b8 }' y rule 4 permit tcp source 172.16.12.61 0 destination 172.16.14.155 0 destination-port eq 4008) Z& D/ U; N o$ W a) K7 s
rule 5 permit tcp source 172.16.12.61 0 destination 172.16.14.155 0 destination-port eq 88985 e: j! w& O/ ?. ^
rule 6 permit tcp source 172.16.12.61 0 destination 172.16.14.155 0 destination-port eq 8868
) P/ |3 R: b8 u1 T rule 7 permit tcp source 172.16.12.61 0 destination 172.16.14.155 0 destination-port eq 8858# ?( }( o3 [# O6 @: Y9 i, z- M2 \/ E
rule 8 permit tcp source 172.16.12.51 0 destination 172.16.10.71 0 destination-port eq 4003
2 l. \! a% R7 a( ~; O rule 9 permit tcp source 172.16.12.61 0 destination 172.16.10.71 0 destination-port eq ftp
0 ]# w# M: Y1 A* Q S1 y7 Q rule 10 permit tcp source 172.16.12.61 0 destination 172.16.10.51 0 destination-port eq ftp
3 ^- ~* M* @) L4 O3 r5 X rule 11 permit tcp source 172.16.12.61 0 destination 172.16.14.155 0 destination-port eq ftp
& Q/ C9 B0 ?- g+ x( Y rule 12 permit tcp source 172.16.12.51 0 destination 172.16.14.155 0 destination-port eq ftp
: V! x: h% D5 i% f4 s& E0 B0 N rule 13 permit tcp source 172.16.12.51 0 destination 172.16.10.71 0 destination-port eq ftp) u: j _1 l& m
rule 14 permit tcp source 172.16.12.51 0 destination 172.16.10.51 0 destination-port eq ftp2 P" Q0 k! k/ I4 v: A c: t
rule 15 permit tcp source 172.16.12.51 0 destination 172.16.14.155 0 destination-port eq 4003* A* @) M5 W( i& f- i7 s) @4 u
rule 16 permit ospf
( y w7 o; Q2 S' w- l5 q rule 17 permit tcp source 172.16.12.51 0 destination 172.16.10.101 0 destination-port eq 8$ Y) Z- p- X6 z: v$ F
rule 18 deny tcp
5 \' x' P( ?4 W# V. v! r; Oacl number 3001
+ `" D! @# @& ^' [* ~ description For Untrust-dmz, \6 B X8 F( |4 h. E* E! Y3 P# K
rule 0 permit tcp source 172.16.20.0 0.0.0.255 destination 172.16.12.51 0 destination-port eq 5000
1 ?4 W6 n# m6 ?6 I0 c rule 5 permit icmp
3 n$ L# d5 {; ^8 i) W8 a* { rule 10 permit ospf
' D& t5 t( R$ ^& B0 l% M rule 15 deny tcp source 172.16.20.0 0.0.0.255$ [( T# Q3 u9 O
acl number 3002
7 N. C4 }1 Q5 e- P9 S- |8 ~ description To_Yinlian
8 @: j( L; ?- p7 p rule 0 permit ip source 9.234.21.63 0 destination 144.234.97.33 0; i* x: ?& u9 L8 Q
rule 5 permit ip source 9.234.21.64 0 destination 144.234.97.33 0/ l+ X( z3 Q" O& D8 i l3 I5 K" ?
