作者:BSXY_19计科_陈永跃
BSXY_信息学院_公众号于结尾处
注:未经允许禁止转发任何内容
注:资源说明,请看前言及资源下载说明
基于eNSP的MPLS VPN的企业/高校网络规划设计
前言及技术/资源下载说明( 未经允许禁止转发任何内容 )
可根据以下所提供的设计与实现步骤过程一步一步自行实现(每一条命令都是关键的命令);但是如果有需要的也可以根据以下地址进行下载完整的topo图和完整的配置进行参考与借鉴,如若拿到topo图可多display查看配置,查看相应的命令,获取配套资源方式如下,相应的内容如下图所示:
公众号(小猿网),回复“网络规划”即可
注:资源为收费资源,如不符合您的消费观,还请您见谅
内容包含:
基于MPLS-VPN的企业/高校网络规划设计-毕
设或课设可参考+所有的配置命令+详细的地
址规划表+相应的测试文档和截图+需求分析
由于公众号可能目前没有太大的曝光度,搜索时可能
不是置顶的公众号。这时可以多往下滑一下找到该公
众号,或者直接到文章结尾处获取公众号二维码即可
模拟器中防火墙用户名:admin 密码:admin@123
topo图也就是这样子的,相应的地址规划和路由规划大部分都在图中明确的标注了
该topo网络中用到的技术有vlan划分、eth-trunk链路捆绑、MSTP、VRRP、OSPF、BFD路由联动、DHCP中继、无线WLAN、防火墙安全策略、NAT、BGP、MPLS VPN、端口镜像、sham-link、路由引入、telnet等。
该实验非常适合于想做有关MPLS VPN的企业或高校网络规划设计毕设的小伙伴或想要练习关于MPLS VPN综合实验的小伙伴。如果是对于想写MPLS VPN的企业或高校网络规划设计方面的论文也比较好写(该图的创新点)。
场景适用于毕业设计、校园网络规划、企业网络规划等场合,有什么问题可以在平台私信博主,博主看到都会第一时间回复的,最后说明该topo规划最后的作者权归于:BSXY_信息学院_19计科_陈永跃
一、设计topo图与设计要求
拓扑图1:
设计要求:
- 完成服务器、防火墙、路由器相应的接口地址的配置
- 接入交换机和汇聚交换机、核心交换机完成相应的链路聚合,提高链路的冗余
- 链路聚合时都有2条链路处于工作状态,如有三条链路则有一条链路处于备份状态
- 为考验一下工作人工在核心交换机在链路聚合时候通过调节接口的优先级,是的23口处于备份状态
- 根据不同的地域划分多个不同的vlan,减小广播域大小,提高网络的可靠性和安全性
- 在核心层和汇聚层之间配置MSTP+VRRP,实现冗余,划分实例,让不同的vlan优先选择相应的交换机,并减少stp震荡
- 访问互联网时,日新楼优先走HX_SW1,慧源楼和德润楼楼优先走HX_SW2
- 主校区内所有用户通过配置相应的DHCP中继能自动获取地址,且DHCP服务器为DHCP server
- 核心层和边缘出口FW1配置相应的OSPF,使的边缘出口一下的内网互通
- 核心层和边缘出口FW1之间配置BFD,检测交换机的上行链路状态
- FW1配置相应的安全策略,且在FW1上放行trust到dmz/untrust区的流量
- FW1配置相应的安全策略,使得财务服务器只能办公楼的vlan10网段的用户可以访问
- FW1配置相应的NAT策略,使得内网、dmz可以访问外网(百度)
- 外网模拟ISP使用使用IS-IS路由让其互通
- 主校区用户可以通过域名(www.baidu.com)访问外网百度
- 我们主校区用户的dns服务器就用我们内部的dns服务器
- 我们的主校区和分校区的通信通过配置相应的MPLS VPN使其互通
- 分校区的实训楼和新实训通信的流量都需要走MPLS实现互通,且流量被主校区进行监管
- 主校区的出口处做相应的端口镜像,方便监控分校区与分校区通信的流量情况
- 配置相应的sham-link作为备份链路,假设MPLS故障,分校区的通信就走备份链路
- 实训楼和新实训楼通信过程中,优先走MPLS VPN,假设故障后才走备份链路
- 在主校区中,所以可网管交换机配置telnet,方便相应管理员的远程操作维护管理
- 无线用户也可以访问公网,也可以和分校区进行互通
- 无线用户配置相应的DNS使得可以通过域名(www.baidu.com)访问外网百度
二、相应地址规划表
地址规划表上传的时候有点模糊,这里没有做图片的一下优化处理,但是Excel里面的是可以编辑的或是可以更改的,像下图就比较清晰
三、基于MPLS VPN与IPsec VPN的双重保障规划设计(综合实验/大作业)(可不看)
插曲部分:基于MPLS VPN与IPsec VPN的双重保障规划设计(综合实验/大作业) 如下图所示(但是并不在该篇文章中做详细介绍和说明,如查看可点击连接自行查看阅读):
设计要求:
- 完成服务器、防火墙、路由器相应的接口地址的配置
- 慧源楼配置Eth-Trunk链路捆绑来提高链路的冗余
- 根据不同的地域划分多个不同的vlan,减小广播域大小,提高网络的可靠性和安全性
- 在明诚楼配置MSTP+VRRP,同时实现冗余,划分实例,让不同的vlan优先选择相应的交换机,并减少stp震荡
- 明诚楼、慧源楼、德润楼的所有用户通过配置相应的DHCP中继能自动获取地址,且DHCP服务器为DHCPserver
- 配置相应的ospf,多区域区域0中OSPF激活MD5认证,SW1/SW2采用接口方式配置
- 区域0内的设备启用BFD快速检测链路故障
- 分校区用户也需要要自动获取地址,相应服务器为AR4,AR4配置相应的子接口为相应终端分配地址
- 配置端口安全,且接口能够自动学习MAC地址
- 配置端口隔离实现PC6,PC7同VLAN内不能互访
- 分校区/分部的无线用的地址和AP的地址都由SW8来分配
- FW2作为PPPoE客户端,AR5作为PPPoE服务端,进行相应的拨号上网
- R1,R2,R3部署ISIS Level-2,区域ID 49.0000
- 部署MPLS VPN,其中R1,R3作为PE设备,R2作为路由放射器
