Winny过滤功能和DHCP终端认证功能

希望提高终端的独立性,保护网络远离病毒感染等的威胁
使用DHCP终端认证功能和Winny过滤功能的解决方案

DHCP终端认证功能”由网络管理员在网络中区分允许终端(已注册终端)和不允许终端(未注册终端),网络中实现通过有无允许来控制各个终端能

能够在每个终端设置不同的访问权,例如,能够使已注册终端访问公司内外的所有网络,未注册终端只能访问公司内部特定网段等。

另外,“Winny过滤功能”是通过将非法访问检测功能设为有效,检测能够使用“Winny”的数据包,同时,能够抛弃该数据包,拦截通信。并且,检测到“Winny”的数据包时,会记录在非法访问检测的历史记录中,因此能够有效确定使用了“Winny”的终端。

网络示意图:Winny过滤功能和DHCP终端认证功能

RTX1200(据点1)的设置范例

能够只导出下述的设置部分。

ConfigDownload

以太网过滤的设置 ethernet filter 1 reject-log dhcp-not-bind 192.168.1.1
ethernet filter 2 pass-nolog *:*:*:*:*:* *:*:*:*:*:*
LAN的接口的设置 ip lan1 address 192.168.1.1/24
ip lan1 secondary address 172.16.0.1/24
ip lan3 address 192.168.100.1/24
WAN(ISP1)的
接口的设置
pp select 1
pp always-on on
pppoe use lan2
pp auth accept pap chap
pp auth myname(连接ISP1的ID) (连接ISP1的密码)
ppp lcp mru on 1454
ppp ipcp msext on
ppp ipcp ipaddress on
ip pp mtu 1454
ip pp nat descriptor 1
pp enable 1
ip route default gateway pp 1
NAT的设置 nat descriptor type 1 masquerade
nat descriptor masquerade static 1 1 192.168.1.1 udp 500
nat descriptor masquerade static 1 2 192.168.1.1 esp
VPN(IPsec)的设置
(共通项目)
ipsec auto refresh on
VPN(IPsec)的设置 tunnel select 1
ipsec tunnel 1
ipsec sa policy 1 1 esp 3des-cbc sha-hmac
ipsec ike hash 1 sha
ipsec ike keepalive use 1 on
ipsec ike local address 1 192.168.1.1
ipsec ike local name 1 kyoten1
ipsec ike pre-shared-key 1 text(密码1)
ipsec ike remote address 1(全局地址1)
tunnel enable 1
ip route 192.168.101.0/24 gateway tunnel 1
以太网过滤的应用 ethernet lan1 filter in 1 2
DHCP的设置 dhcp service server
dhcp server rfc2131 compliant except remain-silent
dhcp scope lease type 1 bind-only fallback=2
dhcp scope 1 192.168.1.2-192.168.1.191/24
dhcp scope 2 172.16.0.2-172.16.0.191/24
IP地址的预约 dhcp scope bind 1 192.168.1.100 ethernet(允许连接的终端的MAC地址)
DNS的设置 dns server(ISP1指定的DNS服务器地址)
dns private address spoof on
Inbound过滤的设置 ip filter source-route on
ip filter directed-broadcast on
ip inbound filter 1001 reject-nolog * * tcp,udp * 135
ip inbound filter 1002 reject-nolog * * tcp,udp 135 *
ip inbound filter 1003 reject-nolog * * tcp,udp * netbios_ns-netbios_ssn
ip inbound filter 1004 reject-nolog * * tcp,udp netbios_ns-netbios_ssn *
ip inbound filter 1005 reject-nolog * * tcp,udp * 445
ip inbound filter 1006 reject-nolog * * tcp,udp 445 *
ip inbound filter 1007 reject-nolog 192.168.1.0/24 * * * *
ip inbound filter 1008 pass-nolog * * * * *
pp select 1
ip pp inbound filter list 1001 1002 1003 1004 1005 1006 1007 1008
pp enable 1
策略过滤的设置 ip policy interface group 101 name=Private local lan1
ip policy address group 1 name=Private2 192.168.1.0/24 172.16.0.0/24
ip policy address group 101 name=Private1 192.168.1.0/24
ip policy address group 102 name=Any *
ip policy service group 101 name="Open Services"
ip policy service group 102 name=General dns
ip policy service group 103 name=Mail pop3 smtp
ip policy service group 104 name=IPsec ike esp
ip policy filter 1 pass-nolog * * 101 * *
ip policy filter 2 pass-nolog * lan3 1 * *
ip policy filter 1100 reject-nolog lan1 * * * *
ip policy filter 1110 pass-nolog * * * * 102
ip policy filter 1122 static-pass-nolog * lan1 * * *
ip policy filter 1123 static-pass-nolog * local * * *
ip policy filter 1130 pass-nolog * tunnel* * * *
ip policy filter 2200 reject-nolog pp* * * * *
ip policy filter 2220 pass-log * lan1 * * 101
ip policy filter 2230 static-pass-nolog * local * * 104
ip policy filter 2300 reject-nolog tunnel* * * * *
ip policy filter 2330 pass-nolog * tunnel* * * *
ip policy filter 2340 pass-nolog * local * * *
ip policy filter 2350 pass-nolog * lan1 * * *
ip policy filter 2360 reject-nolog * pp* * * *
ip policy filter 2380 reject-nolog * pp* * * *
ip policy filter 2400 pass-nolog local * * * *
ip policy filter 2410 static-pass-nolog * lan1 * * *
ip policy filter 2430 static-pass-nolog * pp* * * 104
ip policy filter 2450 static-pass-nolog * pp* * * 104
ip policy filter 2600 reject-nolog * pp* * * *
ip policy filter 2650 reject-nolog pp* * * * *
ip policy filter 2660 static-pass-nolog * local * * 104
ip policy filter 2670 pass-nolog * lan1 * * 101
ip policy filter 3000 reject-nolog * * * * *
ip policy filter set 101 name="Internet Access" 1100 [1110 1123 1122 2600 [1] 2 1130] 2650 [2670 2660] 2300 [2340 2350 2360 2330] 2400 [2410 2430] 3000
ip policy filter set enable 101

