H3C S12500R Ethernet Switch Router Series Config Examples-6W101

HomeSupportSwitchesS12500R SeriesConfigure & DeployConfiguration ExamplesH3C S12500R Ethernet Switch Router Series Config Examples-6W101
Table of Contents
Related Documents
70-Switch and Firewall Connection Configuration Examples for External Network Access

 

H3C S12500R Switch Router Series

Switch and Firewall Connection Configuration Examples for External Network Access

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Copyright © 2024 New H3C Technologies Co., Ltd. All rights reserved.

No part of this manual may be reproduced or transmitted in any form or by any means without prior written consent of New H3C Technologies Co., Ltd.

Except for the trademarks of New H3C Technologies Co., Ltd., any trademarks that may be mentioned in this document are the property of their respective owners.

The information in this document is subject to change without notice.

 



Introduction

This document provides configuration examples for connecting a switch and firewall for external network access.

Prerequisites

The configuration examples in this document were created and verified in a lab environment, and all the devices were started with the factory default configuration. When you are working on a live network, make sure you understand the potential impact of every command on your network.

General restrictions and guidelines

By default, interfaces on the device are disabled (in ADM or Administratively Down state). To have an interface operate, you must use the undo shutdown command to enable that interface.

In this document, some physical interfaces must operate in bridge mode. By default, the physical interfaces on the device operate in route mode. Use the port link-mode command in the corresponding interface view to switch the interface's operating mode as needed.

Example: Connecting a Layer 2 switch and firewall for external network access

Network configuration

As shown in Figure 1, a company has multiple departments located on different subnets, and each department requires access to the external network. Users are required to access the external network through a Layer 2 switch and firewall, with the firewall acting as the gateway for the users.

In this example, an S12500R switch acts as the Layer 2 switch.

Figure 1 Network diagram

 

Analysis

To meet this requirement, perform the following tasks:

·     Configure port-based VLANs on the switch to achieve Layer 2 forwarding.

·     Configure the firewall as the gateway for users to forward traffic across different subnets at Layer 3 through subinterfaces or VLAN interfaces.

·     Configure the firewall as the DHCP server to assign IP addresses to user PCs.

·     Deploy security zones on the firewall to enable the forwarding of packets between different security zones.

·     Deploy NAT on the firewall to allow internal network users to access the external network.

Applicable hardware and software versions

The following matrix shows the hardware and software versions to which this configuration example is applicable:

 

Hardware

Software version

S12500R switch series

Release 5210 and later

 

Procedures

Configuring the switch

# Assign the interfaces that connect to the user devices to VLANs.

<Sysname> system-view

[Sysname] sysname Switch

[Switch] vlan 10

[Switch-vlan10] port hundredgige 1/0/2

[Switch-vlan10] quit

[Switch] vlan 20

[Switch-vlan20] port hundredgige 1/0/3

[Switch-vlan20] quit

# Configure the interface connecting to the firewall. To transmit packets from VLAN 10 and VLAN 20 on the switch to the firewall, configure the link type of HundredGigE 1/0/1 as trunk and assign it to VLAN 10 and VLAN 20.

[Switch] interface hundredgige 1/0/1

[Switch-HundredGigE1/0/1] port link-type trunk

[Switch-HundredGigE1/0/1] port trunk permit vlan 10 20

Configuring the firewall

The firewall can be connected to the Layer 2 switch through subinterfaces or VLAN interfaces. Select one of the following methods:

Connecting the firewall to the Layer 2 switch through VLAN interfaces

# Assign an interface to VLANs.

<Sysname> system-view

[Sysname] sysname Device

[Device] vlan 10 to 20

[Device] interface hundredgige 1/0/1

[Device-HundredGigE1/0/1] port link-mode bridge

The configuration of the interface will be restored to the default. Continue? [Y/N]:y

[Device-HundredGigE1/0/1] port link-type trunk

[Device-HundredGigE1/0/1] port trunk permit vlan 10 20

[Device-HundredGigE1/0/1] quit

# Assign IP addresses to interfaces.

[Device] interface vlan-interface 10

[Device-Vlan-interface10] ip address 192.168.1.1 24

[Device-Vlan-interface10] quit

[Device] interface vlan-interface 20

[Device-Vlan-interface20] ip address 192.168.2.1 24

[Device-Vlan-interface20] quit

# Configure DHCP address pool 5 for dynamically assigning IP addresses to clients on subnet 192.168.1.0/24. Configure the DNS server address and the border gateway. In practical applications, specify the DNS server assigned by the service provider.

