园区出口路由器部署专线与总部互联配置实例
	 
	        案例描述:客户园区分支出口的两台防火墙组建双机热备,作为客户整个园区网络的出口网关,承担外网出口业务,并对出入园区的业务流量提供安全过滤功能,为网络安全提供保证。同时,路由器也作为整个园区网络的出口网关,通过专线与总部互联。核心层的两台交换机组建集群,作为整个公司园区网络的核心,同时作为用户网关,为用户分配IP地址。具体业务要求为:内网可以正常访问Internet资源,但不能玩网络游戏和观看网络视频。且禁止外网用户访问内网。
	路由器部署专线与总部互联的组网图
	        本案例使用的设备:出口 USG6300E 版本 V600R007C00  AR6300  版本V300R019C10
	        核心层  S12700E 版本 V200R019C10
	        部署思路与步骤:
	        1、配置集群/堆叠、多主检测功能,提高设备级可靠性。涉及设备核心交换机
	        2、配置Eth-Trunk功能,提高链路可靠性。涉及设备  核心交换机、出口防火墙
	        3、配置接口IP地址、路由,使得网络互通。涉及设备  核心交换机、出口防火墙
	        4、配置双机热备和VRRP备份组,提高设备级可靠性。涉及设备  出口防火墙
	        5、配置安全策略,使得业务可以通过防火墙。涉及设备  出口防火墙
	        6、配置NAT策略,使得内网用户可以访问外网。涉及设备  出口防火墙
	        7、配置攻击防范和应用行为控制,保证网络安全。涉及设备  出口防火墙
	 
	        配置步骤
	        核心交换机配置集群、多主检测功能,具体配置请参考集群/堆叠通用部署。
	        在防火墙FW上配置Eth-Trunk功能。
	# 在FWA上创建Eth-Trunk1,用于连接核心交换机CORE,并加入Eth-Trunk成员接口。
	<sysname> system-view
	[sysname] sysname FWA
	[FWA] interface eth-trunk 1
	[FWA-Eth-Trunk1] mode lacp-static 
	[FWA-Eth-Trunk1] quit
	[FWA] interface gigabitethernet 1/0/1 
	[FWA-GigabitEthernet1/0/1] eth-trunk 1 
	[FWA-GigabitEthernet1/0/1] quit 
	[FWA] interface gigabitethernet 1/0/2
	[FWA-GigabitEthernet1/0/2] eth-trunk 1
	[FWA-GigabitEthernet1/0/2] quit
	# 在FWB上创建Eth-Trunk2,用于连接核心交换机CORE,并加入Eth-Trunk成员接口。
	 
	<sysname> system-view
	[sysname] sysname FWB
	[FWB] interface eth-trunk 2 
	[FWB-Eth-Trunk2] mode lacp-static 
	[FWB-Eth-Trunk2] quit 
	[FWB] interface gigabitethernet 1/0/1 
	[FWB-GigabitEthernet1/0/1] eth-trunk 2 
	[FWB-GigabitEthernet1/0/1] quit 
	[FWB] interface gigabitethernet 1/0/2 
	[FWB-GigabitEthernet1/0/2] eth-trunk 2 
	[FWB-GigabitEthernet1/0/2] quit
	在出口路由器Router上配置Eth-Trunk功能。
	# 在Router上创建Eth-Trunk40,用于连接CORE,并加入Eth-Trunk成员接口。
	 
	<HUAWEI> system-view 
	[HUAWEI] sysname Router
	[Router] interface Eth-Trunk 40
	[Router-Eth-Trunk40] mode lacp-static
	[Router-Eth-Trunk40] quit
	[Router] interface Gigabitethernet 1/0/0
	[Router-GigabitEthernet1/0/0] eth-trunk 40
	[Router-GigabitEthernet1/0/0] quit
	[Router] interface Gigabitethernet 2/0/0
	[Router-GigabitEthernet2/0/0] eth-trunk 40
	[Router-GigabitEthernet2/0/0] quit  
	在核心交换机CORE上配置Eth-Trunk功能。
	# 在CORE上创建Eth-Trunk1,用于连接FWA,并加入Eth-Trunk成员接口。
	 
