当前位置: 首页 > news >正文

03_旁挂负载分担组网场景

拓扑:1

二层交换配置:

拓扑:5

二层交换配置

使用传统三层架构中MSTP+VRRP组网形式 

VLAN 2--->SW3,SW4作为备份 

VLAN 3--->SW4,SW3作为备份 

MSTP设计--->SW3、4、5运行 

实例1:VLAN 2 

实例2:VLAN 3 

SW3是实例1的主根,实例2的备份根;SW4是实例2的主根,实例1的备份根 

IP地址规划: 

SW3:

VLAN 2:192.168.2.1/24 

VLAN 3:192.168.3.1/24 

SW4:

VLAN 2:192.168.2.2/24 

VLAN 3:192.168.3.2/24 

虚拟IP:

VLAN 2:192.168.2.254/24 

VLAN 3:192.168.3.254/24 

vlan配置:

sw3:

[sw3]sysname sw3 ----修改名称

[sw3]vlan batch 2 3 ----创建vlan2,3

interface GigabitEthernet0/0/3
 port link-type trunk
 port trunk allow-pass vlan 2 to 3
 
 
 interface GigabitEthernet0/0/4
 port link-type trunk
 port trunk allow-pass vlan 2 to 3
 

sw4:

[Huawei]sysname sw4

[sw4]vlan  batch 2 3
[sw4]interface GigabitEthernet 0/0/3
[sw4-GigabitEthernet0/0/3]port link-type trunk 
[sw4-GigabitEthernet0/0/3]port trunk  allow-pass vlan 2 3

[sw4-GigabitEthernet0/0/3]interface GigabitEthernet 0/0/4
[sw4-GigabitEthernet0/0/4]port link-type trunk
[sw4-GigabitEthernet0/0/4]port trunk allow-pass vlan 2 3

sw5:

[Huawei]sysname sw5
[sw5]vlan batch 2 3

[sw5]interface GigabitEthernet 0/0/3
[sw5-GigabitEthernet0/0/3]port link-type access 
[sw5-GigabitEthernet0/0/3]port default vlan 2

[sw5-GigabitEthernet0/0/4]interface GigabitEthernet 0/0/4
[sw5-GigabitEthernet0/0/4]port link-type access
[sw5-GigabitEthernet0/0/4]port default vlan 3

[sw5-GigabitEthernet0/0/4]interface GigabitEthernet 0/0/1
[sw5-GigabitEthernet0/0/1]port link-type trunk     
[sw5-GigabitEthernet0/0/1]port trunk allow-pass vlan 2 3

[sw5-GigabitEthernet0/0/1]interface GigabitEthernet 0/0/2
[sw5-GigabitEthernet0/0/2]port link-type trunk
[sw5-GigabitEthernet0/0/2]port trunk allow-pass vlan 2 3

mstp生成树配置:

sw3:

[sw3]stp enable  ----开启stp
[sw3]stp mode mstp   ----修改模式为mstp

[sw3]stp region-configuration  ----进入域配置视图
[sw3-mst-region]region-name aa   ----配置域名
[sw3-mst-region]instance 1 vlan 2   ----实例1映射vlan2
[sw3-mst-region]instance 2 vlan 3  ----实例2映射vlan3
[sw3-mst-region]active region-configuration    -----激活stp配置

[sw3]display stp region-configuration -----查看stp信息
:2、

:2

[sw3]stp instance 1 root primary  ----实例1主根    
[sw3]stp instance 2 root secondary  ----实例2备跟

[sw3]stp instance 0 root primary ----实例0主根
实例0除了vlan2,3的其他vlan可以配可以不配因为没有用到其他vlan

sw4:

[sw4]stp enable     
[sw4]stp mode mstp 

[sw4]stp region-configuration 
[sw4-mst-region]region-name aa    
[sw4-mst-region]instance 1 vlan 2     
[sw4-mst-region]instance 2 vlan 3    
[sw4-mst-region]active region-configuration 

[sw4]stp instance 1 root secondary ----实例1备根
[sw4]stp instance 2 root primary  ---实例2主根
[sw4]stp instance 0 root secondary ---实例0备根

sw5:

[sw5]stp enable 
[sw5]stp mode mstp 

[sw5]stp region-configuration     
[sw5-mst-region]region-name aa
[sw5-mst-region]instance 1 vlan 2    
[sw5-mst-region]instance 2 vlan 3
[sw5-mst-region]active region-configuration 

