1.华为防火墙打不开

2.如何设置华为路由器防火墙

华为笔记本电脑防火墙在哪_华为电脑防火墙在哪里

步骤一.登陆缺省配置的防火墙并修改防火墙的名称

防火墙和路由器一样,有一个Console接口。使用console线缆将console接口和计算机的com口连接在一块。使用windows操作系统自带的超级终端软件,即可连接到防火墙。

防火墙的缺省配置中,包括了用户名和密码。其中用户名为admin、密码Admin@123,所以登录时需要输入用户名和密码信息,输入时注意区分大小写。

修改防火墙的名称的方法与修改路由器名称的方法一致。

另外需要注意的是,由于防火墙和路由器同样使用了VRP平台操作系统,所以在命令级别、命令帮助等,与路由器上相应操作相同。

<SRG>sys

13:47:28 2014/07/04

Enter system view, return user view withCtrl+Z.

[SRG]sysname FW

13:47:32 2014/07/04

步骤二.修改防火墙的时间和时区信息

默认情况下防火墙没有定义时区,系统保存的时间和实际时间可能不符。使用时应该根据实际的情况定义时间和时区信息。实验中我们将时区定义到东八区,并定义标准时间。

<FW>clock timezone 1 add 08:00:00

13:50:57 2014/07/04

<FW>dis clock

21:51:15 2014/07/03

2014-07-03 21:51:15

Thursday

Time Zone : 1 add 08:00:00

<FW>clock datetime 13:53:442014/07/04

21:53:29 2014/07/03

<FW>dis clock

13:54:04 2014/07/04

2014-07-04 13:54:04

Friday

Time Zone : 1 add 08:00:00

步骤三。修改防火墙登录标语信息

默认情况下,在登陆防火墙,登陆成功后有如下的标语信息。

Please Press ENTER.

Login authentication

Username:admin

Password:*********

NOTICE:This is a private communicationsystem.

Unauthorized access or use may lead to prosecution.

防火墙设备以此信息警告非授权的访问。

实际使用中,管理员可以根据需要修改默认的登陆标语信息。分为登录前提示信息和登陆成功后提示信息两种。

[FW]header login information ^

14:01:21 2014/07/04

Info: The banner text supports 220characters max, including the start and the en

d character.If you want to enter more thanthis, use banner file instead.

Input banner text, and quit with thecharacter '^':

Welcome to USG5500^

[FW]header shell information ^

14:02:54 2014/07/04

Info: The banner text supports 220characters max, including the start and the en

d character.If you want to enter more thanthis, use banner file instead.

Input banner text, and quit with thecharacter '^':

Welcome to USG5500

You are logining insystem Please do not delete system config files^

配置完成后,通过推出系统。然后重新登录,可以查看是否生效。

Please Press ENTER.

Welcome to USG5500

Login authentication

Username:admin

Password:*********

Welcome to USG5500

You are logining insystem Please do not delete system config files

NOTICE:This is a private communicationsystem.

Unauthorized access or use may lead to prosecution.

注意,默认达到NOTICE信息一般都会存在,不会消失或被代替。

步骤四.修改登陆防火墙的用户名和密码

防火墙默认使用的用户名admin。密码Admin@123。可以根据我们的需求进行修改。试验中我们新建一个用户,级别为level3.用户名为user1.密码:huawei@123.需要说明的是,默认情况下console接口登陆仅允许admin登陆。所以配置console接口登陆验证方式为aaa,才能确保新建的用户生效。在配置中,需要指定该配置的用户名的使用范围,本次实验中选择termianl,表示使用于通过console口登陆验证的凭据。

[FW]aaa

14:15:43 2014/07/04

[FW-aaa]local-user user1 pass

[FW-aaa]local-user user1 password cipherhuawei@123

14:16:08 2014/07/04

[FW-aaa]local-user user1 service-typeterminal

14:16:28 2014/07/04

[FW-aaa]local-user user1 level 3

14:16:38 2014/07/04

[FW-aaa]q

14:16:43 2014/07/04

[FW]user-interface console 0

14:16:57 2014/07/04

[FW-ui-console0]authentication-mode aaa

退出系统,测试新用户名和密码是否生效。

Please Press ENTER.