	[CORE] interface eth-trunk 1
	[CORE-Eth-Trunk1] mode lacp 
	[CORE-Eth-Trunk1] quit
	[CORE] interface gigabitethernet 1/3/0/0 
	[CORE-GigabitEthernet1/3/0/0] eth-trunk 1 
	[CORE-GigabitEthernet1/3/0/0] quit 
	[CORE] interface gigabitethernet 2/3/0/1
	[CORE-GigabitEthernet2/3/0/1] eth-trunk 1 
	[CORE-GigabitEthernet2/3/0/1] quit
	# 在CORE上创建Eth-Trunk2,用于连接FWB,并加入Eth-Trunk成员接口。
	 
	[CORE] interface eth-trunk 2 
	[CORE-Eth-Trunk2] mode lacp
	[CORE-Eth-Trunk2] quit  
	[CORE] interface gigabitethernet 1/3/0/1  
	[CORE-GigabitEthernet1/3/0/1] eth-trunk 2  
	[CORE-GigabitEthernet1/3/0/1] quit 
	[CORE] interface gigabitethernet 2/3/0/0 
	[CORE-GigabitEthernet2/3/0/0] eth-trunk 2 
	[CORE-GigabitEthernet2/3/0/0] quit
	# 在CORE上创建Eth-Trunk40,用于连接出口路由器Router,并加入Eth-Trunk成员接口。
	 
