1.组网(一)
内网用户网关在RT路由器上面,内网两个子网网段,在ROUTER上做策略路由,实现负载分担和备份,以及两个网段的用户可以互相访问:
192.168.1.0/24网段优先从G0/2口出去上网,G0/3接口作为备份,
192.168.2.0/24网段优先从G0/3口出去上网,G0/2接口作为备份。
2. 组网(二)
内网用户网关在SW交换机上面,内网两个子网网段,在SWITCH上做策略路由,实现负载分担和备份,以及两个网段的用户可以互相访问:
192.168.1.0/24网段优先从G1/0/2口出去上网,G1/0/3接口作为备份,
192.168.2.0/24网段优先从G1/0/3口出去上网,G1/0/2接口作为备份。
交换机版本:Version 7.1.045, Release 2311P02
路由器版本:version 7.1.059, Release 0305P04
1.
#
sysname H3C
#
telnet server enable
#
dhcp enable
#
password-recovery enable
#
vlan 1
#
policy-based-route policy permit node 1 //定义PBR策略节点1
if-match acl 3010 //匹配acl 3010的报文
#
policy-based-route policy permit node 5 //定义PBR策略节点5
if-match acl 3001 //匹配acl 3001的报文
apply next-hop 10.1.1.1 //指定下一跳地址
#
policy-based-route policy permit node 10 //定义PBR策略节点10
if-match acl 3002 //匹配acl 3002的报文
apply next-hop 20.1.1.1 //指定下一跳地址
#
interface Aux0
#
interface NULL0
#
interface GigabitEthernet0/0
port link-mode route
#
interface GigabitEthernet0/1.1
port link-mode route
ip address 192.168.1.1 255.255.255.0
ip policy-based-route policy //在内网接口应用policy策略
#
interface GigabitEthernet0/1.2
port link-mode route
ip address 192.168.2.1 255.255.255.0
ip policy-based-route policy //在内网接口应用policy策略
#
interface GigabitEthernet0/2
port link-mode route
ip address 10.1.1.2 255.255.255.0
#
interface GigabitEthernet0/3
port link-mode route
ip address 20.1.1.2 255.255.255.0
#
scheduler logfile size 16
#
line class aux
user-role network-admin
#
line class tty
user-role network-operator
#
line class vty
user-role network-operator
#
line aux 0
user-role network-admin
#
line vty 0 4
authentication-mode scheme
user-role level-15
user-role network-operator
#
line vty 5 63
user-role level-15
user-role network-operator
#
ip route-static 0.0.0.0 0 10.1.1.1 //配置缺省路由
ip route-static 0.0.0.0 0 20.1.1.1 //配置缺省路由
#
ntp-service enable
#
acl advanced 3001 //定义acl 3001
rule 0 permit ip source 192.168.1.0 0.0.0.255 //允许192.168.1.0/24源地址网段
#
acl advanced 3002 //定义acl 3002
rule 0 permit ip source 192.168.2.0 0.0.0.255 //允许192.168.4.0/24源地址网段
#
acl advanced 3010 //定义acl 3010
rule 0 permit ip source 192.168.1.0 0.0.0.255 destination 192.168.2.0 0.0.0.255 //允许192.168.1.0/24源地址目的192.168.2.0/24网段
rule 5 permit ip source 192.168.2.0 0.0.0.255 destination 192.168.1.0 0.0.0.255 //允许192.168.2.0/24源地址目的192.168.1.0/24网段
#
domain system
#
domain default enable system
#
role name level-0
description Predefined level-0 role
#
role name level-1
description Predefined level-1 role
#
role name level-2
description Predefined level-2 role
#
role name level-3
description Predefined level-3 role
#
role name level-4
description Predefined level-4 role
#
role name level-5
description Predefined level-5 role
#
role name level-6
description Predefined level-6 role
#
role name level-7
description Predefined level-7 role
#
role name level-8
description Predefined level-8 role
#
role name level-9
description Predefined level-9 role
#
role name level-10
description Predefined level-10 role
#
role name level-11
description Predefined level-11 role
#
role name level-12
description Predefined level-12 role
#
role name level-13
description Predefined level-13 role
#
role name level-14
description Predefined level-14 role
#
user-group group1
authorization-attribute sslvpn-policy-group pgroup
#
user-group system
#
local-user admin class manage
password hash $h$6$iu1wBsf3MlCQRF6F$HTkWAc/mKsHWRO5Y1R2BYPNz3zzq1L48b6nGHkgyqDCLDi3VwuFKHgIH1AMJjWfHECAROGe/fPcewce+Ki8W/g==
service-type telnet http
authorization-attribute user-role network-operator
#
ip http enable
#
return
2.