因为根是sw3,4所以sw5就不要配主备根
[sw5]display stp brief ----查看stp信息

:3

vlanif接口和vrrp配置

sw3:

[sw3]interface Vlanif 2    ----配置vlan2的vlanif接口
[sw3-Vlanif2]ip address 192.168.2.1 24
----sw3是vlan2的主根
[sw3-Vlanif2]vrrp vrid 1 virtual-ip 192.168.2.254   ---配置vrrp的虚拟ip为2.254
[sw3-Vlanif2]vrrp vrid 1 priority 120  ----修改优先级
[sw3-Vlanif2]vrrp vrid  1 preempt-mode timer delay 20 ---修改抢占延时
[sw3-Vlanif2]vrrp vrid 1 track interface GigabitEthernet 0/0/1 reduced 15  ----监控0/0/1和2两个接口当一个接口故障后sw3优先级减少15,这样只有当两个接口都故障后sw3的优先级才会比sw4低,sw3才会改变自身状态
[sw3-Vlanif2]vrrp vrid 1 track interface GigabitEthernet 0/0/2 reduced 15

[sw3]interface Vlanif 3
[sw3-Vlanif3]ip address 192.168.3.1 24

[sw3-Vlanif3]vrrp vrid 1 virtual-ip 192.168.3.254 ---配置vrrp的虚拟IP为3.254---因为sw3是vlan3的备根所以只要配置vrrp的虚拟IP就好

sw4:

[sw4]interface Vlanif 2
[sw4-Vlanif2]ip address 192.168.2.2 24

[sw4-Vlanif2]vrrp vrid 1 virtual-ip 192.169.2.254  ----这里sw4是vlan2的备根所以只要配置虚拟IP


[sw4]interface Vlanif 3
[sw4-Vlanif3]ip address 192.168.3.2 24
[sw4-Vlanif3]vrrp vrid 1 virtual-ip 192.168.3.254    
[sw4-Vlanif3]vrrp vrid 1 priority 120
[sw4-Vlanif3]vrrp vrid 1 preempt-mode timer delay 20
[sw4-Vlanif3]vrrp vrid 1 track interface GigabitEthernet 0/0/1 reduced 15
[sw4-Vlanif3]vrrp vrid 1 track interface GigabitEthernet 0/0/2 reduced 15

测试:pc2ping网关和pc1看是否可以ping通:4

汇聚到核心层路由配置

拓扑:6

SW1-SW2:VLAN 12---10.1.2.0/24 

SW1-SW3:VLAN 13---10.1.3.0/24 

SW1-SW4:VLAN 14---10.1.4.0/24 

SW2-SW3:VLAN 23---10.2.3.0/24 

SW2-SW4:VLAN 24---10.2.4.0/24


sw4-sw5之间部建立ospf

vlan和接口配置:

sw3:

[sw3]vlan batch 13 23
    
[sw3]interface GigabitEthernet 0/0/1
[sw3-GigabitEthernet0/0/1]port link-type access     
[sw3-GigabitEthernet0/0/1]port default vlan 13    
[sw3-GigabitEthernet0/0/1]undo stp enable  ----关闭stp,防止环路

[sw3-GigabitEthernet0/0/1]interface GigabitEthernet 0/0/2
[sw3-GigabitEthernet0/0/2]port link-type access
[sw3-GigabitEthernet0/0/2]port default vlan 23
[sw3-GigabitEthernet0/0/2]undo stp enable

[sw3]interface Vlanif 13    
[sw3-Vlanif13]ip address 10.1.3.3 24

[sw3-Vlanif13]interface Vlanif 23
[sw3-Vlanif23]ip address 10.2.3.3 24

sw4:

[sw4]vlan batch 14 24
    
[sw4]interface GigabitEthernet 0/0/1    
[sw4-GigabitEthernet0/0/1]port link-type access 
[sw4-GigabitEthernet0/0/1]port default vlan 24
[sw4-GigabitEthernet0/0/1]undo stp enable

[sw4-GigabitEthernet0/0/1]interface GigabitEthernet 0/0/2
[sw4-GigabitEthernet0/0/2]port link-type access
[sw4-GigabitEthernet0/0/2]port default vlan 14
[sw4-GigabitEthernet0/0/2]undo stp enable 

[sw4]interface Vlanif 14
[sw4-Vlanif14]ip address 10.1.4.4 24

[sw4-Vlanif14]interface Vlanif 24
[sw4-Vlanif24]ip address 10.2.4.4 24

sw1:

[sw1]vlan batch 12 to 14

[sw1]interface GigabitEthernet 0/0/5
[sw1-GigabitEthernet0/0/5]port link-type access     
[sw1-GigabitEthernet0/0/5]port default vlan 13    
[sw1-GigabitEthernet0/0/5]undo stp enable 


[sw1-GigabitEthernet0/0/5]interface GigabitEthernet 0/0/5
[sw1-GigabitEthernet0/0/5]port link-type access
[sw1-GigabitEthernet0/0/5]undo stp enable


[sw1-GigabitEthernet0/0/5]port default vlan 14

[sw1]interface GigabitEthernet 0/0/4
[sw1-GigabitEthernet0/0/4]port link-type trunk     
[sw1-GigabitEthernet0/0/4]port trunk allow-pass vlan 12
[sw1-GigabitEthernet0/0/4]undo port trunk allow-pass vlan 1
[sw1-GigabitEthernet0/0/4]undo stp enable 


vlanif接口配置在下面交换机vrf区域划分

sw2:

[sw2]vlan batch 12 23 24

[sw2]interface GigabitEthernet 0/0/5
[sw2-GigabitEthernet0/0/5]port link-type access 
[sw2-GigabitEthernet0/0/5]port default vlan 24
[sw2-GigabitEthernet0/0/5]undo stp enable

[sw2-GigabitEthernet0/0/5]interface GigabitEthernet 0/0/6
[sw2-GigabitEthernet0/0/6]undo stp enable
[sw2-GigabitEthernet0/0/6]port link-type access
[sw2-GigabitEthernet0/0/6]port default vlan 23

[sw2]interface GigabitEthernet 0/0/4
[sw2-GigabitEthernet0/0/4]port link-type trunk 
[sw2-GigabitEthernet0/0/4]port trunk allow-pass vlan 12
[sw2-GigabitEthernet0/0/4]undo port trunk allow-pass vlan 1
[sw2-GigabitEthernet0/0/4]undo stp enable 

ospf配置:

sw3:

[sw3]ospf 1 router-id 3.3.3.3
[sw3-ospf-1]area 0    
[sw3-ospf-1-area-0.0.0.0]network 10.1.3.3 0.0.0.0
[sw3-ospf-1-area-0.0.0.0]network 10.2.3.3 0.0.0.0
[sw3-ospf-1-area-0.0.0.0]network 192.168.2.1 0.0.0.0
[sw3-ospf-1-area-0.0.0.0]network 192.168.3.1 0.0.0.0

[sw3-ospf-1]silent-interface Vlanif 2  ----开启vlan2,3的静默接口,让sw3,4之间不要建邻
[sw3-ospf-1]silent-interface Vlanif 3

创建vrf,并将对于接口划入(sw1,sw2上的vlanif接口)

因为SW1和SW2需要被分割为两台设备,分别与上下行设备连接,故需要先创建VRF空间,其中

GE0/0/3-GE0/0/6属于该空间接口。

VRF空间配置信息: 名称:VRF 
RD:100:1 RT:100:1

sw1:

[sw1]ip vpn-instance VRF ---创建VRF空间 

[sw1-vpn-instance-VRF]route-distinguisher 100:1 --设定RD值 

[sw1-vpn-instance-VRF-af-ipv4]vpn-target 100:1 both ---设定RT值 

[sw1-Vlani12]ip binding vpn-instance VRF ----将接口划入到VRF这个交换机中,在接口进行 

配置之前执行 


[sw1]interface Vlanif 12    
[sw1-Vlanif12]ip address 10.1.2.1 24
[sw1-Vlanif12]ip binding  vpn-instance vrf ----将对于接口划入vrf,最好在配置前划入,划入后会把划入前的配置移除


[sw1]interface Vlanif 13    
[sw1-Vlanif13]ip binding vpn-instance vrf    
[sw1-Vlanif13]ip address 10.1.3.1 24

[sw1-Vlanif13]interface Vlanif 14
[sw1-Vlanif14]ip binding vpn-instance vrf
[sw1-Vlanif14]ip address 10.1.4.1 24

sw2:

[Huawei]sysname sw2

[sw2]ip vpn-instance  vrf
[sw2-vpn-instance-vrf]route-distinguisher 100:1
[sw2-vpn-instance-vrf-af-ipv4]vpn-target 100:1 both 


[sw2]interface Vlanif 12
[sw2-Vlanif12]ip binding vpn-instance vrf    
[sw2-Vlanif12]ip address 10.1.2.2 24
    