[Device] dhcp server ip-pool 5

[Device-dhcp-pool-5] network 192.168.1.0 mask 255.255.255.0

[Device-dhcp-pool-5] dns-list 114.114.114.114

[Device-dhcp-pool-5] gateway-list 192.168.1.1

[Device-dhcp-pool-5] quit

# Configure DHCP address pool 6 for dynamically assigning IP addresses to clients on subnet 192.168.2.0/24. Configure the DNS server address and the border gateway. In practical applications, specify the DNS server assigned by the service provider.

[Device] dhcp server ip-pool 6

[Device-dhcp-pool-6] network 192.168.2.0 mask 255.255.255.0

[Device-dhcp-pool-6] dns-list 114.114.114.114

[Device-dhcp-pool-6] gateway-list 192.168.2.1

[Device-dhcp-pool-6] quit

# Enable the DHCP service.

[Device] dhcp enable

# Assign an IP address to the public network interface.

[Device] interface hundredgige 1/0/2

[Device-HundredGigE1/0/2] ip address 200.0.0.2 255.255.255.0

[Device-HundredGigE1/0/2] quit

# Configure the default route. The next hop of the route points to the public IP address 200.0.0.1.

[Device] ip route-static 0.0.0.0 0 200.0.0.1

# Configure security zones. The internal network of the company connected to interface HundredGigE 1/0/1 belongs to the trusted network and is deployed in security zone Trust. Therefore, the internal network can access the external network and devices in other security zones without restrictions. The external network connected to interface HundredGigE 1/0/2 belongs to the untrusted network and is deployed in security zone Untrust, and it cannot access the internal network of the company.

[Device] security-zone name trust

[Device-security-zone-Trust] import interface hundredgige 1/0/1 vlan 10 20

[Device-security-zone-Trust] quit

[Device] security-zone name untrust

[Device-security-zone-Untrust] import interface hundredgige 1/0/2

[Device-security-zone-Untrust] quit

[Device] acl advanced 3001

[Device-acl-ipv4-adv-3001] rule permit ip source 192.168.1.0 0.0.0.255

[Device-acl-ipv4-adv-3001] rule permit ip source 192.168.2.0 0.0.0.255

[Device-acl-ipv4-adv-3001] quit

[Device] zone-pair security source trust destination untrust

[Device-zone-pair-security-Trust-Untrust] packet-filter 3001

[Device-zone-pair-security-Trust-Untrust] quit

# Configure internal network users to access the external network through the NATed addresses. Users in subnets 192.168.1.0/24 and 192.168.2.0/24 of the internal network can use external network address 200.0.0.3 to access the Internet.

[Device] nat address-group 0

[Device-address-group-0] address 200.0.0.3 200.0.0.3

[Device-address-group-0] quit

# Configure ACL 2000 to permit packets sourced from subnets 192.168.1.0/24 and 192.168.2.0/24.

[Device] acl basic 2000

[Device-acl-ipv4-basic-2000] rule permit source 192.168.1.0 0.0.0.255

[Device-acl-ipv4-basic-2000] rule permit source 192.168.2.0 0.0.0.255

[Device-acl-ipv4-basic-2000] quit

# Configure outbound dynamic NAT on interface HundredGigE 1/0/2 to translate the source addresses of packets matching ACL 2000 into the addresses in address group 0 and include port information in the translation process.

[Device] interface hundredgige 1/0/2

[Device-HundredGigE1/0/2] nat outbound 2000 address-group 0

[Device-HundredGigE1/0/2] quit

Connecting the firewall to the Layer 2 switch through Layer 3 Ethernet subinterfaces

# Configure Layer 3 Ethernet subinterfaces to terminate VLANs on the firewall to implement inter-subnet Layer 3 forwarding.

<Sysname> system-view

[Sysname] sysname Device

[Device] interface hundredgige 1/0/1

[Device-HundredGigE1/0/1] port link-mode route

The configuration of the interface will be restored to the default. Continue? [Y/N]:y

[Device] interface hundredgige 1/0/2

[Device-HundredGigE1/0/1.1] vlan-type dot1q vid 10

[Device-HundredGigE1/0/1.1] ip address 192.168.1.1 24

[Device-HundredGigE1/0/1.1] quit

[Device] interface hundredgige 1/0/1.2

[Device-HundredGigE1/0/1.2] vlan-type dot1q vid 20

[Device-HundredGigE1/0/1.2] ip address 192.168.2.1 24

[Device-HundredGigE1/0/1.2] quit

# Configure DHCP address pool 5 for dynamically assigning IP addresses to clients on subnet 192.168.1.0/24. Configure the DNS server address and the border gateway. In practical applications, specify the DNS server assigned by the service provider.

