您现在的位置是:首页 > 技术教程 正文

2022华为ICT大赛全国总决赛网络赛道实验解析及验证

admin 阅读: 2024-03-17
后台-插件-广告管理-内容页头部广告(手机)

作者信息:苗浩15515026488微信同号

本文摘抄自《华为ICT大赛-网络赛道学习空间(中国区)》,如有侵权,请及时联系作者删除文章

一、项目背景

比赛模拟了某大型公司企业网通过广域网连接数据中心的场景。

考虑到网络冗余和流量负载均衡的需求,企业网部署MSTP、防火墙双机热备用于承载web业务和Internet访问业务。同时,为了满足员工的无线办公需求,工程师需要部署WLAN设备于企业网内,用于访问Internet。

在使用丰富的网络资源建设企业网络和数据中心网络的时代大背景下,工程师们证面临严峻的安全问题,NGFW可以部署于企业网络和数据中心网络出口有利于降低安全风险,以帮助实现安全且高效的网络管理。

该企业的私有云部署在总部数据中心机房,企业的各类业务系统都部署在其私有云上,其中企业的OA系统所在的web服务器部署在总部的数据中心,企业各分支需要通过MPLS VPN访问远端数据中心的Web-Server,并且出于安全因素,Web-Server的私网地址不通告到广域网,而是通过一个外部公网地址100.1.1.1提供访问,Web-Client到Web-Server的流量需要在防火墙FW3上做目的地址转换,转换成Web-Server私有地址实现访问。

为实现数据中心租户位于不用子网的业务虚拟机互通,这里业务虚拟机为VM1和VM2,需要在数据中心部署GRE隧道,以打通VM1和VM2的三层通道。

广域网为企业的内网和远端总部数据中心提供链接,提供在广域网上部署MPLS VPN实现企业的互联网专线功能,以确保在广域网上的业务隔离的效果。

二、网络赛道

        实验环境使用如下设备:

  1. 2台S5700(SW2、SW3)
  2. 1台S3700(SW1)
  3. 3台防火墙USG6000V(FW1-FW3)
  4. 7台路由器Router(PE1、PE2、P、Internet、Leaf1、Leaf2)
  5. 1台AC6605(AC)
  6. 1台AP6050(AP)
  7. 1台WLAN终端(PC)
  8. 1台Web服务器(Web-Server)
  9. 1台Web客户端(Web-Client)
  10. 2台虚拟机(VM1、VM2) 

2.1 比赛任务

任务1:VLAN 

        根据2-2规划,配置网络设备名称,在SW1、SW2、SW3上配置VLAN链路类型和VLAN参数、在PE1、FW1和FW2上配置子接口和子接口ID。 

任务2:IP地址

        根据图2-1和表2-3配置网络设备名称和接口IP地址。

配置过程:

  1. 任务1/2:设备命名/VLAN/IP地址
  2. #SW1
  3. system-view
  4. [Huawei]sysname SW1
  5. [SW1]vlan batch 2 to 20
  6. [SW1]interface Ethernet0/0/1
  7. [SW1-Ethernet0/0/1]port link-type access
  8. [SW1-Ethernet0/0/1]port default vlan 10
  9. [SW1]interface Ethernet0/0/2
  10. [SW1-Ethernet0/0/2]port link-type access
  11. [SW1-Ethernet0/0/2]port default vlan 19
  12. [SW1]port-group group-member GigabitEthernet 0/0/1 GigabitEthernet 0/0/2
  13. [SW1-port-group]port link-type trunk
  14. [SW1-port-group]undo port trunk allow-pass vlan 1
  15. [SW1-port-group]port trunk allow-pass vlan 2 to 20
  16. #SW2
  17. system-view
  18. [Huawei]sysname SW2
  19. [SW2]vlan batch 2 to 20
  20. [SW2]port-group group-member GigabitEthernet 0/0/1 GigabitEthernet 0/0/3 GigabitEthernet 0/0/5
  21. [SW2-port-group]port link-type trunk
  22. [SW2-port-group]undo port trunk allow-pass vlan 1
  23. [SW2-port-group]port trunk allow-pass vlan 2 to 20
  24. #SW3
  25. system-view
  26. [Huawei]sysname SW3
  27. [SW3]vlan batch 2 to 20
  28. [SW3]port-group group-member GigabitEthernet 0/0/1 to GigabitEthernet 0/0/3 GigabitEthernet 0/0/5
  29. [SW3-port-group]port link-type trunk
  30. [SW3-port-group]undo port trunk allow-pass vlan 1
  31. [SW3-port-group]port trunk allow-pass vlan 2 to 20
  32. #FW1
  33. system-view
  34. [USG6000V1]sysname FW1
  35. [FW1]interface GigabitEthernet 1/0/5.1
  36. [FW1-GigabitEthernet1/0/5.1]vlan-type dot1q 10
  37. [FW1-GigabitEthernet1/0/5.1]ip address 192.168.1.2 24
  38. [FW1]interface GigabitEthernet 1/0/5.2
  39. [FW1-GigabitEthernet1/0/5.2]vlan-type dot1q 20
  40. [FW1-GigabitEthernet1/0/5.2]ip address 192.168.2.2 24
  41. [FW1]interface GigabitEthernet 1/0/3.1
  42. [FW1-GigabitEthernet1/0/3.1]vlan-type dot1q 1
  43. [FW1-GigabitEthernet1/0/3.1]ip address 10.2.2.1 30
  44. [FW1]interface GigabitEthernet 1/0/1
  45. [FW1-GigabitEthernet1/0/1]ip address 15.1.1.1 24
  46. [FW1]interface GigabitEthernet 1/0/3
  47. [FW1-GigabitEthernet1/0/3]ip address 10.2.1.1 30
  48. #FW2
  49. system-view
  50. [USG6000V1]sysname FW2
  51. [FW2]interface GigabitEthernet 1/0/5.1
  52. [FW2-GigabitEthernet1/0/5.1]vlan-type dot1q 10
  53. [FW2-GigabitEthernet1/0/5.1]ip address 192.168.1.3 24
  54. [FW2]interface GigabitEthernet 1/0/5.2
  55. [FW2-GigabitEthernet1/0/5.2]vlan-type dot1q 20
  56. [FW2-GigabitEthernet1/0/5.2]ip address 192.168.2.3 24
  57. [FW2]interface GigabitEthernet 1/0/3.1
  58. [FW2-GigabitEthernet1/0/3.1]vlan-type dot1q 1
  59. [FW2-GigabitEthernet1/0/3.1]ip address 10.3.2.1 30
  60. [FW2]interface GigabitEthernet 1/0/1
  61. [FW2-GigabitEthernet1/0/1]ip address 15.1.1.2 24
  62. [FW2]interface GigabitEthernet 1/0/3
  63. [FW2-GigabitEthernet1/0/3]ip address 10.3.1.1 30
  64. #PE1
  65. system-view
  66. [Huawei]sysname PE1
  67. [PE1]interface GigabitEthernet 0/0/1.1
  68. [PE1-GigabitEthernet0/0/1.1]dot1q termination vid 1
  69. [PE1-GigabitEthernet0/0/1.1]arp broadcast enable
  70. [PE1-GigabitEthernet0/0/1.1]ip address 10.2.2.2 30
  71. [PE1]interface GigabitEthernet 0/0/3.1
  72. [PE1-GigabitEthernet0/0/3.1]dot1q termination vid 1
  73. [PE1-GigabitEthernet0/0/3.1]arp broadcast enable
  74. [PE1-GigabitEthernet0/0/3.1]ip address 10.3.2.2 30
  75. [PE1]interface LoopBack 0
  76. [PE1-LoopBack0]ip address 1.1.1.1 32
  77. [PE1]interface GigabitEthernet0/0/1
  78. [PE1-GigabitEthernet0/0/1]ip address 10.2.1.2 30
  79. [PE1]interface GigabitEthernet0/0/2
  80. [PE1-GigabitEthernet0/0/2]ip address 20.1.1.1 30
  81. [PE1]interface GigabitEthernet0/0/3
  82. [PE1-GigabitEthernet0/0/3]ip address 10.3.1.2 30
  83. #AC1
  84. system-view
  85. [AC6605]sysname AC
  86. [AC]vlan batch 19 20
  87. [AC]interface GigabitEthernet 0/0/1
  88. [AC-GigabitEthernet0/0/1]port link-type trunk
  89. [AC-GigabitEthernet0/0/1]undo port trunk allow-pass vlan 1
  90. [AC-GigabitEthernet0/0/1]port trunk allow-pass vlan 19 20
  91. #FW3
  92. system-view
  93. [USG6000V1]sysname FW3
  94. [FW3]interface GigabitEthernet 1/0/1
  95. [FW3-GigabitEthernet1/0/1]ip address 30.1.1.1 30
  96. [FW3]interface GigabitEthernet 1/0/2
  97. [FW3-GigabitEthernet1/0/2]ip address 20.1.3.2 30
  98. #P
  99. system-view
  100. [Huawei]sysname P
  101. [P]interface LoopBack 0
  102. [P-LoopBack0]ip address 2.2.2.2 32
  103. [P]interface GigabitEthernet0/0/1
  104. [P-GigabitEthernet0/0/1]ip address 20.1.2.1 30
  105. [P]interface GigabitEthernet0/0/2
  106. [P-GigabitEthernet0/0/2]ip address 20.1.1.2 30
  107. #PE2
  108. system-view
  109. [Huawei]sysname PE2
  110. [PE2]interface LoopBack 0
  111. [PE2-LoopBack0]ip address 3.3.3.3 32
  112. [PE2]interface GigabitEthernet0/0/1
  113. [PE2-GigabitEthernet0/0/1]ip address 20.1.2.2 30
  114. [PE2]interface GigabitEthernet0/0/2
  115. [PE2-GigabitEthernet0/0/2]ip address 20.1.3.1 30
  116. [PE2]interface GigabitEthernet0/0/3
  117. [PE2-GigabitEthernet0/0/3]ip address 20.1.4.1 30
  118. #Internet
  119. system-view
  120. [Huawei]sysname Internet
  121. [Internet]interface LoopBack 0
  122. [Internet-LoopBack0]ip address 16.16.16.16 32
  123. [Internet]interface GigabitEthernet0/0/3
  124. [Internet-GigabitEthernet0/0/3]ip address 20.1.4.2 30
  125. #DC-GW
  126. system-view
  127. [Huawei]sysname DC-GW
  128. [DC-GW]interface LoopBack 0
  129. [DC-GW-LoopBack0]ip address 11.11.11.11 32
  130. [DC-GW]interface GigabitEthernet0/0/1
  131. [DC-GW-GigabitEthernet0/0/1]ip address 30.1.1.2 30
  132. [DC-GW]interface GigabitEthernet0/0/2
  133. [DC-GW-GigabitEthernet0/0/2]ip address 30.1.2.1 30
  134. [DC-GW]interface GigabitEthernet0/0/3
  135. [DC-GW-GigabitEthernet0/0/3]ip address 30.1.3.1 30
  136. #Leaf1
  137. system-view
  138. [Huawei]sysname Leaf1
  139. [Leaf1]interface LoopBack 0
  140. [Leaf1-LoopBack0]ip address 12.12.12.12 32
  141. [Leaf1]interface GigabitEthernet0/0/1
  142. [Leaf1-GigabitEthernet0/0/1]ip address 172.16.3.254 24
  143. [Leaf1]interface GigabitEthernet0/0/2
  144. [Leaf1-GigabitEthernet0/0/2]ip address 30.1.2.2 30
  145. [Leaf1]interface GigabitEthernet0/0/3
  146. [Leaf1-GigabitEthernet0/0/3]ip address 172.16.1.254 24
  147. #Leaf2
  148. system-view
  149. [Huawei]sysname Leaf2
  150. [Leaf2]interface LoopBack 0
  151. [Leaf2-LoopBack0]ip address 13.13.13.13 32
  152. [Leaf2]interface GigabitEthernet0/0/1
  153. [Leaf2-GigabitEthernet0/0/1]ip address 172.16.2.254 24
  154. [Leaf2]interface GigabitEthernet0/0/3
  155. [Leaf2-GigabitEthernet0/0/3]ip address 30.1.3.2 30

验证:

任务3:MSTP配置 

        为了实现二层网络的防环功能和流量负载均衡的目的,需要在SW1、SW2、SW3上配置 MSTP功能 

  1. 配置region名称为RG1。
  2. 将VLAN2到VLAN10映射到生成树实例instance 1,将VLAN11到VLAN20映射到生成树实例instance 2。
  3. 配置SW2为instance 1的根桥,instance 2的备份根桥;配置SW3为instance 2的根桥,instance 1的备份根桥。
  4. 配置SW2的GE 0/0/1口为STP根保护,关闭GE0/0/5的STP功能;配置SW3的GE0/0/2口为STP根保护,配置GE0/0/1口为STP边缘端口,关闭GE0/0/5口的STP功能。
  5. 配置SW1的E0/0/1和E0/0/2口为STP边缘端口。

配置过程:

  1. 任务3:MSTP
  2. #SW2
  3. [SW2]stp region-configuration
  4. [SW2-mst-region]region-name RG1
  5. [SW2-mst-region]instance 1 vlan 2 to 10
  6. [SW2-mst-region]instance 2 vlan 11 to 20
  7. [SW2-mst-region]active region-configuration
  8. [SW2]stp instance 1 root primary
  9. [SW2]stp instance 2 root secondary
  10. [SW2]interface GigabitEthernet 0/0/1
  11. [SW2-GigabitEthernet0/0/1]stp root-protection
  12. [SW2]interface GigabitEthernet 0/0/5
  13. [SW2-GigabitEthernet0/0/5]stp disable
  14. #SW3
  15. [SW3]stp region-configuration
  16. [SW3-mst-region]region-name RG1
  17. [SW3-mst-region]instance 1 vlan 2 to 10
  18. [SW3-mst-region]instance 2 vlan 11 to 20
  19. [SW3-mst-region]active region-configuration
  20. [SW3]stp instance 1 root secondary
  21. [SW3]stp instance 2 root primary
  22. [SW3]interface GigabitEthernet 0/0/2
  23. [SW3-GigabitEthernet0/0/2]stp root-protection
  24. [SW3]interface GigabitEthernet 0/0/1
  25. [SW3-GigabitEthernet0/0/1]stp edged-port enable
  26. [SW3]interface GigabitEthernet 0/0/5
  27. [SW3-GigabitEthernet0/0/5]stp disable
  28. #SW1
  29. [SW1]stp region-configuration
  30. [SW1-mst-region]region-name RG1
  31. [SW1-mst-region]instance 1 vlan 2 to 10
  32. [SW1-mst-region]instance 2 vlan 11 to 20
  33. [SW1-mst-region]active region-configuration
  34. [SW1]port-group group-member Ethernet 0/0/1 Ethernet 0/0/2
  35. [SW1-port-group]stp edged-port enable

验证: 

 

任务4:防火墙安全区域配置 

为实现网络安全的需求,需要部署防火墙,按要求规划安全区域,并且按照最小权限原则放开必要的端口权限,确保业务的正常通信。

请按照如下表格2-4的数据规划完成防火墙的安全区域配置。

验证:

 

任务5:防火墙VRRP、双机热备和安全策略配置 

为了避免防火墙单点故障,且充分利用网络资源,采用负载均衡模式部署防火墙双机热备,以增加网络健壮性。 

  1. 按表2-5的VRRP规划,完成VRRP配置。
  2. 使能FW1和FW2的hrp功能,配置FW1和FW2的G1/0/1口为HRP接口,并使能session快速备份功能。
  3. 然后按照需求完成防火墙安全策略配置。
    1. FW1:创建名称为“web”的安全策略,放通web服务流量;
    2. FW1:创建名称为“Wireless”的安全策略,放通WLAN流量;
    3. FW3:创建名称为“web”的安全策略,放通web服务流量;
    4. 在FW3配置NAT server功能,global地址和端口号分别为100.1.1.1和8080,inside地址和协议分别为172.16.1.1和http。

                安全策略禁止全放通,要求所有安全策略按照实际细化配置。

配置过程:

  1. 任务4:防火墙安全区域配置
  2. #FW1
  3. [FW1]firewall zone trust
  4. [FW1-zone-trust]add interface GigabitEthernet 1/0/5.1
  5. [FW1-zone-trust]add interface GigabitEthernet 1/0/5.2
  6. [FW1]firewall zone untrust
  7. [FW1-zone-untrust]add interface GigabitEthernet 1/0/3
  8. [FW1-zone-untrust]add interface GigabitEthernet 1/0/3.1
  9. [FW1]firewall zone dmz
  10. [FW1-zone-dmz]add interface GigabitEthernet 1/0/1
  11. #FW2
  12. [FW2]firewall zone trust
  13. [FW2-zone-trust]add interface GigabitEthernet 1/0/5.1
  14. [FW2-zone-trust]add interface GigabitEthernet 1/0/5.2
  15. [FW2]firewall zone untrust
  16. [FW2-zone-untrust]add interface GigabitEthernet 1/0/3
  17. [FW2-zone-untrust]add interface GigabitEthernet 1/0/3.1
  18. [FW2]firewall zone dmz
  19. [FW2-zone-dmz]add interface GigabitEthernet 1/0/1
  20. #FW3
  21. [FW3]firewall zone trust
  22. [FW3-zone-trust]add interface GigabitEthernet 1/0/1
  23. [FW3]firewall zone untrust
  24. [FW3-zone-untrust]add interface GigabitEthernet 1/0/2
  25. 任务5:防火墙VRRP、双机热备和安全策略配置
  26. 防火墙VRRP
  27. #FW1
  28. [FW1]interface GigabitEthernet 1/0/5.1
  29. [FW1-GigabitEthernet1/0/5.1]vrrp vrid 1 virtual-ip 192.168.1.254 active
  30. [FW1]interface GigabitEthernet 1/0/5.2
  31. [FW1-GigabitEthernet1/0/5.2]vrrp vrid 2 virtual-ip 192.168.2.254 standby
  32. #FW2
  33. [FW2]interface GigabitEthernet 1/0/5.1
  34. [FW2-GigabitEthernet1/0/5.1]vrrp vrid 1 virtual-ip 192.168.1.254 standby
  35. [FW2]interface GigabitEthernet 1/0/5.2
  36. [FW2-GigabitEthernet1/0/5.2]vrrp vrid 2 virtual-ip 192.168.2.254 active
  37. HRP
  38. #FW1
  39. [FW1]hrp interface GigabitEthernet 1/0/1 remote 15.1.1.2
  40. [FW1]hrp enable
  41. HRP_M[FW1]hrp mirror session enable
  42. HRP_M[FW1]hrp auto-sync config static-route (+B)
  43. #FW2
  44. [FW2]hrp interface GigabitEthernet 1/0/1 remote 15.1.1.1
  45. [FW2]hrp enable
  46. HRP_S[FW2]hrp mirror session enable
  47. 安全策略
  48. #FW1
  49. HRP_M[FW1]security-policy (+B)
  50. HRP_M[FW1-policy-security]rule name web (+B)
  51. HRP_M[FW1-policy-security-rule-web]source-zone trust (+B)
  52. HRP_M[FW1-policy-security-rule-web]destination-zone untrust (+B)
  53. HRP_M[FW1-policy-security-rule-web]source-address 192.168.1.1 32 (+B)
  54. HRP_M[FW1-policy-security-rule-web]destination-address 172.16.1.1 32 (+B)
  55. HRP_M[FW1-policy-security-rule-web]service http (+B)
  56. HRP_M[FW1-policy-security-rule-web]service https (+B)
  57. HRP_M[FW1-policy-security-rule-web]action permit (+B)
  58. HRP_M[FW1-policy-security]rule name Wireless (+B)
  59. HRP_M[FW1-policy-security-rule-Wireless]source-zone trust (+B)
  60. HRP_M[FW1-policy-security-rule-Wireless]source-zone local (+B)
  61. HRP_M[FW1-policy-security-rule-Wireless]source-zone untrust (+B)
  62. HRP_M[FW1-policy-security-rule-Wireless]destination-zone untrust (+B)
  63. HRP_M[FW1-policy-security-rule-Wireless]destination-zone trust (+B)
  64. HRP_M[FW1-policy-security-rule-Wireless]destination-zone local (+B)
  65. HRP_M[FW1-policy-security-rule-Wireless]source-address 192.168.2.0 24 (+B)
  66. HRP_M[FW1-policy-security-rule-Wireless]action permit (+B)
  67. HRP_M[FW1]int g1/0/5.1 (+B)
  68. HRP_M[FW1-GigabitEthernet1/0/5.1]service-manage ping permit (+B)
  69. HRP_M[FW1]int g1/0/5.2 (+B)
  70. HRP_M[FW1-GigabitEthernet1/0/5.2]service-manage ping permit (+B)
  71. #FW3
  72. [FW3]security-policy
  73. [FW3-policy-security]rule name web
  74. [FW3-policy-security-rule-web]source-zone untrust
  75. [FW3-policy-security-rule-web]destination-zone trust
  76. [FW3-policy-security-rule-web]source-address 192.168.1.1 32
  77. [FW3-policy-security-rule-web]destination-address 172.16.1.1 32
  78. [FW3-policy-security-rule-web]service http
  79. [FW3-policy-security-rule-web]service https
  80. [FW3-policy-security-rule-web]action permit
  81. [FW3-policy-security]rule name BGP
  82. [FW3-policy-security-rule-BGP]source-zone untrust
  83. [FW3-policy-security-rule-BGP]destination-zone local
  84. [FW3-policy-security-rule-BGP]source-address 20.1.3.1 mask 255.255.255.255
  85. [FW3-policy-security-rule-BGP]destination-address 20.1.3.2 mask 255.255.255.255
  86. [FW3-policy-security-rule-BGP]service bgp
  87. [FW3-policy-security-rule-BGP]service tcp
  88. [FW3-policy-security-rule-BGP]action permit
  89. [FW3]security-policy
  90. [FW3-policy-security]rule name OSPF
  91. [FW3-policy-security-rule-OSPF]source-zone trust
  92. [FW3-policy-security-rule-OSPF]destination-zone local
  93. [FW3-policy-security-rule-OSPF]source-address 30.1.1.2
  94. [FW3-policy-security-rule-OSPF]service ospf
  95. [FW3-policy-security-rule-OSPF]action permit
  96. NAT Server
  97. #FW3
  98. [FW3]nat server nat_server zone untrust protocol tcp global 100.1.1.1 8080 inside 172.16.1.1 www

验证:

 

任务6:公网静态路由配置(路由可参考图2-2、图2-3及描述)

  1. 为了实现将去往Internet的流量和去往数据中心Web-server的流量引流到广域网上,需要在FW1和FW2上配置静态路由实现。PE1的主接口用于接收Internet流量,PE1的子接口用于接收Web-Server流量。在PE1上配置两台指向WLAN客户端的回程静态路由,回程路由需要指向FW1和FW2实现负载分担,用于引导Internet回程流量。
  2. 因需要发布global地址段到VPN,所以需要在防火墙FW3上配置到Web-Server global地址100.1.1.1的静态黑洞路由,用于引导Web-Server的VPN流量。
  3. 在FW3上配置一条缺省路由,引导Web-Server从数据中心到企业内网的回程流量。 

配置过程:

  1. #FW1
  2. [FW1]ip route-static 0.0.0.0 0.0.0.0 10.2.1.2
  3. [FW1]ip route-static 100.1.1.1 255.255.255.255 10.2.2.2
  4. #FW2
  5. [FW2]ip route-static 0.0.0.0 0.0.0.0 10.3.1.2
  6. #FW3
  7. [FW3]ip route-static 100.1.1.1 32 NULL 0
  8. [FW3]ip route-static 100.1.1.1 255.255.255.255 10.3.2.2
  9. [FW3]ip route-static 0.0.0.0 0.0.0.0 20.1.3.1
  10. #PE1
  11. [PE1]ip route-static 192.168.2.0 24 10.2.1.1
  12. [PE1]ip route-static 192.168.2.0 24 10.3.1.1

验证: 

 

任务7:公网动态路由配置

  1. 在PE1、P、PE2组成的广域网里部署ISIS路由协议,进程ID为1,ISIS域配置为Level-2层,区域ID号为01,systemid值自行规划。要求PE1的Loopback0和GE0/0/2,P路由器Loopback0、GE0/0/1和GE0/0/2,PE2的Loopback0和GE0/0/1使能ISIS协议。
  2. 为了提高网络安全性,需要配置对LSP、CSNP、PSNP报文MD5认证功能,认证密码为ICTEXAM。
  3. DC数据中心部署OSPF,DC内所有路由器均部署在ospf area 0骨干区域,要求FW3的GE1/0/1,DC-GW的loopback0、GE0/0/1、GE0/0/2和GE0/0/3,Leaf1的Loopback0、GE0/0/2和GE0/0/3,Leaf2的loopback0和GE0/0/3所在的地址段发布到OSPF区域。
  4. FW3往OSPF路由域发布缺省路由引导Web-Server服务器到企业内网的回程流量。要求当FW3与PE2的链路中断后,FW3可以同步停止发布缺省路由,避免产生无效流量。 
  5. PE1的loopback0和P路由器的loopback0配置为IBGP邻居,PE2的loopback0和P路由器的loopback0配置为IBGP邻居,P路由器配置IBGP邻居组,添加PE1和PE2为邻居组成员,P路由器配置为反射器RR,PE1和PE2是P路由器的客户端。PE2的GE0/0/3和Internet路由器的GE0/0/3配置为EBGP邻居。把Internet路由器上的loopback0地址提供EBGP通告给对端路由器PE2,引导流量上行。(路由可参考图2-2及描述)

配置过程:

  1. 任务7:公网动态路由配置
  2. ISIS
  3. #PE1
  4. [PE1]isis 1
  5. [PE1-isis-1]network-entity 01.0000.0000.0001.00
  6. [PE1-isis-1]is-level level-2
  7. [PE1-isis-1]domain-authentication-mode md5 ICTEXAM
  8. [PE1]interface LoopBack 0
  9. [PE1-LoopBack0]isis enable 1
  10. [PE1]interface GigabitEthernet0/0/2
  11. [PE1-GigabitEthernet0/0/2]isis enable 1
  12. #P
  13. [P]isis 1
  14. [P-isis-1]network-entity 01.0000.0000.0002.00
  15. [P-isis-1]is-level level-2
  16. [PE1-isis-1]domain-authentication-mode md5 ICTEXAM
  17. [P]interface LoopBack 0
  18. [P-LoopBack0]isis enable 1
  19. [P]interface GigabitEthernet0/0/1
  20. [P-GigabitEthernet0/0/1]isis enable 1
  21. [P]interface GigabitEthernet0/0/2
  22. [P-GigabitEthernet0/0/2]isis enable 1
  23. #PE2
  24. [PE2]isis 1
  25. [PE2-isis-1]network-entity 01.0000.0000.0003.00
  26. [PE2-isis-1]is-level level-2
  27. [PE1-isis-1]domain-authentication-mode md5 ICTEXAM
  28. [PE2]interface LoopBack 0
  29. [PE2-LoopBack0]isis enable 1
  30. [PE2]interface GigabitEthernet0/0/1
  31. [PE2-GigabitEthernet0/0/1]isis enable 1
  32. OSPF
  33. #FW3
  34. [FW3]ospf 1
  35. [FW3-ospf-1]default-route-advertise type 1
  36. [FW3-ospf-1]area 0
  37. [FW3-ospf-1-area-0.0.0.0]network 30.1.1.1 0.0.0.0
  38. #DC-GW
  39. [DC-GW]ospf 1
  40. [DC-GW-ospf-1]area 0
  41. [DC-GW-ospf-1-area-0.0.0.0]network 11.11.11.11 0.0.0.0
  42. [DC-GW-ospf-1-area-0.0.0.0]network 30.1.1.2 0.0.0.0
  43. [DC-GW-ospf-1-area-0.0.0.0]network 30.1.2.1 0.0.0.0
  44. [DC-GW-ospf-1-area-0.0.0.0]network 30.1.3.1 0.0.0.0
  45. #Leaf1
  46. [Leaf1]ospf 1
  47. [Leaf1-ospf-1]area 0
  48. [Leaf1-ospf-1-area-0.0.0.0]network 12.12.12.12 0.0.0.0
  49. [Leaf1-ospf-1-area-0.0.0.0]network 30.1.2.2 0.0.0.0
  50. [Leaf1-ospf-1-area-0.0.0.0]network 172.16.1.254 0.0.0.0
  51. #Leaf2
  52. [Leaf2]ospf 1
  53. [Leaf2-ospf-1]area 0
  54. [Leaf2-ospf-1-area-0.0.0.0]network 30.1.3.2 0.0.0.0
  55. [Leaf2-ospf-1-area-0.0.0.0]network 13.13.13.13 0.0.0.0
  56. BGP
  57. #PE1
  58. [PE1]bgp 100
  59. [PE1-bgp]peer 2.2.2.2 as-number 100
  60. [PE1-bgp]peer 2.2.2.2 connect-interface LoopBack0
  61. #P
  62. [P]bgp 100
  63. [P-bgp]group PE1-PE2 internal
  64. [P-bgp]peer 1.1.1.1 group PE1-PE2
  65. [P-bgp]peer 3.3.3.3 group PE1-PE2
  66. [P-bgp]peer PE1-PE2 connect-interface LoopBack 0
  67. [P-bgp]peer PE1-PE2 reflect-client
  68. #PE2
  69. [PE2]bgp 100
  70. [PE2-bgp]peer 2.2.2.2 as-number 100
  71. [PE2-bgp]peer 2.2.2.2 connect-interface LoopBack 0
  72. [PE2-bgp]peer 20.1.4.2 as-number 200
  73. [PE2-bgp]peer 20.1.3.2 as-number 300
  74. [PE2-bgp]peer 2.2.2.2 next-hop-local
  75. #Internet
  76. [Internet]bgp 200
  77. [Internet-bgp]peer 20.1.4.1 as-number 100
  78. [Internet-bgp]network 16.16.16.16 32
  79. #FW3
  80. [Internet]bgp 300
  81. [Internet-bgp]peer 20.1.3.1 as-number 100
  82. [Internet-bgp]network 100.1.1.1 32

 验证:

 

 

 任务8:MPLS VPN(路由可参考图2-3及描述)

