问题描述:
我已经升级了F100-C-G2的版本,现在也可以登录到console口,我对照之前导出的配置,发现用户信息丢失,而且公网内网都无法连接。配置了内网的IP也不行。试着创建用户提示
我怎么能把之前导出的配置导回去,还有不知道为什么网络配置应该没有变动,就是连不上去了。。ping都不通。
组网及组网描述:
[H3C]dis cur
#
version 7.1.064, Release 9560P28
#
sysname H3C
#
clock timezone Beijing add 08:00:00
clock protocol none
#
context Admin id 1
#
ip vpn-instance management
route-distinguisher 1000000000:1
vpn-target 1000000000:1 import-extcommunity
vpn-target 1000000000:1 export-extcommunity
#
telnet server enable
#
irf mac-address persistent timer
irf auto-update enable
undo irf link-delay
irf member 1 priority 1
#
security-zone intra-zone default permit
---- More ----%May 5 11:45:38:297 2023 H3C SECP/4/SECP_ACCELERATE_UNK_ERR: Failed to accelerate IPv4 security-policy.
#
nat alg h323
nat alg ils
nat alg mgcp
nat alg nbt
nat alg rsh
nat alg sccp
nat alg sip
nat alg sqlnet
[H3C]dis cur
#
version 7.1.064, Release 9560P28
#
sysname H3C
#
clock timezone Beijing add 08:00:00
clock protocol none
#
context Admin id 1
#
ip vpn-instance management
route-distinguisher 1000000000:1
vpn-target 1000000000:1 import-extcommunity
vpn-target 1000000000:1 export-extcommunity
#
telnet server enable
#
irf mac-address persistent timer
irf auto-update enable
undo irf link-delay
irf member 1 priority 1
#
security-zone intra-zone default permit
#
nat alg h323
nat alg ils
nat alg mgcp
nat alg nbt
nat alg rsh
nat alg sccp
nat alg sip
nat alg sqlnet
nat alg tftp
nat alg xdmcp
#
password-recovery enable
#
vlan 1
#
policy-based-route permit node 11
if-match acl 3888
apply next-hop 117.122.225.129
#
policy-based-route permit node 12
if-match acl 3888
apply next-hop 117.122.225.129
#
policy-based-route permit node 20
if-match acl 3004
apply next-hop 117.122.211.193 direct
#
controller Cellular1/0/0
#
controller Cellular1/0/1
#
interface NULL0
#
interface GigabitEthernet1/0/0
port link-mode route
combo enable fiber
ip binding vpn-instance management
ip address 192.168.0.1 255.255.255.0
#
interface GigabitEthernet1/0/1
port link-mode route
combo enable fiber
mtu 1400
tcp mss 1024
#
interface GigabitEthernet1/0/2
port link-mode route
ip binding vpn-instance management
#
interface GigabitEthernet1/0/3
port link-mode route
#
interface GigabitEthernet1/0/4
port link-mode route
mtu 1400
ip address 106.120.65.180 255.255.255.240
tcp mss 1024
ip last-hop hold
nat outbound 3333
nat server protocol tcp global 106.120.65.180 3200 inside 192.168.100.112 3200 rule ServerRule_1
nat server protocol tcp global 106.120.65.180 3201 inside 192.168.100.161 3200 rule ServerRule_2
nat server protocol tcp global 106.120.65.180 3202 inside 192.168.100.149 3200 rule ServerRule_3
nat server protocol tcp global 106.120.65.180 3210 inside 192.168.100.130 3200 rule ServerRule_4
nat server protocol tcp global 106.120.65.180 3220 inside 192.168.100.212 3200 rule ServerRule_5
nat server protocol tcp global 106.120.65.180 3222 inside 192.168.100.35 3200 rule ServerRule_6
nat server protocol tcp global 106.120.65.180 3288 inside 192.168.100.31 3200 rule ServerRule_7
nat server protocol tcp global 106.120.65.180 3299 inside 192.168.100.166 3299 rule ServerRule_8
nat server protocol tcp global 106.120.65.180 3300 inside 192.168.100.112 3300 rule ServerRule_9
nat server protocol tcp global 106.120.65.180 8088 inside 192.168.100.103 8088 rule ServerRule_10
nat server protocol tcp global 106.120.65.180 8308 inside 192.168.100.112 8308 rule ServerRule_11
nat server protocol tcp global 106.120.65.180 8800 inside 192.168.100.130 8800 rule ServerRule_12
nat server protocol tcp global 106.120.65.180 9002 inside 192.168.100.29 9002 rule ServerRule_13
nat server protocol tcp global 106.120.65.180 9999 inside 192.168.100.111 9999 rule ServerRule_14
nat server protocol tcp global 106.120.65.180 11111 inside 192.168.100.111 3389 rule ServerRule_15
nat server protocol tcp global 106.120.65.180 12345 inside 192.168.100.88 3389 rule ServerRule_16
nat server protocol tcp global 106.120.65.180 13389 inside 192.168.100.33 3389 rule ServerRule_17
nat server protocol tcp global 106.120.65.180 18800 inside 192.168.100.212 8800 rule ServerRule_18
nat server protocol tcp global 106.120.65.180 23389 inside 192.168.100.17 3389 rule ServerRule_19
nat server protocol tcp global 106.120.65.180 31171 inside 192.168.100.202 31171 rule ServerRule_20
nat server protocol tcp global 106.120.65.180 31173 inside 192.168.100.202 31173 rule ServerRule_21
nat server protocol tcp global 106.120.65.180 33389 inside 192.168.100.87 3389 rule ServerRule_22
nat server protocol tcp global 106.120.65.180 44300 inside 192.168.100.35 44300 rule ServerRule_23
nat server protocol tcp global 106.120.65.180 50001 inside 192.168.100.23 50001 rule ServerRule_24
nat server protocol tcp global 106.120.65.180 50200 inside 192.168.100.103 50200 rule ServerRule_25
nat server protocol tcp global 106.120.65.180 53122 inside 192.168.100.4 22 rule ServerRule_26
nat server protocol tcp global 106.120.65.180 55535 inside 192.168.100.28 3389 rule ServerRule_27
nat server protocol tcp global 106.120.65.180 58443 inside 192.168.100.200 443 rule ServerRule_28
ipsec apply policy ipsecvpn
#
interface GigabitEthernet1/0/5
port link-mode route
mtu 1300
ip address 123.59.105.46 255.255.255.252
tcp mss 1024
ip last-hop hold
nat outbound
nat static enable
#
interface GigabitEthernet1/0/5.10
#
interface GigabitEthernet1/0/6
port link-mode route
ip address 192.168.100.62 255.255.255.0
tcp mss 1024
nat hairpin enable
#
interface GigabitEthernet1/0/7
port link-mode route
#
interface GigabitEthernet1/0/8
port link-mode route
#
interface GigabitEthernet1/0/9
port link-mode route
#
interface GigabitEthernet1/0/10
port link-mode route
ip address 192.168.200.1 255.255.255.0
#
interface GigabitEthernet1/0/11
port link-mode route
#
interface SSLVPN-AC1
ip address 192.168.101.1 255.255.255.0
#
security-zone name Local
#
security-zone name Trust
import interface GigabitEthernet1/0/6
import interface GigabitEthernet1/0/10
import interface SSLVPN-AC1
#
security-zone name DMZ
#
security-zone name Untrust
import interface GigabitEthernet1/0/4
import interface GigabitEthernet1/0/5
#
security-zone name Management
import interface GigabitEthernet1/0/0
import interface GigabitEthernet1/0/2
#
zone-pair security source Any destination Any
#
zone-pair security source Any destination Local
#
zone-pair security source Local destination Any
#
zone-pair security source Trust destination Trust
#
scheduler logfile size 16
#
line class aux
user-role network-operator
#
line class console
user-role network-admin
#
line class vty
user-role network-operator
#
line aux 0
user-role network-admin
#
line con 0
authentication-mode scheme
user-role network-admin
#
line vty 0 4
authentication-mode scheme
user-role network-admin
set authentication password hash $h$6$KCfTIIDcEH7PPJ/K$iXwJrveCy2TjKNvk1e1TYX+P7wsNTNvN1O3qCjbEoF+3d0NDHXfnhiqMcPvtN2xLuf6yzp/KQRXlBF7XuRJ6mw==
#
line vty 5 63
authentication-mode scheme
user-role network-admin
#
ip route-static-group static
#
ip route-static 0.0.0.0 0 106.120.65.177
ip route-static 0.0.0.0 0 117.122.240.129
ip route-static 172.31.16.0 20 GigabitEthernet1/0/4 192.168.100.203
ip route-static 192.168.50.0 24 117.122.225.129
ip route-static 192.168.99.0 24 117.122.225.129
ip route-static 192.168.199.0 24 106.120.65.177
#
performance-management
#
ssh server enable
sftp server enable
#
acl advanced 3000
rule 0 permit ip
#
acl advanced 3001
rule 0 permit ip source 192.168.100.0 0.0.0.255 destination 192.168.99.0 0.0.0.255
#
acl advanced 3002
rule 0 permit ip source 192.168.100.0 0.0.0.255 destination 192.168.101.0 0.0.0.255
rule 5 permit ip source 192.168.101.0 0.0.0.255 destination 192.168.100.0 0.0.0.255
#
acl advanced 3004
rule 0 permit ip source 192.168.100.0 0.0.0.255 destination 192.168.200.0 0.0.0.255
rule 5 permit ip source 192.168.100.0 0.0.0.255 destination 192.168.199.0 0.0.0.255
#
acl advanced 3333
rule 0 deny ip source 192.168.100.0 0.0.0.255 destination 192.168.99.0 0.0.0.255
rule 1 deny ip source 192.168.100.0 0.0.0.255 destination 192.168.50.0 0.0.0.255
rule 5 deny ip source 192.168.100.0 0.0.0.255 destination 192.168.199.0 0.0.0.255
rule 10 permit ip
#
acl advanced 3444
rule 0 permit ip source 192.168.100.95 0
rule 5 permit ip destination 192.168.100.95 0
rule 10 permit ip source 192.168.50.150 0
rule 15 permit ip destination 192.168.50.150 0
#
acl advanced 3555
rule 0 permit udp
#
acl advanced 3777
rule 0 permit ip source 192.168.50.150 0 destination 192.168.100.95 0
#
acl advanced 3778
rule 0 permit ip source 192.168.100.95 0 destination 192.168.50.150 0
rule 1 permit ip source 192.168.199.1 0 destination 192.168.100.62 0
#
acl advanced 3998
rule 0 permit ip source 192.168.100.180 0 destination 192.168.50.160 0 counting
rule 5 permit ip source 192.168.50.160 0 destination 192.168.100.180 0 counting
rule 10 permit ip source 192.168.100.95 0 destination 192.168.100.180 0
rule 15 permit ip source 192.168.100.180 0 destination 192.168.100.95 0
#
domain 1
#
domain system
#
aaa session-limit ftp 16
aaa session-limit telnet 16
aaa session-limit ssh 16
domain default enable system
#
role name level-0
description Predefined level-0 role
#
role name level-1
description Predefined level-1 role
#
role name level-2
description Predefined level-2 role
#
role name level-3
description Predefined level-3 role
#
role name level-4
description Predefined level-4 role
#
role name level-5
description Predefined level-5 role
#
role name level-6
description Predefined level-6 role
#
role name level-7
description Predefined level-7 role
#
role name level-8
description Predefined level-8 role
#
role name level-9
description Predefined level-9 role
#
role name level-10
description Predefined level-10 role
#
role name level-11
description Predefined level-11 role
#
role name level-12
description Predefined level-12 role
#
role name level-13
description Predefined level-13 role
#
role name level-14
description Predefined level-14 role
#
user-group system
#
pki domain sslvpn
public-key rsa general name sslvpn
undo crl check enable
#
ssl server-policy ssl
pki-domain sslvpn
ciphersuite rsa_aes_128_cbc_sha
version ssl3.0 disable
version tls1.0 disable
#
ftp server enable
#
session statistics enable
#
ipsec transform-set 1
esp encryption-algorithm 3des-cbc
esp authentication-algorithm md5
#
ipsec policy-template v77 1
transform-set 1
local-address 106.120.65.180
ike-profile 1
#
ipsec policy ipsecvpn 1 isakmp template v77
#
ike dpd interval 10 on-demand
#
ike profile 1
keychain 1
exchange-mode aggressive
local-identity fqdn jifang
match remote identity address 0.0.0.0 0.0.0.0
match remote identity fqdn nongxueyuan
proposal 1
#
ike proposal 1
encryption-algorithm 3des-cbc
authentication-algorithm md5
#
ike keychain 1
pre-shared-key address 0.0.0.0 0.0.0.0 key cipher $c$3$DtULyARHmuHMv2I5K5LnAM79yYYoiSfd1Q==
#
sslvpn ip address-pool ssl 192.168.101.10 192.168.101.100
#
sslvpn gateway gw
ip address 106.120.65.180 port 4433
ssl server-policy ssl
#
sslvpn context sslvpn
gateway gw
ip-tunnel interface SSLVPN-AC1
ip-tunnel address-pool ssl mask 255.255.255.0
ip-route-list iplist
include 192.168.100.0 255.255.255.0
policy-group pgroup
filter ip-tunnel acl 3000
ip-tunnel access-route ip-route-list iplist
default-policy-group pgroup
timeout idle 60
service enable
#
packet-capture max-bytes 4096
packet-capture max-file-packets 1000
packet-capture storage local limit 10240
#
security-policy ip
rule 0 name Trust-Trust-0
action pass
source-zone Trust
destination-zone Trust
rule 1 name Local-Any-1
action pass
source-zone Local
rule 2 name Any-Local-2
action pass
destination-zone Local
rule 3 name Any-Any-3
action pass
#
return
[H3C]
升级前我保存配置了,升级后就连不上了,不知道为什么,现在倒是可以CtrlB进来,但是不知道要怎么做