	[CORE] interface eth-trunk 40
	[CORE-Eth-Trunk40] mode lacp
	[CORE-Eth-Trunk40] quit  
	[CORE] interface gigabitethernet 1/6/0/1  
	[CORE-GigabitEthernet1/6/0/1] eth-trunk 40 
	[CORE-GigabitEthernet1/6/0/1] quit 
	[CORE] interface gigabitethernet 2/6/0/1 
	[CORE-GigabitEthernet2/6/0/1] eth-trunk 40
	[CORE-GigabitEthernet2/6/0/1] quit
	配置接口IP地址、路由。
	在FWA上配置接口IP地址,并将接口加入相应的安全区域。
	[FWA] interface loopback 0
	[FWA-LoopBack0] ip address 1.1.1.1 32  //用来做Router ID
	[FWA-LoopBack0] quit
	[FWA] interface gigabitethernet 1/0/0
	[FWA-GigabitEthernet1/0/0] ip address 203.0.113.1 24  //配置和外网相连的接口的IP地址
	[FWA-GigabitEthernet1/0/0] gateway 203.0.113.254
	[FWA-GigabitEthernet1/0/0] quit
	[FWA] interface gigabitethernet 1/0/3
	[FWA-GigabitEthernet1/0/3] ip address 10.4.0.1 24  //配置双机热备心跳口IP地址
	[FWA-GigabitEthernet1/0/3] quit
	[FWA] interface eth-trunk 1
	[FWA-Eth-Trunk1] ip address 10.3.0.1 24  //配置和CORE相连的Eth-Trunk接口的IP地址
	[FWA-Eth-Trunk1] quit
	[FWA] firewall zone trust
	[FWA-zone-trust] set priority 85
	[FWA-zone-trust] add interface eth-trunk 1  //将连接内网的Eth-Trunk1加入安全区域
	[FWA-zone-trust] quit
	[FWA] firewall zone name isp1                    
	[FWA-zone-isp1] set priority 10
	[FWA-zone-isp1] add interface gigabitethernet 1/0/0  //将连接外网的接口加入安全区域
	[FWA-zone-isp1] quit
	[FWA] firewall zone dmz
	[FWA-zone-dmz] set priority 50
	[FWA-zone-dmz] add interface gigabitethernet 1/0/3  //将心跳口加入DMZ区域
	[FWA-zone-dmz] quit
	在FWB上配置接口IP地址,并将接口加入相应的安全区域。
	[FWB] interface loopback 0
	[FWB-LoopBack0] ip address 2.2.2.2 32  //用来做Router ID
	[FWB-LoopBack0] quit
	[FWB] interface gigabitethernet 1/0/0
	[FWB-GigabitEthernet1/0/0] ip address 203.0.113.2 24  //配置和外网相连的接口的IP地址
	[FWB-GigabitEthernet1/0/0] gateway 203.0.113.254
	[FWB-GigabitEthernet1/0/0] quit
	[FWB] interface gigabitethernet 1/0/3
	[FWB-GigabitEthernet1/0/3] ip address 10.4.0.2 24  //配置双机热备心跳口IP地址
	[FWB-GigabitEthernet1/0/3] quit
	[FWB] interface eth-trunk 2
	[FWB-Eth-Trunk2] ip address 10.3.0.2 24  //配置和CORE相连的Eth-Trunk接口的IP地址
	[FWB-Eth-Trunk2] quit
	[FWB] firewall zone trust
	[FWB-zone-trust] set priority 85
	[FWB-zone-trust] add interface eth-trunk 2  //将连接内网的Eth-Trunk2加入安全区域
	[FWB-zone-trust] quit
	[FWB] firewall zone name isp1                     
	[FWB-zone-isp1] set priority 10
	[FWB-zone-isp1] add interface gigabitethernet 1/0/0  //将连接外网的接口加入安全区域isp1  
	[FWB-zone-isp1] quit
	[FWB] firewall zone dmz
	[FWB-zone-dmz] set priority 50
	[FWB-zone-dmz] add interface gigabitethernet 1/0/3  //将心跳口加入DMZ区域
	[FWB-zone-dmz] quit
	在Router上配置接口IP地址。
	[Router] interface loopback 0
	[Router-LoopBack0] ip address 4.4.4.4 32  //用来做Router ID
	[Router-LoopBack0] quit
	[Router] interface gigabitethernet 3/0/0
	[Router-GigabitEthernet3/0/0] ip address 10.7.0.1 24  //配置和外网相连的接口的IP地址
	[Router-GigabitEthernet3/0/0] quit
	[Router] interface Eth-Trunk 40
	[Router-Eth-Trunk40] ip address 10.8.0.254 24  //配置和CORE相连的接口的IP地址
	[Router-Eth-Trunk40] quit
	在CORE上配置接口IP地址。
	[CORE] interface loopback 0
	[CORE-LoopBack0] ip address 3.3.3.3 32  //用来做Router ID
	[CORE-LoopBack0] quit
	[CORE] vlan batch 20 50
	[CORE] interface eth-trunk 1
	[CORE-Eth-Trunk1] port link-type access
	[CORE-Eth-Trunk1] port default vlan 20
	[CORE-Eth-Trunk1] quit
	[CORE] interface eth-trunk 2
	[CORE-Eth-Trunk2] port link-type access
	[CORE-Eth-Trunk2] port default vlan 20
	[CORE-Eth-Trunk2] quit
	[CORE] interface eth-trunk 40
	[CORE-Eth-Trunk40] port link-type trunk
	[CORE-Eth-Trunk40] port trunk pvid vlan 50
	[CORE-Eth-Trunk40] port trunk allow-pass vlan 50
	[CORE-Eth-Trunk40] quit
	[CORE] interface vlanif 20
	[CORE-Vlanif20] ip address 10.3.0.254 24  //配置连接FW的VLANIF的IP地址
	[CORE-Vlanif20] quit
	[CORE] interface vlanif 50
	[CORE-Vlanif50] ip address 10.8.0.1 24  //配置连接Router的VLANIF的IP地址
	[CORE-Vlanif50] quit
	在FWA上配置OSPF路由来发布下行接口所在网段。
	[FWA] ospf 1 router-id 1.1.1.1
	[FWA-ospf-1] area 0.0.0.0
	[FWA-ospf-1-area-0.0.0.0] network 10.3.0.0 0.0.0.255
	[FWA-ospf-1-area-0.0.0.0] network 10.4.0.0 0.0.0.255
	[FWA-ospf-1-area-0.0.0.0] quit
	[FWA-ospf-1] quit
	在FWA上配置缺省路由,下一跳为公网的IP地址。
	[FWA] ip route-static 0.0.0.0 0.0.0.0 203.0.113.254
	在FWB上配置OSPF路由来发布下行接口所在网段。
	[FWB] ospf 1 router-id 2.2.2.2
	[FWB-ospf-1] area 0.0.0.0
	[FWB-ospf-1-area-0.0.0.0] network 10.3.0.0 0.0.0.255
	[FWB-ospf-1-area-0.0.0.0] network 10.4.0.0 0.0.0.255
	[FWB-ospf-1-area-0.0.0.0] quit
	[FWB-ospf-1] quit
	在FWB上配置缺省路由,下一跳为公网的IP地址。
	[FWB] ip route-static 0.0.0.0 0.0.0.0 203.0.113.254
	在Router上配置OSPF路由来发布上下行接口所在网段。
	[Router] ospf 1 router-id 4.4.4.4
	[Router-ospf-1] area 0.0.0.0
	[Router-ospf-1-area-0.0.0.0] network 10.7.0.0 0.0.0.255
	[Router-ospf-1-area-0.0.0.0] network 10.8.0.0 0.0.0.255
	[Router-ospf-1-area-0.0.0.0] quit
	[Router-ospf-1] quit
	在CORE上配置OSPF路由发布上行接口所在网段。
	[CORE] router id 3.3.3.3
	[CORE] ospf 1
	[CORE-ospf-1] area 0.0.0.0
	[CORE-ospf-1-area-0.0.0.0] network 10.3.0.0 0.0.0.255 //发布连接FW的网段
	[CORE-ospf-1-area-0.0.0.0] network 10.8.0.0 0.0.0.255 //发布连接Router的网段
	[CORE-ospf-1-area-0.0.0.0] quit
	[CORE-ospf-1] quit
	在CORE上配置缺省路由,下一跳为FW的VRRP虚拟IP。
	[CORE] ip route-static 0.0.0.0 0.0.0.0 10.3.0.3
	在防火墙上配置VRRP备份组。
	# 在FWA上行业务接口GE1/0/0上配置VRRP备份组1,并设置其状态为Active;下行业务接口Eth-Trunk1上配置VRRP备份组2,并设置其状态为Active。
	 