rule 10 permit ip source 9.234.21.66 0 destination 144.234.97.33 0
P: i3 N6 G) Z4 T9 l; K$ y% F6 f rule 15 deny ip
% L. C3 c( l) p. Qacl number 30033 |6 A$ I& B2 a
description for Untrust-Trust3 D8 z2 T+ [ I: q" `/ p
rule 0 permit ip source 10.78.72.70 0 destination 172.15.10.4 0: Z" P) }6 @. x$ v
rule 1 permit ip source 172.16.2.26 0 destination 172.16.10.111 0- t) W" P1 w* G* R! Y K% W8 h
rule 2 permit ip source 172.16.2.26 0 destination 172.16.14.1 0* ?$ f1 S' {* V7 d7 ^
rule 3 permit ip source 10.78.72.153 0 destination 172.15.10.4 0
+ r8 M4 q* L+ G8 ~ rule 4 permit ip source 10.78.72.157 0 destination 172.15.10.4 0
4 D2 x& l/ k, B2 a rule 5 permit ip source 192.168.100.43 0 destination 172.15.10.4 0 b6 r# ~- U" o% |! V+ k3 G
rule 6 permit ip source 10.16.2.7 0 destination 172.15.10.4 0
1 r- A2 n4 u j! N2 z rule 7 permit ip source 10.16.2.5 0 destination 172.15.10.4 0, P7 y) Z5 O* p5 X. V
rule 8 permit ip source 10.16.2.6 0 destination 172.15.10.4 0
4 ^ c) e4 _* q- G rule 9 permit ip source 10.16.2.8 0 destination 172.15.10.4 04 S" K; x/ s1 O- e9 S
rule 11 permit ip source 10.139.25.26 0 destination 172.15.10.4 0
" n9 M; {& Z$ J% H+ y" G rule 13 permit ip source 10.143.10.183 0 destination 172.15.10.4 0
6 g% k7 y1 s! q! j8 Q C rule 50 deny ip. D: ]0 q$ r8 w7 N
acl number 3004 ; n3 u9 x1 m9 U3 h
rule 0 permit ip source 172.16.1.7 0 destination 172.16.10.111 0
. H7 k" N# { V1 Xacl number 3005
6 |+ O5 H" W' d- r description TO_dudubao
2 Y/ ?' O" R' x; t rule 0 permit tcp destination 172.15.10.4 0 destination-port eq 68685 ?0 q) V7 J7 i1 m
rule 1 permit tcp destination 172.15.10.4 0 destination-port eq ftp-data
3 e7 j* d9 P2 v6 L. m rule 2 permit tcp destination 172.15.10.4 0 destination-port eq ftp
% I& \$ S) C7 g& iacl number 3006) N/ S1 A8 C+ c' U$ W7 B* A
rule 0 permit ip source 172.16.12.0 0.0.0.255 destination 10.0.1.0 0.0.0.255
$ V# B' u1 a! }1 n+ G6 lacl number 3007. T7 r. _: m9 N1 c- o
rule 0 deny ip source 172.16.12.0 0.0.0.255 destination 10.0.1.0 0.0.0.255# r/ f, [( {6 `2 f# x
rule 1 permit ip source 172.16.12.0 0.0.0.255! n F' u3 E, u: H$ r- _% i
#
+ ]: w& q# o2 L2 i sysname NB_Eudemon300-A; b0 l0 [: c2 m2 e
#) n t* c% V; }* H% y7 b% w+ Z
super password level 3 cipher '._1D9P1YCQ=^Q`MAF4<1!!