RTX1200(据点n)的设置范例

能够只导出下述的设置部分。

ConfigDownload

LAN的接口的设置 ip lan1 address 192.168.2.1/24
WAN(ISP2)的接口的设置 pp select 1
pp always-on on
pppoe use lan2
pp auth accept pap chap
pp auth myname(连接ISP2的ID) (连接ISP2的密码)
ppp lcp mru on 1454
ppp ipcp msext on
ppp ipcp ipaddress on
ip pp mtu 1454
ip pp nat descriptor 1
pp enable 1
ip route default gateway pp 1
NAT的设置 nat descriptor type 1 masquerade
nat descriptor masquerade static 1 1 192.168.2.1 udp 500
nat descriptor masquerade static 1 2 192.168.2.1 esp
VPN(IPsec)的设置
(共通项目)
ipsec auto refresh on
VPN(IPsec)的设置 tunnel select 1
ipsec tunnel 1
ipsec sa policy 1 1 esp 3des-cbc sha-hmac
ipsec ike hash 1 sha
ipsec ike keepalive use 1 on
ipsec ike local address 1 192.168.2.1
ipsec ike local name 1 kyoten2
ipsec ike pre-shared-key 1 text(密码2)
ipsec ike remote address 1(全局地址1)
tunnel enable 1
ip route 192.168.101.0/24 gateway tunnel 1
DHCP的设置 dhcp service server
dhcp server rfc2131 compliant except remain-silent
dhcp scope 1 192.168.2.2-192.168.2.191/24
DNS的设置 dns server(ISP2指定的DNS服务器地址)
dns private address spoof on
winny过滤的设置 pp select 1
ip pp intrusion detection out on
ip pp intrusion detection out winny on reject=on
ip pp intrusion detection out default off
Inbound过滤的设置 ip filter source-route on
ip filter directed-broadcast on
ip inbound filter 1001 reject-nolog * * tcp,udp * 135
ip inbound filter 1002 reject-nolog * * tcp,udp 135 *
ip inbound filter 1003 reject-nolog * * tcp,udp * netbios_ns-netbios_ssn
ip inbound filter 1004 reject-nolog * * tcp,udp netbios_ns-netbios_ssn *
ip inbound filter 1005 reject-nolog * * tcp,udp * 445
ip inbound filter 1006 reject-nolog * * tcp,udp 445 *
ip inbound filter 1007 reject-nolog 192.168.2.0/24 * * * *
ip inbound filter 1008 pass-nolog * * * * *
pp select 1
ip pp inbound filter list 1001 1002 1003 1004 1005 1006 1007 1008
pp enable 1
策略过滤的设置 ip policy interface group 101 name=Private local lan1
ip policy address group 101 name=Private 192.168.2.0/24
ip policy address group 102 name=Any *
ip policy service group 101 name="Open Services"
ip policy service group 102 name=General dns
ip policy service group 103 name=Mail pop3 smtp
ip policy service group 104 name=IPsec ike esp
ip policy filter 1100 reject-nolog lan1 * * * *
ip policy filter 1110 pass-nolog * * * * 102
ip policy filter 1122 static-pass-nolog * lan1 * * *
ip policy filter 1123 static-pass-nolog * local * * *
ip policy filter 1124 static-pass-log * * 192.168.2.0/24 * http
ip policy filter 1130 pass-nolog * tunnel* * * *
ip policy filter 1140 pass-nolog * pp1 * * *
ip policy filter 1520 pass-log * lan1 * * 101
ip policy filter 1530 static-pass-nolog * local * * 104
ip policy filter 1600 reject-nolog tunnel* * * * *
ip policy filter 1630 pass-nolog * tunnel* * * *
ip policy filter 1640 pass-nolog * local * * *
ip policy filter 1650 pass-nolog * lan1 * * *
ip policy filter 1680 reject-nolog * pp* * * *
ip policy filter 1700 pass-nolog local * * * *
ip policy filter 1710 static-pass-nolog * lan1 * * *
ip policy filter 1750 static-pass-nolog * pp* * * 104
ip policy filter 2000 reject-nolog * * * * *
ip policy filter set 101 name="Internet Access" 1100 [1110 1123 [1124] 1122 1140 1130] 1500 [1520 1530] 1600 [1640 1650 1680 1630] 1700 [1710 1750] 2000
ip policy filter set enable 101