	[FWA] interface GigabitEthernet 1/0/0
	[FWA-GigabitEthernet1/0/0] vrrp vrid 1 virtual-ip 203.0.113.3 24 active
	[FWA-GigabitEthernet1/0/0] quit
	[FWA] interface eth-trunk 1
	[FWA-Eth-Trunk1] vrrp vrid 2 virtual-ip 10.3.0.3 24 active
	[FWA-Eth-Trunk1] quit
	# 在FWB上行业务接口GE1/0/0上配置VRRP备份组1,并设置其状态为Standby;下行业务接口Eth-trunk2上配置VRRP备份组2,并设置其状态为Standby。
	 
	[FWB] interface GigabitEthernet 1/0/0
	[FWB-GigabitEthernet1/0/0] vrrp vrid 1 virtual-ip 203.0.113.3 24 standby
	[FWB-GigabitEthernet1/0/0] quit
	[FWB] interface eth-trunk 2
	[FWB-Eth-Trunk2] vrrp vrid 2 virtual-ip 10.3.0.3 24 standby
	[FWB-Eth-Trunk2] quit
	在防火墙上配置双机热备。
	# 在FWA上指定心跳接口,启用双机热备。
	 
	[FWA] hrp interface gigabitethernet 1/0/3 remote 10.4.0.2   
	[FWA] hrp enable   
	HRP_M[FWA]  hrp mirror session enable   //启动会话快速备份功能
	# 在FWB上指定心跳接口,启用双机热备。
	 
	[FWB] hrp interface gigabitethernet 1/0/3 remote 10.4.0.1  
	[FWB] hrp enable 
	HRP_S[FWB] hrp mirror session enable  
	在防火墙上配置安全策略。
	# 双机热备状态成功建立后,FWA的安全策略配置会自动备份到FWB上。
	 
