關於H3C的路由器、交換機基礎理論知識,能夠參看博文:H3C產品簡介及基礎配置命令node
該拓撲圖中的校園網內部分爲兩個網段:一個爲學生校舍網段(192.168.2.0),主要訪問電信提供的internet服務器;另一個網段爲校園辦公和教學用網段(192.168.3.0),主要訪問教育網。校園網出口路由器鏈接了電信提供的internet20m光纖,同時也鏈接了教育網的20m光纖(因爲H3C的模擬器沒法模擬出PC和server,因此只好使用路由器來代替了)。服務器
本次案例使用的模擬器是H3C Cloud Lab,網盤連接:連接:https://pan.baidu.com/s/1MK-nw5MpkroXvhf-kFgG3w
提取碼:xfup session
(1)路由器配置要求:當其中任意一條外部光纖中斷時,另外一條光纖可備份其下屬的網段訪問internet服務或教育網資源。
(2)Nat配置要求:出口路由器的兩個出口都能同時使用校園內網的私有網段作nat後訪問外部資源。教育網出口接口處還配置了nat server,使內部的教學網段的某個ip服務器對教育網提供telnet訪問服務。
(3)策略路由配置要求:校園網內的教學用網段192.168.3.0/24主要經過教育網訪問外部資源,而校舍網段192.168.2.0/24主要經過電信出口訪問Internet資源。當教育專網的光纖故障時,校舍網段能夠經過電信出口訪問相關教育網資源,當電信的光纖線路故障時,校舍網段能夠經過專網出口訪問相關資源。app
PC1的配置:tcp
Automatic configuration is running, press CTRL_D to break. //每一個設備開機時,都需使用組合鍵Ctrl+D纔可進行配置 [PC1]int g0/0 [PC1-GigabitEthernet0/0]ip add 192.168.2.100 255.255.255.0 [PC1-GigabitEthernet0/0]undo shutdown [PC1-GigabitEthernet0/0]quit [PC1]ip route-static 0.0.0.0 0.0.0.0 192.168.2.1 //配置默認路由(網關)
PC2的配置:ide
[PC2]int g0/0 [PC2-GigabitEthernet0/0]ip add 192.168.3.100 255.255.255.0 [PC2-GigabitEthernet0/0]undo shutdown [PC2-GigabitEthernet0/0]quit [PC2]ip route-static 0.0.0.0 0.0.0.0 192.168.3.1
server的配置:oop
[server]int g0/0 [server-GigabitEthernet0/0]ip add 192.168.3.250 255.255.255.0 [server-GigabitEthernet0/0]undo shutdown [server-GigabitEthernet0/0]quit [server]ip route-static 0.0.0.0 0.0.0.0 192.168.3.1
SW1的配置:測試
[sw1]vlan 2 [sw1-vlan2]vlan 3 //建立vlan二、vlan3 [sw1-vlan3]quit [sw1]int vlan 1 [sw1-Vlan-interface1]ip add 192.168.1.2 255.255.255.0 [sw1-Vlan-interface1]undo shutdown [sw1-Vlan-interface1]int vlan 2 [sw1-Vlan-interface2]ip add 192.168.2.1 255.255.255.0 [sw1-Vlan-interface2]undo shutdown [sw1-Vlan-interface2]int vlan 3 [sw1-Vlan-interface3]ip add 192.168.3.1 255.255.255.0 [sw1-Vlan-interface3]undo shutdown [sw1-Vlan-interface3]int g1/0/6 [sw1-GigabitEthernet1/0/6]port access vlan 2 [sw1-GigabitEthernet1/0/6]int g1/0/7 [sw1-GigabitEthernet1/0/7]port access vlan 3 [sw1-GigabitEthernet1/0/7]int g1/0/8 [sw1-GigabitEthernet1/0/8]port access vlan 3 //將接口加入指定vlan中
R1的配置:ui
[R1]int g0/0 [R1-GigabitEthernet0/0]ip add 202.202.202.2 255.255.255.252 [R1-GigabitEthernet0/0]undo shutdown [R1-GigabitEthernet0/0]int g0/1 [R1-GigabitEthernet0/1]ip add 200.200.200.2 29 //子網掩碼也支持數值 [R1-GigabitEthernet0/1]undo shutdown [R1-GigabitEthernet0/1]int g0/2 [R1-GigabitEthernet0/2]port link-mode bridge //將接口改成bridge類型 //全部接口默認屬於vlan1,因此至關於G0/2的接口IP已是vlan 1的IP地址了 [R1-GigabitEthernet0/2]int vlan 1 [R1-Vlan-interface1]ip add 192.168.1.1 24 [R1-Vlan-interface1]undo shutdown
R2的配置:code
[R2]int g0/0 [R2-GigabitEthernet0/0]ip add 202.202.202.1 30 [R2-GigabitEthernet0/0]undo shutdown [R2-GigabitEthernet0/0]int g0/1 [R2-GigabitEthernet0/1]ip add 222.222.222.1 30 [R2-GigabitEthernet0/1]undo shutdown [R2-GigabitEthernet0/1]int loop 0 [R2-LoopBack0]ip add 202.202.0.1 32
R3的配置:
[R3]int g0/0 [R3-GigabitEthernet0/0]ip add 222.222.222.2 30 [R3-GigabitEthernet0/0]undo shutdown [R3-GigabitEthernet0/0]int g0/1 [R3-GigabitEthernet0/1]ip add 200.200.200.1 29 [R3-GigabitEthernet0/1]undo shutdown [R3-GigabitEthernet0/1]int g0/2 [R3-GigabitEthernet0/2]ip add 202.1.1.1 24 [R3-GigabitEthernet0/2]undo shutdown
PC3的配置:
[pc3]int g0/0 [pc3-GigabitEthernet0/0]ip add 202.1.1.2 24 [pc3-GigabitEthernet0/0]undo shutdown [pc3-GigabitEthernet0/0]quit [pc3]ip route-static 0.0.0.0 0.0.0.0 202.1.1.1
sw1配置默認路由:
[sw1]ip route-static 0.0.0.0 0.0.0.0 192.168.1.1 //配置一條默認路由指向R1
R1配置靜態路由和ospf:
[R1]ip route-static 192.168.3.0 255.255.255.0 192.168.1.2 [R1]ip route-static 192.168.2.0 255.255.255.0 192.168.1.2 [R1]ospf 1 [R1-ospf-1]area 0 [R1-ospf-1-area-0.0.0.0]net 0.0.0.0 255.255.255.255
R2配置ospf:
[R2]ospf 1 [R2-ospf-1]area 0 [R2-ospf-1-area-0.0.0.0]net 0.0.0.0 255.255.255.255
R3配置ospf:
[R3]ospf 1 [R3-ospf-1]area 0 [R3-ospf-1-area-0.0.0.0]net 0.0.0.0 255.255.255.255
R1的配置NAT:
[R1]acl basic 2001 //建立ACL,編號爲2001 [R1-acl-ipv4-basic-2001]rule 0 permit source 192.168.2.0 0.0.0.255 [R1-acl-ipv4-basic-2001]rule 5 permit source 192.168.3.0 0.0.0.255 [R1-acl-ipv4-basic-2001]rule 10 deny [R1-acl-ipv4-basic-2001]int g0/0 [R1-GigabitEthernet0/0]port link-mode route [R1-GigabitEthernet0/0]description link_to_tel [R1-GigabitEthernet0/0]nat outbound 2001 [R1-GigabitEthernet0/0]int g0/1 [R1-GigabitEthernet0/1]port link-mode route [R1-GigabitEthernet0/1]description link_to_end [R1-GigabitEthernet0/1]nat outbound 2001 //將ACL應用到兩個出接口上,匹配到ACL2001的,都進行nat轉換
驗證PC1是否可以ping通R2路由器上的loopback接口地址:
驗證PC1是否可以ping通PC3:
在R1路由器查看NAT轉換表:
[R1]display nat session verbose Slot 0: Initiator: Source IP/port: 192.168.2.100/44032 //源地址是192.168.2.100 Destination IP/port: 202.202.0.1/2048 //目標地址是202.202.0.1 DS-Lite tunnel peer: - instance/VLAN ID/VLL ID: -/-/- Protocol: ICMP(1) Inbound interface: Vlan-interface1 Responder: Source IP/port: 202.202.0.1/3 //202.202.0.1的返回流量 Destination IP/port: 202.202.202.2/0 //200.200.200.2接口進入內網 DS-Lite tunnel peer: - instance/VLAN ID/VLL ID: -/-/- Protocol: ICMP(1) Inbound interface: GigabitEthernet0/0 State: ICMP_REPLY Application: OTHER Start time: 2019-10-29 07:48:16 TTL: 28s Initiator->Responder: 0 packets 0 bytes Responder->Initiator: 0 packets 0 bytes Initiator: Source IP/port: 192.168.2.100/43776 //源地址是192.168.2.100 Destination IP/port: 202.1.1.2/2048 //目標地址是200.1.1.2 DS-Lite tunnel peer: - instance/VLAN ID/VLL ID: -/-/- Protocol: ICMP(1) Inbound interface: Vlan-interface1 Responder: Source IP/port: 202.1.1.2/3 //202.1.1.2的返回流量 Destination IP/port: 200.200.200.2/0 //200.200.200.2接口進入內網 DS-Lite tunnel peer: - instance/VLAN ID/VLL ID: -/-/- Protocol: ICMP(1) Inbound interface: GigabitEthernet0/1 State: ICMP_REPLY Application: OTHER Start time: 2019-10-29 07:47:47 TTL: 0s Initiator->Responder: 0 packets 0 bytes Responder->Initiator: 0 packets 0 bytes Total sessions found: 2
R1配置策略路由:
[R1]acl advanced 3001 //定義擴展ACL,編號爲3001 [R1-acl-ipv4-adv-3001]rule 0 permit ip source 192.168.3.0 0.0.0.255 [R1-acl-ipv4-adv-3001]quit [R1]policy-based-route al permit node 10 //配置策略路由 [R1-pbr-al-10]if-match acl 3001 //若是匹配acl 3001 [R1-pbr-al-10]apply next-hop 200.200.200.1 //下一跳指向200.200.200.1 [R1-pbr-al-10]quit [R1]policy-based-route al permit node 20 //空節點,放行其餘流量 [R1-pbr-al-20]quit [R1]int Vlan-interface 1 [R1-Vlan-interface1]ip policy-based-route al //在此接口下應用路由策略,由於須要作策略路由的數據包都是從這個接口下轉發過來的
測試pc1pingpc3,並查看nat轉換表
[R1]display nat session verbose Slot 0: Initiator: Source IP/port: 192.168.2.100/45824 Destination IP/port: 202.1.1.2/2048 DS-Lite tunnel peer: - instance/VLAN ID/VLL ID: -/-/- Protocol: ICMP(1) Inbound interface: Vlan-interface1 Responder: Source IP/port: 202.1.1.2/4 Destination IP/port: 200.200.200.2/0 //注意看這裏 DS-Lite tunnel peer: - instance/VLAN ID/VLL ID: -/-/- Protocol: ICMP(1) Inbound interface: GigabitEthernet0/1 State: ICMP_REPLY Application: OTHER Start time: 2019-10-29 08:01:58 TTL: 27s Initiator->Responder: 0 packets 0 bytes Responder->Initiator: 0 packets 0 bytes Total sessions found: 1
測試pc2pingpc3,並查看nat轉換表
[R1]display nat session verbose Slot 0: Initiator: Source IP/port: 192.168.3.100/43008 Destination IP/port: 202.1.1.2/2048 DS-Lite tunnel peer: - instance/VLAN ID/VLL ID: -/-/- Protocol: ICMP(1) Inbound interface: Vlan-interface1 Responder: Source IP/port: 202.1.1.2/6 Destination IP/port: 200.200.200.2/0 DS-Lite tunnel peer: - instance/VLAN ID/VLL ID: -/-/- Protocol: ICMP(1) Inbound interface: GigabitEthernet0/1 State: ICMP_REPLY Application: OTHER Start time: 2019-10-29 08:04:55 TTL: 27s Initiator->Responder: 0 packets 0 bytes Responder->Initiator: 0 packets 0 bytes Total sessions found: 1
能夠看到策略路由已經生效了,而且如今關閉R1路由器的G0/0和G0/1中的任何一個接口,都不會影響內網與外網的通訊,可自行測試。
R1配置NAT server:
[R1]int g0/1 [R1-GigabitEthernet0/1]nat server protocol tcp global 200.200.200.2 23 inside 192.168.3.250 23 //配置NAT映射,將內部的服務器192.168.3.250的23端口映射到全局地址200.200.200.2的23端口上
server開啓Telnet:
[server]telnet server enable //默認就是開啓,能夠省略 [server]local-user admin //建立本地用戶admin New local user added. [server-luser-manage-admin]password simple benet //配置明文密碼「benet」 [server-luser-manage-admin]service-type telnet //指定服務類型爲telnet [server-luser-manage-admin]authorization-attribute user-role level-3 //指定命令級別爲3 [server-luser-manage-admin]quit [server]user-interface vty 0 4 //進入vty線路 [server-line-vty0-4]authentication-mode scheme //配置用戶的認證方式 [server-line-vty0-4]protocol inbound telnet //支持telnet [server-line-vty0-4]quit
PC3開始測試telnet server:
<pc3>Telnet 200.200.200.2 //注意是在用戶視圖下 //測試使用server映射出的外部地址(也就是路由器的接口地址) Trying 200.200.200.2 ... Press CTRL+K to abort Connected to 200.200.200.2 ... ****************************************************************************** * Copyright (c) 2004-2014 Hangzhou H3C Tech. Co., Ltd. All rights reserved. * * Without the owner's prior written consent, * * no decompiling or reverse-engineering shall be allowed. * ****************************************************************************** login: admin Password: <server> //登陸成功
———————— 本文至此結束,感謝閱讀 ————————