- FW1,FW2作为CE端与PE端建立eBGP邻居关系
- 运营商AS 100,总部/主校区在65430,分支都在AS65000
- FW1,FW2之间部署IPSec VPN 实现总部/主校区与分支之间通信
- 其中总部和分支之间通信优先使用MPLS VPN若MPLS VPN故障使用IPSec VPN实现通信
- 若FW1中NQA检测10.1.5.5不可达则停止下发缺省到内网
- NAT配置总部/主校区用户方位外网用地址池10.1.22.100~10.1.22.110
- 分支用户访问外网采用EASY-IP实现
- 外网用户访问内网WEB服务——用100.100.100.100来做相应的地址映射
- 财务部服务器只能由内网的vlan 10用户访问
- 配置DHCP Snooping防止DHCP欺骗与非法dhcp服务器的接入
- 内部的所有交换机都可以被telnet进行远程管理
- 主校区/总部用户可以通过域名(www.baidu.com)访问外网百度,无线用户也可以
- ipv6中对于AS100内互联地址采用link-local地址
- R1,R2,R3的lo0地址2001:10:1:X::X/128
- 激活ISISv6,并保障v4与v6的拓扑分离
- SW1 SW2新增Lo0接口地址为2001:192:168:X::X/128
- FW1,SW1,SW2部署OSPFv3区域0,其中互联地址采用Link-local地址
- 分支FW2与AR4部署OSPFv3,互联地址采用link-local地址
- FW1,FW2利用MPLS VPN网络建立6to4隧道
- 对于6to4隧道基础上部署BGP4+,实现总部与分支的IPv6互通
四、该网络规划全过程(顺着一步一步走)
1、eth-trunk
HX_SW1:
sys
un in en
sysname HX_SW1
int eth-trunk 1
mode lacp-static
max active-linknumber 2
trunkport g0/0/24
trunkport g0/0/23
trunkport g0/0/22
lacp preempt enable
lacp preempt delay 10
qui
int g0/0/24
lacp priority 16384
qui
------------------------------
HX_SW2:
sys
un in en
sysname HX_SW2
int eth-trunk 1
mode lacp-static
max active-linknumber 2
trunkport g0/0/24
trunkport g0/0/23
trunkport g0/0/22
lacp preempt enable
lacp preempt delay 10
qui
int g0/0/24
lacp priority 16384
qui
------------------------------
HJ_SW3:
sys
un in en
sysname HJ_SW3
int eth-trunk 2
mode lacp-static
trunkport g0/0/3
trunkport g0/0/4
qui
------------------------------
HJ_SW5:
sys
un in en
sysname JR_SW5
int eth-trunk 2
mode lacp-static
trunkport g0/0/3
trunkport g0/0/4
qui
2、vlan 划分
JR_SW5:
vlan batch 10 20 900
int g0/0/1
port link-type access
port default vlan 10
int g0/0/2
port link-type access
port default vlan 20
qui
int eth 2
port link-type trunk
port trunk allow-pass vlan 10 20 900
qui
------------------------------
JR_SW6:
sys
un in en
sysname JR_SW6
vlan batch 30 40 900
int g0/0/3
port link-type access
port default vlan 30
int g0/0/4
port link-type access
port default vlan 40
qui
int g0/0/1
port link-type trunk
port trunk allow-pass vlan 30 40 900
qui
------------------------------
JR_SW7:
sys
un in en
sysname JR_SW7
vlan batch 50 900
port-group g g0/0/3 g0/0/4
port link-type access
port default vlan 50
qui
int g0/0/1
port link-type trunk
port trunk allow-pass vlan 50 900
qui
------------------------------
HJ_SW3:
vlan batch 10 20 900
int eth 2
port link-type trunk
port trunk allow-pass vlan 10 20 900
port-group g g0/0/1 g0/0/2
port link-type trunk
port trunk allow-pass vlan 10 20 900
qui
------------------------------
HJ_SW4:
sys
un in en
sysname HJ_SW4
