作者信息:苗浩15515026488微信同号
本文摘抄自全国职业院校技能大赛官网发布赛题,如有侵权,请及时联系作者删除文章。
本文由H3C模拟器H3C Cloud Lab完成,不涉及SDN/认证/运维/无线地勘部分。
企业交流Group:535935227
拓扑图
地址规划表
设备 | 接口/VLAN | 接口/VLAN描述 | 二层/三层规划 | 说明 |
S1 | G 0/24 | Connect_To_R2 | 10.1.0.1/30 2001:10:1::1/64 | 级联R2 |
VLAN11 | SC1-Connect | 10.1.1.1/30 | 生产1VPN互联 | |
VLAN12 | BG1-Connect | 10.1.2.1/30 | 办公1VPN互联 | |
VLAN13 | GL1-Connect | 10.1.3.1/30 | 管理1VPN互联 | |
VLAN14 | IPv6-Connect | 2001:10:1:4::1/64 | IPv6互联 | |
LoopBack 0 | \ | 10.0.0.1/32 | OSPF 10 | |
LoopBack11 | \ | 10.1.4.1/32 | 生产1 OSPF 11 Router-id | |
LoopBack12 | \ | 10.1.4.2/32 | 办公1 OSPF 12 Router-id | |
LoopBack13 | \ | 10.1.4.3/32 | 管理1 OSPF 13 Router-id | |
S3 | VLAN11 | SC1-Connect | 10.1.1.2/30 | 生产1VPN互联 |
VLAN12 | BG1-Connect | 10.1.2.2/30 | 办公1VPN互联 | |
VLAN13 | GL1-Connect | 10.1.3.2/30 | 管理1VPN互联 | |
VLAN14 | IPv6-Connect | 2001:10:1:4::2/64 | IPv6互联 | |
VLAN10 | SC1-Terminal | 10.1.10.254/24 | 生产终端 | |
VLAN20 | BG1-Terminal | 10.1.20.254/24 | 办公终端 | |
VLAN30 | GL1-Terminal | 10.1.30.254/24 | G 0/21(AP) | |
VLAN40 | IPv6-Terminal | 2001:10:1:40::254/64 | IPv6终端 | |
LoopBack11 | \ | 10.1.4.4/32 | 生产1 OSPF 11 Router-id | |
LoopBack12 | \ | 10.1.4.5/32 | 办公1 OSPF 12 Router-id | |
LoopBack13 | \ | 10.1.4.6/32 | 管理1 OSPF 13 Router-id | |
LoopBack14 | \ | 10.1.4.7/32 | IPv6 OSPF 14 Router-id | |
S2 | G 0/24 | Connect_To_R2 | 10.2.0.1/30 2001:10:2::1/64 | 级联R2 |
VLAN11 | SC2-Connect | 10.2.1.1/30 | 生产2VPN互联 | |
VLAN12 | BG2-Connect | 10.2.2.1/30 | 办公2VPN互联 | |
VLAN13 | GL2-Connect | 10.2.3.1/30 | 管理2VPN互联 | |
VLAN14 | IPv6-Connect | 2001:10:2:4::1/64 | IPv6互联 | |
LoopBack 0 | \ | 10.0.0.2/32 | OSPF 10 | |
S2 | LoopBack11 | \ | 10.2.4.1/32 | 生产2 OSPF 11 Router-id |
LoopBack12 | \ | 10.2.4.2/32 | 办公2 OSPF 12 Router-id | |
LoopBack13 | \ | 10.2.4.3/32 | 管理2 OSPF 13 Router-id | |
S4 | VLAN11 | SC2-Connect | 10.2.1.2/30 | 生产2VPN互联 |
VLAN12 | BG2-Connect | 10.2.2.2/30 | 办公2VPN互联 | |
VLAN13 | GL2-Connect | 10.2.3.2/30 | 管理2VPN互联 | |
VLAN14 | IPv6-Connect | 2001:10:2:4::2/64 | IPv6互联 | |
VLAN10 | SC2-Terminal | 10.2.10.254/24 | 生产终端 | |
VLAN20 | BG2-Terminal | 10.2.20.254/24 | 办公终端 | |
VLAN30 | GL2-Terminal | 10.2.30.254/24 | G 0/21(AP) | |
VLAN40 | IPv6-Terminal | 2001:10:2:40::254/64 | IPv6终端 | |
LoopBack11 | \ | 10.2.4.4/32 | 生产2 OSPF 11 Router-id | |
LoopBack12 | \ | 10.2.4.5/32 | 办公2 OSPF 12 Router-id | |
LoopBack13 | \ | 10.2.4.6/32 | 管理2 OSPF 13 Router-id | |
LoopBack14 | \ | 10.2.4.7/32 | IPv6 OSPF 14 Router-id | |
R2 | G 0/1 | Connect_To_S1 | 10.1.0.2/30 2001:10:1::2/64 | |
G 0/2 | Connect_To_S1 | 10.2.0.2/30 2001:10:2::2/64 | ||
G 0/0 | Connect_To_R1 | 12.1.1.2/29 | 对接各业务中心 | |
G 0/0.21 | Connect_To_R1 | 21.1.1.2/29 | 对接Internet | |
LoopBack 0 | \ | 10.0.0.22/32 | ||
LoopBack 1 | \ | 172.16.0.2/24 | L2TP隧道 | |
Tunnel 0 | \ | 172.17.0.2/24 | GRE隧道 | |
LoopBack13 | \ | 10.1.4.22/32 | 运维管理使用 | |
R1 | G 0/1 | Connect_To_R2 | 12.1.1.1/29 | |
G 0/1.21 | Connect_To_R2 | 21.1.1.1/29 | ||
G 0/2 | Connect_To_R3 | 13.1.1.1/29 | ||
G 0/0 | Connect_To_S7 | 17.1.1.1/29 | ||
LoopBack 20 | \ | 20.0.0.1/32 | 模拟IPv4公网 资源 | |
LoopBack 30 | \ | 30.0.0.1/32 | ||
R3 | G 0/1 | Connect_To_R1 | 13.1.1.2/29 | |
G 0/2 | Connect_To_S5 | 10.3.0.1/30 | ||
LoopBack 0 | \ | 10.3.1.3/32 | OSPF 20 Router id | |
Tunnel 0 | \ | 172.17.0.3/24 | GRE隧道 | |
S5 | G 0/24 | Connect_To_R3 | 10.3.0.2/30 | |
AG1 | Connect_To_VAC | 10.3.0.10/30 | G 0/1 G 0/2 | |
LoopBack 0 | \ | 10.3.1.5/32 | OSPF 20 Router id | |
G 0/21 | Connect_To_IOM | 192.1.100.254/24 | 运维系统 | |
G 0/22 | Connect_To_AAA | 194.1.100.254/24 | 认证系统 | |
VAC | AG1 | Connect_To_S5 | 10.3.0.9/30 | G 1/0/2 G 2/0/2 |
LoopBack 0 | \ | 10.3.1.12/32 | OSPF 20 Router id | |
GW1 | G 0/0 | Connect_To_R1 | 17.1.1.2/29 | |
G 0/1.10 | SC1-Terminal | 10.4.10.254/24 | 生产1终端 | |
G 0/1.11 | SC2-Terminal | 10.4.11.254/24 | 生产2终端 | |
G 0/1.20 | AP-Manage | 10.4.20.254/24 | AP管理 | |
G 0/1.30 | Net-Manage | 10.4.30.254/24 | 设备管理 | |
LoopBack 0 | \ | 10.4.1.1/32 | ||
Virtual-ppp | 172.16.0.3/24 | L2tp隧道 | ||
GW2 | G 0/0 | Connect_To_R1 | 17.1.1.3/29 | |
G 0/1.10 | SC1-Terminal | 10.4.10.253/24 | 生产1终端 | |
G 0/1.11 | SC2-Terminal | 10.4.11.253/24 | 生产2终端 | |
G 0/1.20 | AP-Manage | 10.4.20.253/24 | AP管理 | |
G 0/1.30 | Net-Manage | 10.4.30.253/24 | 设备管理 | |
LoopBack 0 | \ | 10.4.1.2/32 | ||
Virtual-ppp | \ | 172.16.0.4/24 | L2tp隧道 | |
S6 | G 0/21 | Connect_To_SDN | 192.168.1.6/24 | SDN控制器 |
VLAN10 | SC1-Terminal | \ | ||
VLAN11 | SC2-Terminal | \ | ||
VLAN20 | AP-Manage | \ | G 0/11(AP) | |
VLAN30 | Net-Manage | 10.4.30.1/24 | 设备管理 | |
S7 | VLAN1 | HUB | 17.1.1.4/29 | 测试运维使用 |
注:交换设备、安全设备、无线设备的接口编号G 0/x与G1/0/x一致。
设备编号表
编号 | H3C硬件型号(HCL Cloud Lab) |
S1 | H3C S5560X(S5820V2-54QS-GE) |
S2 | H3C S5560X(S5820V2-54QS-GE) |
S3 | H3C S5560X(S5820V2-54QS-GE) |
S4 | H3C S5560X(S5820V2-54QS-GE) |
S5 | H3C S5560X(S5820V2-54QS-GE) |
S6 | H3C S5130S(S5820V2-54QS-GE) |
S7 | H3C S5130S(S5820V2-54QS-GE) |
GW1 | H3C SecPath F1010(F1060) |
GW2 | H3C SecPath F1010(F1060) |
R1 | H3C MSR3600(MSR36-20) |
R2 | H3C MSR3600(MSR36-20) |
R3 | H3C MSR3600(MSR36-20) |
AC1 | H3C WX3510(AC) |
AC2 | H3C WX3510(AC) |
AP1 | H3C WA6320(AP) |
AP2 | H3C WA6320(AP) |
AP3 | H3C WA6320(AP) |
任务清单
(一)基础配置
前置配置:AC虚拟化/链路聚合
由于模拟器的原因,VAC与S5之间的互联地址使用vlan1
解法:
AC堆叠
#AC1手工关闭堆叠物理口
[H3C]interface range Ten-GigabitEthernet 1/0/24 to Ten-GigabitEthernet 1/0/25
[H3C-if-range]shutdown
#AC1配置IRF描述/优先级
[H3C]irf member 1 description AC-1
[H3C]irf member 1 priority 32
#AC1创建堆叠口irf-port 1/1,并加入物理口 F1/0/53 和 F1/0/54 口
[H3C]irf-port 1/1
[H3C-irf-port1/1]port group interface Ten-GigabitEthernet 1/0/24
[H3C-irf-port1/1]port group interface Ten-GigabitEthernet 1/0/25
#AC1手动开启关闭的物理口
[H3C]interface range Ten-GigabitEthernet 1/0/24 to Ten-GigabitEthernet 1/0/25
[H3C-if-range]undo shutdown
#AC1保存配置
<H3C>save
#AC1激活IRF配置
[H3C]irf-port-configuration active
#AC2修改设备编号,修改过后保存重启
[H3C]irf member 1 renumber 2
Renumbering the member ID may result in configuration change or loss. Continue?[Y/N]:y
<H3C>save
<H3C>reboot
#AC2配置IRF描述
[H3C]irf member 2 description AC-2
#AC2上手工关闭堆叠物理口
[H3C]interface range Ten-GigabitEthernet 2/0/24 to Ten-GigabitEthernet 2/0/25
[H3C-if-range]shutdown
#AC2创建堆叠口irf-port 2/2
[H3C]irf-port 2/2
[H3C-irf-port2/2]port group interface Ten-GigabitEthernet 2/0/24