[Device] dhcp server ip-pool 5

[Device-dhcp-pool-5] network 192.168.1.0 mask 255.255.255.0

[Device-dhcp-pool-5] dns-list 114.114.114.114

[Device-dhcp-pool-5] gateway-list 192.168.1.1

[Device-dhcp-pool-5] quit

# Configure DHCP address pool 6 for dynamically assigning IP addresses to clients on subnet 192.168.2.0/24. Configure the DNS server address and the border gateway. In practical applications, specify the DNS server assigned by the service provider.

[Device] dhcp server ip-pool 6

[Device-dhcp-pool-6] network 192.168.2.0 mask 255.255.255.0

[Device-dhcp-pool-6] dns-list 114.114.114.114

[Device-dhcp-pool-6] gateway-list 192.168.2.1

[Device-dhcp-pool-6] quit

# Enable the DHCP service.

[Device] dhcp enable

# Assign an IP address to the public network interface.

[Device] interface hundredgige 1/0/2

[Device-HundredGigE1/0/2] ip address 200.0.0.2 255.255.255.0

[Device-HundredGigE1/0/2] quit

# Configure the default route. The next hop of the route points to the public IP address 200.0.0.1.

[Device] ip route-static 0.0.0.0 0.0.0.0 200.0.0.1

# Configure security zones. The internal network of the company connected to interface HundredGigE 1/0/1 belongs to the trusted network and is deployed in security zone Trust. Therefore, the internal network can access the external network and devices in other security zones without restrictions. The external network connected to interface HundredGigE 1/0/2 belongs to the untrusted network and is deployed in security zone Untrust, and it cannot access the internal network of the company.

[Device] security-zone name trust

[Device-security-zone-Trust] import interface hundredgige 1/0/1

[Device-security-zone-Trust] quit

[Device] security-zone name untrust

[Device-security-zone-Untrust] import interface hundredgige 1/0/2

[Device-security-zone-Untrust] quit

[Device] acl advanced 3001

[Device-acl-ipv4-adv-3001] rule permit ip source 192.168.1.0 0.0.0.255

[Device-acl-ipv4-adv-3001] rule permit ip source 192.168.2.0 0.0.0.255

[Device-acl-ipv4-adv-3001] quit

[Device] zone-pair security source trust destination untrust

[Device-zone-pair-security-Trust-Untrust] packet-filter 3001

[Device-zone-pair-security-Trust-Untrust] quit

# Configure internal network users to access the external network through the NATed addresses. Users in subnets 192.168.1.0/24 and 192.168.2.0/24 of the internal network can use external network address 200.0.0.3 to access the Internet.

[Device] nat address-group 0

[Device-address-group-0] address 200.0.0.3 200.0.0.3

[Device-address-group-0] quit

# Configure ACL 2000 to permit packets sourced from subnets 192.168.1.0/24 and 192.168.2.0/24.

[Device] acl basic 2000

[Device-acl-ipv4-basic-2000] rule permit source 192.168.1.0 0.0.0.255

[Device-acl-ipv4-basic-2000] rule permit source 192.168.2.0 0.0.0.255

[Device-acl-ipv4-basic-2000] quit

# Configure outbound dynamic NAT on interface HundredGigE 1/0/2 to translate the source addresses of packets matching ACL 2000 into the addresses in address group 0 and include port information in the translation process.

[Device] interface hundredgige 1/0/2

[Device-HundredGigE1/0/2] nat outbound 2000 address-group 0

[Device-HundredGigE1/0/2] quit

Verifying the configuration

After configuration, both PC1 and PC2 can successfully ping external IP address 200.0.0.1/24 and access the Internet.

# Execute the ping command on Host A on the internal network to identify whether the external addresses are reachable. Assume the host runs the Windows XP operating system.