, z% L0 S# E* c1 ]1 E#
! r p: P: R4 o# r info-center loghost 172.16.10.1928 A$ h; P( g! }& G7 N
info-center loghost 172.16.10.111; S5 {- q& s# n& d
#& e+ _: d/ G) x. [( {0 K
hrp enable+ F: E! i8 f, b' u) N
hrp interface Ethernet2/0/7
) W+ _- x0 Q8 g#
# |5 z! \, ?& L5 Y( w router id 172.16.1.3 " ~3 E, D4 M0 L6 D/ k! {1 `' C
#8 y1 Y5 }% M4 H: @# b, p5 k' j
firewall packet-filter default permit interzone local trust direction inbound
. ~* q% P2 X1 H: i firewall packet-filter default permit interzone local trust direction outbound) t+ ? j; H0 Y' r
firewall packet-filter default permit interzone local untrust direction inbound3 {" c, @, K, i4 M3 f2 M
firewall packet-filter default permit interzone local untrust direction outbound
( ^8 {! B- K' H* t0 O" i. ^2 u firewall packet-filter default permit interzone local dmz direction inbound3 a6 @1 X3 D5 L6 k: @" a: r
firewall packet-filter default permit interzone local dmz direction outbound
2 `5 g( _% N+ f' s" k firewall packet-filter default permit interzone local hrp direction inbound- f! W% w8 @( S: b+ j. Q" A
firewall packet-filter default permit interzone local hrp direction outbound
, S* T" D" C$ A' q2 |" T: S firewall packet-filter default permit interzone local gprs direction inbound: y/ R+ ~. ]2 U0 l5 r! k: C# N
firewall packet-filter default permit interzone local gprs direction outbound1 M/ l/ D. g% H) P4 {& D
firewall packet-filter default permit interzone local dudubao direction inbound- b2 r5 h5 } u& A3 v1 T
firewall packet-filter default permit interzone local dudubao direction outbound' K4 R' f' n/ T& K( b) s: k s* c
firewall packet-filter default permit interzone trust untrust direction outbound
! V6 v& a. ], ~! U: i1 o firewall packet-filter default permit interzone trust dmz direction inbound
. E2 t. w. V1 R! {1 I firewall packet-filter default permit interzone trust dmz direction outbound
' H! P. m1 h; j+ |" ]$ w firewall packet-filter default permit interzone trust gprs direction inbound: Y' C6 p3 S* U9 f
firewall packet-filter default permit interzone trust gprs direction outbound
) c% i7 Z* [/ `/ ^3 J6 g3 C8 M firewall packet-filter default permit interzone trust dudubao direction inbound& Z: q; b$ d# s4 I) L! o
firewall packet-filter default permit interzone trust dudubao direction outbound1 P# l- c* {' |
firewall packet-filter default permit interzone dmz untrust direction inbound
& W# u, F. n0 Y2 l firewall packet-filter default permit interzone dmz untrust direction outbound% ^7 S9 f* l: R* _, P5 V. v
firewall packet-filter default permit interzone dmz gprs direction inbound) U, o6 R' U# z! e; V
firewall packet-filter default permit interzone dmz gprs direction outbound* s% g+ g9 t. I0 R
firewall packet-filter default permit interzone dmz dudubao direction inbound
