@
中小型企业网络配置
提示:如有错误。欢迎支出
文章目录
一、需求分析
本次论文设计为实现中小型企业的网络规划与实施,可以从系统的完整性、安全性、高效性等几个方面来分析:
某企业总公司在广州,分公司设在深圳。总部有六个部门如下:管理、财务、后勤、销售、研发、生产。分公司主要负责开拓新市场。
项目要求:
(1)为保证内网运行性能,每一个部门单独一个VLAN,进行合理规划IP地址;
(2)为各设备做基础配置,完成路由配置,实现内外网的基本连通;
(3)为了保证网络的可用性和可靠性,对核心层设备配置冗余技术,起到热备及负载均衡作用。
(4)配置出口策略路由,使得不同内网流量分别通过联通、电信两条ISP线路访问Internet,从而起到负载均衡的作用;
(5)由于公网IP地址有限,尽可能节约IP地址的损耗。
(6)总公司有多个部门,要求财务部不允许其他部门访问,其他部门都可以互相访问,各部门都允许访问互联网。(具体内容自己规划)。
(7)总公司拥有自己的WEB,内外网均可访问;
(8) 实现公司总部与分公司通信。
(9) 保证内网安全,监视内网资源与访问走向,限制内网用户的网络资源访问权限,并采用防火墙设备来保证外网到内网间的安全。
二、拓扑图与ip规划
三、实现
1、 防火墙FW1的配置
基本配置
interface GigabitEthernet1/0/1
undo shutdown
ip address 192.168.10.7 255.255.255.0
gateway 192.168.10.1
service-manage http permit
service-manage https permit
service-manage ping permit
service-manage ssh permit
service-manage snmp permit
service-manage telnet permit
interface GigabitEthernet1/0/2
undo shutdown
ip address 192.168.20.7 255.255.255.0
gateway 192.168.20.1
service-manage http permit
service-manage https permit
service-manage ping permit
service-manage ssh permit
service-manage snmp permit
service-manage telnet permit
interface GigabitEthernet1/0/3
undo shutdown
ip address 192.168.90.7 255.255.255.0
service-manage http permit
service-manage https permit
service-manage ping permit
service-manage ssh permit
service-manage snmp permit
service-manage telnet permit
interface GigabitEthernet1/0/4
undo shutdown
ip address 10.93.93.7 255.255.255.0
gateway 10.93.93.2
service-manage http permit
service-manage https permit
service-manage ping permit
service-manage ssh permit
service-manage snmp permit
service-manage telnet permit
配置VPN接口
interface Tunnel1
ip address 192.168.93.1 255.255.255.0
tunnel-protocol gre
source 10.93.93.7
destination 3.3.3.93
gre key cipher 123
添加端口
firewall zone trust
add interface GigabitEthernet1/0/1
add interface GigabitEthernet1/0/2
add interface Tunnel1
firewall zone untrust
add interface GigabitEthernet1/0/4
firewall zone dmz
add interface GigabitEthernet1/0/3
配置ospf
ospf 1
area 0.0.0.0
network 192.168.10.0 0.0.0.255
network 192.168.20.0 0.0.0.255
network 192.168.90.0 0.0.0.255
配置静态路由
ip route-static 0.0.0.0 0.0.0.0 10.93.93.2
ip route-static 192.168.100.0 255.255.255.0 Tunnel1
ip route-static 192.168.110.0 255.255.255.0 Tunnel1
配置静态pat
nat server web_server protocol tcp global 10.93.93.7 8000 inside 192.168.90.93 www
nat server ftp_server protocol tcp global 10.93.93.7 2100 inside 192.168.90.93 ftp
配置自定义防火墙域间策略
security-policy
rule name local_to_dmz
source-zone dmz
source-zone local
destination-zone dmz
destination-zone local
action permit
rule name local_to_trust
source-zone local
source-zone trust
destination-zone local
destination-zone trust
action permit
rule name local_to_untrust
source-zone local
source-zone untrust
destination-zone local
destination-zone untrust
action permit
rule name trust_to_dmz
source-zone dmz
source-zone trust
destination-zone dmz