	HRP_M[FWA] security-policy 
	HRP_M[FWA-policy-security] rule name policy_dmz       //允许本地和DMZ区域间互访
	HRP_M[FWA-policy-security-rule-policy_dmz] source-zone local 
	HRP_M[FWA-policy-security-rule-policy_dmz] source-zone dmz 
	HRP_M[FWA-policy-security-rule-policy_dmz] destination-zone local
	HRP_M[FWA-policy-security-rule-policy_dmz] destination-zone dmz
	HRP_M[FWA-policy-security-rule-policy_dmz] action permit  
	HRP_M[FWA-policy-security-rule-policy_dmz] quit
	HRP_M[FWA-policy-security] rule name trust_to_untrust  //允许内网用户访问外网
	HRP_M[FWA-policy-security-rule-trust_to_untrust] source-zone trust
	HRP_M[FWA-policy-security-rule-trust_to_untrust] destination-zone isp1
	HRP_M[FWA-policy-security-rule-trust_to_untrust] source-address 10.6.0.0 24
	HRP_M[FWA-policy-security-rule-trust_to_untrust] action permit
	HRP_M[FWA-policy-security-rule-trust_to_untrust] quit
	HRP_M[FWA-policy-security] rule name untrust_to_trust  //禁止外网用户访问内网
	HRP_M[FWA-policy-security-rule-untrust_to_trust] source-zone isp1
	HRP_M[FWA-policy-security-rule-untrust_to_trust] destination-zone trust
	HRP_M[FWA-policy-security-rule-untrust_to_trust] action deny
	HRP_M[FWA-policy-security-rule-untrust_to_trust] quit
	HRP_M[FWA-policy-security] quit
	在防火墙上配置NAT策略。
	# 在FWA上创建地址池addressgroup1(192.0.2.1~192.0.2.5)。在FWA上配置的地址池会自动备份到FWB上。
	 
	HRP_M[FWA] nat address-group addressgroup1
	HRP_M[FWA-nat-address-group-addressgroup1] section 0 192.0.2.1 192.0.2.5
	HRP_M[FWA-nat-address-group-addressgroup1] mode pat
	HRP_M[FWA-nat-address-group-addressgroup1] route enable
	HRP_M[FWA-nat-address-group-addressgroup1] quit
	# 配置源NAT策略,使IP地址为10.6.0.0/24的内网用户通过转换后的公网IP地址可以访问Internet。
	 
	HRP_M[FWA-policy-nat] rule name policy_nat_1
	HRP_M[FWA-policy-nat-rule-policy_nat_1] source-address range 10.6.0.1 10.6.0.127
	HRP_M[FWA-policy-nat-rule-policy_nat_1] source-zone trust
	HRP_M[FWA-policy-nat-rule-policy_nat_1] destination-zone untrust
	HRP_M[FWA-policy-nat-rule-policy_nat_1] action source-nat address-group addressgroup1
	HRP_M[FWA-policy-nat-rule-policy_nat_1] quit
	# 需要联系ISP的网络管理员配置目的地址为地址池addressgroup1的路由,下一跳为防火墙对应的接口地址。
	 
	在防火墙上配置攻击防范和应用行为控制。
	# 配置攻击防范。
	 
	HRP_M[FWA] firewall defend land enable
	HRP_M[FWA] firewall defend smurf enable
	HRP_M[FWA] firewall defend fraggle enable
	HRP_M[FWA] firewall defend winnuke enable
	HRP_M[FWA] firewall defend source-route enable
	HRP_M[FWA] firewall defend route-record enable
	HRP_M[FWA] firewall defend time-stamp enable
	HRP_M[FWA] firewall defend ping-of-death enable
	HRP_M[FWA] interface GigabitEthernet 1/0/0
	HRP_M[FWA-GigabitEthernet1/0/0] anti-ddos flow-statistic enable
	HRP_M[FWA-GigabitEthernet1/0/0] quit
	HRP_M[FWA] anti-ddos baseline-learn start
	HRP_M[FWA] anti-ddos baseline-learn tolerance-value 100
	HRP_M[FWA] anti-ddos baseline-learn apply
	HRP_M[FWA] anti-ddos syn-flood source-detect
	HRP_M[FWA] anti-ddos udp-flood dynamic-fingerprint-learn
	HRP_M[FWA] anti-ddos udp-frag-flood dynamic-fingerprint-learn
	HRP_M[FWA] anti-ddos http-flood defend alert-rate 2000
	HRP_M[FWA] anti-ddos http-flood source-detect mode basic
	# 配置应用行为控制。
	 