[H3C-irf-port2/2]port group interface Ten-GigabitEthernet 2/0/25
#AC2手动开启关闭的物理口
[H3C]interface range Ten-GigabitEthernet 2/0/24 to Ten-GigabitEthernet 2/0/25
[H3C-if-range]undo shutdown
#AC2保存配置
<H3C>save
#AC2上激活IRF配置
[H3C]irf-port-configuration active
链路聚合
VAC
[VAC]interface Bridge-Aggregation 1
[VAC-Bridge-Aggregation1]link-aggregation mode dynamic
[VAC]interface GigabitEthernet 1/0/2
[VAC-GigabitEthernet1/0/2]port link-aggregation group 1
[VAC]interface GigabitEthernet 2/0/2
[VAC-GigabitEthernet1/0/2]port link-aggregation group 1
S5
[S5]interface Bridge-Aggregation 1
[S5-Bridge-Aggregation1]link-aggregation mode dynamic
[S5]interface GigabitEthernet 1/0/1
[S5-GigabitEthernet1/0/1]port link-aggregation group 1
[S5]interface GigabitEthernet 1/0/2
[S5-GigabitEthernet1/0/1]port link-aggregation group 1
验证:
1. 根据附录1拓扑图、附录2地址规划表、附录3设备编号表,配置设备接口及主机名信息。
解法:
#VAC
<H3C>system-view
[H3C]sysname VAC
[VAC]interface Bridge-Aggregation 1
[VAC-Bridge-Aggregation1]port link-type trunk
[VAC-Bridge-Aggregation1]description Connect_To_S5_VLAN1
[VAC]interface Vlan-interface 1
[VAC-Vlan-interface1]ip address 10.3.0.9 30
[VAC]interface LoopBack 0
[VAC-LoopBack0]ip address 10.3.1.12 32
#S5
<H3C>system-view
[H3C]sysname S5
[S5]interface GigabitEthernet 1/0/24
[S5-GigabitEthernet1/0/24]port link-mode route
[S5-GigabitEthernet1/0/24]description Connect_To_R3
[S5-GigabitEthernet1/0/24]ip address 10.3.0.2 30
[S5]interface Bridge-Aggregation 1
[S5-Bridge-Aggregation1]port link-type trunk
[S5-Bridge-Aggregation1]description Connect_To_VAC_VLAN1
[S5]interface Vlan-interface 1
[S5-Vlan-interface1]ip address 10.3.0.10 30
[S5]interface LoopBack 0
[S5-LoopBack0]ip address 10.3.1.5 32
[S5]interface GigabitEthernet 1/0/21
[S5-GigabitEthernet1/0/21]port link-mode route
[S5-GigabitEthernet1/0/21]description Connect_To_IOM
[S5-GigabitEthernet1/0/21]ip address 192.1.100.254 24
[S5]interface GigabitEthernet 1/0/22
[S5-GigabitEthernet1/0/22]port link-mode route
[S5-GigabitEthernet1/0/22]description Connect_To_AAA
[S5-GigabitEthernet1/0/22]ip address 194.1.100.254 24
#R3
<H3C>system-view
[H3C]sysname R3
[R3]interface GigabitEthernet 0/1
[R3-GigabitEthernet0/1]description Connect_To_R1
[R3-GigabitEthernet0/1]ip address 13.1.1.2 29
[R3]interface GigabitEthernet 0/2
[R3-GigabitEthernet0/2]description Connect_To_S5
[R3-GigabitEthernet0/2]ip address 10.3.0.1 30
[R3]interface LoopBack 0
[R3-LoopBack0]ip address 10.3.1.3 32
[R3]interface Tunnel 0 mode gre
[R3-Tunnel0]ip address 172.17.0.3 24
#R1
<H3C>system-view
[H3C]sysname R1
[R1]interface GigabitEthernet 0/1
[R1-GigabitEthernet0/1]description Connect_To_R2
[R1-GigabitEthernet0/1]ip address 12.1.1.1 29
[R1]interface GigabitEthernet 0/1.21
[R1-GigabitEthernet0/1.21]vlan-type dot1q vid 21
[R1-GigabitEthernet0/1.21]description Connect_To_R2
[R1-GigabitEthernet0/1.21]ip address 21.1.1.1 29
[R1]interface GigabitEthernet 0/2
[R1-GigabitEthernet0/2]description Connect_To_R3
[R1-GigabitEthernet0/2]ip address 13.1.1.1 29
[R1]interface GigabitEthernet 0/0
[R1-GigabitEthernet0/0]description Connect_To_S7
[R1-GigabitEthernet0/0]ip address 17.1.1.1 29
[R1]interface LoopBack 20
[R1-LoopBack20]ip address 20.0.0.1 32
[R1]interface LoopBack 30
[R1-LoopBack30]ip address 30.0.0.1 32
#R2
<H3C>system-view
[H3C]sysname R2
[R2]interface GigabitEthernet 0/1
[R2-GigabitEthernet0/1]description Connect_To_S1
[R2-GigabitEthernet0/1]ip address 10.1.0.2 30
[R2-GigabitEthernet0/1]ipv6 address 2001:10:1::2 64
[R2]interface GigabitEthernet 0/2
[R2-GigabitEthernet0/2]description Connect_To_S2
[R2-GigabitEthernet0/2]ip address 10.2.0.2 30
[R2-GigabitEthernet0/2]ipv6 address 2001:10:2::2 64
[R2]interface GigabitEthernet 0/0
[R2-GigabitEthernet0/0]description Connect_To_R1
[R2-GigabitEthernet0/0]ip address 12.1.1.2 29
[R2]interface GigabitEthernet 0/0.21
[R2-GigabitEthernet0/0.21]vlan-type dot1q vid 21
[R2-GigabitEthernet0/0.21]description Connect_To_R1
[R2-GigabitEthernet0/0.21]ip address 21.1.1.2 24
[R2]interface LoopBack 0
[R2-LoopBack0]ip address 10.0.0.22 32
[R2]interface LoopBack 1
[R2-LoopBack1]ip address 172.16.0.2 24
[R2]interface Tunnel 0 mode gre
[R2-Tunnel0]ip address 172.17.0.2 24
[R2]interface LoopBack 13
[R2-LoopBack13]ip address 10.1.4.22 32
#S1
<H3C>system-view
[H3C]sysname S1
[S1]interface GigabitEthernet 1/0/24
[S1-GigabitEthernet1/0/24]port link-mode route
[S1-GigabitEthernet1/0/24]description Connect_To_R2
[S1-GigabitEthernet1/0/24]ip address 10.1.0.1 30
[S1-GigabitEthernet1/0/24]ipv6 address 2001:10:1::1 64
[S1]vlan 11 to 14
[S1]interface Vlan-interface 11
[S1-Vlan-interface11]description SC1-Connect
[S1-Vlan-interface11]ip address 10.1.1.1 30
[S1]interface Vlan-interface 12
[S1-Vlan-interface12]description BG1-Connect
[S1-Vlan-interface12]ip address 10.1.2.1 30
[S1]interface Vlan-interface 13
[S1-Vlan-interface13]description GL1-Connect
[S1-Vlan-interface13]ip address 10.1.3.1 30
[S1]interface Vlan-interface 14
[S1-Vlan-interface14]description IPv6-Connect
[S1-Vlan-interface14]ipv6 address 2001:10:1:4::1 64
[S1]interface LoopBack 0
[S1-LoopBack0]ip address 10.0.0.1 32
[S1]interface LoopBack 11
[S1-LoopBack11]ip address 10.1.4.1 32
[S1]interface LoopBack 12
[S1-LoopBack12]ip address 10.1.4.2 32
[S1]interface LoopBack 13
[S1-LoopBack13]ip address 10.1.4.3 32
#S2
<H3C>system-view
[H3C]sysname S2
[S2]interface GigabitEthernet 1/0/24
[S2-GigabitEthernet1/0/24]port link-mode route
[S2-GigabitEthernet1/0/24]description Connect_To_R2
[S2-GigabitEthernet1/0/24]ip address 10.2.0.1 30
[S2-GigabitEthernet1/0/24]ipv6 address 2001:10:2::1 64
[S2]vlan 11 to 14
[S2]interface Vlan-interface 11
[S2-Vlan-interface11]description SC2-Connect
[S2-Vlan-interface11]ip address 10.2.1.1 30
[S2]interface Vlan-interface 12
[S2-Vlan-interface12]description BG2-Connect
[S2-Vlan-interface12]ip address 10.2.2.1 30
[S2]interface Vlan-interface 13
[S2-Vlan-interface13]description GL2-Connect
[S2-Vlan-interface13]ip address 10.2.3.1 30
[S2]interface Vlan-interface 14
[S2-Vlan-interface14]description IPv6-Connect
[S2-Vlan-interface14]ipv6 address 2001:10:2:4::1 64
[S2]interface LoopBack 0
[S2-LoopBack0]ip address 10.0.0.2 32
[S2]interface LoopBack 11
[S2-LoopBack11]ip address 10.2.4.1 32