vlan batch 30 40 50 900
port-group g g0/0/1 g0/0/2
port link-type trunk
port trunk allow-pass vlan 30 40 50 900
qui
int g0/0/3
port link-type trunk
port trunk allow-pass vlan 30 40 900
int g0/0/4
port link-type trunk
port trunk allow-pass vlan 50 900
qui
------------------------------
SW5:
sys
un in en
sysname LSW5
vlan batch 200 900
port-group g g0/0/1 g0/0/2
port link-type trunk
port trunk allow-pass vlan 200 900
qui
port-group g e0/0/1 e0/0/2
port link-type access
port default vlan 200
qui
------------------------------
HX_SW1:
vlan batch 10 11 20 30 40 50 200 900
int g0/0/1
port link-type access
port default vlan 11
int g0/0/2
port link-type trunk
port trunk allow-pass vlan 200 900
int g0/0/3
port link-type trunk
port trunk allow-pass vlan 10 20 900
int g0/0/4
port link-type trunk
port trunk allow-pass vlan 30 40 50 900
int eth-trunk 1
port link-type trunk
port trunk allow-pass vlan all
qui
------------------------------
HX_SW2:
vlan batch 10 12 20 30 40 50 200 900
int g0/0/1
port link-type access
port default vlan 12
int g0/0/2
port link-type trunk
port trunk allow-pass vlan 200 900
int g0/0/3
port link-type trunk
port trunk allow-pass vlan 10 20 900
int g0/0/4
port link-type trunk
port trunk allow-pass vlan 30 40 50 900
int eth-trunk 1
port link-type trunk
port trunk allow-pass vlan all
qui
3、MSTP
HX_SW1:
stp region-configuration
region-name huawei
revision-level 1
instance 1 vlan 10 20 200
instance 2 vlan 30 40 50
active region-configuration
qui
stp instance 1 root primary
stp instance 2 root secondary
------------------------------------
HX_SW2:
stp region-configuration
region-name huawei
revision-level 1
instance 1 vlan 10 20 200
instance 2 vlan 30 40 50
active region-configuration
qui
stp instance 2 root primary
stp instance 1 root secondary
------------------------------------
HJ_SW3:
stp region-configuration
region-name huawei
revision-level 1
instance 1 vlan 10 20 200
instance 2 vlan 30 40 50
active region-configuration
qui
------------------------------------
HJ_SW4:
stp region-configuration
region-name huawei
revision-level 1
instance 1 vlan 10 20 200
instance 2 vlan 30 40 50
active region-configuration
qui
------------------------------------
LSW5:
stp region-configuration
region-name huawei
revision-level 1
instance 1 vlan 10 20 200
instance 2 vlan 30 40 50
active region-configuration
qui
4、VRRP
HX_SW1:
int vlan 10
ip add 192.168.10.254 24
vrrp vrid 10 virtual-ip 192.168.10.1
vrrp vrid 10 priority 105
int vlan 20
ip add 192.168.20.254 24
vrrp vrid 20 virtual-ip 192.168.20.1
vrrp vrid 20 priority 105
