JUNIPER SRX雙ISP部署Destination-nat配置實驗1.0

    企業網環境中,客戶一般會部署多條運營商線路。同一臺服務器的不一樣端口會經過不一樣運營商線的線路發佈出去。也有客戶會問:沒法經過ISP2的地址管理設備。咱們經過簡單的路由實例就能夠實現這一要求。web

實驗拓撲:    瀏覽器

路由實例拓撲.png


實驗需求:1.客戶經過電信訪問服務器8080端口,經過聯通ip訪問服務器80端口;服務器

               2.(後續)SRX監控電信的443端口,一旦443單口被封掉,業務當即切換到聯通ip的443。ide

實驗配置:測試

1.接口:優化

set interfaces ge-0/0/0 unit 0 family inet address 1.1.1.2/24
spa

set interfaces ge-0/0/1 unit 0 family inet address 10.10.10.2/24
3d

set interfaces ge-0/0/2 unit 0 family inet address 172.16.10.1/24
orm

2.主路由inet.0:router

set routing-options static route 0.0.0.0/0 next-hop 1.1.1.1

set routing-options static route 172.188.10.0/24 next-hop st0.1

3.路由實例:

set routing-options interface-routes rib-group inet share

set routing-options rib-groups share import-rib inet.0

set routing-options rib-groups share import-rib isp2.inet.0

set routing-instances isp2 instance-type virtual-router

set routing-instances isp2 interface ge-0/0/1.0

set routing-instances isp2 routing-options static route 0.0.0.0/0 next-hop 10.10.10.1

4.NAT設置:

set security nat source rule-set 1 from zone trust

set security nat source rule-set 1 to zone untrust

set security nat source rule-set 1 rule 1 match source-address 0.0.0.0/0

set security nat source rule-set 1 rule 1 match destination-address 0.0.0.0/0

set security nat source rule-set 1 rule 1 then source-nat interface

set security nat source rule-set 2 from zone trust

set security nat source rule-set 2 to zone isp2

set security nat source rule-set 2 rule 2 match source-address 0.0.0.0/0

set security nat source rule-set 2 rule 2 match destination-address 0.0.0.0/0

set security nat source rule-set 2 rule 2 then source-nat interface

set security nat destination pool test address 172.16.10.2/32

set security nat destination pool test address port 23

set security nat destination pool test_web address 172.16.10.2/32

set security nat destination pool test_web address port 8080

set security nat destination rule-set 1 from zone isp2

set security nat destination rule-set 1 rule 1 match destination-address 10.10.10.2/32

set security nat destination rule-set 1 rule 1 match destination-port 23

set security nat destination rule-set 1 rule 1 then destination-nat pool test

set security nat destination rule-set 2 from zone untrust

set security nat destination rule-set 2 rule 2 match destination-address 1.1.1.2/32

set security nat destination rule-set 2 rule 2 match destination-port 8080

set security nat destination rule-set 2 rule 2 then destination-nat pool test_web

實驗驗證:

1.測試聯通線路NAT端口。實驗環境就用telnet的23號端口作測試。從2.2.2.2上telnet 10.10.10.2 23端口登陸到了server:

23端口.png

查看10.10.10.2上的NAT HIT:

hit數.png

nat裝換成功。

查看10.10.10.2上的會話:

回話.png

2.測試電信線路8080端口,用web代替。遠端pc瀏覽器輸入1.1.1.2端口8080跳轉到了server的web管理界面:

web.png

web管理.png


正常的業務流量就經過電線的ip出去:

正常.png

老司機們常常會提到一個問題,就是xx環境不太好,考慮到實際狀況下運營商物理線路不多會出問題,後續針對500和433端口會作一些SRX上面的rpm實驗,進而更加優化主備***和地址映射等相關功能。

相關文章
相關標籤/搜索