[S2]interface LoopBack 12
[S2-LoopBack12]ip address 10.2.4.2 32
[S2]interface LoopBack 13
[S2-LoopBack13]ip address 10.2.4.3 32
#S3
<H3C>system-view
[H3C]sysname S3
[S3]vlan 10 to 14
[S3]vlan 20
[S3]vlan 30
[S3]vlan 40
[S3]interface Vlan-interface 11
[S3-Vlan-interface11]description SC1-Connect
[S3-Vlan-interface11]ip address 10.1.1.2 30
[S3]interface Vlan-interface 12
[S3-Vlan-interface12]description BG1-Connect
[S3-Vlan-interface12]ip address 10.1.2.2 30
[S3]interface Vlan-interface 13
[S3-Vlan-interface13]description GL1-Connect
[S3-Vlan-interface13]ip address 10.1.3.2 30
[S3]interface Vlan-interface 14
[S3-Vlan-interface14]description IPv6-Connect
[S3-Vlan-interface14]ipv6 address 2001:10:1:4::2 64
[S3]interface Vlan-interface 10
[S3-Vlan-interface10]description SC1-Terminal
[S3-Vlan-interface10]ip address 10.1.10.254 24
[S3]interface Vlan-interface 20
[S3-Vlan-interface20]description BG1-Terminal
[S3-Vlan-interface20]ip address 10.1.20.254 24
[S3]interface Vlan-interface 30
[S3-Vlan-interface30]description GL1-Terminal
[S3-Vlan-interface30]ip address 10.1.30.254 24
[S3]interface Vlan-interface 40
[S3-Vlan-interface40]description IPv6-Terminal
[S3-Vlan-interface40]ipv6 address 2001:10:1:40::254 64
[S3]interface LoopBack 11
[S3-LoopBack11]ip address 10.1.4.4 32
[S3]interface LoopBack 12
[S3-LoopBack12]ip address 10.1.4.5 32
[S3]interface LoopBack 13
[S3-LoopBack13]ip address 10.1.4.6 32
[S3]interface LoopBack 14
[S3-LoopBack14]ip address 10.1.4.7 32
#S4
<H3C>system-view
[H3C]sysname S4
[S4]vlan 10 to 14
[S4]vlan 20
[S4]vlan 30
[S4]vlan 40
[S4]interface Vlan-interface 11
[S4-Vlan-interface11]description SC2-Connect
[S4-Vlan-interface11]ip address 10.2.1.2 30
[S4]interface Vlan-interface 12
[S4-Vlan-interface12]description BG2-Connect
[S4-Vlan-interface12]ip address 10.2.2.2 30
[S4]interface Vlan-interface 13
[S4-Vlan-interface13]description GL2-Connect
[S4-Vlan-interface13]ip address 10.2.3.2 30
[S4]interface Vlan-interface 14
[S4-Vlan-interface14]description IPv6-Connect
[S4-Vlan-interface14]ipv6 address 2001:10:2:4::2 64
[S4]interface Vlan-interface 10
[S4-Vlan-interface10]description SC2-Terminal
[S4-Vlan-interface10]ip address 10.2.10.254 24
[S4]interface Vlan-interface 20
[S4-Vlan-interface20]description BG2-Terminal
[S4-Vlan-interface20]ip address 10.2.20.254 24
[S4]interface Vlan-interface 30
[S4-Vlan-interface30]description GL2-Terminal
[S4-Vlan-interface30]ip address 10.2.30.254 24
[S4]interface Vlan-interface 40
[S4-Vlan-interface40]description IPv6-Terminal
[S4-Vlan-interface40]ipv6 address 2001:10:2:40::254 64
[S4]interface LoopBack 11
[S4-LoopBack11]ip address 10.2.4.4 32
[S4]interface LoopBack 12
[S4-LoopBack12]ip address 10.2.4.5 32
[S4]interface LoopBack 13
[S4-LoopBack13]ip address 10.2.4.6 32
[S4]interface LoopBack 14
[S4-LoopBack14]ip address 10.2.4.7 32
#GW1
<H3C>system-view
[H3C]sysname GW1
[GW1]interface GigabitEthernet 1/0/0
[GW1-GigabitEthernet1/0/0]description Connect_To_R1
[GW1-GigabitEthernet1/0/0]ip address 17.1.1.2 29
[GW1]interface GigabitEthernet 1/0/1.10
[GW1-GigabitEthernet1/0/1.10]vlan-type dot1q vid 10
[GW1-GigabitEthernet1/0/1.10]description SC1-Terminal
[GW1-GigabitEthernet1/0/1.10]ip address 10.4.10.254 24
[GW1]interface GigabitEthernet 1/0/1.11
[GW1-GigabitEthernet1/0/1.11]vlan-type dot1q vid 11
[GW1-GigabitEthernet1/0/1.11]description SC2-Terminal
[GW1-GigabitEthernet1/0/1.11]ip address 10.4.11.254 24
[GW1]interface GigabitEthernet 1/0/1.20
[GW1-GigabitEthernet1/0/1.20]vlan-type dot1q vid 20
[GW1-GigabitEthernet1/0/1.20]description AP-Manage
[GW1-GigabitEthernet1/0/1.20]ip address 10.4.20.254 24
[GW1]interface GigabitEthernet 1/0/1.30
[GW1-GigabitEthernet1/0/1.30]vlan-type dot1q vid 30
[GW1-GigabitEthernet1/0/1.30]description Net-Manage
[GW1-GigabitEthernet1/0/1.30]ip address 10.4.30.254 24
[GW1]interface LoopBack 0
[GW1-LoopBack0]ip address 10.4.1.1 32
[GW1]interface Virtual-Template 1
[GW1-Virtual-Template1]ip address 172.16.0.3 24
#GW2
<H3C>system-view
[H3C]sysname GW2
[GW2]interface GigabitEthernet 1/0/0
[GW2-GigabitEthernet1/0/0]description Connect_To_R1
[GW2-GigabitEthernet1/0/0]ip address 17.1.1.3 29
[GW2]interface GigabitEthernet 1/0/1.10
[GW2-GigabitEthernet1/0/1.10]vlan-type dot1q vid 10
[GW2-GigabitEthernet1/0/1.10]description SC1-Terminal
[GW2-GigabitEthernet1/0/1.10]ip address 10.4.10.253 24
[GW2]interface GigabitEthernet 1/0/1.11
[GW2-GigabitEthernet1/0/1.11]vlan-type dot1q vid 11
[GW2-GigabitEthernet1/0/1.11]description SC2-Terminal
[GW2-GigabitEthernet1/0/1.11]ip address 10.4.11.253 24
[GW2]interface GigabitEthernet 1/0/1.20
[GW2-GigabitEthernet1/0/1.20]vlan-type dot1q vid 20
[GW2-GigabitEthernet1/0/1.20]description AP-Manage
[GW2-GigabitEthernet1/0/1.20]ip address 10.4.20.253 24
[GW2]interface GigabitEthernet 1/0/1.30
[GW2-GigabitEthernet1/0/1.30]vlan-type dot1q vid 30
[GW2-GigabitEthernet1/0/1.30]description Net-Manage
[GW2-GigabitEthernet1/0/1.30]ip address 10.4.30.253 24
[GW2]interface LoopBack 0
[GW2-LoopBack0]ip address 10.4.1.2 32
[GW2]interface Virtual-Template 1
[GW2-Virtual-Template1]ip address 172.16.0.4 24
#S6
<H3C>system-view
[H3C]sysname S6
[S6]interface GigabitEthernet 1/0/21
[S6-GigabitEthernet1/0/21]port link-mode route
[S6-GigabitEthernet1/0/21]description Connect_To_SDN
[S6-GigabitEthernet1/0/21]ip address 192.168.1.6 24
[S6]vlan 10
[S6]vlan 11
[S6]vlan 20
[S6]vlan 30
[S6]interface Vlan-interface 10
[S6-Vlan-interface10]description SC1-Terminal
[S6]interface Vlan-interface 11
[S6-Vlan-interface11]description SC2-Terminal
[S6]interface Vlan-interface 20
[S6-Vlan-interface20]description AP-Manage
[S6]interface Vlan-interface 30
[S6-Vlan-interface30]description Net-Manage
[S6-Vlan-interface30]ip address 10.4.30.1 24
#S7
<H3C>system-view
[H3C]sysname S7
[S7]interface Vlan-interface 1
[S7-Vlan-interface1]description HUB
[S7-Vlan-interface1]ip address 17.1.1.4 29
2. 在网络设备上均开启SSH服务端功能。其中用户名和密码为admin/Test@123456。密码为明文类型。特权密码为Test@123456。
解法:
#网络设备(以S7为例)
[S7]ssh server enable
[S7]public-key local create rsa
[S7]local-user admin class manage
[S7-luser-network-admin]password simple Test@123456
[S7-luser-network-admin]authorization-attribute user-role level-15
[S7-luser-manage-admin]service-type ssh terminal
[S7]user-interface vty 0 4