int vlan 200
ip add 192.168.200.254 24
vrrp vrid 200 virtual-ip 192.168.200.1
vrrp vrid 200 priority 105
int vlan 30
ip add 192.168.30.254 24
vrrp vrid 30 virtual-ip 192.168.30.1
int vlan 40
ip add 192.168.40.254 24
vrrp vrid 40 virtual-ip 192.168.40.1
int vlan 50
ip add 192.168.50.254 24
vrrp vrid 50 virtual-ip 192.168.50.1
int vlan 11
ip add 192.168.11.1 24
qui
------------------------------------
HX_SW2:
int vlan 10
ip add 192.168.10.253 24
vrrp vrid 10 virtual-ip 192.168.10.1
int vlan 20
ip add 192.168.20.253 24
vrrp vrid 20 virtual-ip 192.168.20.1
int vlan 200
ip add 192.168.200.253 24
vrrp vrid 200 virtual-ip 192.168.200.1
int vlan 30
ip add 192.168.30.253 24
vrrp vrid 30 virtual-ip 192.168.30.1
vrrp vrid 30 priority 105
int vlan 40
ip add 192.168.40.253 24
vrrp vrid 40 virtual-ip 192.168.40.1
vrrp vrid 40 priority 105
int vlan 50
ip add 192.168.50.253 24
vrrp vrid 50 virtual-ip 192.168.50.1
vrrp vrid 50 priority 105
int vlan 12
ip add 192.168.12.2 24
qui
5、测试PC通网关
手动给PC配置IP地址访问网关,如给vlan10下的PC配置
IP:192.168.10.3
GW:192.168.10.1 测试访问网关,ping 192.168.10.1通了即可
手动给PC配置IP地址访问网关,如给vlan30下的PC配置
IP:192.168.30.7
GW:192.168.30.1 测试访问网关,ping 192.168.30.1通了即可
6、OSPF
HX_SW1:
ospf 1 router-id 10.1.5.5
area 0
network 192.168.0.0 0.0.255.255
qui
qui
------------------------------------
HX_SW2:
ospf 1 router-id 10.1.6.6
area 0
network 192.168.0.0 0.0.255.255
qui
qui
7、DHCP中继
DHCP:
sys
un in en
sysname DHCP
int g0/0/0
ip add 192.168.200.3 24
qui
dhcp enable
ip pool vlan10
network 192.168.10.0 mask 24
gateway-list 192.168.10.1
dns-list 192.168.200.2 8.8.8.8
excluded-ip-address 192.168.10.250 192.168.10.254
qui
ip pool vlan20
network 192.168.20.0 mask 24
gateway-list 192.168.20.1
dns-list 192.168.200.2 8.8.8.8
excluded-ip-address 192.168.20.250 192.168.20.254
qui
ip pool vlan30
network 192.168.30.0 mask 24
gateway-list 192.168.30.1
dns-list 192.168.200.2 8.8.8.8
excluded-ip-address 192.168.30.250 192.168.30.254
qui
ip pool vlan40
network 192.168.40.0 mask 24
gateway-list 192.168.40.1
dns-list 192.168.200.2 8.8.8.8
excluded-ip-address 192.168.40.250 192.168.40.254
qui
ip pool vlan50
network 192.168.50.0 mask 24
gateway-list 192.168.50.1
dns-list 192.168.200.2 8.8.8.8
excluded-ip-address 192.168.50.250 192.168.50.254
qui
int g0/0/0
dhcp select global
qui
ip route-static 0.0.0.0 0 192.168.200.1
------------------------------------------
HX_SW1:
dhcp enable
int vlan 10
dhcp select relay
dhcp relay server-ip 192.168.200.3
int vlan 20
dhcp select relay
dhcp relay server-ip 192.168.200.3
int vlan 30
dhcp select relay