C:\Documents and Settings\Administrator>ping 200.0.0.1

 

Pinging 200.0.0.1 with 32 bytes of data:

 

Reply from 200.0.0.1: bytes=32 time=1ms TTL=126

Reply from 200.0.0.1: bytes=32 time=1ms TTL=126

Reply from 200.0.0.1: bytes=32 time=1ms TTL=126

Reply from 200.0.0.1: bytes=32 time=1ms TTL=126

 

Ping statistics for 200.0.0.1:

    Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

    Minimum = 1ms, Maximum = 1ms, Average = 1ms

Configuration files

·     Switch:

#

 sysname Switch

#

vlan 10

#

vlan 20

#

interface HundredGigE1/0/1

 port link-mode bridge

 port link-type trunk

 port trunk permit vlan 1 10 20

#

interface HundredGigE1/0/2

 port link-mode bridge

 port access vlan 10

#

interface HundredGigE1/0/3

 port link-mode bridge

 port access vlan 20

#

·     Key configuration on the firewall (the firewall performs Layer 3 forwarding through VLAN interfaces):

#

 sysname Device

#

nat address-group 0

 address 200.0.0.3 200.0.0.3

#

 dhcp enable

#

vlan 10 to 20

#

dhcp server ip-pool 5

 gateway-list 192.168.1.1

 network 192.168.1.0 mask 255.255.255.0

 dns-list 114.114.114.114

#

dhcp server ip-pool 6

 gateway-list 192.168.2.1

 network 192.168.2.0 mask 255.255.255.0

 dns-list 114.114.114.114

#

interface Vlan-interface10

 ip address 192.168.1.1 255.255.255.0

#

interface Vlan-interface20

 ip address 192.168.2.1 255.255.255.0

#

interface HundredGigE1/0/2

 port link-mode route

 ip address 200.0.0.2 255.255.255.0

 nat outbound 2000 address-group 0

#

interface HundredGigE1/0/1

 port link-mode bridge

 port link-type trunk

 port trunk permit vlan 1 10 20

#

security-zone name Trust

 import interface HundredGigE1/0/1 vlan 10 20

#

security-zone name Untrust

 import interface HundredGigE1/0/2

#

zone-pair security source Trust destination Untrust

 packet-filter 3001

#

 ip route-static 0.0.0.0 0 200.0.0.1

#

acl basic 2000

 rule 0 permit source 192.168.1.0 0.0.0.255

 rule 5 permit source 192.168.2.0 0.0.0.255

#

acl advanced 3001

 rule 0 permit ip source 192.168.1.0 0.0.0.255

 rule 5 permit ip source 192.168.2.0 0.0.0.255

#

·     Key configuration on the firewall (the firewall performs Layer 3 forwarding through Layer 3 Ethernet subinterfaces):

#

 sysname Device

#

nat address-group 0

 address 200.0.0.3 200.0.0.3

#

 dhcp enable

#

vlan 10 to 20

#

dhcp server ip-pool 5

 gateway-list 192.168.1.1

 network 192.168.1.0 mask 255.255.255.0

 dns-list 114.114.114.114

#

dhcp server ip-pool 6

 gateway-list 192.168.2.1

 network 192.168.2.0 mask 255.255.255.0

 dns-list 114.114.114.114

#

interface HundredGigE1/0/1

 port link-mode route

#

interface HundredGigE1/0/1.1

 ip address 192.168.1.1 255.255.255.0

 vlan-type dot1q vid 10

#

interface HundredGigE1/0/1.2

 ip address 192.168.2.1 255.255.255.0

 vlan-type dot1q vid 20

#

interface HundredGigE1/0/2

 port link-mode route

 ip address 200.0.0.2 255.255.255.0

 nat outbound 2000 address-group 0

#

security-zone name Trust

 import interface HundredGigE1/0/1 vlan 10 20

#

security-zone name Untrust

 import interface HundredGigE1/0/2

#

zone-pair security source Trust destination Untrust

 packet-filter 3001

#

 ip route-static 0.0.0.0 0 200.0.0.1

#

acl basic 2000

 rule 0 permit source 192.168.1.0 0.0.0.255

 rule 5 permit source 192.168.2.0 0.0.0.255

#

acl advanced 3001

 rule 0 permit ip source 192.168.1.0 0.0.0.255

 rule 5 permit ip source 192.168.2.0 0.0.0.255

#


Example: Connecting a Layer 3 switch and firewall for external network access

Network configuration

As shown in Figure 2, a company has multiple departments located on different subnets, and each department requires access to the external network. Users are required to access the external network through a Layer 3 switch and firewall, with the Layer 3 switch acting as the gateway for the users.

In this example, an S12500R switch acts as the Layer 3 switch.

Figure 2 Network diagram

 

Analysis

To meet this requirement, perform the following tasks:

·     Configure the switch as the gateway for users and enable users to communicate across subnets through VLAN interfaces.

·     Configure the switch as the DHCP server to assign IP addresses to users.

·     Deploy security zones on the firewall to enable the forwarding of packets between different security zones.

