Hi,本文是一个测试环境,模拟中小型企业广泛使用安全稳定的juniper产品来管理公司网络。从安全,到网关,到无线均是juniper产品,本次主要是讲解这些产品的配置,具体设备的性能和可扩展性请根据客户实际需求配置。谢谢

   以下是环境的拓扑图:19616390


首先是SRX210上面的配置:

SRX210的配置

步骤:

root@juniperSrx210# load factory-default    //清除所有配置

root@juniperSrx210# set system root-authentication plain-text-password  

commit

delete interfaces //清除所有默认接口

delete security zones //清除所有默认zones

root@juniperSrx210# show |display set

set version 12.1X44.5

set system root-authentication encrypted-password "$1$okkrnGtM$PoUGILVvgQ5TL4LHNxeMO."

------------系统配置------------

set system name-server 202.96.134.133

set system name-server 8.8.8.8

set system services ssh

set system services telnet

set system services xnm-clear-text

set system services web-management http interface fe-0/0/7.0

set system services web-management http interface ge-0/0/1.0

set system services web-management https system-generated-certificate

set system services web-management https interface ge-0/0/0.0

------------日志服务器配置------------

set system syslog archive size 100k

set system syslog archive files 3

set system syslog user * any emergency

set system syslog file messages any critical

set system syslog file messages authorization info

set system syslog file interactive-commands interactive-commands error

set system max-configurations-on-flash 5

set system max-configuration-rollbacks 5

set system license autoupdate url https://ae1.juniper.net/junos/key_retrieval

------------接口配置------------

set interfaces ge-0/0/0 unit 0 family inet address 192.168.1.2/24

set interfaces ge-0/0/1 unit 0 family inet address 1.1.1.1/30

set interfaces fe-0/0/7 unit 0 family inet address 192.168.2.1/24

set interfaces vlan unit 0

------------路由配置------------

set routing-options static route 0.0.0.0/0 next-hop 192.168.1.1

set protocols ospf area 0.0.0.0 interface fe-0/0/7.0

set protocols ospf area 0.0.0.0 interface ge-0/0/1.0

set protocols stp

------------防火墙默认配置------------

set security screen ids-option untrust-screen icmp ping-death

set security screen ids-option untrust-screen ip source-route-option

set security screen ids-option untrust-screen ip tear-drop

set security screen ids-option untrust-screen tcp syn-flood alarm-threshold 1024

set security screen ids-option untrust-screen tcp syn-flood attack-threshold 200

set security screen ids-option untrust-screen tcp syn-flood source-threshold 1024

set security screen ids-option untrust-screen tcp syn-flood destination-threshold 2048

set security screen ids-option untrust-screen tcp syn-flood timeout 20

set security screen ids-option untrust-screen tcp land

------------策略配置------------

set security policies from-zone trust to-zone untrust policy trust-to-untrust match source-address any

set security policies from-zone trust to-zone untrust policy trust-to-untrust match destination-address any

set security policies from-zone trust to-zone untrust policy trust-to-untrust match application any

set security policies from-zone trust to-zone untrust policy trust-to-untrust then permit

set security policies from-zone trust to-zone untrust policy trust-to-untrust then log session-init

set security policies from-zone trust to-zone untrust policy trust-to-untrust then log session-close

set security policies from-zone DMZ to-zone untrust policy DMZ-TO-untrust match source-address any

set security policies from-zone DMZ to-zone untrust policy DMZ-TO-untrust match destination-address any

set security policies from-zone DMZ to-zone untrust policy DMZ-TO-untrust match application any

set security policies from-zone DMZ to-zone untrust policy DMZ-TO-untrust then permit

set security policies from-zone trust to-zone DMZ policy trust-to-DMZ match source-address any

set security policies from-zone trust to-zone DMZ policy trust-to-DMZ match destination-address any

set security policies from-zone trust to-zone DMZ policy trust-to-DMZ match application any

set security policies from-zone trust to-zone DMZ policy trust-to-DMZ then permit

set security policies from-zone DMZ to-zone trust policy DMZ-to-trust match source-address any

set security policies from-zone DMZ to-zone trust policy DMZ-to-trust match destination-address any

set security policies from-zone DMZ to-zone trust policy DMZ-to-trust match application any

set security policies from-zone DMZ to-zone trust policy DMZ-to-trust then permit

set security policies from-zone untrust to-zone trust policy untrust-to-trust match source-address any

set security policies from-zone untrust to-zone trust policy untrust-to-trust match destination-address any

set security policies from-zone untrust to-zone trust policy untrust-to-trust match application any

set security policies from-zone untrust to-zone trust policy untrust-to-trust then permit

set security policies from-zone untrust to-zone DMZ policy untrust-to-DMZ match source-address any

set security policies from-zone untrust to-zone DMZ policy untrust-to-DMZ match destination-address any

set security policies from-zone untrust to-zone DMZ policy untrust-to-DMZ match application any

set security policies from-zone untrust to-zone DMZ policy untrust-to-DMZ then permit