dhcp relay server-ip 192.168.200.3
int vlan 40
dhcp select relay
dhcp relay server-ip 192.168.200.3
int vlan 50
dhcp select relay
dhcp relay server-ip 192.168.200.3
----------------------------------------
HX_SW2:
dhcp enable
int vlan 10
dhcp select relay
dhcp relay server-ip 192.168.200.3
int vlan 20
dhcp select relay
dhcp relay server-ip 192.168.200.3
int vlan 30
dhcp select relay
dhcp relay server-ip 192.168.200.3
int vlan 40
dhcp select relay
dhcp relay server-ip 192.168.200.3
int vlan 50
dhcp select relay
dhcp relay server-ip 192.168.200.3
8、无线WLAN
HX_SW2:
vlan batch 100 101 102
int g0/0/6
port link-type trunk
port trunk allow-pass vlan all
int g0/0/3
port trunk allow-pass vlan 100 101 102
int g0/0/4
port trunk allow-pass vlan 100 101 102
qui
int vlan 100
ip add 192.168.100.1 24
int vlan 101
ip add 192.168.101.1 24
int vlan 102
ip add 192.168.102.1 24
qui
dhcp enable
ip pool ap_pool
gateway-list 192.168.100.1
network 192.168.100.0 mask 24
excluded-ip-address 192.168.100.100
dns-list 192.168.200.2
qui
ip pool hua_1
gateway-list 192.168.101.1
network 192.168.101.0 mask 24
dns-list 192.168.200.2
qui
ip pool hua_2
gateway-list 192.168.102.1
network 192.168.102.0 mask 24
dns-list 192.168.200.2
qui
int vlan 100
dhcp select global
int vlan 101
dhcp select global
int vlan 102
dhcp select global
qui
qui
-------------------------------------
HJ_SW3:
vlan batch 100 101 102
int g0/0/2
port trunk allow-pass vlan 100 101 102
int eth 2
port trunk allow-pass vlan 100 101 102
qui
-------------------------------------
JR_SW5:
vlan batch 100 101 102
int eth 2
port trunk allow-pass vlan 100 101 102
int g0/0/5
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100 101
qui
---------------------------------
HJ_SW4:
vlan batch 100 101 102
int g0/0/2
port trunk allow-pass vlan 100 101 102
int g0/0/4
port trunk allow-pass vlan 100 101 102
qui
---------------------------------
JR_SW7:
vlan batch 100 101 102
int g0/0/1
port trunk allow-pass vlan 100 101 102
int g0/0/5
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100 102
qui
---------------------------------
AC:
sys
un in en
sysname AC1
vlan 100
int vlan 100
ip add 192.168.100.100 24
qui
int g0/0/1
port link-type trunk
port trunk allow-pass vlan all
qui
ip route-static 0.0.0.0 0.0.0.0 192.168.100.253
capwap source interface vlanif100
wlan
ssid-profile name SSID_PRO
ssid huawei
qui
security-profile name SEC_PRO
security wpa2 psk pass-phrase huawei@123 aes
qui
vap-profile name VAP1_PRO
ssid-profile SSID_PRO
security-profile SEC_PRO
service-vlan vlan-id 101
qui
vap-profile name VAP2_PRO
