我们的客户现在使用的是Fortigate防火墙,想用H3C NS-F1000-AI-60把Fortigate防火墙替换下来。其它设备配置都不变。
Fortigate防火墙配置
公网IP是207.35.121.195 255.255.255.224
带外管理 ip address 10.158.31.129 255.255.255.192
Fortigate 防火墙与华为交换机之间使用 LACP 组建 EtherChannel,并在聚合接口上配置 802.1Q Trunk。有3个vlan需要上网:
interface Vlanif12
ip address 172.16.12.62 255.255.255.192
interface Vlanif20
ip address 172.16.20.62 255.255.255.192
interface Vlanif31
ip address 172.30.31.254 255.255.255.0
我需要怎样配置H3C NS-F1000-AI-60, 能不能给我一个配置模板?
这是我写的配置
1. LACP 绑定接口(下联华为交换机)
interface Bridge-Aggregation1
description TO-HUAWEI-SW
link-aggregation mode dynamic
port link-type trunk
port trunk permit vlan 12 20 31
2. 物理口加入聚合组
interface GigabitEthernet1/0/1
port link-aggregation group 1
interface GigabitEthernet1/0/2
port link-aggregation group 1
3. VLAN Interface(三个业务网段)
interface Vlan-interface12
ip address 172.16.12.62 255.255.255.192
interface Vlan-interface20
ip address 172.16.20.62 255.255.255.192
interface Vlan-interface31
ip address 172.30.31.254 255.255.255.0
4. 公网接口(WAN)
interface GigabitEthernet1/0/0
ip address 207.35.121.195 255.255.255.224
undo shutdown
5. 带外管理口(OOB)
interface GigabitEthernet1/0/3
ip address 10.158.31.129 255.255.255.192
undo shutdown
6. 默认路由
ip route-static 0.0.0.0 0 207.35.121.193
7. NAT(如果 H3C 替代 Fortigate 出口)
acl number 3000
rule 5 permit ip source 172.16.0.0 0.0.255.255
rule 10 permit ip source 172.30.31.0 0.0.0.255
interface GigabitEthernet1/0/0
nat outbound 3000
暂无评论
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
暂无评论