·     Deploy NAT on the firewall to allow internal users to access the external network.

Applicable hardware and software versions

The following matrix shows the hardware and software versions to which this configuration example is applicable:

 

Hardware

Software version

S12500R switch series

Release 5210 and later

 

Procedures

Configuring the switch

# Assign the interfaces that connect to the user devices to VLANs. Assign addresses to VLAN interfaces.

<Sysname> system-view

[Sysname] sysname Switch

[Switch] vlan 10

[Switch-vlan10] port hundredgige 1/0/2

[Switch-vlan10] quit

[Switch] vlan 20

[Switch-vlan20] port hundredgige 1/0/3

[Switch-vlan20] quit

[Switch] interface vlan-interface 10

[Switch-Vlan-interface10] ip address 192.168.1.1 24

[Switch-Vlan-interface10] quit

[Switch] interface vlan-interface 20

[Switch-Vlan-interface20] ip address 192.168.2.1 24

[Switch-Vlan-interface20] quit

# Configure the Layer 3 Ethernet interface connecting to the firewall and assign an IP address to the interface.

[Switch] interface hundredgige 1/0/1

[Switch-HundredGigE1/0/1] port link-mode route

The configuration of the interface will be restored to the default. Continue? [Y

/N]:y

[Switch-HundredGigE1/0/1] ip address 192.168.100.2 24

# Configure a static route to the external network.

[Switch] ip route-static 0.0.0.0 0 192.168.100.1

# Configure DHCP address pool 5 for dynamically assigning IP addresses to clients on subnet 192.168.1.0/24. Configure the DNS server address and the border gateway. In practical applications, specify the DNS server assigned by the service provider.

[Switch] dhcp server ip-pool 5

[Switch-dhcp-pool-5] network 192.168.1.0 mask 255.255.255.0

[Switch-dhcp-pool-5] dns-list 114.114.114.114

[Switch-dhcp-pool-5] gateway-list 192.168.1.1

[Switch-dhcp-pool-5] quit

# Configure DHCP address pool 6 for dynamically assigning IP addresses to clients on subnet 192.168.2.0/24. Configure the DNS server address and the border gateway. In practical applications, specify the DNS server assigned by the service provider.

[Switch] dhcp server ip-pool 6

[Switch-dhcp-pool-6] network 192.168.2.0 mask 255.255.255.0

[Switch-dhcp-pool-6] dns-list 114.114.114.114

[Switch-dhcp-pool-6] gateway-list 192.168.2.1

[Switch-dhcp-pool-6] quit

# Enable the DHCP service.

[Switch] dhcp enable

Configuring the firewall

# Assign an IP address to the interface connecting to the switch.

<Sysname> system-view

[Sysname] sysname Device

[Device] interface hundredgige 1/0/1

[Device-HundredGigE1/0/1] ip address 192.168.100.1 24

[Device-HundredGigE1/0/1] quit

# Assign an IP address to the public network interface.

[Device] interface hundredgige 1/0/2

[Device-HundredGigE1/0/2] ip address 200.0.0.2 24

[Device-HundredGigE1/0/2] quit

# Configure the default route. The next hop of the route points to the public IP address 200.0.0.1.

[Device] ip route-static 0.0.0.0 0 200.0.0.1

# Configure a static route to devices on the internal network.

[Device] ip route-static 192.168.0.0 16 192.168.100.2

# Configure security zones. The internal network of the company connected to interface HundredGigE 1/0/1 belongs to the trusted network and is deployed in security zone Trust. Therefore, the internal network can access the external network and devices in other security zones without restrictions. The external network connected to interface HundredGigE 1/0/2 belongs to the untrusted network and is deployed in security zone Untrust, and it cannot access the internal network of the company.

[Device] security-zone name trust

[Device-security-zone-Trust] import interface hundredgige 1/0/1

[Device-security-zone-Trust] quit

[Device] security-zone name untrust

[Device-security-zone-Untrust] import interface hundredgige 1/0/2

[Device-security-zone-Untrust] quit

[Device] acl advanced 3001

[Device-acl-ipv4-adv-3001] rule permit ip source 192.168.1.0 0.0.0.255

[Device-acl-ipv4-adv-3001] rule permit ip source 192.168.2.0 0.0.0.255

[Device-acl-ipv4-adv-3001] quit

[Device] zone-pair security source trust destination untrust

[Device-zone-pair-security-Trust-Untrust] packet-filter 3001

[Device-zone-pair-security-Trust-Untrust] quit

# Configure internal network users to access the external network through the NATed addresses. Users in subnets 192.168.1.0/24 and 192.168.2.0/24 of the internal network can use external network address 200.0.0.3 to access the Internet.