[sw2-Vlanif12]interface Vlanif 23
[sw2-Vlanif13]ip binding vpn-instance vrf        
[sw2-Vlanif13]ip address 10.2.3.2 24
    
[sw2-Vlanif13]interface Vlanif 24
[sw2-Vlanif14]ip binding vpn-instance vrf    
[sw2-Vlanif14]ip address 10.2.4.2 24

[sw2]display ip routing-table vpn-instance vrf ----查看vrf的ip信息
[sw2]ping -vpn-instance vrf 10.1.2.1
----pingsw1看是否能通
:7,8

:7,8

配置ospf

sw3:上面配过了

sw4:上面配过了

sw1:

[sw1]ospf 1 router-id 1.1.1.1 vpn-instance vrf
[sw1-ospf-1]area 0    
[sw1-ospf-1-area-0.0.0.0]network 10.1.2.1 0.0.0.0
[sw1-ospf-1-area-0.0.0.0]network 10.1.3.1 0.0.0.0
[sw1-ospf-1-area-0.0.0.0]network 10.1.4.1 0.0.0.0

sw2:

[sw2]ospf 1 router-id 2.2.2.2 vpn-instance vrf  ---宣告是在sw2的划分的那个交换机的(vrf的)
[sw2-ospf-1]area 0
[sw2-ospf-1-area-0.0.0.0]network 10.1.2.2 0.0.0.0    
[sw2-ospf-1-area-0.0.0.0]network 10.2.3.2 0.0.0.0
[sw2-ospf-1-area-0.0.0.0]network 10.2.4.2 0.0.0.0

[sw1]display ospf peer brief ----查看ospf邻居表
[sw1]display ip routing-table vpn-instance vrf ----查看sw1上vrf交换机的IP路由信息

:9

:10

此时回程流量是等价路由,负载均衡,不符合来回路径一致要求。故需要进行路由干涉,使用路由

策略

:6

SW3:

主要流量发送给SW1,备份发给SW2 

SW4:

主要流量发送给SW2,备份发给SW1 

SW1:

192.168.2.0/24--->主要发送给SW3,备份给SW4 

192.168.3.0/24--->主要发送给SW4,备份给SW3 

SW2:

192.168.2.0/24--->主要发送给SW3,备份给SW4 

192.168.3.0/24--->主要发送给SW4,备份给SW3

W3和SW4只需要修改接口Cost数值,让SW3优选从SW1学习到的路由即可,让SW4优选从SW2学习到的路由。

sw3:

[sw3]interface Vlanif 23
[sw3-Vlanif23]ospf cost 5  -----因为原本的链路是千兆链路ospf过来开销值为1,将sw2-sw3的链路对于接口开销值改为5则192.168.2.0的信息优先选择开销值小的链路(sw1-sw3)

sw4:

[sw4]interface Vlanif 14
[sw4-Vlanif14]ospf cost 5

路由策略:

先把sw3和sw4在ospf中宣告的192.168.2.0和3.0取消宣告,因为一会会通过重发布来宣告

sw3:

[sw3-ospf-1-area-0.0.0.0]undo network 192.168.2.1 0.0.0.0
[sw3-ospf-1-area-0.0.0.0]undo network 192.168.3.1 0.0.0.0

sw4:

[sw4-ospf-1-area-0.0.0.0]undo  network 192.168.2.2 0.0.0.0
[sw4-ospf-1-area-0.0.0.0]undo network 192.168.3.2 0.0.0.0

[sw1]display ip routing-table vpn-instance vrf ---在sw1上查看vrf路由信息
:11

:11

SW3:

将SW3本地发送的192.168.3.0/24路由的开销值改大 

192.168.2.0/24路由开销不变 

通过重发布,来调用路由策略 

重发布时,不要引入其他路由信息 

1、抓流量 
[sw3]ip ip-prefix aa permit 192.168.3.0 24 ----抓取2.0和3.0流量
[sw3]ip ip-prefix bb permit 192.168.2.0 24

2、做策略 
[sw3]route-policy aa permit node 10
[sw3-route-policy]if-match ip-prefix aa    ---如果匹配抓取到的流量aa(3.0)
[sw3-route-policy]apply cost 5  ----开销值加5
    
[sw3]route-policy aa permit node 20    
[sw3-route-policy]if-match ip-prefix bb

----因为通过重发布,来调用路由策略 
重发布时,不要引入其他路由信息 ,所以最后不要放通所有(防止有其他的路由信息)


3、调用 
[sw3-ospf-1]import-route direct route-policy aa

SW4:

将SW4本地发送的192.168.2.0/24路由的开销值改大 

192.168.3.0/24路由开销不变 

通过重发布,来调用路由策略
重发布时,不要引入其他路由信息


1、抓流量 
[sw4]ip ip-prefix aa permit 192.168.2.0 24    
[sw4]ip ip-prefix bb permit 192.168.3.0 24

2、做策略 
[sw4]route-policy aa permit node 10
[sw4-route-policy]if-match ip-prefix aa    
[sw4-route-policy]apply cost 5

[sw4]route-policy aa permit node 20
[sw4-route-policy]if-match ip-prefix bb


3、调用 
[sw4-ospf-1]import-route direct route-policy aa

查看vrrf路由表和ospf的lsdb表

[sw1]display ip routing-table vpn-instance vrf
[sw1]display ospf lsdb

:12

VRF交换机和防火墙的路由交互

拓扑:13

防火墙视角: 

去往内部的流量,vFW路由的下一跳为交换机的VRRP备份组3的虚拟IP地址,当Master设备存在时,由 

Master设备进行回复。 

而当Master设备故障时,或者Master设备连接防火墙的链路故障时,VRF交换机会将Master角色进行 

切换。而防火墙因为感知到接口down,也会进行主备切换。 

接下来,就又备份防火墙进行数据发送,访问的下一跳还是VRRP备份组3的虚拟IP地址 

VRF交换机视角: 

如果流量正常来到Master设备上,将由Master设备进行路由查找,请求下一跳地址的信息,即VRRP备份 

组1的虚拟IP地址,正常情况又Active设备回复 

如果流量没有正常来到Master设备,即可能因为Master设备故障,那么此时不管是VRF交换机还是防火 

墙都会进行主备切换。且流量还是正常转发。 

如果Master路由器的下游设备链路故障,流量不得已到达Backup,但是此时Master设备还是存在的, 

此时Backup设备无法通过三层转发机制转发流量,只能通过二层转发机制,将流量引导到Master设备上,此 

时报文转发路径为Backup--->Master--->vFW

想要实现上述效果,需要让两台防火墙和虚拟出来的两台VRF交换机的数据转发路径同属于一个广

播域,即使用相同的VLAN和网段信息。**

拓扑:14

如果是负载分担组网形式,其逻辑是完全相同的,在每个设备上新添加一组VRRP信息。

下面可以参考图15:相当于把交换机变为两个交换机(vrf,poblic),然后防火墙在两个交换机中间

拓扑:15

FW1为主

VRRP备份组1---VRRP备份组5 

VRRP备份组3---VRRP备份组7 

FW2为主

VRRP备份组2---VRRP备份组6 

VRRP备份组4---VRRP备份组8 

VRRP备份组1:VRF使用,SW1为Master,SW2为Backup 

VLAN 41---10.4.1.0/24 

SW1:10.4.1.1/24     

SW2:10.4.1.2/24     

虚拟地址:10.4.1.100 

VRRP备份组2:VRF使用,SW2为Master,SW1为Backup 

VLAN 42---10.4.2.0/24 

SW1:10.4.2.1/24 

SW2:10.4.2.2/24 

虚拟地址:10.4.2.100 

VRRP备份组3:Public使用,SW1为Master,SW2为Backup 

VLAN 43---10.4.3.0/24 

SW1:10.4.3.1/24 

SW2:10.4.3.2/24 

虚拟地址:10.4.3.100 

VRRP备份组4:Public使用,SW2为Master,SW1为Backup 

VLAN 44---10.4.4.0/24 

SW1:10.4.4.1/24 

SW2:10.4.4.2/24 

虚拟地址:10.4.4.100 


VRRP备份组5:防火墙使用,FW1为Master,FW2为Backup 

VLAN 41---10.4.1.0/24 

FW1:10.4.1.10/24 

FW2:10.4.1.20/24 

虚拟地址:10.4.1.200 


VRRP备份组6:防火墙使用,FW2为Master,FW1为Backup 

VLAN 42---10.4.2.0/24 

FW1:10.4.2.10/24 

FW2:10.4.2.20/24 

虚拟地址:10.4.2.200 

VRRP备份组7:防火墙使用,FW1为Master,FW2为Backup 

VLAN 43---10.40.3.0/24 

FW1:10.4.3.10/24 

FW2:10.4.3.20/24 

虚拟地址:10.40.3.200 

VRRP备份组8:防火墙使用,FW2为Master,FW1为Backup 

VLAN 44---10.4.4.0/24 

FW1:10.4.4.10/24
FW2:10.4.4.20/24 
虚拟地址:10.4.4.200

sw1:vrf:组1,2

[sw1]vlan batch 41 42   -----创建vlan

[sw1]interface GigabitEthernet 0/0/3    -----设置0/3和4口为trunk接口放通vlan41和42
[sw1-GigabitEthernet0/0/3]port link-type trunk     
[sw1-GigabitEthernet0/0/3]port trunk allow-pass vlan 41 42 

