• 全部
  • 经验案例
  • 典型配置
  • 技术公告
  • FAQ
  • 漏洞说明
  • 全部
  • 全部
  • 大数据引擎
  • 知了引擎
产品线
搜索
取消
案例类型
发布者
是否解决
是否官方
时间
搜索引擎
匹配模式
高级搜索

这些华为的命令翻译成华三的是哪些命令

2022-08-30提问
  • 0关注
  • 0收藏,1301浏览
粉丝:0人 关注:43人

问题描述:

# acl number 3000 rule 5 permit ip source 192.168.24.0 0.0.0.255 rule 10 permit ip source 192.168.29.0 0.0.0.255 rule 15 permit ip source 192.168.30.0 0.0.0.255 rule 20 permit ip source 192.168.31.0 0.0.0.255 rule 25 permit ip source 192.168.32.0 0.0.0.255 rule 30 permit ip source 192.168.33.0 0.0.0.255 rule 35 permit ip source 192.168.36.0 0.0.0.255 rule 40 permit ip source 192.168.37.0 0.0.0.255 rule 45 permit ip source 192.168.38.0 0.0.0.255 acl number 3001 rule 5 permit ip destination 192.168.0.0 0.0.0.255 rule 6 permit ip destination 192.168.24.0 0.0.0.255 rule 9 permit ip source 192.168.60.0 0.0.0.255 destination 192.168.100.0 0.0.0.255 rule 10 permit ip source 192.168.90.0 0.0.0.255 destination 192.168.100.0 0.0.0.255 rule 11 permit ip source 192.168.46.0 0.0.0.255 destination 192.168.70.0 0.0.0.255 rule 12 permit ip source 192.168.70.0 0.0.0.255 destination 192.168.46.0 0.0.0.255 rule 13 permit ip destination 192.168.46.0 0.0.0.255 rule 14 permit ip destination 192.168.51.0 0.0.0.255 rule 15 permit ip destination 192.168.53.0 0.0.0.255 rule 16 permit ip source 192.168.51.0 0.0.0.255 destination 192.168.70.0 0.0.0.255 rule 17 permit ip source 192.168.53.0 0.0.0.255 destination 192.168.70.0 0.0.0.255 rule 18 permit ip destination 192.168.21.0 0.0.0.255 rule 100 deny ip destination 192.168.0.0 0.0.255.255 acl number 3002 rule 4 permit ip destination 192.168.0.41 0 rule 5 permit ip destination 192.168.0.13 0 rule 10 permit ip destination 192.168.0.24 0 rule 15 permit ip destination 192.168.0.1 0 rule 30 permit ip destination 192.168.0.10 0 rule 35 permit ip destination 192.168.0.205 0 rule 40 permit ip destination 192.168.0.200 0 rule 45 permit ip destination 192.168.0.201 0 rule 50 permit ip destination 192.168.0.202 0 rule 55 permit ip destination 192.168.0.203 0 rule 60 permit ip destination 192.168.0.204 0 rule 65 permit ip destination 192.168.0.210 0 rule 70 permit ip destination 192.168.0.211 0 rule 75 permit ip destination 192.168.0.212 0 rule 80 permit ip destination 192.168.0.213 0 rule 85 permit ip destination 192.168.0.214 0 rule 90 permit ip destination 192.168.0.207 0 rule 95 permit ip destination 192.168.0.208 0 rule 96 permit ip destination 192.168.0.209 0 rule 97 permit ip destination 192.168.0.18 0 rule 98 permit ip destination 192.168.0.215 0 rule 99 permit ip destination 192.168.0.216 0 rule 100 permit ip destination 192.168.24.0 0.0.0.255 rule 105 permit ip destination 192.168.29.0 0.0.0.255 rule 110 permit ip destination 192.168.30.0 0.0.0.255 rule 115 permit ip destination 192.168.31.0 0.0.0.255 rule 120 permit ip destination 192.168.32.0 0.0.0.255 rule 125 permit ip destination 192.168.33.0 0.0.0.255 rule 130 permit ip destination 192.168.36.0 0.0.0.255 rule 135 permit ip destination 192.168.37.0 0.0.0.255 rule 140 permit ip destination 192.168.38.0 0.0.0.255 rule 145 deny ip destination 192.168.0.0 0.0.255.255 acl number 3003 rule 5 deny ip source 192.168.62.0 0.0.0.255 destination 192.168.100.0 0.0.0.255 rule 6 deny ip source 192.168.62.0 0.0.0.255 destination 192.168.0.0 0.0.0.255 rule 10 permit ip # traffic classifier c1 operator and precedence 5 if-match acl 3000 traffic classifier vlan2 operator or precedence 10 if-match acl 3001 traffic classifier vlan28 operator or precedence 15 if-match acl 3002 # traffic behavior b1 permit redirect ip-nexthop 192.168.0.205 traffic behavior vlan2 permit statistic enable traffic behavior vlan28 permit statistic enable # traffic policy p1 match-order auto classifier c1 behavior b1 traffic policy vlan2 match-order auto classifier vlan2 behavior vlan2 traffic policy vlan28 match-order auto classifier vlan28 behavior vlan28 # drop-profile default # vlan 2 traffic-policy vlan2 inbound vlan 3 traffic-policy vlan2 inbound vlan 4 traffic-policy vlan2 inbound vlan 5 traffic-policy vlan2 inbound vlan 6 traffic-policy vlan2 inbound vlan 7 traffic-policy vlan2 inbound vlan 9 traffic-policy vlan2 inbound vlan 10 traffic-policy vlan2 inbound vlan 11 traffic-policy vlan2 inbound vlan 12 traffic-policy vlan2 inbound vlan 13 traffic-policy vlan2 inbound vlan 14 traffic-policy vlan2 inbound vlan 15 traffic-policy vlan2 inbound vlan 16 traffic-policy vlan2 inbound vlan 17 traffic-policy vlan2 inbound vlan 18 traffic-policy vlan2 inbound vlan 20 traffic-policy vlan2 inbound vlan 21 traffic-policy vlan2 inbound vlan 22 traffic-policy vlan2 inbound vlan 23 traffic-policy vlan2 inbound vlan 24 traffic-policy vlan2 inbound vlan 25 traffic-policy vlan2 inbound vlan 27 traffic-policy vlan28 inbound vlan 29 traffic-policy vlan2 inbound vlan 30 traffic-policy vlan2 inbound vlan 31 traffic-policy vlan2 inbound vlan 32 traffic-policy vlan2 inbound vlan 34 traffic-policy vlan2 inbound vlan 35 traffic-policy vlan28 inbound vlan 36 traffic-policy vlan28 inbound vlan 37 traffic-policy vlan28 inbound vlan 38 traffic-policy vlan28 inbound vlan 39 traffic-policy vlan2 inbound vlan 40 traffic-policy vlan28 inbound vlan 41 traffic-policy vlan28 inbound vlan 42 traffic-policy vlan28 inbound vlan 51 traffic-policy vlan2 inbound vlan 2000 description Office-F1&F2-OA traffic-policy vlan2 inbound vlan 2001 description Office-JianKong&MenJin&KaoQin traffic-policy vlan2 inbound vlan 2002 description Office-QiLunJi&YePian traffic-policy vlan2 inbound vlan 2003 description Office-ZhuQiFa&FaDianJi traffic-policy vlan2 inbound vlan 2004 description Office-WLAN traffic-policy vlan2 inbound vlan 2005 description Office-IP-Phone traffic-policy vlan2 inbound vlan 2006 description GYYW-JiChuang&KongzhiDuan traffic-policy vlan2 inbound vlan 2022 description GuanLi traffic-policy vlan2 inbound # interface GigabitEthernet6/0/37 port hybrid tagged vlan 1 to 4094 traffic-policy p1 inbound # interface XGigabitEthernet4/0/13 description TO-BZZJF-WLAN-AC-01 port link-type trunk port trunk allow-pass vlan 2011 to 2012 traffic-filter inbound acl 3003 # port-group 1 group-member GigabitEthernet6/0/36 group-member GigabitEthernet6/0/37 group-member GigabitEthernet6/0/38 group-member GigabitEthernet6/0/39 group-member GigabitEthernet6/0/40 group-member GigabitEthernet6/0/41 group-member GigabitEthernet6/0/42 group-member GigabitEthernet6/0/43 group-member GigabitEthernet6/0/44 group-member GigabitEthernet6/0/45 group-member GigabitEthernet6/0/46 group-member GigabitEthernet6/0/47 # port-group 2 group-member GigabitEthernet2/0/36 group-member GigabitEthernet2/0/37 group-member GigabitEthernet2/0/38 group-member GigabitEthernet2/0/39 group-member GigabitEthernet2/0/40 group-member GigabitEthernet2/0/41 group-member GigabitEthernet2/0/42 group-member GigabitEthernet2/0/43 group-member GigabitEthernet2/0/44 group-member GigabitEthernet2/0/45 #

组网及组网描述:


3 个回答
粉丝:226人 关注:0人

您好,基本都类似,你可以整合一下格式,这个太乱了

粉丝:111人 关注:1人

看配置就是聚合 vlan  acl以及包过滤的配置。

基本华三华为都是一样的

我发下面了

zhiliao_DeeeBD 发表时间:2022-08-30
粉丝:0人 关注:43人

#
acl number 3000
rule 5 permit ip source 192.168.24.0 0.0.0.255
rule 10 permit ip source 192.168.29.0 0.0.0.255
rule 15 permit ip source 192.168.30.0 0.0.0.255
rule 20 permit ip source 192.168.31.0 0.0.0.255
rule 25 permit ip source 192.168.32.0 0.0.0.255
rule 30 permit ip source 192.168.33.0 0.0.0.255
rule 35 permit ip source 192.168.36.0 0.0.0.255
rule 40 permit ip source 192.168.37.0 0.0.0.255
rule 45 permit ip source 192.168.38.0 0.0.0.255
acl number 3001
rule 5 permit ip destination 192.168.0.0 0.0.0.255
rule 6 permit ip destination 192.168.24.0 0.0.0.255
rule 9 permit ip source 192.168.60.0 0.0.0.255 destination 192.168.100.0 0.0.0.255
rule 10 permit ip source 192.168.90.0 0.0.0.255 destination 192.168.100.0 0.0.0.255
rule 11 permit ip source 192.168.46.0 0.0.0.255 destination 192.168.70.0 0.0.0.255
rule 12 permit ip source 192.168.70.0 0.0.0.255 destination 192.168.46.0 0.0.0.255
rule 13 permit ip destination 192.168.46.0 0.0.0.255
rule 14 permit ip destination 192.168.51.0 0.0.0.255
rule 15 permit ip destination 192.168.53.0 0.0.0.255
rule 16 permit ip source 192.168.51.0 0.0.0.255 destination 192.168.70.0 0.0.0.255
rule 17 permit ip source 192.168.53.0 0.0.0.255 destination 192.168.70.0 0.0.0.255
rule 18 permit ip destination 192.168.21.0 0.0.0.255
rule 100 deny ip destination 192.168.0.0 0.0.255.255
acl number 3002
rule 4 permit ip destination 192.168.0.41 0
rule 5 permit ip destination 192.168.0.13 0
rule 10 permit ip destination 192.168.0.24 0
rule 15 permit ip destination 192.168.0.1 0
rule 30 permit ip destination 192.168.0.10 0
rule 35 permit ip destination 192.168.0.205 0
rule 40 permit ip destination 192.168.0.200 0
rule 45 permit ip destination 192.168.0.201 0
rule 50 permit ip destination 192.168.0.202 0
rule 55 permit ip destination 192.168.0.203 0
rule 60 permit ip destination 192.168.0.204 0
rule 65 permit ip destination 192.168.0.210 0
rule 70 permit ip destination 192.168.0.211 0
rule 75 permit ip destination 192.168.0.212 0
rule 80 permit ip destination 192.168.0.213 0
rule 85 permit ip destination 192.168.0.214 0
rule 90 permit ip destination 192.168.0.207 0
rule 95 permit ip destination 192.168.0.208 0
rule 96 permit ip destination 192.168.0.209 0
rule 97 permit ip destination 192.168.0.18 0
rule 98 permit ip destination 192.168.0.215 0
rule 99 permit ip destination 192.168.0.216 0
rule 100 permit ip destination 192.168.24.0 0.0.0.255
rule 105 permit ip destination 192.168.29.0 0.0.0.255
rule 110 permit ip destination 192.168.30.0 0.0.0.255
rule 115 permit ip destination 192.168.31.0 0.0.0.255
rule 120 permit ip destination 192.168.32.0 0.0.0.255
rule 125 permit ip destination 192.168.33.0 0.0.0.255
rule 130 permit ip destination 192.168.36.0 0.0.0.255
rule 135 permit ip destination 192.168.37.0 0.0.0.255
rule 140 permit ip destination 192.168.38.0 0.0.0.255
rule 145 deny ip destination 192.168.0.0 0.0.255.255
acl number 3003
rule 5 deny ip source 192.168.62.0 0.0.0.255 destination 192.168.100.0 0.0.0.255
rule 6 deny ip source 192.168.62.0 0.0.0.255 destination 192.168.0.0 0.0.0.255
rule 10 permit ip
#
traffic classifier c1 operator and precedence 5
if-match acl 3000
traffic classifier vlan2 operator or precedence 10
if-match acl 3001
traffic classifier vlan28 operator or precedence 15
if-match acl 3002
#
traffic behavior b1
permit
redirect ip-nexthop 192.168.0.205
traffic behavior vlan2
permit
statistic enable
traffic behavior vlan28
permit
statistic enable
#
traffic policy p1 match-order auto
classifier c1 behavior b1
traffic policy vlan2 match-order auto
classifier vlan2 behavior vlan2
traffic policy vlan28 match-order auto
classifier vlan28 behavior vlan28
#
drop-profile default
#
vlan 2
traffic-policy vlan2 inbound
vlan 3
traffic-policy vlan2 inbound
vlan 4
traffic-policy vlan2 inbound
vlan 5
traffic-policy vlan2 inbound
vlan 6
traffic-policy vlan2 inbound
vlan 7
traffic-policy vlan2 inbound
vlan 9
traffic-policy vlan2 inbound
vlan 10
traffic-policy vlan2 inbound
vlan 11
traffic-policy vlan2 inbound
vlan 12
traffic-policy vlan2 inbound
vlan 13
traffic-policy vlan2 inbound
vlan 14
traffic-policy vlan2 inbound
vlan 15
traffic-policy vlan2 inbound
vlan 16
traffic-policy vlan2 inbound
vlan 17
traffic-policy vlan2 inbound
vlan 18
traffic-policy vlan2 inbound
vlan 20
traffic-policy vlan2 inbound
vlan 21
traffic-policy vlan2 inbound
vlan 22
traffic-policy vlan2 inbound
vlan 23
traffic-policy vlan2 inbound
vlan 24
traffic-policy vlan2 inbound
vlan 25
traffic-policy vlan2 inbound
vlan 27
traffic-policy vlan28 inbound
vlan 29
traffic-policy vlan2 inbound
vlan 30
traffic-policy vlan2 inbound
vlan 31
traffic-policy vlan2 inbound
vlan 32
traffic-policy vlan2 inbound
vlan 34
traffic-policy vlan2 inbound
vlan 35
traffic-policy vlan28 inbound
vlan 36
traffic-policy vlan28 inbound
vlan 37
traffic-policy vlan28 inbound
vlan 38
traffic-policy vlan28 inbound
vlan 39
traffic-policy vlan2 inbound
vlan 40
traffic-policy vlan28 inbound
vlan 41
traffic-policy vlan28 inbound
vlan 42
traffic-policy vlan28 inbound
vlan 51
traffic-policy vlan2 inbound
vlan 2000
description Office-F1&F2-OA
traffic-policy vlan2 inbound
vlan 2001
description Office-JianKong&MenJin&KaoQin
traffic-policy vlan2 inbound
vlan 2002
description Office-QiLunJi&YePian
traffic-policy vlan2 inbound
vlan 2003
description Office-ZhuQiFa&FaDianJi
traffic-policy vlan2 inbound
vlan 2004
description Office-WLAN
traffic-policy vlan2 inbound
vlan 2005
description Office-IP-Phone
traffic-policy vlan2 inbound
vlan 2006
description GYYW-JiChuang&KongzhiDuan
traffic-policy vlan2 inbound
vlan 2022
description GuanLi
traffic-policy vlan2 inbound
#
interface GigabitEthernet6/0/37
port hybrid tagged vlan 1 to 4094
traffic-policy p1 inbound
#
interface XGigabitEthernet4/0/13
description TO-BZZJF-WLAN-AC-01
port link-type trunk
port trunk allow-pass vlan 2011 to 2012
traffic-filter inbound acl 3003
#
port-group 1
group-member GigabitEthernet6/0/36
group-member GigabitEthernet6/0/37
group-member GigabitEthernet6/0/38
group-member GigabitEthernet6/0/39
group-member GigabitEthernet6/0/40
group-member GigabitEthernet6/0/41
group-member GigabitEthernet6/0/42
group-member GigabitEthernet6/0/43
group-member GigabitEthernet6/0/44
group-member GigabitEthernet6/0/45
group-member GigabitEthernet6/0/46
group-member GigabitEthernet6/0/47
#
port-group 2
group-member GigabitEthernet2/0/36
group-member GigabitEthernet2/0/37
group-member GigabitEthernet2/0/38
group-member GigabitEthernet2/0/39
group-member GigabitEthernet2/0/40
group-member GigabitEthernet2/0/41
group-member GigabitEthernet2/0/42
group-member GigabitEthernet2/0/43
group-member GigabitEthernet2/0/44
group-member GigabitEthernet2/0/45
#

编辑答案

你正在编辑答案

如果你要对问题或其他回答进行点评或询问,请使用评论功能。

分享扩散:

提出建议

    +

亲~登录后才可以操作哦!

确定

亲~检测到您登陆的账号未在http://hclhub.h3c.com进行注册

注册后可访问此模块

跳转hclhub

你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作

举报

×

侵犯我的权益 >
对根叔社区有害的内容 >
辱骂、歧视、挑衅等(不友善)

侵犯我的权益

×

泄露了我的隐私 >
侵犯了我企业的权益 >
抄袭了我的内容 >
诽谤我 >
辱骂、歧视、挑衅等(不友善)
骚扰我

泄露了我的隐私

×

您好,当您发现根叔知了上有泄漏您隐私的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您认为哪些内容泄露了您的隐私?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)

侵犯了我企业的权益

×

您好,当您发现根叔知了上有关于您企业的造谣与诽谤、商业侵权等内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到 pub.zhiliao@h3c.com 邮箱,我们会在审核后尽快给您答复。
  • 1. 您举报的内容是什么?(请在邮件中列出您举报的内容和链接地址)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
  • 3. 是哪家企业?(营业执照,单位登记证明等证件)
  • 4. 您与该企业的关系是?(您是企业法人或被授权人,需提供企业委托授权书)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

抄袭了我的内容

×

原文链接或出处

诽谤我

×

您好,当您发现根叔知了上有诽谤您的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您举报的内容以及侵犯了您什么权益?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

对根叔社区有害的内容

×

垃圾广告信息
色情、暴力、血腥等违反法律法规的内容
政治敏感
不规范转载 >
辱骂、歧视、挑衅等(不友善)
骚扰我
诱导投票

不规范转载

×

举报说明