% Y1 d4 |; c L" `/ Y6 i | firewall packet-filter default permit interzone dmz dudubao direction outbound y# L& [: J H' P
#
" R x2 k3 W6 b! e# C* T nat address-group 3 145.234.97.33 145.234.97.335 A o- a: z2 m( b5 i
nat address-group 5 144.234.97.33 144.234.97.33
* ^& e# s0 h' B: P; M- m nat server zone gprs global 144.234.97.33 inside 172.16.12.61: W' N( C4 @" E7 l/ G E- Q
#
5 C# n( I6 u( t1 ]' v bypass switch-back auto
. F" b; K/ w+ k) i#+ l3 M6 N; |# Q6 V, x0 U& Q
firewall mode route- `! d% W; U" J) I% t
#
- S. j" K- ?8 o4 u m firewall defend ip-spoofing enable& o' ]7 {0 I" T/ e
firewall defend land enable* Q* {. A5 p) Y8 i8 d M8 v
firewall defend smurf enable
. D9 a, ]$ X6 J- ] O4 W firewall defend fraggle enable
4 W, V# W# V4 T! h0 {2 e firewall defend winnuke enable
* X. F. R4 \; A' c9 r H; X6 H, c ] firewall defend syn-flood enable# x4 V0 H3 J) ?, r: k+ E2 K9 Z& P
firewall defend udp-flood enable
# ~* \( t6 ~; J3 H9 x3 @" Q, B firewall defend icmp-redirect enable; g+ U4 N0 c0 x& t
firewall defend icmp-unreachable enable
! @7 v1 f% J* t% d5 B9 d" V firewall defend ip-sweep enable
- N5 z" O% |8 y( G firewall defend port-scan enable
# R9 N2 n2 ^& N4 @5 O" s firewall defend route-record enable7 E$ u$ Q, ?5 h7 {1 J
firewall defend ping-of-death enable
& o/ b+ w( S4 m8 Y0 E firewall defend teardrop enable7 M6 Q+ I: e3 O5 Z* l4 t: O
firewall defend tcp-flag enable
+ R1 Q" E8 G& {4 e* ]) e firewall defend large-icmp enable
# d& n) O {9 h; @9 o) k. {#, M; R& Q) H7 K8 l; s3 X
firewall statistic system enable
# y/ i5 T l3 B#
, I' o f+ K7 H& h: H# p4 ]ike proposal 13 U2 y. o5 n( d$ U) Z9 X
#0 f! n6 E0 _ ~- ?* o- B
ike peer a
' o3 z& i- ~0 U* F pre-shared-key cnnbtk
`0 N3 ^9 {+ X2 q2 l& y ike-proposal 1
! ]. o- L- [ Z6 a1 `: _2 |7 s8 w remote-address 119.57.5.5
0 M+ W! G) q* N! ^#
; V1 \: o7 f6 v" ~5 m; D' fipsec proposal tran1
; Z. n1 V% `; p" {: G, s8 J# |#; L8 p: w' n0 {, b
ipsec policy map1 1 isakmp
; L/ j: c) c2 Z8 Z security acl 3006
& _1 {, q4 w8 I; H pfs dh-group2
" a$ E) s/ x# O" | ike-peer a
0 L. |2 _0 ]3 v proposal tran1
8 }/ j# ^1 w2 ^; ]. f% R5 U6 U local-address 60.12.194.14
; d- @% t4 j- g0 I f#* P/ k- }- J, [0 A4 m: n$ a
interface Aux0
' f# [/ S3 L9 p4 S& \ async mode flow2 i( X' `+ h" T# i
link-protocol ppp1 o! U0 y" q& X
#
3 B( K$ Q$ g9 z: ]' ~, |+ x9 c* h7 V- Kinterface Ethernet0/0/0
9 ?4 V, t9 u4 v$ v; `& x) |#/ n! x6 Y. Q4 s0 X
interface Ethernet0/0/1* U) y& l6 o; N) i/ C: m$ R8 q: L
#+ [ p) j! ~; `: `
interface Ethernet2/0/00 b+ P& Y$ p, z
description To_S5624-A(1/0/24)
' W4 R$ }7 R# ?& O: _: u- N ip address 172.16.2.9 255.255.255.252
0 Q3 @+ `- O! k ospf cost 100+ K2 X; ]8 a8 n9 }; \# p
#6 R5 i' E E# _" o7 ]
interface Ethernet2/0/19 p0 Y: u4 t% E0 { H6 G0 r
description To_Yinlian
) i0 |+ z0 z K ip address 145.234.132.154 255.255.255.252