[S7-line-vty0-4]authentication-mode scheme
验证:
3. 在网络设备上均部署SNMP功能,配置所有设备SNMP消息,向主机192.1.100.100发送Trap消息。版本采用V2C,读写的Community为“Test@123”。
解法:
#网络设备(以S7为例)
[S7]snmp-agent
[S7]snmp-agent community read Test@123
[S7]snmp-agent community write Test@123
[S7]undo snmp-agent sys-info version v3
[S7]snmp-agent sys-info version v2c
[S7]snmp-agent target-host trap address udp 192.1.100.100 params securityname Test@123 v2c
[S7]snmp-agent trap enable
验证:模拟器读写团体字无法配置成一样的
(二)有线网络配置
1. 在全网Trunk链路上做VLAN修剪。
解法:
#S1
[S1]interface GigabitEthernet 1/0/1
[S1-GigabitEthernet1/0/1]port link-type trunk
[S1-GigabitEthernet1/0/1]undo port trunk permit vlan 1
[S1-GigabitEthernet1/0/1]port trunk permit vlan 11 to 14
#S2
[S2]interface GigabitEthernet 1/0/1
[S2-GigabitEthernet1/0/1]port link-type trunk
[S2-GigabitEthernet1/0/1]undo port trunk permit vlan 1
[S2-GigabitEthernet1/0/1]port trunk permit vlan 11 to 14
#S3
[S3]interface GigabitEthernet 1/0/24
[S3-GigabitEthernet1/0/24]port link-type trunk
[S3-GigabitEthernet1/0/24]undo port trunk permit vlan 1
[S3-GigabitEthernet1/0/24]port trunk permit vlan 11 to 14
[S3]interface GigabitEthernet 1/0/21
[S3-GigabitEthernet1/0/21]port link-type trunk
[S3-GigabitEthernet1/0/21]undo port trunk permit vlan 1
[S3-GigabitEthernet1/0/21]port trunk permit vlan 10 20 30 40
[S3-GigabitEthernet1/0/21]port trunk pvid vlan 30
#S4
[S4]interface GigabitEthernet 1/0/24
[S4-GigabitEthernet1/0/24]port link-type trunk
[S4-GigabitEthernet1/0/24]undo port trunk permit vlan 1
[S4-GigabitEthernet1/0/24]port trunk permit vlan 11 to 14
[S4]interface GigabitEthernet 1/0/21
[S4-GigabitEthernet1/0/21]port link-type trunk
[S4-GigabitEthernet1/0/21]undo port trunk permit vlan 1
[S4-GigabitEthernet1/0/21]port trunk permit vlan 10 20 30 40
[S4-GigabitEthernet1/0/21]port trunk pvid vlan 30
#S6
[S6]interface GigabitEthernet 1/0/11
[S6-GigabitEthernet1/0/11]port link-type trunk
[S6-GigabitEthernet1/0/11]undo port trunk permit vlan 1
[S6-GigabitEthernet1/0/11]port trunk permit vlan 20
[S6-GigabitEthernet1/0/11]port trunk pvid vlan 20
[S6]interface range GigabitEthernet 1/0/23 to GigabitEthernet 1/0/24
[S6-if-range]port link-type trunk
[S6-if-range]undo port trunk permit vlan 1
[S6-if-range]port trunk permit vlan 10 11 20 30
验证:
2. 在S3、S4开启边缘端口和BPDU防护功能;检测到环路后处理方式为关闭端口。如果端口检测进入禁用状态,设置200秒后会自动恢复。
解法:
#S3
[S3]interface GigabitEthernet 1/0/21
[S3-GigabitEthernet1/0/21]stp edged-port
[S3-GigabitEthernet1/0/21]loopback-detection enable vlan all
[S3-GigabitEthernet1/0/21]loopback-detection action block
[S3]shutdown-interval 200
#S4
[S4]interface GigabitEthernet 1/0/21
[S4-GigabitEthernet1/0/21]stp edged-port
[S4-GigabitEthernet1/0/21]loopback-detection enable vlan all
[S4-GigabitEthernet1/0/21]loopback-detection action block
[S4]shutdown-interval 200
验证:
3. DHCP服务器搭建于S3、S4、GW1、GW2设备上,为局域网终端动态分配IP地址。
#S3
[S3]dhcp enable
[S3]dhcp server ip-pool SC
[S3-dhcp-pool-SC]network 10.1.10.0 mask 255.255.255.0
[S3-dhcp-pool-SC]gateway-list 10.1.10.254
[S3]dhcp server ip-pool BG
[S3-dhcp-pool-BG]network 10.1.20.0 mask 255.255.255.0
[S3-dhcp-pool-BG]gateway-list 10.1.20.254
[S3]dhcp server ip-pool GL
[S3-dhcp-pool-GL]network 10.1.30.0 mask 255.255.255.0
[S3-dhcp-pool-GL]gateway-list 10.1.30.254
[S3-dhcp-pool-GL]option 43 hex 80070000010A03010C
#S4
[S4]dhcp enable
[S4]dhcp server ip-pool SC
[S4-dhcp-pool-SC]network 10.2.10.0 mask 255.255.255.0
[S4-dhcp-pool-SC]gateway-list 10.2.10.254
[S4]dhcp server ip-pool BG
[S4-dhcp-pool-BG]network 10.2.20.0 mask 255.255.255.0
[S4-dhcp-pool-BG]gateway-list 10.2.20.254
[S4]dhcp server ip-pool GL
[S4-dhcp-pool-GL]network 10.2.30.0 mask 255.255.255.0
[S4-dhcp-pool-GL]gateway-list 10.2.30.254
[S4-dhcp-pool-GL]option 43 hex 80070000010A03010C
#GW1
[GW1]security-zone name Trust
[GW1-security-zone-Trust]import interface GigabitEthernet 1/0/1.10
[GW1-security-zone-Trust]import interface GigabitEthernet 1/0/1.11
[GW1-security-zone-Trust]import interface GigabitEthernet 1/0/1.20
[GW1-security-zone-Trust]import interface GigabitEthernet 1/0/1.30
[GW1]security-zone name Untrust
[GW1-security-zone-Untrust]import interface GigabitEthernet 1/0/0
[GW1-security-zone-Untrust]import interface Virtual-PPP 1
[GW1]security-policy ip
[GW1-security-policy-ip]rule name pass
[GW1-security-policy-ip-0-pass]action pass
[GW1]dhcp enable
[GW1]dhcp server ip-pool SC1
[GW1-dhcp-pool-sc1]network 10.4.10.0 mask 255.255.255.0
[GW1-dhcp-pool-sc1]gateway-list 10.4.10.254
[GW1]dhcp server ip-pool SC2
[GW1-dhcp-pool-sc2]network 10.4.11.0 mask 255.255.255.0
[GW1-dhcp-pool-sc2]gateway-list 10.4.11.254
[GW1]dhcp server ip-pool AP
[GW1-dhcp-pool-ap]network 10.4.20.0 mask 255.255.255.0
[GW1-dhcp-pool-ap]gateway-list 10.4.20.254
[GW1-dhcp-pool-ap]option 43 hex 80070000010A03010C
[GW1]dhcp server ip-pool Net
[GW1-dhcp-pool-net]network 10.4.30.0 mask 255.255.255.0
[GW1-dhcp-pool-net]gateway-list 10.4.30.254
#GW2
[GW2]security-zone name Trust
[GW2-security-zone-Trust]import interface GigabitEthernet 1/0/1.10
[GW2-security-zone-Trust]import interface GigabitEthernet 1/0/1.11
[GW2-security-zone-Trust]import interface GigabitEthernet 1/0/1.20
[GW2-security-zone-Trust]import interface GigabitEthernet 1/0/1.30
[GW2]security-zone name Untrust
[GW2-security-zone-Untrust]import interface GigabitEthernet 1/0/0
[GW2-security-zone-Untrust]import interface Virtual-PPP 1
[GW2]security-policy ip
[GW2-security-policy-ip]rule name pass
[GW2-security-policy-ip-0-pass]action pass
[GW2]dhcp enable
[GW2]dhcp server ip-pool SC1
[GW2-dhcp-pool-sc1]network 10.4.10.0 mask 255.255.255.0
[GW2-dhcp-pool-sc1]gateway-list 10.4.10.254
[GW2]dhcp server ip-pool SC2
[GW2-dhcp-pool-sc2]network 10.4.11.0 mask 255.255.255.0
[GW2-dhcp-pool-sc2]gateway-list 10.4.11.254
[GW2]dhcp server ip-pool AP
[GW2-dhcp-pool-ap]network 10.4.20.0 mask 255.255.255.0
[GW2-dhcp-pool-ap]gateway-list 10.4.20.254
[GW2-dhcp-pool-ap]option 43 hex 80070000010A03010C
[GW2]dhcp server ip-pool Net
[GW2-dhcp-pool-net]network 10.4.30.0 mask 255.255.255.0
[GW2-dhcp-pool-net]gateway-list 10.4.30.254
option43格式简要说明:
80 07 00 00 01 0a 17 0a fd
80:固定值,不用改变;
07:长度字段,其后面所跟数据的字节长度;
00 00:固定值,不用改变;
01:表示后面的IP地址的个数,此处为一个IP地址;
0A 03 01 0C:为16进制的IP地址,转换成十进制为10.3.1.12
验证:
4. S5的2条互联链路(G 0/1、G 0/2)启用链路聚合,采取LACP动态聚合模式。