RTX1200(总公司)的设置范例

能够只导出下述的设置部分。

ConfigDownload

LAN的接口的设置 ip lan1 address 192.168.101.1/24
WAN(ISP3)的接口的设置 pp select 1
pp select 1
pp always-on on
pppoe use lan2
pp auth accept pap chap
pp auth myname(连接ISP3的ID) (连接ISP3的密码)
ppp lcp mru on 1454
ip pp address(全局地址1)
ip pp mtu 1454
ip pp nat descriptor 1
pp enable 1
ip route default gateway pp 1
NAT的设置 nat descriptor type 1 masquerade
nat descriptor masquerade static 1 1 192.168.101.1 udp 500
nat descriptor masquerade static 1 2 192.168.101.1 esp
VPN(IPsec)的设置
(共通项目)
ipsec auto refresh on
VPN(IPsec)的设置
(据点1)
tunnel select 1
ipsec tunnel 1
ipsec sa policy 1 1 esp 3des-cbc sha-hmac
ipsec ike hash 1 sha
ipsec ike keepalive log 1 off
ipsec ike keepalive use 1 on
ipsec ike local address 1 192.168.101.1
ipsec ike pre-shared-key 1 text(密码1)
ipsec ike remote address 1 any
ipsec ike remote name 1 kyoten1
tunnel enable 1
ip route 192.168.1.0/24 gateway tunnel 1
VPN(IPsec)的设置
(据点2)
tunnel select 2
ipsec tunnel 2
ipsec sa policy 2 2 esp 3des-cbc sha-hmac
ipsec ike keepalive log 2 off
ipsec ike keepalive use 2 on
ipsec ike local address 2 192.168.101.1
ipsec ike pre-shared-key 2 text(密码2)
ipsec ike remote address 2 any
ipsec ike remote name 2 kyoten2
tunnel enable 2
ip route 192.168.2.0/24 gateway tunnel 2
DHCP的设置 dhcp service server
dhcp scope 1 192.168.101.2-192.168.101.191/24
DNS的设置 dns server(ISP3所指定的DNS服务器的IP地址)
dns private address spoof on
Inbound过滤的设置 ip filter source-route on
ip filter directed-broadcast on
ip inbound filter 1001 reject-nolog * * tcp,udp * 135
ip inbound filter 1002 reject-nolog * * tcp,udp 135 *
ip inbound filter 1003 reject-nolog * * tcp,udp * netbios_ns-netbios_ssn
ip inbound filter 1004 reject-nolog * * tcp,udp netbios_ns-netbios_ssn *
ip inbound filter 1005 reject-nolog * * tcp,udp * 445
ip inbound filter 1006 reject-nolog * * tcp,udp 445 *
ip inbound filter 1007 reject-nolog 192.168.101.0/24 * * * *
ip inbound filter 1008 pass-nolog * * * * *
pp select 1
ip pp inbound filter list 1001 1002 1003 1004 1005 1006 1007 1008
pp enable 1
策略过滤的设置 ip policy interface group 101 name=Private local lan1
ip policy address group 101 name=Private 192.168.101.0/24
ip policy address group 102 name=Any *
ip policy service group 101 name="Open Services"
ip policy service group 102 name=General dns
ip policy service group 103 name=Mail pop3 smtp
ip policy service group 104 name=IPsec ike esp
ip policy filter 1100 reject-nolog lan1 * * * *
ip policy filter 1110 pass-nolog * * * * 102
ip policy filter 1122 static-pass-nolog * lan1 * * *
ip policy filter 1123 static-pass-nolog * local * * *
ip policy filter 1124 static-pass-log * * 192.168.101.0/24 * http
ip policy filter 1130 pass-nolog * tunnel* * * *
ip policy filter 1140 pass-nolog * pp1 * * *
ip policy filter 1520 pass-log * lan1 * * 101
ip policy filter 1530 static-pass-nolog * local * * 104
ip policy filter 1600 reject-nolog tunnel* * * * *
ip policy filter 1630 pass-nolog * tunnel* * * *
ip policy filter 1640 pass-nolog * local * * *
ip policy filter 1650 pass-nolog * lan1 * * *
ip policy filter 1680 reject-nolog * pp* * * *
ip policy filter 1700 pass-nolog local * * * *
ip policy filter 1710 static-pass-nolog * lan1 * * *
ip policy filter 1750 static-pass-nolog * pp* * * 104
ip policy filter 2000 reject-nolog * * * * *
ip policy filter set 101 name="Internet Access" 1100 [1110 1123 [1124] 1122 1140 1130] 1500 [1520 1530] 1600 [1640 1650 1680 1630] 1700 [1710 1750] 2000
ip policy filter set enable 101

返回顶部