Welcome to USG5500

Login authentication

Username:user1

Password:**********

Welcome to USG5500

You are logining in system Please do notdelete system config files

NOTICE:This is a private communicationsystem.

Unauthorized access or use may lead to prosecution.

<FW>

步骤五.掌握查看、保存、和删除配置的方法。

在防火墙上使用命令查看运行的配置和已经保存的配置。其中使用display current-configuration命令查看运行配置,使用displaysaved-configuration命令查看已经保存的配置。

<FW>dis current-configuration

14:27:01 2014/07/04

#

stp region-configuration

region-name f0a7e2157008

active region-configuration

#

interface GigabitEthernet0/0/0

alias GE0/MGMT

ipaddress 192.168.0.1 255.255.255.0

dhcpselect interface

dhcpserver gateway-list 192.168.0.1

#

interface GigabitEthernet0/0/1

#

interface GigabitEthernet0/0/2

#

interface GigabitEthernet0/0/3

#

interface GigabitEthernet0/0/4

#

interface GigabitEthernet0/0/5

#

interface GigabitEthernet0/0/6

#

interface GigabitEthernet0/0/7

#

interface GigabitEthernet0/0/8

#

interface NULL0

alias NULL0

#

firewall zone local

setpriority 100

#

firewall zone trust

setpriority 85

addinterface GigabitEthernet0/0/0

#

firewall zone untrust

setpriority 5

#

firewall zone dmz

setpriority 50

#

aaa

local-user admin password cipher%$%$s$]c%^XV6(/|BaQ$[T;X"G>5%$%$

local-user admin service-type web terminaltelnet

local-user admin level 15

local-user user1 password cipher%$%$tY4Z:`xG0/G!1^C)2[48"%yp%$%$

local-user user1 service-type terminal

local-user user1 level 3

authentication-scheme default

#

authorization-scheme default

#

accounting-scheme default

#

domain default

#

#

nqa-jitter tag-version 1

#

header shell information "Welcome toUSG5500

You are logining in system Please do notdelete system config files"

header login information "Welcome toUSG5500"

banner enable

#

user-interface con 0

authentication-mode aaa

user-interface vty 0 4

authentication-mode none

protocol inbound all

#

slb

#

right-manager server-group

#

sysname FW

#

l2tpdomain suffix-separator @

#

firewall packet-filter default permitinterzone local trust direction inbound

firewall packet-filter default permitinterzone local trust direction outbound

firewall packet-filter default permitinterzone local untrust direction outbound

firewall packet-filter default permitinterzone local dmz direction outbound

#

ipdf-unreachables enable

#

firewall ipv6 session link-state check

firewall ipv6 statistic system enable

#

dnsresolve

#

firewall statistic system enable

#

pkiocsp response cache refresh interval 0

pkiocsp response cache number 0

#

undodns proxy

#

license-server domain lic.huawei.com

#

web-manager enable

#

return

保存配置,并查看以保存的配置信息。

<FW> sa

14:29:29 2014/07/04

The current configuration will be writtento the device.

Are you sure to continue?[Y/N]y

2014-07-04 14:29:31 FW %%01CFM/4/SAVE(l):When deciding whether to save configura

tion to the device, the user chose Y.

Do you want to synchronically save theconfiguration to the startup saved-configu

ration file on peer device?[Y/N]:y

Now saving the current configuration to thedevice...

Info:The current configuration was saved tothe device successfully.