ssid-profile SSID_PRO
security-profile SEC_PRO
service-vlan vlan-id 102
qui
ap-id 1 ap-mac 00E0-FCDC-6AC0
ap-id 2 ap-mac 00E0-FC2F-7240
qui
ap-id 1
ap-name AREA_1
vap-profile VAP1_PRO wlan 1 radio 0
vap-profile VAP1_PRO wlan 1 radio 1
qui
ap-id 2
ap-name AREA_2
vap-profile VAP2_PRO wlan 1 radio 0
vap-profile VAP2_PRO wlan 1 radio 1
qui
9、防火墙基本配置
admin
Admin@123
Y
Admin@123
admin@123
admin@123
sys
user-int con 0
id 0 0
qui //取消防火墙的屏保
FW1:
sys
un in en
sysname FW1
int g1/0/1
ip add 192.168.11.12 24
service-manage all permit
int g1/0/2
ip add 192.168.12.12 24
service-manage all permit
int g1/0/0
ip add 192.168.111.12 24
service-manage all permit
int g1/0/3
service-manage all permit
qui
firewall zone trust
add int g1/0/1
add int g1/0/2
add int g1/0/5
qui
firewall zone dmz
add int g1/0/0
qui
firewall zone untrust
add int g1/0/3
add int g1/0/4
add int g1/0/6
qui
ospf 1 router-id 10.1.4.4
default-route-advertise
area 0
net 192.168.11.0 0.0.0.255
net 192.168.12.0 0.0.0.255
qui
qui
ip route-static 0.0.0.0 0.0.0.0 10.1.1.4
icmp ttl-exceeded send
10、BFD路由联动
HX_SW1:
bfd
qui
bfd test1 bind peer-ip 192.168.11.12 source-ip 192.168.11.1 auto
commit
qui
dis bfd session all
int vlan 10
vrrp vrid 10 track bfd-session session-name test1
vrrp vrid 10 track int g0/0/1
int vlan 20
vrrp vrid 20 track bfd-session session-name test1
vrrp vrid 20 track int g0/0/1
int vlan 200
vrrp vrid 200 track bfd-session session-name test1
vrrp vrid 200 track int g0/0/1
qui
----------------------------------
FW1:
bfd
qui
bfd test1 bind peer-ip 192.168.11.1 source-ip 192.168.11.12 auto
commit
qui
bfd test2 bind peer-ip 192.168.12.2 source-ip 192.168.12.12 auto
commit
qui
----------------------------------
HX_SW2:
bfd
qui
bfd test2 bind peer-ip 192.168.12.12 source-ip 192.168.12.2 auto
commit
qui
int vlan 30
vrrp vrid 30 track bfd-session session-name test2
vrrp vrid 30 track int g0/0/1
int vlan 40
vrrp vrid 40 track bfd-session session-name test2
vrrp vrid 40 track int g0/0/1
int vlan 50
vrrp vrid 50 track bfd-session session-name test2
vrrp vrid 50 track int g0/0/1
qui
11、防火墙安全策略&NAT
FW1:
security-policy
rule name local_to_any
source-zone local
action permit
rule name trust_to_untrust
source-zone trust
destination-zone untrust
action permit
rule name dmz_to_untrust
source-zone dmz
destination-zone untrust
action permit
rule name untrst_to_trust
source-zone untrust
destination-zone trust
action permit
rule name trust_to_dmz
source-zone trust
destination-zone dmz
source-address 192.168.10.0 mask 255.255.255.0
destination-address 192.168.111.10 mask 255.255.255.255