/ @: }7 p- _( u3 P+ K6 h" T$ @0 Z#$ ]* A* b9 g2 E% ^+ F/ Q" p
interface Ethernet2/0/2! Y; C* f/ }" G0 I
description To_S6506R_A(7/0/48)
; |2 N; Q C& y: p: ^, K ip address 172.16.2.2 255.255.255.252% C( x _8 x( }! N* y" w7 j8 l
ospf cost 100
$ f) r8 Q# H' r, \. x% U#/ b8 D# L1 d/ |5 `1 H8 j9 A
interface Ethernet2/0/3
0 {5 u! V2 a) }0 T description To-dudubao% a1 @$ R% G5 C1 I& |: }8 A, T
ip address 60.12.194.14 255.255.255.240
+ z l$ o3 I8 Q, Q ipsec policy map12 ?, |9 |6 P/ E, ^( q" Q5 U
#
+ _( `1 t! a! {. ]1 n5 Minterface Ethernet2/0/4( x, n+ T. E E5 T
#
# e) u! c& s: X! J+ Xinterface Ethernet2/0/5& b1 `/ t4 X) J) L- Q2 t& B; x0 U
#
# ]7 I! W9 V0 }% v2 Minterface Ethernet2/0/6
4 P* X$ w3 ?! n k5 D, p) m. t; V#
: _+ J$ a4 y2 t3 i% zinterface Ethernet2/0/7/ h! ]. i* b9 [; w8 W
description To_Eudemon300-B_E2/0/7
6 [ Y [9 s. g! n ip address 172.16.2.201 255.255.255.248
: d8 s; ~* I9 b v2 v vrrp vrid 1 virtual-ip 172.16.2.203
: e( Q) B8 c3 D [! o8 O vrrp vrid 1 priority 150
! N( N( k1 P3 _! j; A# A% `' W. ^ vrrp vrid 1 preempt-mode timer delay 60
) c/ H" O4 f& \- h# j. @ vrrp vrid 2 virtual-ip 172.16.2.204
2 h2 m |- q) n#
5 ?4 }6 R/ I$ N U! u) \0 o! Pinterface GigabitEthernet1/0/0
! d$ s- p8 V& T shutdown 2 S* G1 i( k9 Z6 n. O
#9 b9 W8 ]+ g! P8 [: z
interface GigabitEthernet1/0/1
) T" ?6 X6 L; v/ z# r; F# `7 i9 h description To_S5624-B(1/0/25)
9 a" Z$ U; G+ ^ p ip address 172.16.2.25 255.255.255.252
- J$ {5 C) O8 Y" @% C ospf cost 500+ L- Y! m1 g, P+ D( h1 y% j; J: I: H
#1 \8 }5 R/ L, S& b5 O
interface NULL0
1 Y4 m( b" ~9 v6 {6 A#9 r7 t' I' s) r1 j3 w) N/ D
interface LoopBack09 I, p7 K. m) K l' b# Q" ]
ip address 172.16.1.3 255.255.255.255& V; h& B- f8 t
#
* J, o. U# M) }# I$ Cfirewall zone local1 ^) v) g3 F3 z% O" o3 q1 a
set priority 100! d" `" ]. o3 y/ ^1 J
#
, J% ]6 {5 ?, Tfirewall zone trust1 d; b5 O' J* A; F
set priority 85
* i7 @. s2 F0 O8 }* c" F0 e# u detect ftp
! F: y7 [& y* `3 o! i/ x4 p3 Y add interface Ethernet2/0/24 e: v* n2 P( N; E
#$ m3 ~5 A& |9 P+ a" E7 r: Y, ?! ]
firewall zone untrust; ?1 q) S2 N9 Q. w3 t+ H
set priority 5
6 @" e, l$ {. B4 C) j detect ftp
Y: t( B8 m7 I+ M add interface GigabitEthernet1/0/11 x9 z2 p4 g. v6 {8 p8 j
#
* z" D+ q$ g+ B+ m; ~: kfirewall zone dmz) I! V# A. o$ a# d& Z1 J
set priority 502 [9 r% y& }# z: A$ m
add interface Ethernet2/0/0
( C+ K0 x: }) X: z7 q/ x* H+ c#& A; Y7 ^, T1 ~2 ?: h' Q- O3 N
firewall zone name hrp D2 r9 `9 r3 N$ e. K% @
set priority 405 i/ m* ~+ a. m# h* n( N
add interface Ethernet2/0/7
$ U, [: T+ o/ E$ y2 u#5 k+ Q& E2 B+ o+ p) i* j1 ?
firewall zone name gprs0 b+ [* q9 \; t. T# ^' H
set priority 4
" P) n$ `. p2 B# u b detect ftp0 p4 h& X6 i" t7 h
add interface Ethernet2/0/1
, `2 r& R+ B1 Y' S#& U& y, }9 p( d* y3 Y9 `
firewall zone name dudubao* j0 j6 ^0 S+ X2 q& c
set priority 31 I0 B& a5 @9 A; l- P, ~) k* w! ?
detect ftp
1 L, Q# ]7 G* A) ]1 }6 J7 [) L add interface Ethernet2/0/3
1 N% e3 H( l6 e/ o) d#1 X4 ~) i2 m% q7 o
firewall interzone local trust
`! ~9 a7 {' g+ P#1 b( O8 \9 F) t8 N0 \' Q
firewall interzone local untrust
/ k/ P% _" h- U4 d) P6 o) n3 c6 x#! n% ]6 J# a! z' C7 @' R6 b; @8 }
firewall interzone local dmz
: `# O O& {5 V! m+ s+ j: h# f#
$ d$ `- M% h* v$ o4 L1 Mfirewall interzone local hrp
( H5 }1 d5 j2 o6 u3 I#
, [0 e2 w' [$ T5 Ifirewall interzone local gprs- }. O5 I* u2 F
#
$ B- n; W1 s! d$ Ifirewall interzone local dudubao
1 Q- N/ H+ X9 e( h#, i7 G, }. a V/ B) C* D
firewall interzone trust untrust- }$ b0 f- S% Z* V- l" y' a
packet-filter 3003 inbound" z8 j. h/ A& h9 P
detect ftp3 ?& B# [. _- K7 } V
#4 i J" e* E! T3 p" K% V/ C/ i9 ?
firewall interzone trust dmz
) D. X; \) e- I6 C; o7 c( ]#
& V+ P$ H% r, ^0 {firewall interzone trust hrp! p. r- _) F& W7 H0 l5 A/ q
#4 D! [9 Z& W e: o7 v# U/ @
firewall interzone trust gprs
; ? ~4 W. B3 Z nat outbound 2003 address-group 30 w' M" e6 R3 k- P- @7 K
detect ftp
3 h* ]: W/ A3 f#
& p2 j" a; n) Z# E! g+ N* Sfirewall interzone trust dudubao% h8 _* e" o, r
packet-filter 3005 inbound
2 h0 L6 r% o* U1 ^# N' M detect ftp+ h1 p0 u% B* U, Q- a$ d. p: ?
#% ]; m) c0 J( B6 ]" A
firewall interzone dmz untrust6 k, e6 L9 v6 d+ `
#% Q. T! K; U/ H9 c' W; R
firewall interzone hrp untrust
2 m' w8 |* @* e! ?% D3 H/ p5 g#( s! }+ ]" q( [* F$ G% q$ L
firewall interzone untrust gprs
i( Y8 P+ t0 X; q6 A, f) W9 T+ C9 X#
+ N: V) H, f* @6 Nfirewall interzone untrust dudubao
- b$ m+ J5 L1 U$ v: \#
, [: `. x" N$ k) j' g. U% Lfirewall interzone dmz hrp
8 m& [2 e+ e& E5 q( K3 o; n' }& `4 O#* {) Y8 n8 A( }) h5 H ?3 V
firewall interzone dmz gprs
; p |2 Z; O, Y( O# { packet-filter 3002 inbound
) I# }4 K$ {+ R: C( s& R nat outbound 2002 address-group 51 o7 R- \# D) i/ ~+ g# I" n, S
detect ftp
; u6 T5 h, {9 m3 C#
# X$ H$ j8 o9 U6 _+ h u7 n+ D9 ufirewall interzone dmz dudubao
! u0 Y, O8 D1 m2 m9 w t" n7 S packet-filter 3006 outbound5 n5 b: Q2 v8 f% N& O8 C7 q) B
#( K5 |' Y' C" U* T3 v( F" c' v
firewall interzone hrp gprs! t: e' ]) \# m# j& k% }5 ^# I/ ^
#
" j& d5 _/ P* O) w8 V, Afirewall interzone hrp dudubao
! }1 ~/ Z: _* q#$ A) j q; `( v* a
firewall interzone gprs dudubao2 j0 r( B. R& ^) J( b1 U
#
6 n+ H6 y5 C8 Mvrrp group 1
5 p% O ~1 p, h7 J add interface Ethernet2/0/7 vrrp vrid 1 data
, P- t3 x/ R1 N' v" ^ vrrp-group enable) [1 E. `" Q& `- d- s6 j8 ~
vrrp-group priority 105
* g# k1 ~ U* B( l vrrp-group preempt delay 60
, R, [" ^# {0 h8 u7 Q* N% `$ W& r undo vrrp-group group-send
+ P* E n: N* X+ ~! q4 q0 ivrrp group 2
& H+ S" D- ~" a) c, q( d$ L add interface Ethernet2/0/7 vrrp vrid 2 data1 W5 z0 A! C4 N, x
vrrp-group enable' i, S4 Q. S8 x! \2 e5 ]
undo vrrp-group preempt! T* N. ~4 H) K7 D" x
undo vrrp-group group-send2 `8 d' [1 S! q5 o
#5 f3 j$ f, x3 L$ D; j4 a. s6 f N
aaa* R k6 z" h! C! `) n$ _, M) k+ v
local-user huawei password cipher 1_`%CO&$8@7"+C5`;6XL!!!
