Forgot password?
 Register now

Welcome to use this form to feedback your problems with Ruijie Community

The category of your feedback

Your Feedback

Your Email address (optional):

Typical Configuration Example of Layer 2 Transparent Transmission Reply

GTAC-Sophia

Level 5

Ruijie Staff

Typical Configuration Example of Layer 2 Transparent Transmission
47 0 2024-11-11 16:02:11
Original
1. Device Model and Firmware

  Device Type
  
  Device Model
  
  Version
  
  NGFW
  
  RG-WALL  1600-Z-S series firewall
  
  NGFW_NTOS1.0
  
2. Service Requirements

The firewall needs to transparently transmit multi-VLAN Layer 2 packets.
3. Topology



4. Configuration Description
  Configuration  Item
  
  Description
  
  SW  1
  
  The  configuration of the port connected to the firewall should be trunk permit  vlan 10 20 30.
  
  SW  2
  
  The  configuration of the port connected to the firewall is trunk permit vlan 10  20 30.
  
5. Configuration Roadmap
Create a group of bridge interfaces on the firewall, and add a pair of transparent transmission interfaces to the bridge interface group.
Add the uplink interfaces of the firewall to the untrust zone untrust 1 and the downlink interfaces to the trust zone trust 1. Then, create a security policy to allow mutual access between the two zones.
6. Configuration Procedure
Choose Network > Zone to create a security zone.
Click Create to create security zone trust 1, configure the parameters, and click Save.
Repeat this procedure to create an untrust zone untrust 1.
Choose Network > Interface> Bridge Interface and click Create to create the bridge interface br1.
Configure parameters for br1,and click Save.
Configure a pair of interfaces to transparent mode, and add them to the related bridge interface and security zone. Choose Network > Interface > Physical Interface. Click Edit to edit the related physical interface.
Set the Port Mode to Transparent Mode, Bridge Interface to br1, and Zone to trust1, and click Save.
Repeat this procedure to add the uplink interfaces of the firewall to untrust1. Configure the parameters to be the same as those in the preceding figure.
Create a security policy and apply it to the zone. Choose Policy > Security Policy andclick Create to create security policy 1.
Configure the parameters as shown in the following figure, and click Save.
7. Verification

Layer 2 packets of all VLANs can be transparently transmitted by the firewall, and the downlink devices can successfully ping the uplink gateway address.
You can also view traffic details in the security policy hit records for verification.
RG-WALL Z Series

Configuration Firewall
There are no replies.
Related Posts
Product Model

Share this topic to

Cancel

This site contains user submitted content, comments and opinions and is for informational purposes only. Ruijie may provide or recommend responses as a possible solution based on the information provided; every potential issue may involve several factors not detailed in the conversations captured in an electronic forum and Ruijie can therefore provide no guarantee as to the efficacy of any proposed solutions on the community forums. Ruijie disclaims any and all liability for the acts, omissions and conduct of any third parties in connection with or related to your use of the site. All postings and use of the content on this site are subject to the Ruijie Community Terms of Use.

More ways to get help: Visit Support Videos, call us via Service Hotline, Facebook or Live Chat.

©2000-2023 Ruijie Networks Co,Ltd