	 
	本功能需要License授权,并通过动态加载功能加载相应组件包后方可使用。
	 
	创建应用行为控制文件,用于禁止进行HTTP操作和FTP操作。
	 
	HRP_M[FWA] profile type app-control name profile_app_work
	HRP_M[FWA-profile-app-control-profile_app_work] http-control post action deny
	HRP_M[FWA-profile-app-control-profile_app_work] http-control proxy action deny
	HRP_M[FWA-profile-app-control-profile_app_work] http-control web-browse action deny
	HRP_M[FWA-profile-app-control-profile_app_work] http-control file direction upload action deny
	HRP_M[FWA-profile-app-control-profile_app_work] http-control file direction download action deny
	HRP_M[FWA-profile-app-control-profile_app_work] ftp-control file delete action deny
	HRP_M[FWA-profile-app-control-profile_app_work] ftp-control file direction upload action deny
	HRP_M[FWA-profile-app-control-profile_app_work] ftp-control file direction download action deny
	HRP_M[FWA-profile-app-control-profile_app_work] quit
	创建名称为working_hours的时间段。
	 
	HRP_M[FWA] time-range working_hours
	HRP_M[FWA-time-range-working_hours] period-range all
	HRP_M[FWA-time-range-working_hours] quit 
	配置安全策略policy_sec_work,通过引用时间段“working_hours”和应用行为控制配置文件“profile_app_work”用来禁止工作时间进行HTTP操作和FTP操作。
	 
	HRP_M[FWA] security-policy
	HRP_M[FWA-policy-security] rule name policy_sec_work
	HRP_M[FWA-policy-security-rule-policy_sec_work] source-zone trust
	HRP_M[FWA-policy-security-rule-policy_sec_work] destination-zone isp1
	HRP_M[FWA-policy-security-rule-policy_sec_work] user any
	HRP_M[FWA-policy-security-rule-policy_sec_work] time-range working_hours
	HRP_M[FWA-policy-security-rule-policy_sec_work] profile app-control profile_app_work
	HRP_M[FWA-policy-security-rule-policy_sec_work] action permit
	HRP_M[FWA-policy-security-rule-policy_sec_work] quit
	结果验证
	# 通过Ping方式,可以发现总部和分支的私网可以相互Ping通。外网用户不能访问内网。内网员工能够访问Internet,但不能玩网络游戏和观看网络视频。
	 