------------ZONES配置------------

set security zones security-zone trust interfaces ge-0/0/1.0 host-inbound-traffic system-services all

set security zones security-zone trust interfaces ge-0/0/1.0 host-inbound-traffic protocols all

set security zones security-zone untrust interfaces ge-0/0/0.0 host-inbound-traffic system-services all

set security zones security-zone DMZ interfaces fe-0/0/7.0 host-inbound-traffic system-services all

set security zones security-zone DMZ interfaces fe-0/0/7.0 host-inbound-traffic protocols all

------------默认vlan配置------------

set vlans vlan-trust vlan-id 3

set vlans vlan-trust l3-interface vlan.0

交换机的配置:

3989984

admin# show |display set

set version 11.4R1.6

set system root-authentication encrypted-password "$1$pWh6yJUK$/ErngshQbpbEuuphoRn041"

set system login user admin uid 2000

set system login user admin class super-user

set system login user admin authentication encrypted-password "$1$pygG.dck$sYJPoTD.1JlCMUwlPgWGV1"

set system services ssh

set system services telnet

set system services dhcp pool 192.168.5.0/24 address-range low 192.168.5.2

set system services dhcp pool 192.168.5.0/24 address-range high 192.168.5.253

set system services dhcp pool 192.168.5.0/24 name-server 8.8.8.8

set system services dhcp pool 192.168.5.0/24 router 192.168.5.1

set system services dhcp pool 192.168.4.0/24 address-range low 192.168.4.2

set system services dhcp pool 192.168.4.0/24 address-range high 192.168.4.253

set system services dhcp pool 192.168.4.0/24 name-server 8.8.8.8

set system services dhcp pool 192.168.4.0/24 router 192.168.4.1

set system services dhcp pool 192.168.6.0/24 address-range low 192.168.6.2

set system services dhcp pool 192.168.6.0/24 address-range high 192.168.6.253

set system services dhcp pool 192.168.6.0/24 name-server 8.8.8.8

set system services dhcp pool 192.168.6.0/24 router 192.168.6.1

set system syslog user * any emergency

set system syslog file messages any notice

set system syslog file messages authorization info

set system syslog file interactive-commands interactive-commands any

set interfaces interface-range IT12-23 member-range ge-0/0/12 to ge-0/0/23

set interfaces interface-range IT12-23 unit 0 family ethernet-switching vlan members vlan5

set interfaces interface-range IT1-11 member-range ge-0/0/0 to ge-0/0/11

set interfaces interface-range IT1-11 unit 0 family ethernet-switching vlan members vlan2

set interfaces interface-range IT24-35 member-range ge-0/0/24 to ge-0/0/35

set interfaces interface-range IT24-35 unit 0 family ethernet-switching port-mode access

set interfaces interface-range IT24-35 unit 0 family ethernet-switching vlan members vlan4

set interfaces interface-range IT36-47 member-range ge-0/0/36 to ge-0/0/47

set interfaces interface-range IT36-47 unit 0 family ethernet-switching vlan members vlan6

set interfaces ge-0/0/0 unit 0 family ethernet-switching port-mode access

set interfaces ge-0/0/0 unit 0 family ethernet-switching vlan members vlan2

set interfaces ge-0/0/12 unit 0 family ethernet-switching

set interfaces ge-0/0/24 unit 0 family ethernet-switching vlan members vlan4

set interfaces vlan unit 2 family inet address 1.1.1.2/30

set interfaces vlan unit 4 family inet address 192.168.4.1/24

set interfaces vlan unit 5 family inet address 192.168.5.1/24

set interfaces vlan unit 6 family inet address 192.168.6.1/24

set routing-options static route 0.0.0.0/0 next-hop 1.1.1.1

set protocols ospf area 0.0.0.0 interface vlan.2

set protocols ospf area 0.0.0.0 interface vlan.4 passive

set protocols ospf area 0.0.0.0 interface vlan.5 passive

set protocols ospf area 0.0.0.0 interface vlan.6 passive

set protocols igmp-snooping vlan all

set protocols rstp

set protocols lldp interface all

set protocols lldp-med interface all

set ethernet-switching-options storm-control interface all

set vlans vlan2 vlan-id 2

set vlans vlan2 interface ge-0/0/0.0

set vlans vlan2 l3-interface vlan.2

set vlans vlan4 vlan-id 4

set vlans vlan4 l3-interface vlan.4

set vlans vlan5 vlan-id 5

set vlans vlan5 l3-interface vlan.5

set vlans vlan6 vlan-id 6

set vlans vlan6 l3-interface vlan.6

set poe interface all

无线控制台WLC880R的配置

13096343

13121500

13006375

划了两个vlan

13202421

分别建了两个不同的SSID

13234187

自动学习AP

13252109

配置完成后,控制台自动搜索到以下AP:

14574859

无线显示:

14617718

连接后,自动获取交换机上下发的IP

连接到VLAN4

14759375

连接到VLAN6

14789171

最后测试一下无线用户登陆需要经过Radius认证。

控制台上配置Radius认证:

18353875

18384093

服务器配置

15065750

使用winradius做测试:

连接无线后不能拼外网:

15720000

打开任意网站,需要进行验证:

15768015

验证成功后显示:

15778515

外网拼通:

15800937

radius服务器显示认证成功:

15833812