  1. PE1的loopback0和P路由器的Loopback0配置为MP-IBGP邻居,PE2的loopback0和P路由器的loopback0配置MP-IBGP邻居,P路由器配置为VPN反射器vRR,PE1和PE2是P路由器的客户端。为了能将路由顺利传递,需要在P路由器上配置undo policy vpn-target。
  2. PE1、P、PE2使能MPLS和MPLS LDP,并将各自的loopback0接口地址配置为MPLS LSR ID。PE1的GE0/0/2,P路由器的GE0/0/1和GE0/0/2,PE2的FE0/0/1均使能MPLS和MPLS LDP。
  3. PE1和PE2配置VPN实例,命名为ToDC,RD值为100:1,Export RT和Import RT均为200:1。把PE1的GE0/0/3.1接口绑定到PE1的VPN实例ToDC,PE2的GE0/0/2绑定到PE2的VPN实例ToDC。
  4. 在PE1的VPN实例ToDC内配置静态路由,目的网段为Web-Client地址段192.168.0.0/16,吓一跳指向FW1和FW2的GE1/0/3.1,以实现Web-Server回程流量的负载分担。将配置的两条等价静态路由引入到VPN实例ToDC中,让MP-IBGP通告给PE2,引导Web-Server的回程流量。
  5. PE2的VPN实例ToDC上的接口GE0/0/2与FW3的GE1/0/2配置为EBGP邻居,通过EBGP邻居交换Web-Server业务路由。
  1. 任务8:MPLS VPN配置
  2. VPN实例
  3. #PE1
  4. [PE1]ip vpn-instance ToDC
  5. [PE1-vpn-instance-ToDC]route-distinguisher 100:1
  6. [PE1-vpn-instance-ToDC-af-ipv4]vpn-target 200:1 both
  7. [PE1]interface GigabitEthernet0/0/3.1
  8. [PE1-GigabitEthernet0/0/3.1]ip binding vpn-instance ToDC
  9. [PE1-GigabitEthernet0/0/3.1]ip address 10.3.2.2 30
  10. [PE1]interface GigabitEthernet0/0/1.1
  11. [PE1-GigabitEthernet0/0/1.1]ip binding vpn-instance ToDC
  12. [PE1-GigabitEthernet0/0/1.1]ip address 10.2.2.2 30
  13. #PE2
  14. [PE2]ip vpn-instance ToDC
  15. [PE2-vpn-instance-ToDC]route-distinguisher 100:1
  16. [PE2-vpn-instance-ToDC-af-ipv4]vpn-target 200:1 both
  17. [PE2]interface GigabitEthernet0/0/2
  18. [PE2-GigabitEthernet0/0/2]ip binding vpn-instance ToDC
  19. [PE2-GigabitEthernet0/0/2]ip address 20.1.3.1 30
  20. MPLS
  21. #PE1
  22. [PE1]mpls lsr-id 1.1.1.1
  23. [PE1]mpls
  24. [PE1]mpls ldp
  25. [PE1]interface GigabitEthernet0/0/2
  26. [PE1-GigabitEthernet0/0/2]mpls
  27. [PE1-GigabitEthernet0/0/2]mpls ldp
  28. #P
  29. [P]mpls lsr-id 2.2.2.2
  30. [P]mpls
  31. [P]mpls ldp
  32. [P]interface GigabitEthernet0/0/1
  33. [P-GigabitEthernet0/0/1]mpls
  34. [P-GigabitEthernet0/0/1]mpls ldp
  35. [P]interface GigabitEthernet0/0/2
  36. [P-GigabitEthernet0/0/2]mpls
  37. [P-GigabitEthernet0/0/2]mpls ldp
  38. #PE2
  39. [PE2]mpls lsr-id 3.3.3.3
  40. [PE2]mpls
  41. [PE2]mpls ldp
  42. [PE2]interface GigabitEthernet0/0/1
  43. [PE2-GigabitEthernet0/0/1]mpls
  44. [PE2-GigabitEthernet0/0/1]mpls ldp
  45. MP-BGP
  46. #PE1
  47. [PE1]bgp 100
  48. [PE1-bgp]ipv4-family vpnv4
  49. [PE1-bgp-af-vpnv4]peer 2.2.2.2 enable
  50. #P
  51. [P]bgp 100
  52. [P-bgp]ipv4-family vpnv4
  53. [P-bgp-af-vpnv4]undo policy vpn-target
  54. [P-bgp-af-vpnv4]peer 1.1.1.1 enable
  55. [P-bgp-af-vpnv4]peer 3.3.3.3 enable
  56. [P-bgp-af-vpnv4]peer 1.1.1.1 reflect-client
  57. [P-bgp-af-vpnv4]peer 3.3.3.3 reflect-client
  58. #PE2
  59. [PE2-bgp]ipv4-family vpn-instance ToDC
  60. [PE2-bgp-ToDC]peer 20.1.3.2 as-number 300
  61. [PE2-bgp]ipv4-family vpnv4
  62. [PE2-bgp-af-vpnv4]peer 2.2.2.2 enable
  63. [PE2-bgp-af-vpnv4]peer 2.2.2.2 next-hop-local
  64. VPN静态路由
  65. #PE1
  66. [PE1]ip route-static vpn-instance ToDC 192.168.0.0 16 10.2.2.1
  67. [PE1]ip route-static vpn-instance ToDC 192.168.0.0 16 10.3.2.1
  68. [PE1]bgp 100
  69. [PE1-bgp]ipv4-family vpn-instance ToDC
  70. [PE1-bgp-ToDC]network 10.3.2.0 30
  71. [PE1-bgp-ToDC]network 192.168.0.0 16

验证:

 

 

任务9:GRE

  1. 数据中心的租户会部署虚拟私有网络,该虚拟私有网络划分两个子网,VM1属于子网1(172.16.3.0/24),VM2属于子网2(172.16.2.0/24),为实现数据中心位于这两个不同子网的虚拟机互通,需要在VM1的网关Leaf和VM2的网关Leaf2之间部署GRE,根据表2-6参数规划完成GRE隧道配置。

配置过程:

  1. 任务9:GRE
  2. #Leaf1
  3. [Leaf1]interface Tunnel 0/0/0
  4. [Leaf1-Tunnel0/0/0]tunnel-protocol gre
  5. [Leaf1-Tunnel0/0/0]ip address 173.1.2.1 30
  6. [Leaf1-Tunnel0/0/0]source 12.12.12.12
  7. [Leaf1-Tunnel0/0/0]destination 13.13.13.13
  8. [Leaf1]ip route-static 172.16.2.0 24 173.1.2.2
  9. #Leaf2
  10. [Leaf2]interface Tunnel 0/0/0
  11. [Leaf2-Tunnel0/0/0]tunnel-protocol gre
  12. [Leaf2-Tunnel0/0/0]ip address 173.1.2.2 30
  13. [Leaf2-Tunnel0/0/0]source 13.13.13.13
  14. [Leaf2-Tunnel0/0/0]destination 12.12.12.12
  15. [Leaf2]ip route-static 172.16.3.0 24 173.1.2.1

验证: 

 

任务10:WLAN

Ⅰ.有线侧网络配置
  1. 完成企业内网的交换机侧配置,使得AP能够与AC进行通信,AP下的终端到WLAN网络后可以与网关(防火墙)进行通信。
  2. 完成AC侧底层网络配置,使得AC能够与AP进行通信,AC作为DHCP服务器分别为AP、Station分配IP地址。 
Ⅱ.WLAN业务配置 
  1. WLAN侧业务要求如下:AP与AC处于同一网段,AP直接二层注册到AC,AP通过AC来转发station流量,AC作为AP以及station的DHCP Server。
  2. 无线侧业务配置按照表2-8规划完成: 

配置过程:

  1. 任务10:WLAN
  2. DHCP
  3. #AC1
  4. [AC]interface Vlanif 19
  5. [AC-Vlanif19]ip address 192.168.19.254 24
  6. [AC]dhcp enable
  7. [AC]ip pool For_AP
  8. [AC-ip-pool-For_AP]network 192.168.19.0 mask 255.255.255.0
  9. [AC-ip-pool-For_AP]gateway-list 192.168.19.254
  10. [AC]ip pool STA
  11. [AC-ip-pool-STA]network 192.168.2.0 mask 255.255.255.0
  12. [AC-ip-pool-STA]gateway-list 192.168.2.254
  13. [AC]interface Vlanif 19
  14. [AC-Vlanif19]dhcp select global
  15. [AC]interface Vlanif 20
  16. [AC-Vlanif20]dhcp select global
  17. [AC]interface Vlanif 19
  18. [AC-Vlanif19]ip address 192.168.19.254 24
  19. WLAN业务配置
  20. [AC]capwap source interface Vlanif 19
  21. [AC]wlan
  22. [AC-wlan-view]ap auth-mode mac-auth
  23. [AC-wlan-view]ap-id 0 ap-mac 00e0-fc52-0650
  24. [AC-wlan-ap-0]ap-name AP
  25. [AC-wlan-ap-0]ap-group default
  26. [AC-wlan-view]ssid-profile name s1
  27. [AC-wlan-ssid-prof-s1]ssid ICT
  28. [AC-wlan-view]security-profile name s1
  29. [AC-wlan-sec-prof-s1]security wpa-wpa2 psk pass-phrase Huawei@123 aes
  30. [AC-wlan-view]vap-profile name p1
  31. [AC-wlan-vap-prof-p1]forward-mode tunnel
  32. [AC-wlan-vap-prof-p1]service-vlan vlan-id 20
  33. [AC-wlan-vap-prof-p1]ssid-profile s1
  34. [AC-wlan-vap-prof-p1]security-profile s1
  35. [AC-wlan-view]ap-group name default
  36. [AC-wlan-ap-group-default]regulatory-domain-profile default
  37. [AC-wlan-ap-group-default]vap-profile p1 wlan 1 radio all

验证:

 

标签:
声明

1.本站遵循行业规范,任何转载的稿件都会明确标注作者和来源;2.本站的原创文章,请转载时务必注明文章作者和来源,不尊重原创的行为我们将追究责任;3.作者投稿可能会经我们编辑修改或补充。

在线投稿:投稿 站长QQ:1888636

后台-插件-广告管理-内容页尾部广告(手机)
关注我们

扫一扫关注我们,了解最新精彩内容

搜索
排行榜