action permit
rule name trust_to_dmz_no
source-zone trust
destination-zone dmz
source-address 192.168.0.0 mask 255.255.0.0
destination-address 192.168.111.10 mask 255.255.255.255
action deny
rule name trust_to_dmz_yes
source-zone trust
destination-zone dmz
action permit
qui
qui
nat-policy
rule name nat_easy
source-zone trust
destination-zone untrust
source-address 192.168.0.0 mask 255.255.0.0
action source-nat easy-ip
qui
qui
12、ISP互通
AR4:
sys
un in en
sysname AR4
int g0/0/2
ip add 10.1.45.4 24
in g4/0/0
ip add 10.1.46.4 24
int g4/0/3
ip add 10.1.1.4 24
int loo0
ip add 4.4.4.4 32
qui
isis 1
is-level level-1
net 49.0001.0000.0000.0004.00
cost-style wide
qui
int g0/0/2
isis enable 1
int g4/0/0
isis enable 1
int loo0
isis enable 1
qui
----------------------------------
AR5:
sys
un in en
sysname AR5
int g0/0/0
ip add 10.1.45.5 24
int loo0
ip add 5.5.5.5 32
qui
isis 1
is-level level-1
net 49.0001.0000.0000.0005.00
cost-style wide
qui
int g0/0/0
isis enable 1
int loo0
isis enable 1
qui
----------------------------------
AR6:
sys
un in en
sysname AR6
int g0/0/0
ip add 10.1.46.6 24
int loo0
ip add 6.6.6.6 32
qui
isis 1
is-level level-1
net 49.0001.0000.0000.0006.00
cost-style wide
qui
int g0/0/0
isis enable 1
int loo0
isis enable 1
qui
13、配置MPLS
AR5:
mpls lsr-id 5.5.5.5
mpls
mpls ldp
qui
int g0/0/0
mpls
mpls ldp
qui
----------------------------------
AR4:
mpls lsr-id 4.4.4.4
mpls
mpls ldp
qui
int g0/0/2
mpls
mpls ldp
int g4/0/0
mpls
mpls ldp
qui
----------------------------------
AR6:
mpls lsr-id 6.6.6.6
mpls
mpls ldp
qui
int g0/0/0
mpls
mpls ldp
qui
14、建立BGP关系
AR5:
bgp 100
peer 4.4.4.4 as 100
peer 4.4.4.4 con loo0
ipv4 vpnv4
peer 4.4.4.4 en
qui
qui
----------------------------------
AR6:
bgp 100
peer 4.4.4.4 as 100
peer 4.4.4.4 con loo0
ipv4 vpnv4
peer 4.4.4.4 en
qui
qui
----------------------------------
AR4:
bgp 100
peer 5.5.5.5 as 100
peer 5.5.5.5 con loo0
peer 6.6.6.6 as 100
peer 6.6.6.6 con loo0
ipv4 vpnv4
peer 5.5.5.5 en
peer 6.6.6.6 en
qui
qui
15、创建VPN实例
这一部分要不我就先不放在文章中,
配置的设备主要是CE边界设备与ISP之间配置相应的VPN实例
配置相应的实例运行OSPF,最后做路由引入
这一部分在文章中省了,但是如果是
自己确实是小白没法自己配置出来那
可能就没有办法了,下载资源的话需要
收取一些费用,那里的order命令是没有省略的
一条一条一步一步的命令都是有的,也都是全的。
http://www.small.org.cn/ (资源010)
16、后门链路sham-link
这一部分也和上面一样也省了吧
17、镜像端口
FW1:
int g1/0/5
ip add 192.168.13.12 24
qui
observing-port g1/0/5
port-mirroring g1/0/3 both g1/0/5
y
port-mirroring g1/0/4 both g1/0/5
y
qui
验证:
pc6 ping pc7在视频监控设备的端口能收到数据报(抓包)
18、防火墙路由引入
FW1:
bgp 65430
import-route ospf 1
qui
ospf 1
import-route bgp
qui
19、Telnet
HX_SW1:
aaa