#前置配置已配置
5. 北京综合服务中心R2、S1、S2间运行OSPF,归属区域0,进程号10;S1、S3间及S2、S4间分别运行OSPF,归属区域0,基于生产、办公、管理业务分别定义进程号为11、12、13。
解法:
注意:结合后续题意,应在此规划好VPN实例
#R2
[R2]interface GigabitEthernet 0/0.21
[R2-GigabitEthernet0/0.21]ip binding vpn-instance BG
[R2-GigabitEthernet0/0.21]ip address 21.1.1.2 24
[R2]ospf 10 router-id 10.0.0.22
[R2-ospf-10]area 0
[R2-ospf-10]default-route-advertise type 1
[R2-ospf-10-area-0.0.0.0]network 10.1.0.2 0.0.0.0
[R2-ospf-10-area-0.0.0.0]network 10.2.0.2 0.0.0.0
[R2-ospf-10-area-0.0.0.0]network 10.0.0.22 0.0.0.0
#S1
[S1]interface LoopBack 11
[S1-LoopBack11]ip binding vpn-instance SC
[S1-LoopBack11]ip address 10.1.4.1 255.255.255.255
[S1]interface LoopBack 12
[S1-LoopBack12]ip binding vpn-instance BG
[S1-LoopBack12]ip address 10.1.4.2 255.255.255.255
[S1]interface LoopBack 13
[S1-LoopBack13]ip binding vpn-instance GL
[S1-LoopBack13]ip address 10.1.4.3 255.255.255.255
[S1]interface Vlan-interface 11
[S1-Vlan-interface11]ip binding vpn-instance SC
[S1-Vlan-interface11]ip address 10.1.1.1 255.255.255.252
[S1]interface Vlan-interface 12
[S1-Vlan-interface12]ip binding vpn-instance BG
[S1-Vlan-interface12]ip address 10.1.2.1 255.255.255.252
[S1]interface Vlan-interface 13
[S1-Vlan-interface13]ip binding vpn-instance GL
[S1-Vlan-interface13]ip address 10.1.3.1 255.255.255.252
[S1]ospf 10 router-id 10.0.0.1
[S1-ospf-10]area 0
[S1-ospf-10-area-0.0.0.0]network 10.1.0.1 0.0.0.0
[S1-ospf-10-area-0.0.0.0]network 10.0.0.1 0.0.0.0
[S1]ospf 11 router-id 10.1.4.1 vpn-instance SC
[S1-ospf-11]area 0
[S1-ospf-11-area-0.0.0.0]network 10.1.4.1 0.0.0.0
[S1-ospf-11-area-0.0.0.0]network 10.1.1.1 0.0.0.0
[S1]ospf 12 router-id 10.1.4.2 vpn-instance BG
[S1-ospf-12]area 0
[S1-ospf-12-area-0.0.0.0]network 10.1.4.2 0.0.0.0
[S1-ospf-12-area-0.0.0.0]network 10.1.2.1 0.0.0.0
[S1]ospf 13 router-id 10.1.4.3 vpn-instance GL
[S1-ospf-13]area 0
[S1-ospf-13-area-0.0.0.0]network 10.1.4.3 0.0.0.0
[S1-ospf-13-area-0.0.0.0]network 10.1.3.1 0.0.0.0
#S2
[S2]interface LoopBack 0
[S2-LoopBack0]ip address 10.0.0.2 255.255.255.255
[S2]interface LoopBack 11
[S2-LoopBack11]ip binding vpn-instance SC
[S2-LoopBack11]ip address 10.2.4.1 255.255.255.255
[S2]interface LoopBack 12
[S2-LoopBack12]ip binding vpn-instance BG
[S2-LoopBack12]ip address 10.2.4.2 255.255.255.255
[S2]interface LoopBack 13
[S2-LoopBack13]ip binding vpn-instance GL
[S2-LoopBack13]ip address 10.2.4.3 255.255.255.255
[S2]interface Vlan-interface 11
[S2-Vlan-interface11]ip binding vpn-instance SC
[S2-Vlan-interface11]ip address 10.2.1.1 255.255.255.252
[S2]interface Vlan-interface 12
[S2-Vlan-interface12]ip binding vpn-instance BG
[S2-Vlan-interface12]ip address 10.2.2.1 30
[S2]interface Vlan-interface 13
[S2-Vlan-interface13]ip binding vpn-instance GL
[S2-Vlan-interface13]ip address 10.2.3.1 255.255.255.252
[S2]ospf 10 router-id 10.0.0.2
[S2-ospf-10]area 0
[S2-ospf-10-area-0.0.0.0]network 10.2.0.1 0.0.0.0
[S2-ospf-10-area-0.0.0.0]network 10.0.0.2 0.0.0.0
[S2]ospf 11 router-id 10.2.4.1 vpn-instance SC
[S2-ospf-11]area 0
[S2-ospf-11-area-0.0.0.0]network 10.2.4.1 0.0.0.0
[S2-ospf-11-area-0.0.0.0]network 10.2.1.1 0.0.0.0
[S2]ospf 12 router-id 10.2.4.2 vpn-instance BG
[S2-ospf-12]area 0
[S2-ospf-12-area-0.0.0.0]network 10.2.4.2 0.0.0.0
[S2-ospf-12-area-0.0.0.0]network 10.2.2.1 0.0.0.0
[S2]ospf 13 router-id 10.2.4.3 vpn-instance GL
[S2-ospf-13]area 0
[S2-ospf-13-area-0.0.0.0]network 10.2.4.3 0.0.0.0
[S2-ospf-13-area-0.0.0.0]network 10.2.3.1 0.0.0.0
#S3
[S3]ospf 11 router-id 10.1.4.4
[S3-ospf-11]area 0
[S3-ospf-11-area-0.0.0.0]network 10.1.4.4 0.0.0.0
[S3-ospf-11-area-0.0.0.0]network 10.1.10.254 0.0.0.0
[S3-ospf-11-area-0.0.0.0]network 10.1.1.2 0.0.0.0
[S3]ospf 12 router-id 10.1.4.5
[S3-ospf-12]area 0
[S3-ospf-12-area-0.0.0.0]network 10.1.4.5 0.0.0.0
[S3-ospf-12-area-0.0.0.0]network 10.1.20.254 0.0.0.0
[S3-ospf-12-area-0.0.0.0]network 10.1.1.2 0.0.0.0
[S3-ospf-12-area-0.0.0.0]network 10.1.2.2 0.0.0.0
[S3]ospf 13 router-id 10.1.4.6
[S3-ospf-13]area 0
[S3-ospf-13-area-0.0.0.0]network 10.1.4.6 0.0.0.0
[S3-ospf-13-area-0.0.0.0]network 10.1.30.254 0.0.0.0
[S3-ospf-13-area-0.0.0.0]network 10.1.3.2 0.0.0.0
#S4
[S4]ospf 11 router-id 10.2.4.4
[S4-ospf-11]area 0
[S4-ospf-11-area-0.0.0.0]network 10.2.4.4 0.0.0.0
[S4-ospf-11-area-0.0.0.0]network 10.2.10.254 0.0.0.0
[S4-ospf-11-area-0.0.0.0]network 10.2.1.2 0.0.0.0
[S4]ospf 12 router-id 10.2.4.5
[S4-ospf-12]area 0
[S4-ospf-12-area-0.0.0.0]network 10.2.4.5 0.0.0.0
[S4-ospf-12-area-0.0.0.0]network 10.2.20.254 0.0.0.0
[S4-ospf-12-area-0.0.0.0]network 10.2.2.2 0.0.0.0
[S4]ospf 13 router-id 10.2.4.6
[S4-ospf-13]area 0
[S4-ospf-13-area-0.0.0.0]network 10.2.4.6 0.0.0.0
[S4-ospf-13-area-0.0.0.0]network 10.2.30.254 0.0.0.0
[S4-ospf-13-area-0.0.0.0]network 10.2.3.2 0.0.0.0
验证:
6. 上海管理中心R3、S5间运行OSPF,归属区域0,进程号20。AC1、AC2与S5间运行静态路由协议。
解法:
#R3
[R3]ospf 20 router-id 10.3.1.3
[R3-ospf-20]area 0
[R3-ospf-20]default-route-advertise type 1
[R3-ospf-20-area-0.0.0.0]network 10.3.1.3 0.0.0.0
[R3-ospf-20-area-0.0.0.0]network 10.3.0.1 0.0.0.0
#S5
[S5]ospf 20 router-id 10.3.1.5
[S5-ospf-20]area 0
[S5-ospf-20-area-0.0.0.0]network 10.3.1.5 0.0.0.0
[S5-ospf-20-area-0.0.0.0]network 192.1.100.254 0.0.0.0
[S5-ospf-20-area-0.0.0.0]network 194.1.100.254 0.0.0.0
[S5-ospf-20-area-0.0.0.0]network 10.3.0.2 0.0.0.0
[S5-ospf-20]import-route static type 1
[S5]ip route-static 10.3.1.12 32 10.3.0.9
#VAC
[VAC]ip route-static 0.0.0.0 0 10.3.0.10
验证:
7. 各中心出口设备至互联网使用静态路由协议。
解法:
#R3
[R3]ip route-static 0.0.0.0 0 13.1.1.1
#R2
[R2]ip route-static 0.0.0.0 0 12.1.1.1
[R2]ip route-static vpn-instance BG 0.0.0.0 0 21.1.1.1
#GW1
[GW1]ip route-static 0.0.0.0 0 17.1.1.1
#GW2
[GW2]ip route-static 0.0.0.0 0 17.1.1.1
8. R2、S1、S2间部署IBGP,AS号为100;定义R2为路由反射器RR,使用Loopback 0接口建立BGP邻居关系。
解法:
#R2
[R2]bgp 100
[R2-bgp-default]router-id 10.0.0.22
[R2-bgp-default]peer 10.0.0.1 as-number 100
[R2-bgp-default]peer 10.0.0.2 connect-interface LoopBack 0
[R2-bgp-default]peer 10.0.0.2 as-number 100
[R2-bgp-default]peer 10.0.0.2 connect-interface LoopBack 0
[R2-bgp-default]address-family vpnv4
[R2-bgp-default-vpnv4]peer 10.0.0.1 enable
[R2-bgp-default-vpnv4]peer 10.0.0.2 enable
[R2-bgp-default-vpnv4]peer 10.0.0.1 reflect-client
[R2-bgp-default-vpnv4]peer 10.0.0.2 reflect-client
