防火墙链路聚合有配置手册吗 防火墙到核心做链路聚合是trunk 还是access啊
(0)
(0)
如果防火墙是透明部署,需要透传多个vlan,那就用trunk口,如果是作三层使用,建议使用三层链路聚合或者access口。
配置如下:
通过将Device A与Device B之间的链路进行聚合,有利于设备间通信链路的相互备份和增加通信带宽。
图1-6 二层动态聚合配置组网图
Device B的配置与Device A相似,下面仅以Device A为例。
(1) 配置以太网接口的工作模式
# 使接口GigabitEthernet1/0/1至GigabitEthernet1/0/4工作在二层模式下。
<DeviceA> system-view
[DeviceA] interface range gigabitethernet 1/0/1 to gigabitethernet 1/0/4
[DeviceA-if-range] port link-mode bridge
[DeviceA-if-range] quit
(2) 配置VLAN
# 创建VLAN 10,并将端口GigabitEthernet1/0/4加入到VLAN 10中。
[DeviceA] vlan 10
[DeviceA-vlan10] port gigabitethernet 1/0/4
[DeviceA-vlan10] quit
(3) 配置二层动态聚合
# 创建二层聚合接口1为Trunk端口,允许VLAN 1和10的报文通过,并配置该接口为动态聚合模式。
[DeviceA] interface bridge-aggregation 1
[DeviceA-Bridge-Aggregation1] port link-type trunk
[DeviceA-Bridge-Aggregation1] port trunk permit vlan 1 10
[DeviceA-Bridge-Aggregation1] link-aggregation mode dynamic
[DeviceA-Bridge-Aggregation1] quit
# 将端口GigabitEthernet1/0/1至GigabitEthernet1/0/3加入到聚合组1中。
[DeviceA] interface range gigabitethernet 1/0/1 to gigabitethernet 1/0/3
[DeviceA-if-range] port link-aggregation group 1
[DeviceA-if-range] quit
(4) 配置以太网接口的链路类型
# 配置GigabitEthernet1/0/1至GigabitEthernet1/0/3为Trunk端口,并允许VLAN 1和VLAN 10的报文通过。
[DeviceA] interface range gigabitethernet 1/0/1 to gigabitethernet 1/0/3
[DeviceA-if-range] port link-type trunk
[DeviceA-if-range] port trunk permit vlan 1 10
[DeviceA-if-range] quit
(5) 配置接口加入安全域
# 请根据组网图中规划的信息,将接口加入对应的安全域,具体配置步骤如下。
[DeviceA] security-zone name trust
[Device-security-zone-Trust] import interface gigabitethernet 1/0/4 vlan 10
[Device-security-zone-Trust] quit
[DeviceA] security-zone name untrust
[Device-security-zone-Untrust] import interface bridge-aggregation 1 vlan 1 10
[Device-security-zone-Untrust] quit
(6) 配置安全策略
配置安全策略放行trust与untrust安全域之间的流量,用于设备之间的互通。
# 配置名称为trust-untrust的安全策略,使trust的安全域到untrust的安全域的报文可通。
[DeviceA] security-policy ip
[DeviceA-security-policy-ip] rule name trust-untrust
[DeviceA-security-policy-ip-0-trust-untrust] action pass
[DeviceA-security-policy-ip-0-trust-untrust] source-zone trust
[DeviceA-security-policy-ip-0-trust-untrust] destination-zone untrust
[DeviceA-security-policy-ip-0-trust-untrust] quit
[DeviceA-security-policy-ip] quit
# 配置名称为untrust-trust的安全策略,使untrust的安全域到trust的安全域的报文可通。
[DeviceA] security-policy ip
[DeviceA-security-policy-ip] rule name untrust-trust
[DeviceA-security-policy-ip-1-untrust-trust] action pass
[DeviceA-security-policy-ip-1-untrust-trust] source-zone untrust
[DeviceA-security-policy-ip-1-untrust-trust] destination-zone trust
[DeviceA-security-policy-ip-1-untrust-trust] quit
[DeviceA-security-policy-ip] quit
# 查看Device A上所有聚合组的详细信息。
[DeviceA] display link-aggregation verbose
Loadsharing Type: Shar -- Loadsharing, NonS -- Non-Loadsharing
Port Status: S -- Selected, U -- Unselected, I -- Individual
Port: A -- Auto port
Flags: A -- LACP_Activity, B -- LACP_Timeout, C -- Aggregation,
D -- Synchronization, E -- Collecting, F -- Distributing,
G -- Defaulted, H -- Expired
Aggregate Interface: Bridge-Aggregation1
Creation Mode: Manual
Aggregation Mode: Dynamic
Loadsharing Type: Shar
System ID: 0x8000, 000f-e267-6c6a
Local:
Port Status Priority Oper-Key Flag
--------------------------------------------------------------------------------
GE1/0/1 S 32768 1 {ACDEF}
GE1/0/2 S 32768 1 {ACDEF}
GE1/0/3 S 32768 1 {ACDEF}
Remote:
Actor Partner Priority Oper-Key SystemID Flag
--------------------------------------------------------------------------------
GE1/0/1 1 32768 1 0x8000, 000f-e267-57ad {ACDEF}
GE1/0/2 2 32768 1 0x8000, 000f-e267-57ad {ACDEF}
GE1/0/3 3 32768 1 0x8000, 000f-e267-57ad {ACDEF}
以上信息表明,聚合组1为负载分担类型的二层动态聚合组,包含有三个选中端口。
(0)
暂无评论
1、防火墙链路聚合配置:
https://www.h3c.com/cn/d_202206/1632938_30005_0.htm
2、如果是防火墙做出口,建议access,因为网关都在核心交换机,当然trunk也行,但是没必要
(0)
暂无评论
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
暂无评论