<FW>dis saved-configuration

14:27:48 2014/07/04

# CLI_VERSION=V300R001

# Last configuration was changed at2014/07/04 13:56:09 from console0

#*****BEGIN****public****#

#

interface GigabitEthernet0/0/0

alias GE0/MGMT

ipaddress 192.168.0.1 255.255.255.0

dhcpselect interface

dhcpserver gateway-list 192.168.0.1

#

interface GigabitEthernet0/0/1

#

interface GigabitEthernet0/0/2

#

interface GigabitEthernet0/0/3

#

interface GigabitEthernet0/0/4

#

interface GigabitEthernet0/0/5

#

interface GigabitEthernet0/0/6

#

interface GigabitEthernet0/0/7

#

interface GigabitEthernet0/0/8

#

interface NULL0

alias NULL0

#

firewall zone local

setpriority 100

#

firewall zone trust

setpriority 85

addinterface GigabitEthernet0/0/0

#

firewall zone untrust

setpriority 5

#

firewall zone dmz

setpriority 50

#

aaa

local-user admin password cipher%$%$s$]c%^XV6(/|BaQ$[T;X"G>5%$%$

local-user admin service-type web terminaltelnet

local-useradmin level 15

authentication-scheme default

#

authorization-scheme default

#

accounting-scheme default

#

domain default

#

#

nqa-jitter tag-version 1

#

banner enable

#

user-interface con 0

authentication-mode none

user-interface vty 0 4

authentication-mode none

protocol inbound all

#

slb

#

right-manager server-group

#

sysname FW

#

l2tpdomain suffix-separator @

#

firewall packet-filter default permitinterzone local trust direction inbound

firewall packet-filter default permitinterzone local trust direction outbound

firewall packet-filter default permitinterzone local untrust direction outbound

firewall packet-filter default permitinterzone local dmz direction outbound

#

ipdf-unreachables enable

#

firewall ipv6 session link-state check

firewall ipv6 statistic system enable

#

dnsresolve

#

firewall statistic system enable

#

pkiocsp response cache refresh interval 0

pkiocsp response cache number 0

#

undodns proxy

#

license-server domain lic.huawei.com

#

web-manager enable

#

return

#-----END----#

使用delete Flash:/vrpcfg.zip命令删除保存的配置。

步骤六.配置接口地址

配置G0/0/1:10.0.2.1/24;G0/0/0:10.0.1.1/24;G0/0/2:10.0.3.1/24.

[FW] interface g0/0/2

16:12:58 2014/07/04

[FW-GigabitEthernet0/0/2]ip add 10.0.3.1 24

16:13:21 2014/07/04

[FW-GigabitEthernet0/0/2]interface g0/0/0

16:13:32 2014/07/04

[FW-GigabitEthernet0/0/0]undo ip add

16:14:02 2014/07/04

[FW-GigabitEthernet0/0/0]ip add 10.0.1.1 24

16:14:14 2014/07/04

[FW-GigabitEthernet0/0/0]interface g0/0/1

16:14:36 2014/07/04

[FW-GigabitEthernet0/0/1]ip add 10.0.2.1 24

16:14:50 2014/07/04

[FW-GigabitEthernet0/0/1]q

16:14:52 2014/07/04

[FW]

在交换机S1上配置接口G0/0/21属于vlan1、G0/0/22属于vlan2、G0/0/23属于vlan3.vlanif接口配置IP地址10.0.1.2/24、vlanif2接口配置IP地址10.0.2.2/24、vlanif3接口配置IP地址10.0.3.2/24。

[Huawei]sysname S1

[S1]vlan batch 2 3

[S1]interface g0/0/21

[S1-GigabitEthernet0/0/21]port link-typeaccess

[S1-GigabitEthernet0/0/21]port default vlan1

[S1-GigabitEthernet0/0/21]interface g0/0/22

[S1-GigabitEthernet0/0/22]port link-typeaccess

[S1-GigabitEthernet0/0/22]port default vlan2

[S1-GigabitEthernet0/0/22]interface g0/0/23

[S1-GigabitEthernet0/0/23]port link-typeaccess

[S1-GigabitEthernet0/0/23]port default vlan3

[S1-GigabitEthernet0/0/23]interface vlanif1

[S1-Vlanif1]ip add 10.0.1.2 24

[S1-Vlanif1]interface vlanif 2

[S1-Vlanif2]ip add 10.0.2.2 24

[S1-Vlanif2]interface vlanif 3

[S1-Vlanif3]ip add 10.0.3.2 24

将G0/0/0、G0/0/1、G0/0/2添加到trust区。在测试三口的连通性(在添加到trust区以前先确认这些端口不在untrust区)