	配置文件
	FWA的配置文件
	#
	sysname FWA
	#
	 hrp enable
	 hrp interface GigabitEthernet1/0/3 remote 10.4.0.2
	 hrp mirror session enable 
	#                                                                            
	interface Eth-Trunk1
	 ip address 10.3.0.1 255.255.255.0
	 vrrp vrid 2 virtual-ip 10.3.0.3 255.255.255.0 active
	 mode lacp-static
	#
	interface GigabitEthernet1/0/0
	 undo shutdown
	 ip address 203.0.113.1 255.255.255.0
	 vrrp vrid 1 virtual-ip 203.0.113.3 255.255.255.0 active
	 anti-ddos flow-statistic enable
	 gateway 203.0.113.254
	#
	interface GigabitEthernet1/0/1
	 undo shutdown
	 eth-trunk 1
	#
	interface GigabitEthernet1/0/2
	 undo shutdown
	 eth-trunk 1
	#
	interface GigabitEthernet1/0/3
	 undo shutdown
	 ip address 10.4.0.1 255.255.255.0
	#
	interface LoopBack0                                                             
	 ip address 1.1.1.1 255.255.255.255                                             
	# 
	firewall zone trust
	 set priority 85
	 add interface GigabitEthernet1/0/1
	 add interface GigabitEthernet1/0/2
	 add interface Eth-Trunk1
	#
	firewall zone dmz
	 set priority 50
	 add interface GigabitEthernet1/0/3
	#
	firewall zone name isp1 
	 set priority 10
	 add interface GigabitEthernet1/0/0
	#
	ospf 1 router-id 1.1.1.1
	 area 0.0.0.0
	  network 10.3.0.0 0.0.0.255
	  network 10.4.0.0 0.0.0.255
	#
	ip route-static 0.0.0.0 0.0.0.0 203.0.113.254
	#
	firewall defend time-stamp enable
	firewall defend route-record enable
	firewall defend source-route enable
	firewall defend winnuke enable
	firewall defend fraggle enable
	firewall defend ping-of-death enable
	firewall defend smurf enable
	firewall defend land enable
	#
	anti-ddos baseline-learn start
	anti-ddos baseline-learn tolerance-value 100
	anti-ddos baseline-learn apply
	anti-ddos syn-flood source-detect
	anti-ddos udp-flood dynamic-fingerprint-learn
	anti-ddos udp-frag-flood dynamic-fingerprint-learn
	anti-ddos http-flood defend alert-rate 2000
	anti-ddos http-flood source-detect mode basic
	#
	profile type app-control name profile_app_work
	 http-control post action deny
	 http-control proxy action deny
	 http-control web-browse action deny
	 http-control file direction upload action deny
	 http-control file direction download action deny
	 ftp-control file delete action deny
	 ftp-control file direction upload action deny
	 ftp-control file direction download action deny
	#
	time-range working_hours
	 period-range all
	# 
	nat address-group addressgroup1 0
	 mode pat
	 route enable
	 section 0 192.0.2.1 192.0.2.5
	#
	security-policy 
	 rule name policy_dmz 
	  source-zone local  
	  source-zone dmz 
	  destination-zone local 
	  destination-zone dmz 
	  action permit  
	 rule name trust_to_untrust 
	  source-zone trust
	  destination-zone isp1
	  source-address 10.6.0.0 mask 255.255.255.0
	  action permit
	 rule name untrust_to_trust
	  source-zone isp1
	  destination-zone trust
	  action deny
	 rule name policy_sec_work
	  source-zone trust
	  destination-zone isp1
	  time-range working_hours
	  profile app-control profile_app_work
	  action permit
	#
	nat-policy
	 rule name policy_nat_1
	  source-zone trust
	  destination-zone untrust
	  source-address range 10.6.0.1 10.6.0.127
	  action source-nat address-group addressgroup1
	#
	return
	FWB的配置文件
	#
	sysname FWB
	#
	 hrp enable
	 hrp interface GigabitEthernet1/0/3 remote 10.4.0.1
	 hrp mirror session enable 
	#                                                                            
	interface Eth-Trunk2
	 ip address 10.3.0.2 255.255.255.0
	 vrrp vrid 2 virtual-ip 10.3.0.3 255.255.255.0 standby
	 mode lacp-static
	#
	interface GigabitEthernet1/0/0
	 undo shutdown
	 ip address 203.0.113.2 255.255.255.0
	 vrrp vrid 1 virtual-ip 203.0.113.3 255.255.255.0 standby
	 anti-ddos flow-statistic enable
	 gateway 203.0.113.254
	#
	interface GigabitEthernet1/0/1
	 undo shutdown
	 eth-trunk 2
	#
	interface GigabitEthernet1/0/2
	 undo shutdown
	 eth-trunk 2
	#
	interface GigabitEthernet1/0/3
	 undo shutdown
	 ip address 10.4.0.2 255.255.255.0
	#
	interface LoopBack0                                                             
	 ip address 2.2.2.2 255.255.255.255                                             
	#  
	firewall zone trust
	 set priority 85
	 add interface GigabitEthernet1/0/1