[R2-bgp-default-vpnv4]undo policy vpn-target
#S1
[S1]bgp 100
[S1-bgp-default]router-id 10.0.0.1
[S1-bgp-default]peer 10.0.0.22 as-number 100
[S1-bgp-default]peer 10.0.0.22 connect-interface LoopBack 0
[S1-bgp-default]address-family vpnv4
[S1-bgp-default-vpnv4]peer 10.0.0.22 enable
#S2
[S2]bgp 100
[S2-bgp-default]router-id 10.0.0.2
[S2-bgp-default]peer 10.0.0.22 as-number 100
[S2-bgp-default]peer 10.0.0.22 connect-interface LoopBack 0
[S2-bgp-default]address-family vpnv4
[S2-bgp-default-vpnv4]peer 10.0.0.22 enable
验证:
9. 北京综合服务中心局域网间通过MPLS VPN技术实现各业务安全隔离。R2、S1、S2开启MPLS报文转发及LDP标签转发协议。
解法:
#R2
[R2]mpls lsr-id 10.0.0.22
[R2]mpls ldp
[R2]interface GigabitEthernet 0/1
[R2-GigabitEthernet0/1]mpls enable
[R2-GigabitEthernet0/1]mpls ldp enable
[R2]interface GigabitEthernet 0/2
[R2-GigabitEthernet0/2]mpls enable
[R2-GigabitEthernet0/2]mpls ldp enable
#S1
[S1]mpls lsr-id 10.0.0.1
[S1]mpls ldp
[S1]interface GigabitEthernet 1/0/24
[S1-GigabitEthernet1/0/24]mpls enable
[S1-GigabitEthernet1/0/24]mpls ldp enable
#S2
[S2]mpls lsr-id 10.0.0.2
[S2]mpls ldp
[S2]interface GigabitEthernet 1/0/24
[S2-GigabitEthernet1/0/24]mpls enable
[S2-GigabitEthernet1/0/24]mpls ldp enable
验证:
10. 生产VRF名称为SC,RD值为100:1、RT值自定义;办公VRF名称为BG,RD值为100:2、RT值自定义;管理VRF名称为GL,RD值为100:3、RT值自定义。
解法:
#S1
[S1]ip vpn-instance SC
[S1-vpn-instance-SC]route-distinguisher 100:1
[S1-vpn-instance-SC]vpn-target 100:1 export-extcommunity
[S1-vpn-instance-SC]vpn-target 100:1 import-extcommunity
[S1]ip vpn-instance BG
[S1-vpn-instance-BG]route-distinguisher 100:2
[S1-vpn-instance-BG]vpn-target 100:2 export-extcommunity
[S1-vpn-instance-BG]vpn-target 100:2 import-extcommunity
[S1]ip vpn-instance GL
[S1-vpn-instance-GL]route-distinguisher 100:3
[S1-vpn-instance-GL]vpn-target 100:3 export-extcommunity
[S1-vpn-instance-GL]vpn-target 100:3 import-extcommunity
#S2
[S2]ip vpn-instance SC
[S2-vpn-instance-SC]route-distinguisher 100:1
[S2-vpn-instance-SC]vpn-target 100:1 export-extcommunity
[S2-vpn-instance-SC]vpn-target 100:1 import-extcommunity
[S2]ip vpn-instance BG
[S2-vpn-instance-BG]route-distinguisher 100:2
[S2-vpn-instance-BG]vpn-target 100:2 export-extcommunity
[S2-vpn-instance-BG]vpn-target 100:2 import-extcommunity
[S2]ip vpn-instance GL
[S2-vpn-instance-GL]route-distinguisher 100:3
[S2-vpn-instance-GL]vpn-target 100:3 export-extcommunity
[S2-vpn-instance-GL]vpn-target 100:3 import-extcommunity
#R2
[R2]ip vpn-instance SC
[R2-vpn-instance-SC]route-distinguisher 100:1
[R2-vpn-instance-SC]vpn-target 100:1 export-extcommunity
[R2-vpn-instance-SC]vpn-target 100:3 import-extcommunity
[R2]ip vpn-instance BG
[R2-vpn-instance-BG]route-distinguisher 100:2
[R2-vpn-instance-BG]vpn-target 100:2 export-extcommunity
[R2-vpn-instance-BG]vpn-target 100:3 import-extcommunity
[R2]ip vpn-instance GL
[R2-vpn-instance-GL]route-distinguisher 100:3
[R2-vpn-instance-GL]vpn-target 100:3 export-extcommunity
[R2-vpn-instance-GL]vpn-target 100:1 100:2 100:3 import-extcommunity
11. 通过MPLS VPN技术实现同VPN终端间互访,生产与办公不同VPN间禁止互访,管理VPN可与生产及办公VPN互通。北京综合服务中心办公VPN终端用户可访问互联网。
解法:
#S1
[S1]bgp 100
[S1-bgp-default]ip vpn-instance SC
[S1-bgp-default-SC]address-family ipv4
[S1-bgp-default-ipv4-SC]import-route ospf 11
[S1-bgp-default-BG]address-family ipv4
[S1-bgp-default-ipv4-BG]import-route ospf 12
[S1-bgp-default]ip vpn-instance GL
[S1-bgp-default-GL]address-family ipv4
[S1-bgp-default-ipv4-GL]import-route ospf 13
[S1]ospf 11
[S1-ospf-11]import-route bgp type 1
[S1]ospf 12
[S1-ospf-12]import-route bgp type 1
[S1]ospf 13
[S1-ospf-13]import-route bgp type 1
#S2
[S2]bgp 100
[S2-bgp-default]ip vpn-instance SC
[S2-bgp-default-SC]address-family ipv4
[S2-bgp-default-ipv4-SC]import-route ospf 11
[S2-bgp-default]ip vpn-instance BG
[S2-bgp-default-BG]address-family ipv4
[S2-bgp-default-ipv4-BG]import-route ospf 12
[S2-bgp-default]ip vpn-instance GL
[S2-bgp-default-GL]address-family ipv4
[S2-bgp-default-ipv4-GL]import-route ospf 13
[S2]ospf 11
[S2-ospf-11]import-route bgp type 1
[S2]ospf 12
[S2-ospf-12]import-route bgp type 1
[S2]ospf 13
[S2-ospf-13]import-route bgp type 1
验证:
12. 北京综合服务中心内网部署IPv6网络,内网启用OSPF V3路由协议,进程号14。R2、S1、S2间归属区域0,S1、S3间归属区域1,S2、S4间归属区域2。VLAN40业务终端可通过无状态自动从网关S3、S4处获取地址。
#R2
[R2]ospfv3 14
[R2-ospfv3-14]router-id 10.0.0.22
[R2]interface GigabitEthernet 0/1
[R2-GigabitEthernet0/1]ospfv3 14 area 0
[R2]interface GigabitEthernet 0/2
[R2-GigabitEthernet0/2]ospfv3 14 area 0
#S1
[S1]ospfv3 14
[S1-ospfv3-14]router-id 10.0.0.1
[S1]interface GigabitEthernet 1/0/24
[S1-GigabitEthernet1/0/24]ospfv3 14 area 0
[S1]interface Vlan-interface 14
[S1-Vlan-interface14]ospfv3 14 area 1
#S3
[S3]ospfv3 14
[S3-ospfv3-14]router-id 10.1.4.7
[S3]interface Vlan-interface 14
[S3-Vlan-interface14]ospfv3 14 area 1
[S3]interface Vlan-interface 40
[S3-Vlan-interface40]ospfv3 14 area 1
[S3-Vlan-interface40]undo ipv6 nd ra halt
#S2
[S2]ospfv3 14
[S2-ospfv3-14]router-id 10.0.0.2
[S2]interface GigabitEthernet 1/0/24
[S2-GigabitEthernet1/0/24]ospfv3 14 area 0
[S2]interface Vlan-interface 14
[S2-Vlan-interface14]ospfv3 14 area 2
#S4
[S4]ospfv3 14
[S4-ospfv3-14]router-id 10.2.4.7
[S4]interface Vlan-interface 14
[S4-Vlan-interface14]ospfv3 14 area 2
[S4]interface Vlan-interface 40
[S4-Vlan-interface40]ospfv3 14 area 2
[S4-Vlan-interface40]undo ipv6 nd ra halt
验证截图:
13. 北京综合服务中心内网VLAN40 IPv6终端有访问广域网30.0.0.1地址需求,为此在R2路由器部署NAT-PT实现IPv6地址的动态转换,具体规划内网IPv6地址转换地址池为12.1.1.3-12.1.1.5,30.0.0.1转换为2001:21:1::2。
!!模拟器无法支持
#R2
[R2-GigabitEthernet0/0]
[R2-GigabitEthernet0/0]natpt enable
[R2-GigabitEthernet0/1]
[R2-GigabitEthernet0/1]natpt enable
[R2-GigabitEthernet0/2]
[R2-GigabitEthernet0/2]natpt enable
[R2]natpt prefix 2001:21:1::
[R2]natpt v4bound static 30.0.0.1 2001:21:1::2
[R2]natpt v6bound static 2001:10:1:40:: 12.1.1.3 12.1.1.5
[R2]natpt v6bound static 2001:10:2:40:: 12.1.1.3 12.1.1.5
//大体配置如上,有真机的小伙伴可以尝试以下
14. 要求终端网段中不出现OSPF协议报文;减少非必须OSPF协商报文;所有路由协议都发布具体网段;需要发布Loopback地址;优化OSPF相关配置,加快OSPF收敛;外部路由引入采用第一类外部路由模式。
#S5
[S5]ospf 20
[S5-ospf-20]silent-interface GigabitEthernet 1/0/21
[S5-ospf-20]silent-interface GigabitEthernet 1/0/22
[S5]interface GigabitEthernet 1/0/24
[S5-GigabitEthernet1/0/24]ospf network-type p2p
#R3
[R3]interface GigabitEthernet 0/2
[R3-GigabitEthernet0/2]ospf network-type p2p
#R2
[R2]interface range GigabitEthernet 0/1 to GigabitEthernet 0/2