local-user huawei privilege level 3 password cipher 5555
local-user huawei service-type telnet
qui
user-interface vty 0 4
authentication-mode aaa
protocol inbound telnet
qui
int vlanif 900
ip add 192.168.255.254 24
vrrp vrid 255 virtual-ip 192.168.255.1
q
------------------------------
HX_SW2:
aaa
local-user huawei privilege level 3 password cipher 5555
local-user huawei service-type telnet
qui
user-interface vty 0 4
authentication-mode aaa
protocol inbound telnet
qui
int vlanif 900
ip add 192.168.255.253 24
vrrp vrid 255 virtual-ip 192.168.255.1
q
------------------------------
HJ_SW3:
aaa
local-user huawei privilege level 3 password cipher 5555
local-user huawei service-type telnet
qui
user-interface vty 0 4
authentication-mode aaa
protocol inbound telnet
qui
int vlanif 900
ip add 192.168.255.3 24
qui
ip route-s 0.0.0.0 0 192.168.255.1
------------------------------
HJ_SW4:
aaa
local-user huawei privilege level 3 password cipher 5555
local-user huawei service-type telnet
qui
user-interface vty 0 4
authentication-mode aaa
protocol inbound telnet
qui
int vlanif 900
ip add 192.168.255.4 24
qui
ip route-s 0.0.0.0 0 192.168.255.1
------------------------------
JR_SW5:
aaa
local-user huawei privilege level 3 password cipher 5555
local-user huawei service-type telnet
qui
user-interface vty 0 4
authentication-mode aaa
protocol inbound telnet
qui
int vlanif 900
ip add 192.168.255.5 24
qui
ip route-s 0.0.0.0 0 192.168.255.1
------------------------------
HJ_SW6:
aaa
local-user huawei privilege level 3 password cipher 5555
local-user huawei service-type telnet
qui
user-interface vty 0 4
authentication-mode aaa
protocol inbound telnet
qui
int vlanif 900
ip add 192.168.255.6 24
qui
ip route-s 0.0.0.0 0 192.168.255.1
------------------------------
HJ_SW7:
aaa
local-user huawei privilege level 3 password cipher 5555
local-user huawei service-type telnet
qui
user-interface vty 0 4
authentication-mode aaa
protocol inbound telnet
qui
int vlanif 900
ip add 192.168.255.7 24
qui
ip route-s 0.0.0.0 0 192.168.255.1
------------------------------
LSW5:
aaa
local-user huawei privilege level 3 password cipher 5555
local-user huawei service-type telnet
qui
user-interface vty 0 4
authentication-mode aaa
protocol inbound telnet
qui
int vlanif 900
ip add 192.168.255.55 24
qui
ip route-s 0.0.0.0 0 192.168.255.1
//测试:
//由于模拟器上不可以telnet所以就换成了路由器
PC路由器配置:自动获取IP地址
[Huawei]sysname PC
[PC]un in en
[PC]dhcp enable
[PC]int e0/0/0
[PC-Ethernet0/0/0]ip add dhcp-alloc
之后就可以telnet了
<PC>telnet 192.168.255.254
五、公众/名片所在地
关注公众号(小猿网),回复“网络规划”即可。
资源为收费资源,如不符合您的消费观,还请您见谅