	 add interface GigabitEthernet1/0/2
	 add interface Eth-Trunk2
	#
	firewall zone dmz
	 set priority 50
	 add interface GigabitEthernet1/0/3
	#
	firewall zone name isp1 
	 set priority 10
	 add interface GigabitEthernet1/0/0
	#
	ospf 1 router-id 2.2.2.2
	 area 0.0.0.0
	  network 10.3.0.0 0.0.0.255
	  network 10.4.0.0 0.0.0.255
	#
	ip route-static 0.0.0.0 0.0.0.0 203.0.113.254
	#
	firewall defend time-stamp enable
	firewall defend route-record enable
	firewall defend source-route enable
	firewall defend winnuke enable
	firewall defend fraggle enable
	firewall defend ping-of-death enable
	firewall defend smurf enable
	firewall defend land enable
	#
	anti-ddos baseline-learn start
	anti-ddos baseline-learn tolerance-value 100
	anti-ddos baseline-learn apply
	anti-ddos syn-flood source-detect
	anti-ddos udp-flood dynamic-fingerprint-learn
	anti-ddos udp-frag-flood dynamic-fingerprint-learn
	anti-ddos http-flood defend alert-rate 2000
	anti-ddos http-flood source-detect mode basic
	#
	profile type app-control name profile_app_work
	 http-control post action deny
	 http-control proxy action deny
	 http-control web-browse action deny
	 http-control file direction upload action deny
	 http-control file direction download action deny
	 ftp-control file delete action deny
	 ftp-control file direction upload action deny
	 ftp-control file direction download action deny
	#
	time-range working_hours
	 period-range all
	# 
	nat address-group addressgroup1 0
	 mode pat
	 route enable
	 section 0 192.0.2.1 192.0.2.5
	#
	security-policy 
	 rule name policy_dmz 
	  source-zone local  
	  source-zone dmz 
	  destination-zone local 
	  destination-zone dmz 
	  action permit  
	 rule name trust_to_untrust 
	  source-zone trust
	  destination-zone isp1
	  source-address 10.6.0.0 mask 255.255.255.0
	  action permit
	 rule name untrust_to_trust
	  source-zone isp1
	  destination-zone trust
	  action deny
	 rule name policy_sec_work
	  source-zone trust
	  destination-zone isp1
	  time-range working_hours
	  profile app-control profile_app_work
	  action permit
	#
	nat-policy
	 rule name policy_nat_1
	  source-zone trust
	  destination-zone untrust
	  source-address range 10.6.0.1 10.6.0.127
	  action source-nat address-group addressgroup1
	#
	return
	Router的配置文件
	#
	 sysname Router
	#
	interface Eth-Trunk40
	 undo portswitch
	 ip address 10.8.0.254 255.255.255.0
	 mode lacp-static
	#
	interface GigabitEthernet1/0/0
	 eth-trunk 40
	#
	interface GigabitEthernet2/0/0
	 eth-trunk 40
	#
	interface GigabitEthernet3/0/0
	 ip address 10.7.0.1 255.255.255.0
	#
	interface LoopBack0
	 ip address 4.4.4.4 255.255.255.255
	#
	ospf 1 router-id 4.4.4.4
	 area 0.0.0.0
	  network 10.7.0.0 0.0.0.255
	  network 10.8.0.0 0.0.0.255
	#
	return
	CORE的配置文件
	sysname CORE
	#
	router id 3.3.3.3  
	# 
	vlan batch 20 50
	#
	interface Vlanif20
	 ip address 10.3.0.254 255.255.255.0
	#
	interface Vlanif50
	 ip address 10.8.0.1 255.255.255.0
	#
	interface Eth-Trunk1
	 port link-type access
	 port default vlan 20
	 mode lacp
	#
	interface Eth-Trunk2
	 port link-type access
	 port default vlan 20
	 mode lacp
	#
	interface Eth-Trunk40
	 port link-type trunk
	 port trunk pvid vlan 50
	 port trunk allow-pass vlan 50
	 mode lacp
	#
	interface GigabitEthernet1/3/0/0
	 eth-trunk 1
	#
	interface GigabitEthernet1/3/0/1
	 eth-trunk 2
	#
	interface GigabitEthernet1/6/0/1
	 eth-trunk 40
	#
	interface XGigabitEthernet1/1/0/10
	 mad detect mode direct
	#
	interface GigabitEthernet2/3/0/0
	 eth-trunk 2
	#
	interface GigabitEthernet2/3/0/1
	 eth-trunk 1
	#
	interface GigabitEthernet2/6/0/1
	 eth-trunk 40
	#
	interface XGigabitEthernet2/1/0/10
	  mad detect mode direct
	#
	interface LoopBack0                                                             
	 ip address 3.3.3.3 255.255.255.255                                             
	#                                                                               
	ospf 1                                                                          
	 area 0.0.0.0                                                        
	  network 10.3.0.0 0.0.0.255     
	  network 10.8.0.0 0.0.0.255                                                          
	#                                                                               
	ip route-static 0.0.0.0 0.0.0.0 10.3.0.3
	#
	return