[Device] nat address-group 0

[Device-address-group-0] address 200.0.0.3 200.0.0.3

[Device-address-group-0] quit

# Configure ACL 2000 to permit packets sourced from subnets 192.168. 1.0/24 and 192.168.2.0/24.

[Device] acl basic 2000

[Device-acl-ipv4-basic-2000] rule permit source 192.168.1.0 0.0.0.255

[Device-acl-ipv4-basic-2000] rule permit source 192.168.2.0 0.0.0.255

[Device-acl-ipv4-basic-2000] quit

# Configure outbound dynamic NAT on interface HundredGigE 1/0/2 to translate the source addresses of packets matching ACL 2000 into the addresses in address group 0 and include port information in the translation process.

[Device] interface hundredgige 1/0/2

[Device-HundredGigE1/0/2] nat outbound 2000 address-group 0

[Device-HundredGigE1/0/2] quit

Verifying the configuration

After configuration, both PC1 and PC2 can successfully ping external IP address 200.0.0.1/24 and access the Internet.

# Execute the ping command on Host A on the internal network to identify whether the external addresses are reachable. Assume the host runs the Windows XP operating system.

C:\Documents and Settings\Administrator>ping 200.0.0.1

 

Pinging 200.0.0.1 with 32 bytes of data:

 

Reply from 200.0.0.1: bytes=32 time=1ms TTL=126

Reply from 200.0.0.1: bytes=32 time=1ms TTL=126

Reply from 200.0.0.1: bytes=32 time=1ms TTL=126

Reply from 200.0.0.1: bytes=32 time=1ms TTL=126

 

Ping statistics for 200.0.0.1:

    Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

    Minimum = 1ms, Maximum = 1ms, Average = 1ms

Configuration files

·     Switch:

#

 sysname Switch

#

 dhcp enable

#

vlan 10

#

vlan 20

#

dhcp server ip-pool 5

 gateway-list 192.168.1.1

 network 192.168.1.0 mask 255.255.255.0

 dns-list 114.114.114.114

#

dhcp server ip-pool 6

 gateway-list 192.168.2.1

 network 192.168.2.0 mask 255.255.255.0

 dns-list 114.114.114.114

#

interface Vlan-interface10

 ip address 192.168.1.1 255.255.255.0

#

interface Vlan-interface20

 ip address 192.168.2.1 255.255.255.0

#

interface HundredGigE1/0/1

 port link-mode route

 ip address 192.168.100.2 255.255.255.0

#

interface HundredGigE1/0/2

 port link-mode bridge

 port access vlan 10

#

interface HundredGigE1/0/3

 port link-mode bridge

 port access vlan 20

#

 ip route-static 0.0.0.0 0 192.168.100.1

#

·     Firewall:

#

 sysname Device

#

nat address-group 0

 address 200.0.0.3 200.0.0.3

#

interface HundredGigE1/0/1

 port link-mode route

 ip address 192.168.100.1 255.255.255.0

#

interface HundredGigE1/0/2

 port link-mode route

 ip address 200.0.0.2 255.255.255.0

 nat outbound 2000 address-group 0

#

security-zone name Trust

 import interface HundredGigE1/0/1

#

security-zone name Untrust

 import interface HundredGigE1/0/2

#

zone-pair security source Trust destination Untrust

 packet-filter 3001

#

 ip route-static 0.0.0.0 0 200.0.0.1

 ip route-static 192.168.0.0 16 192.168.100.2

#

acl basic 2000

 rule 0 permit source 192.168.1.0 0.0.0.255

 rule 5 permit source 192.168.2.0 0.0.0.255

#

acl advanced 3001

 rule 0 permit ip source 192.168.1.0 0.0.0.255

 rule 5 permit ip source 192.168.2.0 0.0.0.255

#

Related documentation

·     High Availability Configuration Guide in H3C S12500R Switch Router Series Configuration Guides-R52xx

·     High Availability Command Reference in H3C S12500R Switch Router Series Command References-R52xx

·     High Availability Configuration Guide in H3C S12500R-48Y8C&S12500R-48C6D Switch Router Configuration Guides-R52xx

·     High Availability Command Reference in H3C S12500R-48Y8C&S12500R-48C6D Switch Router Command References-R52xx

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Intelligent Storage
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
  • Technical Blogs
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网