K3 Q# v A5 X local-user huawei service-type terminal telnet ssh G8 u6 R. k8 r- Q
local-user huawei level 1- W4 F- D6 ~8 f8 u) a/ a5 P
authentication-scheme default7 v4 f* |% G1 t) _* m [
#
7 J9 b5 v2 x' J0 C8 k* d7 Z( V, l authorization-scheme default
- F. M) A5 F2 y' q4 h" F#
% }0 L& O- B' a5 c1 n accounting-scheme default6 q% i, i4 O) s3 g3 w- G N
#* h, w9 p+ M7 v/ i
domain default, {9 ^0 v: Q9 c5 k5 G* |& a3 |) D( {
#
6 f, M, v6 O1 U' T#2 z4 M2 N# c: n; C/ r
ospf 1, h. d T8 Y; l9 T
import-route static
* x" O8 A. K& h$ b area 0.0.0.0% n: M+ w9 P. i; w+ E8 d% P/ W& W
network 172.16.1.3 0.0.0.0% L+ G* @! a% J
network 172.16.2.0 0.0.0.34 b' l- {$ ^* A6 P/ N) {2 g4 p% q
network 172.16.2.8 0.0.0.33 P c6 c" E' q& _" Y; T4 q
network 172.16.2.24 0.0.0.3
+ d5 w3 K( x1 s g#
( l% g1 y' Z! d) }: ]8 }- ?% y ip route-static 9.234.21.0 255.255.255.0 145.234.132.153
# e3 b# T8 m, `. {" L4 w6 r ip route-static 10.0.1.0 255.255.255.0 60.12.194.129
# ~8 F" T0 q8 q; Q1 W ip route-static 61.14.10.218 255.255.255.255 60.12.194.129
4 `. B. L) z! W. s ip route-static 119.57.5.0 255.255.255.0 60.12.194.129
8 u( w: b% {. l% L: L' M+ ` ip route-static 172.15.10.4 255.255.255.255 172.16.2.1
7 s! T# x% J/ _! V7 ? ip route-static 221.136.75.25 255.255.255.255 60.12.194.129
9 G: [: a; c4 _7 K#
$ T! H$ w: z" P0 ?3 w8 M9 f: P7 ` snmp-agent3 D# T$ [* o* a+ P+ H
snmp-agent local-engineid 000007DB7F00000100001BEE
6 M( A/ G8 m9 c! s% t snmp-agent community read nbcardro . c9 Y& n1 [( y' Q w, R4 M
snmp-agent sys-info version all
y& A. V! j! h& X#& B; {9 K# t( E' H1 l3 E
ssh server timeout 30
* g/ A( c: I0 h9 H7 `5 t- m! Q4 ^ ssh server rekey-interval 24' p5 o4 {8 J. u0 `
ssh user huawei authentication-type password e) Z" m* x& j
#
" p3 x( T) o4 D+ r+ luser-interface con 09 N) |7 s B0 @
authentication-mode aaa
# B! f7 @ j5 l0 T! [user-interface aux 0
, M) ]1 l a% V6 M% [1 o0 Z authentication-mode none3 I7 _! a" V6 U: n V c
user-interface vty 0 49 @1 \6 Z: g$ {! w* d) d( U3 q
acl 2000 inbound" ~$ D" d l; A( g" o k
authentication-mode aaa
8 s! {( N( c8 x: P# P; _ idle-timeout 5 0! l: O- Z: P1 l4 {3 Z/ x0 x! {& l, y
#
* b; ]4 ]4 Q3 o$ {* K$ m2 treturn |