[R2-if-range]ospf network-type p2p
[R2-if-range]ospfv3 network-type p2p
#S1
[S1]interface GigabitEthernet 1/0/24
[S1-GigabitEthernet1/0/24]ospf network-type p2p
[S1-GigabitEthernet1/0/24]ospfv3 network-type p2p
[S1]interface range Vlan-interface 11 to Vlan-interface 13
[S1-if-range]ospf network-type p2p
[S1]interface Vlan-interface 14
[S1-Vlan-interface14]ospfv3 network-type p2p
#S2
[S2]interface GigabitEthernet 1/0/24
[S2-GigabitEthernet1/0/24]ospf network-type p2p
[S2-GigabitEthernet1/0/24]ospfv3 network-type p2p
[S2]interface range Vlan-interface 11 to Vlan-interface 13
[S2-if-range]ospf network-type p2p
[S2]interface Vlan-interface 14
[S2-Vlan-interface14]ospfv3 network-type p2p
#S3
[S3]interface range Vlan-interface 11 to Vlan-interface 13
[S3-if-range]ospf network-type p2p
[S3]interface Vlan-interface 14
[S3-Vlan-interface14]ospfv3 network-type p2p
[S3]ospf 11
[S3-ospf-11]silent-interface Vlan-interface 10
[S3]ospf 12
[S3-ospf-12]silent-interface Vlan-interface 20
[S3]ospf 13
[S3-ospf-13]silent-interface Vlan-interface 30
[S3]ospfv3 14
[S3-ospfv3-14]silent-interface Vlan-interface 40
#S4
[S4]interface range Vlan-interface 11 to Vlan-interface 13
[S4-if-range]ospf network-type p2p
[S4]interface Vlan-interface 14
[S4-Vlan-interface14]ospfv3 network-type p2p
[S4]ospf 11
[S4-ospf-11]silent-interface Vlan-interface 10
[S4]ospf 12
[S4-ospf-12]silent-interface Vlan-interface 20
[S4]ospf 13
[S4-ospf-13]silent-interface Vlan-interface 30
[S4]ospfv3 14
[S4-ospfv3-14]silent-interface Vlan-interface 40
验证截图:
(三)无线网络配置
1. 配置两台AC设备,使用虚拟化方案组合成1台虚拟AC。
2. AC1和AC2之间的G 0/3-4端口作为虚拟交换链路。配置AC1为主,AC2为备。主设备 description为AC-1,备用设备description为AC-2。
//第一题和第二题已在基础配置完成
3. 无线网络采用FIT AP+AC方案,所有AP都关联到上海管理中心AC进行管理。
!!在此首先完成GRE OSPF配置/L2TP配置
GRE OSPF
#R3
[R3]interface Tunnel0
[R3-Tunnel0]source 13.1.1.2
[R3-Tunnel0]destination 12.1.1.2
[R3]ospf 1
[R3-ospf-1-area-0.0.0.0]network 172.17.0.3 0.0.0.0
[R3-ospf-1]import-route ospf 20 type 1
[R3]ospf 20
[R3-ospf-20]import-route ospf 1 type 1
#R2
[R2]interface Tunnel0
[R2-Tunnel0]ip binding vpn-instance GL
[R2-Tunnel0]ip address 172.17.0.2 255.255.255.0
[R2-Tunnel0]source 12.1.1.2
[R2-Tunnel0]destination 13.1.1.2
[R2]ospf 1 vpn-instance GL
[R2-ospf-1]import-route bgp type 1
[R2-ospf-1-area-0.0.0.0]network 172.17.0.2 0.0.0.0
[R2]bgp 100
[R2-bgp-default]ip vpn-instance GL
[R2-bgp-default-GL]address-family ipv4
[R2-bgp-default-ipv4-GL]import-route ospf 1
L2TP OSPF
#R2
[R2]interface LoopBack 1
[R2-LoopBack1]ip binding vpn-instance SC
[R2-LoopBack1]ip address 172.16.0.2 24
[R2]ospf 2 vpn-instance SC
[R2-ospf-2]import-route bgp type 1
[R2-ospf-2]area 0
[R2-ospf-2-area-0.0.0.0]network 172.16.0.2 0.0.0.0
[R2]bgp 100
[R2-bgp-default]ip vpn-instance SC
[R2-bgp-default-SC]address-family ipv4
[R2-bgp-default-ipv4-SC]import-route ospf 2
[R2]ip pool l2tp 172.16.0.1 172.16.0.254
[R2]ip pool l2tp gateway 172.16.0.254
[R2]local-user Test123 class network
[R2-luser-network-Test123]password simple Test123
[R2-luser-network-Test123]service-type ppp
[R2]domain system
[R2-isp-system]authentication ppp local
[R2]interface Virtual-Template 1
[R2-Virtual-Template1]ip binding vpn-instance SC
[R2-Virtual-Template1]ip address unnumbered interface LoopBack 1
[R2-Virtual-Template1]ppp authentication-mode chap
[R2-Virtual-Template1]remote address pool l2tp
[R2]l2tp enable
[R2]l2tp-group 1 mode lns
[R2-l2tp1]allow l2tp virtual-template 1 remote GW1
[R2-l2tp1]tunnel name R2
[R2-l2tp1]tunnel authentication
[R2-l2tp1]tunnel password simple Test123
[R2]l2tp enable
[R2]l2tp-group 2 mode lns
[R2-l2tp2]allow l2tp virtual-template 1 remote GW2
[R2-l2tp2]tunnel name R2
[R2-l2tp2]tunnel authentication
[R2-l2tp2]tunnel password simple Test123
#GW1
[GW1]l2tp enable
[GW1]l2tp-group 1 mode lac
[GW1-l2tp1]tunnel name GW1
[GW1-l2tp1]lns-ip 12.1.1.2
[GW1-l2tp1]tunnel authentication
[GW1-l2tp1]tunnel password simple Test123
[GW1]interface Virtual-PPP 1
[GW1-Virtual-PPP1]ppp chap user Test123
[GW1-Virtual-PPP1]ppp chap password simple Test123
[GW1-Virtual-PPP1]l2tp-auto-client l2tp-group 1
[GW1]ospf 2 router-id 10.4.1.1
[GW1-ospf-2]silent-interface GigabitEthernet 1/0/1.10
[GW1-ospf-2]silent-interface GigabitEthernet 1/0/1.11
[GW1-ospf-2]silent-interface GigabitEthernet 1/0/1.20
[GW1-ospf-2]silent-interface GigabitEthernet 1/0/1.30
[GW1-ospf-2]area 0
[GW1-ospf-2-area-0.0.0.0]network 10.4.1.1 0.0.0.0
[GW1-ospf-2-area-0.0.0.0]network 172.16.0.3 0.0.0.0
[GW1-ospf-2-area-0.0.0.0]network 10.4.10.254 0.0.0.0
[GW1-ospf-2-area-0.0.0.0]network 10.4.11.254 0.0.0.0
[GW1-ospf-2-area-0.0.0.0]network 10.4.20.254 0.0.0.0
[GW1-ospf-2-area-0.0.0.0]network 10.4.30.254 0.0.0.0
#GW2
[GW2]l2tp enable
[GW2]l2tp-group 1 mode lac
[GW2-l2tp1]tunnel name GW2
[GW2-l2tp1]lns-ip 12.1.1.2
[GW2-l2tp1]tunnel authentication
[GW2-l2tp1]tunnel password simple Test123
[GW2]interface Virtual-PPP 1
[GW2-Virtual-PPP1]ppp chap user Test123
[GW2-Virtual-PPP1]ppp chap password simple Test123
[GW2-Virtual-PPP1]l2tp-auto-client l2tp-group 1
[GW2]ospf 2 router-id 10.4.1.2
[GW2-ospf-2]silent-interface GigabitEthernet 1/0/1.10
[GW2-ospf-2]silent-interface GigabitEthernet 1/0/1.11
[GW2-ospf-2]silent-interface GigabitEthernet 1/0/1.20
[GW2-ospf-2]silent-interface GigabitEthernet 1/0/1.30
[GW2-ospf-2]area 0
[GW2-ospf-2-area-0.0.0.0]network 10.4.1.2 0.0.0.0
[GW2-ospf-2-area-0.0.0.0]network 172.16.0.4 0.0.0.0
[GW2-ospf-2-area-0.0.0.0]network 10.4.10.254 0.0.0.0
[GW2-ospf-2-area-0.0.0.0]network 10.4.11.254 0.0.0.0
[GW2-ospf-2-area-0.0.0.0]network 10.4.20.254 0.0.0.0
[GW2-ospf-2-area-0.0.0.0]network 10.4.30.254 0.0.0.0
#VAC
[VAC]wlan ap-group Admin_BJ
[VAC]wlan ap-group Admin_GZ
验证:
4. 北京综合服务中心使用S3交换机作为无线生产1用户(VLAN 10)、办公1用户(VLAN 20)和无线FIT AP1(VLAN 30)的DHCP服务器。使用S4交换机作为无线生产2用户(VLAN 10)、办公2用户(VLAN 20)和无线FIT AP2(VLAN 30)的DHCP服务器。
//DHCP已配置
5. 北京综合服务中心无线网络部署中,创建SSID为BJ_SC_DOT1X_XX;WLANID为1;AP-GROUP为Admin_BJ;无线用户(认证用户名user1、密码为YY)关联SSID后使用802.1X认证方式,可自动获取VLAN10地址(XX、YY现场提供)。
#VAC
[VAC]wlan service-template 1
[VAC-wlan-st-1]ssid BJ_SC_DOT1X_01
[VAC-wlan-st-1]akm mode psk
[VAC-wlan-st-1]preshared-key pass-phrase simple H3C@2023
[VAC-wlan-st-1]cipher-suite ccmp
[VAC-wlan-st-1]security-ie rsn
[VAC-wlan-st-1]vlan 10
[VAC-wlan-st-1]service-template enable