[FW]firewall zone trust

16:39:40 2014/07/04

[FW-zone-trust]add interface g0/0/2

16:40:05 2014/07/04

[FW-zone-trust]add interface g0/0/3

16:41:59 2014/07/04

[FW-zone-trust]add interface g0/0/1

[FW-zone-trust]q

[S1]ping -c 1 10.0.1.1

PING 10.0.1.1: 56 data bytes,press CTRL_C to break

Reply from 10.0.1.1: bytes=56 Sequence=1 ttl=255 time=50 ms

---10.0.1.1 ping statistics ---

1packet(s) transmitted

1packet(s) received

0.00% packet loss

round-trip min/avg/max = 50/50/50 ms

[S1]ping -c 1 10.0.2.1

PING 10.0.2.1: 56 data bytes,press CTRL_C to break

Reply from 10.0.2.1: bytes=56 Sequence=1 ttl=255 time=50 ms

---10.0.2.1 ping statistics ---

1packet(s) transmitted

1packet(s) received

0.00% packet loss

round-trip min/avg/max = 50/50/50 ms

[S1]ping -c 1 10.0.3.1

PING 10.0.3.1: 56 data bytes,press CTRL_C to break

Reply from 10.0.3.1: bytes=56 Sequence=1 ttl=255 time=60 ms

---10.0.3.1 ping statistics ---

1packet(s) transmitted

1packet(s) received

0.00% packet loss

round-trip min/avg/max = 60/60/60 ms

华为防火墙打不开

登录到华为防火墙的Web管理界面。.选择网络接口,找到需要启用DHCP的接口(例如端口1-8),点击编辑按钮进入接口设置页面。在接口设置页面中,选择启用DHCP服务器选项,并设置IP地址池、租期等相关参数。

进入交换机的配置模式,输入system-view命令。配置交换机端口,输入interface命令,然后输入具体端口号。将端口设置为只接受DHCP请求,输入dhcpselectrelay命令。保存配置并退出,输入save命令和quit命令。

在交换机S1上,设置名称,查看接口状态信息,启用DHCP服务,设置vlanif1自动获取IP地址。在PC终端上,设置自动获取IP地址并查看IP地址。

首先需要开启交换机的DHCP服务。配置接口加入Vlan,并分别配置GE0/0/1和GE0/0/2加入VLAN10和VLAN11。配置VLANIF接口IP地址,并分别配置VLANIFVLANIF11的IP地址。

华为交换机在任何一个接口下都不会自动获取dhcp保留地址。这部分保留地址经过设置后,不分发,与之连接的终端设备也就不会自动获取到。相反,非保留地址倒是可以自动获取。如果要使用保留地址,只能在终端手工配置。

华为防火墙设定dhcp稳定因为该场景防火墙作为出口访问internet,然后接的傻瓜式交换机来连接下面的办公PC,属于一个简单的SOHO环境,一般在防火墙上面应用DHCP,也通常是这种情况,大点的环境则是交换机或者专门的DHCP服务器来做。

如何设置华为路由器防火墙

你这两个问题其实是一个问题,关闭防火墙之后uwp应用安全模式无法打开。可尝试的解决方法

1.把曾经建议你或偷偷帮你关闭的Windows defender重新打开,重启电脑,尝试打开防火墙设为自动

2.取舍自己是否需要uwp应用,对于流氓软件来说,你真的需要UWP应用而不是那些道貌岸然却实际上是在为你帮到忙的“管家”?“安全中心”?

假设默然后台是192.168.1.1IE---192.168.1.1--登陆---将网络设置完毕(每台电脑都能分配一个指定的IP)---找到---转发规则---DMZ---(寻找你要当DMZ的主机IP---填写该主机的IP---保存--即可。