#
sysname H3C
#
clock timezone beijing add 08:00:00
#
telnet server enable
#
irf mac-address persistent timer
irf auto-update enable
undo irf link-delay
irf member 1 priority 1
#
dhcp enable
#
lldp global enable
#
system-working-mode standard
password-recovery enable
#
vlan 1
#
vlan 10
#
vlan 20
#
vlan 100 to 101
#
policy-based-route policy permit node 1 //定义PBR策略节点1
if-match acl 3010 //匹配acl 3010的报文
#
policy-based-route policy permit node 5 //定义PBR策略节点5
if-match acl 3001 //匹配acl 3001的报文
apply next-hop 10.1.1.1 //指定下一跳地址
#
policy-based-route policy permit node 10 //定义PBR策略节点10
if-match acl 3002 //匹配acl 3002的报文
apply next-hop 20.1.1.1 //指定下一跳地址
#
interface NULL0
#
interface LoopBack0
#
interface Vlan-interface1
#
interface Vlan-interface2
#
interface Vlan-interface10
ip address 10.1.1.2 255.255.255.0
#
interface Vlan-interface20
ip address 20.1.1.2 255.255.255.0
#
interface Vlan-interface100
ip address 192.168.1.1 255.255.255.0
ip policy policy-based-route policy //在内网接口应用policy策略
#
interface Vlan-interface101
ip address 192.168.2.1 255.255.255.0
ip policy policy-based-route policy //在内网接口应用policy策略
#
interface GigabitEthernet1/0/1
port link-mode bridge
port link-type trunk
port trunk permit vlan 1 100 101
#
interface GigabitEthernet1/0/2
port link-mode bridge
port access vlan 10
#
interface GigabitEthernet1/0/3
port link-mode bridge
port access vlan 20
#
interface GigabitEthernet1/0/4
port link-mode bridge
#
interface GigabitEthernet1/0/5
port link-mode bridge
#
interface M-GigabitEthernet0/0/0
ip address 10.153.42.91 255.255.255.0
#
interface Ten-GigabitEthernet1/0/49
port link-mode bridge
#
interface Ten-GigabitEthernet1/0/50
port link-mode bridge
#
interface Ten-GigabitEthernet1/0/51
port link-mode bridge
#
interface Ten-GigabitEthernet1/0/52
port link-mode bridge
#
scheduler logfile size 16
#
line class aux
user-role network-admin
#
line class vty
user-role network-operator
#
line aux 0
user-role network-admin
#
line vty 0 63
authentication-mode scheme
user-role network-admin
user-role network-operator
#
ip route-static 0.0.0.0 0 10.1.1.1 //配置缺省路由
ip route-static 0.0.0.0 0 20.1.1.1 //配置缺省路由
#
acl number 3001 //定义acl 3001
rule 0 permit ip source 192.168.1.0 0.0.0.255 /允许192.168.1.0/24源地址网段
#
acl number 3002 //定义acl 3002
rule 0 permit ip source 192.168.2.0 0.0.0.255 /允许192.168.2.0/24源地址网段
#
acl number 3010 //定义acl 3010
rule 0 permit ip source 192.168.1.0 0.0.0.255 destination 192.168.2.0 0.0.0.255 //允许192.168.1.0/24源地址目的192.168.2.0/24网段
rule 5 permit ip source 192.168.2.0 0.0.0.255 destination 192.168.1.0 0.0.0.255 //允许192.168.2.0/24源地址目的192.168.1.0/24网段
#
header incoming %
Hello!!! %
header shell %
Hello %
#
domain system
#
domain default enable system
#
role name level-0
description Predefined level-0 role
#
role name level-1
description Predefined level-1 role
#
role name level-2
description Predefined level-2 role
#
role name level-3
description Predefined level-3 role
#
role name level-4
description Predefined level-4 role
#
role name level-5
description Predefined level-5 role
#
role name level-6
description Predefined level-6 role
#
role name level-7
description Predefined level-7 role
#
role name level-8
description Predefined level-8 role
#
role name level-9
description Predefined level-9 role
#
role name level-10
description Predefined level-10 role
#
role name level-11
description Predefined level-11 role
#
role name level-12
description Predefined level-12 role
#
role name level-13
description Predefined level-13 role
#
role name level-14
description Predefined level-14 role
#
local-user admin class manage
password hash $h$6$Ys/xMVzmPLvHHZZL$xUvnj060vouleH5Tgd8ySowN7cj+Fiq7ch1zPtDkCQ4ttl1fgQD/PjoSyYWcLivenZnGolOTQAX/IM+3uJvvCA==
service-type telnet terminal http https
authorization-attribute user-role level-15
authorization-attribute user-role network-admin
authorization-attribute user-role network-operator
#
ip http enable
ip https enable
#
return
1、通过配置策略路由和缺省路由实现链路的备份
2、内部多个网段的时候,如果在设备上面做了策略路由,内网互访的流量上来之后,优先匹配策略路由,流量直接被丢到公网,所以会导致内网用户访问的时候不通;需要先将内网访问的流量放通
该案例暂时没有网友评论
✖
案例意见反馈
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作