[VAC]wlan ap AP1 model WA6320-HCL
[VAC-wlan-ap-AP1]serial-id H3C_5a-4e-b2-c3-0f-00
[VAC-wlan-ap-AP1]radio 1
[VAC-wlan-ap-AP1-radio-1]service-template 1
[VAC-wlan-ap-AP1-radio-1]radio enable
[VAC-wlan-ap-AP1]radio 2
[VAC-wlan-ap-AP1-radio-2]service-template 1
[VAC-wlan-ap-AP1-radio-2]radio enable
[VAC]wlan ap-group admin_bj
[VAC-wlan-ap-group-admin_bj]ap AP1
6. 北京综合服务中心无线网络部署中,创建SSID为BJ_BG_WEB_XX;WLANID为2;AP-GROUP为Admin_BJ;无线用户(认证用户名user2、密码为YY)关联SSID后使用WEB认证方式,可自动获取VLAN20地址(XX、YY现场提供)。
#VAC
[VAC]wlan service-template 2
[VAC-wlan-st-2]ssid BJ_BG_WEB_01
[VAC-wlan-st-2]akm mode psk
[VAC-wlan-st-2]preshared-key pass-phrase simple H3C@2023
[VAC-wlan-st-2]cipher-suite ccmp
[VAC-wlan-st-2]security-ie rsn
[VAC-wlan-st-2]vlan 10
[VAC-wlan-st-2]service-template enable
[VAC]wlan ap AP2 model WA6320-HCL
[VAC-wlan-ap-AP2]serial-id H3C_5A-4E-D8-16-10-00
[VAC-wlan-ap-AP2]radio 1
[VAC-wlan-ap-AP2-radio-1]service-template 2
[VAC-wlan-ap-AP2-radio-1]radio enable
[VAC-wlan-ap-AP2]radio 2
[VAC-wlan-ap-AP2-radio-2]service-template 2
[VAC-wlan-ap-AP2-radio-2]radio enable
[VAC]wlan ap-group admin_bj
[VAC-wlan-ap-group-admin_bj]ap AP2
7. 广州生产中心使用GW1/GW2作为无线生产1用户(VLAN 10)、生产2用户(VLAN 11)和无线FIT AP3(VLAN 20)的DHCP服务器。
//DHCP已配置
8. 广州生产中心无线网络部署中,创建SSID为GZ_SC_DOT1X_XX;WLANID为3;AP-GROUP为Admin_GZ;无线用户(认证用户名user11、密码为YY)关联SSID后使用802.1X认证方式,可自动获取VLAN10地址(XX、YY现场提供)。
#VAC
[VAC]wlan service-template 3
[VAC-wlan-st-3]ssid GZ_SC_DOT1X_01
[VAC-wlan-st-3]akm mode psk
[VAC-wlan-st-3]preshared-key pass-phrase simple H3C@2023
[VAC-wlan-st-3]cipher-suite ccmp
[VAC-wlan-st-3]security-ie rsn
[VAC-wlan-st-3]vlan 10
[VAC-wlan-st-3]service-template enable
[VAC]wlan ap AP3 model WA6320-HCL
[VAC-wlan-ap-AP3]serial-id H3C_5A-4E-D8-16-10-00
[VAC-wlan-ap-AP3]radio 1
[VAC-wlan-ap-AP3-radio-1]service-template 3
[VAC-wlan-ap-AP3-radio-1]radio enable
[VAC]wlan ap-group admin_gz
[VAC-wlan ap-group admin_gz]ap AP3
9. 广州生产中心无线网络部署中,创建SSID为:GZ_SC_WEB_XX;WLANID为4;AP-GROUP为Admin_GZ;无线用户(认证用户名user12、密码为YY)关联SSID后使用WEB认证方式,可自动获取VLAN11地址(XX、YY现场提供)。
#VAC
[VAC]wlan service-template 4
[VAC-wlan-st-4]ssid GZ_SC_WEB_01
[VAC-wlan-st-4]akm mode psk
[VAC-wlan-st-4]preshared-key pass-phrase simple H3C@2023
[VAC-wlan-st-4]cipher-suite ccmp
[VAC-wlan-st-4]security-ie rsn
[VAC-wlan-st-4]vlan 11
[VAC-wlan-st-4]service-template enable
[VAC]wlan ap AP3 model WA6320-HCL
[VAC-wlan-ap-AP3]radio 2
[VAC-wlan-ap-AP3-radio-2]service-template 4
[VAC-wlan-ap-AP3-radio-2]radio enable
10. 认证平台考试现场提供登陆用户名密码信息。
11. 所有AP均通过VAC的loopback 0接口建立隧道。
12. 无线用户的下行平均速率为1000KB/s,突发速率为1600KB/s。
#VAC
[VAC]wlan service-template 1
[VAC-wlan-st-1]client-rate-limit outbound mode static cir 1000
[VAC]wlan service-template 2
[VAC-wlan-st-2]client-rate-limit outbound mode static cir 1000
[VAC]wlan service-template 3
[VAC-wlan-st-3]client-rate-limit outbound mode static cir 1000
[VAC]wlan service-template 4
[VAC-wlan-st-4]client-rate-limit outbound mode static cir 1000
13. 每AP最大带点人数为25人。
#VAC
[VAC]wlan service-template 1
[VAC-wlan-st-1]client max-count 25
[VAC]wlan service-template 2
[VAC-wlan-st-2]client max-count 25
[VAC]wlan service-template 3
[VAC-wlan-st-3]client max-count 25
[VAC]wlan service-template 4
[VAC-wlan-st-4]client max-count 25
(四)出口网络配置
1. 北京综合服务中心办公终端可通过出口路由器R2 G 0/0.21子接口的NAPT方式访问互联网。
#R2
[R2]acl basic 2000
[R2-acl-ipv4-basic-2000]rule permit source 10.1.20.0 0.0.0.255
[R2-acl-ipv4-basic-2000]rule permit source 10.2.20.0 0.0.0.255
[R2]nat address-group 1
[R2-address-group-1]address 21.1.1.2 21.1.1.2
[R2]interface GigabitEthernet 0/0.21
[R2-GigabitEthernet0/0.21]nat outbound 2000 address-group 1
[R2]bgp 100
[R2-bgp-default]ip vpn-instance BG
[R2-bgp-default-BG]address-family ipv4
[R2-bgp-default-ipv4-BG]default-route imported
#S1
[S1]ospf 12
[S1-ospf-12]default-route-advertise always type 1
#S2
[S2]ospf 12
[S2-ospf-12]default-route-advertise always type 1
2. 上海管理中心局域网管理终端可通过出口路由器R3 NAPT方式访问互联网。
#R3
[R3]nat address-group 1
[R3-address-group-1]address 13.1.1.2 13.1.1.2
[R3]acl basic 2000
[R3-acl-ipv4-basic-2000]rule permit source 192.1.100.0 0.0.0.255
[R3-acl-ipv4-basic-2000]rule permit source 194.1.100.0 0.0.0.255
[R3]interface GigabitEthernet 0/1
[R3-GigabitEthernet0/1]nat outbound 2000 address-group 1
3. 广州生产中心局域网生产终端可通过出口网关GW1/GW2 NAPT方式访问互联网。
#GW1
[GW1]nat address-group 1
[GW1-address-group-1]address 17.1.1.2 17.1.1.2
[GW1]acl basic 2000
[GW1-acl-ipv4-basic-2000]rule permit source 10.4.10.0 0.0.0.255
[GW1-acl-ipv4-basic-2000]rule permit source 10.4.11.0 0.0.0.255
[GW1]interface GigabitEthernet 1/0/0
[GW1-GigabitEthernet1/0/0]nat outbound 2000 address-group 1
#GW2
[GW2]nat address-group 1
[GW2-address-group-1]address 17.1.1.2 17.1.1.2
[GW2]acl basic 2000
[GW2-acl-ipv4-basic-2000]rule permit source 10.4.10.0 0.0.0.255
[GW2-acl-ipv4-basic-2000]rule permit source 10.4.11.0 0.0.0.255
[GW2]interface GigabitEthernet 1/0/0
[GW2-GigabitEthernet1/0/0]nat outbound 2000 address-group 1
验证:
4. 广州生产中心出口网关内网启用VRRP功能,其中GW1为生产1、AP管理、网络设备管理网段的主设备,优先级255;GW2为生产2的主设备,优先级255;两者互为备份,在其中一台宕机的情况下终端流量可以无缝切换到另一台设备,达到网关冗余备份的目的。
VRRP
#GW1
[GW1]interface GigabitEthernet 1/0/1.10
[GW1-GigabitEthernet1/0/1.10]vrrp vrid 10 virtual-ip 10.4.10.254
[GW1]interface GigabitEthernet 1/0/1.11
[GW1-GigabitEthernet1/0/1.11]vrrp vrid 11 virtual-ip 10.4.11.253
[GW1]interface GigabitEthernet 1/0/1.20
[GW1-GigabitEthernet1/0/1.20]vrrp vrid 20 virtual-ip 10.4.20.254
[GW1]interface GigabitEthernet 1/0/1.30
[GW1-GigabitEthernet1/0/1.30]vrrp vrid 30 virtual-ip 10.4.30.254
#GW2
[GW2]interface GigabitEthernet 1/0/1.10
[GW2-GigabitEthernet1/0/1.10]vrrp vrid 10 virtual-ip 10.4.10.254
[GW2]interface GigabitEthernet 1/0/1.11
[GW2-GigabitEthernet1/0/1.11]vrrp vrid 11 virtual-ip 10.4.11.253
[GW2]interface GigabitEthernet 1/0/1.20
[GW2-GigabitEthernet1/0/1.20]vrrp vrid 20 virtual-ip 10.4.20.254
[GW2]interface GigabitEthernet 1/0/1.30
[GW2-GigabitEthernet1/0/1.30]vrrp vrid 30 virtual-ip 10.4.30.254
验证:
5. 在R3与R2间启用GRE隧道,隧道内承载OSPF协议,使上海管理中心与北京综合服务中心内网连通(访问规则遵循MPLS VPN规划)。
//配置WLAN时已配置
验证:
6. GW1/GW2与R2间启用L2TP隧道,隧道内承载OSPF协议,使广州生产中心与北京综合服务中心内网连通(访问规则遵循MPLS VPN规划)。两者互为备份,在其中一台宕机的情况下业务流量可自动切换到另一条L2TP隧道进行转发。
7. L2TP隧道验证用户名及密码均为Test@123,L2TP隧道密码为Test@123。L2TP用户地址池为172.16.0.1—172.16.0.254,服务端L2TP隧道接口引用本地loopback 1接口地址。
//6、7配置WLAN时已配置
验证: