IPv6 Internet访问IPv4服务器网络典型配置

拓扑图

说明:isp 为公网设备部署 ipv6 dhcp 为 host1、host2 分配 ipv6 地址。FW1 左侧公网为IPV6网络;右侧为内网为IPV4网络

要求:IPV4地址范围中的telnet设备配置 telnet 服务为公网上的host1、host2 提供远程访问

实验步骤

1.接口加入安全域

[FW1] security-zone name Trust
[FW1-security-zone-Trust] import interface GigabitEthernet1/0/1
[FW1-security-zone-DMZ]security-zone name Untrust
[FW1-security-zone-Untrust] import interface GigabitEthernet1/0/0

2.配置安全策略

[FW1]security-policy ip
[FW1-security-policy-ip] rule 1 name aft-v4
[FW1-security-policy-ip-1-aft-v4]  action pass
[FW1-security-policy-ip-1-aft-v4]  source-zone Local
[FW1-security-policy-ip-1-aft-v4]  destination-zone Trust
[FW1-security-policy-ip-1-aft-v4]  source-ip-host 10.1.1.1 
[FW1-security-policy-ip-1-aft-v4]  destination-ip-host 192.168.10.1 

[FW1]security-policy ipv6
[FW1-security-policy-ipv6] rule 1 name aft-ipv6
[FW1-security-policy-ipv6-1-aft-ipv6]  action pass
[FW1-security-policy-ipv6-1-aft-ipv6]  source-zone Untrust
[FW1-security-policy-ipv6-1-aft-ipv6]  destination-zone Local
[FW1-security-policy-ipv6-1-aft-ipv6]  source-ip-host 100::2 
[FW1-security-policy-ipv6-1-aft-ipv6]  destination-ip-host 220::C0A8:A01

3.基础配置(配置IP地址,配置路由,配置IPV6-DHCP,telnet配置)

(1)IP地址配置

[host2]interface GigabitEthernet0/0
[host2-GigabitEthernet0/0] ipv6 address dhcp-alloc

[host3]interface GigabitEthernet0/0
[host3-GigabitEthernet0/0] ipv6 address dhcp-alloc

[ISP]vlan 10 
[ISP-vlan10]port  g1/0/2 to g1/0/3 

[ISP]interface Vlan-interface1
[ISP-Vlan-interface1] ipv6 address 200::2/96
[ISP-Vlan-interface1]interface Vlan-interface10
[ISP-Vlan-interface10] ipv6 address 100::1/96

[FW1]interface GigabitEthernet1/0/0 
[FW1-GigabitEthernet1/0/0] ipv6 address 200::1/96       
[FW1-GigabitEthernet1/0/0]interface GigabitEthernet1/0/1
[FW1-GigabitEthernet1/0/1] ip address 10.1.1.1 255.255.255.252

[S1]interface Vlan-interface1
[S1-Vlan-interface1] ip address 192.168.10.254 255.255.255.0
[S1]interface GigabitEthernet1/0/1
[S1-GigabitEthernet1/0/1] ip address 10.1.1.2 255.255.255.252

 [telnet]interface GigabitEthernet0/0
[telnet-GigabitEthernet0/0] ip address 192.168.10.1 255.255.255.0

[telnet] telnet server enable 
[telnet] line vty 0 10 
[telnet-line-vty0-10] authentication-mode scheme 
[telnet-line-vty0-10] qu
[telnet] local-user fk 
[telnet-luser-manage-fk] password simple 11111111qq
[telnet-luser-manage-fk] authorization-attribute user-role level-15 
[telnet-luser-manage-fk] service-type telnet 

(2)路由配置

[ISP]  ipv6 route-static 220:: 96 200::1

[FW1] ipv6 route-static :: 0 200::2

[FW1]  ip route-static 192.168.10.0 24 10.1.1.2

[S1] ip route-static 0.0.0.0 0 10.1.1.1

[telnet] ip route-static 0.0.0.0 0 192.168.10.254 

(3)IPV6-DHCP配置

[ISP]ipv6 dhcp pool 100
[ISP-dhcp6-pool-100] network 100::/96

[ISP]interface Vlan-interface10
[ISP-Vlan-interface10] ipv6 dhcp select server
[ISP-Vlan-interface10] ipv6 nd autoconfig managed-address-flag
[ISP-Vlan-interface10] ipv6 nd autoconfig other-flag
[ISP-Vlan-interface10] undo ipv6 nd ra halt

4.AFT 配置

[FW1]acl ipv6 basic 2000
[FW1-acl-ipv6-basic-2000]rule 0 permit source 100::/96  配置哪些公网上的IPV6地址允许变为IPV4

[FW1]aft address-group 1
[FW1-aft-address-group-1] address 10.1.1.1 10.1.1.1   配置被转换后的IPV4地址池

[FW1] aft v6tov4 source acl ipv6 number 2000 address-group 1 配置IPV6和IPV4的源地址转换对应的动态策略

[FW1] aft prefix-nat64 220:: 96 配置 AFT 触发的条件 注意:General前缀与NAT64前缀都不能与设备上的接口地址同网段

[FW1] aft v4tov6 source 192.168.10.1 210::1 配置服务器地址 192.168.10.1 和 ipv6 地址做映射

[FW1]int ra g1/0/0 g1/0/1 
[FW1-if-range] aft enable

5.HOST2 上测试

<host2>telnet ipv6 220::192.168.10.1
Trying 220::C0A8:A01 ...
Press CTRL+K to abort
Connected to 220::C0A8:A01 ...

******************************************************************************
* Copyright (c) 2004-2021 New H3C Technologies Co., Ltd. All rights reserved.*
* Without the owner's prior written consent,                                 *
* no decompiling or reverse-engineering shall be allowed.                    *
******************************************************************************

Login: fk
Password: 
<telnet>

查看 AFT 会话

[FW1]DIS AFT session  ipv4 
Slot 1:
Initiator:
  Source      IP/port: 10.1.1.1/1024
  Destination IP/port: 192.168.10.1/23
  DS-Lite tunnel peer: -
  VPN instance/VLAN ID/Inline ID: -/-/-
  Protocol: TCP(6)
  Inbound interface: GigabitEthernet1/0/0
  Source security zone: Local

Total sessions found: 1
[FW1]DIS AFT session  ipv4 ve
[FW1]DIS AFT session  ipv4 verbose  
Slot 1:
Initiator:
  Source      IP/port: 10.1.1.1/1024
  Destination IP/port: 192.168.10.1/23
  DS-Lite tunnel peer: -
  VPN instance/VLAN ID/Inline ID: -/-/-
  Protocol: TCP(6)
  Inbound interface: GigabitEthernet1/0/0
  Source security zone: Local
Responder:
  Source      IP/port: 192.168.10.1/23
  Destination IP/port: 10.1.1.1/1024
  DS-Lite tunnel peer: -
  VPN instance/VLAN ID/Inline ID: -/-/-
  Protocol: TCP(6)
  Inbound interface: GigabitEthernet1/0/1
  Source security zone: Trust
State: TCP_ESTABLISHED
Application: TELNET
Rule ID: 1
Rule name: aft-v4
Start time: 2023-12-21 21:08:38  TTL: 1186s
Initiator->Responder:            0 packets          0 bytes
Responder->Initiator:            0 packets          0 bytes
               
Total sessions found: 1


[FW1]DIS AFT session  ipv6 verbose  
Slot 1:
Initiator:
  Source      IP/port: 100::2/17473
  Destination IP/port: 220::C0A8:A01/23
  VPN instance/VLAN ID/Inline ID: -/-/-
  Protocol: TCP(6)
  Inbound interface: GigabitEthernet1/0/0
  Source security zone: Untrust
Responder:
  Source      IP/port: 220::C0A8:A01/23
  Destination IP/port: 100::2/17473
  VPN instance/VLAN ID/Inline ID: -/-/-
  Protocol: TCP(6)
  Inbound interface: GigabitEthernet1/0/1
  Source security zone: Local
State: TCP_ESTABLISHED
Application: TELNET
Rule ID: -/-/-
Rule name: 
Start time: 2023-12-21 21:08:38  TTL: 1177s
Initiator->Responder:            0 packets          0 bytes
Responder->Initiator:            0 packets          0 bytes

Total sessions found: 1