[sw1-GigabitEthernet0/0/3]interface GigabitEthernet 0/0/4
[sw1-GigabitEthernet0/0/4]port link-type trunk
[sw1-GigabitEthernet0/0/4]port trunk allow-pass vlan 41 42

备份组1:sw1为主----对于5
[sw1]interface Vlanif 41
[sw1-Vlanif41]ip binding vpn-instance vrf    ----将vlanif41加入vrf交换机
[sw1-Vlanif41]ip address 10.4.1.1 24  
[sw1-Vlanif41]vrrp vrid 1 virtual-ip 10.4.1.100  ---设置vrrp组的虚拟IP
[sw1-Vlanif41]vrrp vrid 1 priority 120   ----因为sw1是vrrp组1的master所以要设置优先级为120
[sw1-Vlanif41]vrrp vrid 1 preempt-mode timer delay 60  ---设置抢占延时和防火墙一样为60秒
[sw1-Vlanif41]vrrp vrid 1 track interface GigabitEthernet 0/0/3 reduced 30
---监控连接防火墙的接口0/0/3,当该接口故障了之后优先级降低30


备份组2:sw1为备----对应6
[sw1-Vlanif41]interface Vlanif 42    
[sw1-Vlanif42]ip binding vpn-instance vrf    
[sw1-Vlanif42]ip address 10.4.2.1 24 


---这里sw1作为组2的备所以只要配置虚拟IP

[sw1]ip route-static vpn-instance vrf 0.0.0.0 0 10.4.1.200    ---sw1向上的缺省路由,指向fw1
[sw1]ip route-static vpn-instance vrf 0.0.0.0 0 10.4.2.200 preference 70  ---备用指向fw2

[sw1]ip route-static 192.168.0.0 16 10.4.3.200  ---pobilc向下指向sw1
[sw1]ip route-static 192.168.0.0 16 10.4.4.200 preference 70

[sw1-ospf-1]default-route-advertise ----sw1下放缺省路由

sw2:vrf:组1,2

[sw2]vlan batch 41 42

[sw2]interface GigabitEthernet 0/0/4    
[sw2-GigabitEthernet0/0/4]port link-type trunk 
[sw2-GigabitEthernet0/0/4]port trunk allow-pass vlan 41 42

[sw2-GigabitEthernet0/0/4]interface GigabitEthernet 0/0/3
[sw2-GigabitEthernet0/0/3]port link-type trunk
[sw2-GigabitEthernet0/0/3]port trunk allow-pass vlan 41 42


备份组1:sw2为备----对应5
[sw2]interface Vlanif 41
[sw2-Vlanif41]ip binding vpn-instance vrf
[sw2-Vlanif41]ip address 10.4.1.2 24    
[sw2-Vlanif41]vrrp vrid 1 virtual-ip 10.4.1.100


备份组2:sw2为主---对应6
[sw2-Vlanif41]interface Vlanif 42
[sw2-Vlanif42]ip binding vpn-instance vrf
[sw2-Vlanif42]ip address 10.4.2.2 24
[sw2-Vlanif42]vrrp vrid 2 virtual-ip 10.4.2.100    
[sw2-Vlanif42]vrrp vrid 2 priority 120    
[sw2-Vlanif42]vrrp vrid 2 preempt-mode timer delay 60
[sw2-Vlanif42]vrrp vrid 2 track interface GigabitEthernet 0/0/3 reduced 30

[sw2]ip route-static vpn-instance vrf 0.0.0.0 0 10.4.2.200    ---主要指向fw2
[sw2]ip route-static vpn-instance vrf 0.0.0.0 0 10.4.1.200 preference 70

[sw2]ip route-static 192.168.0.0 16 10.4.3.200 preference 70
[sw2]ip route-static 192.168.0.0 16 10.4.4.200  ---主要

[sw2-ospf-1]default-route-advertise

sw1:poblic:组3,4

[sw1]vlan batch 43 44

[sw1]interface GigabitEthernet 0/0/1
[sw1-GigabitEthernet0/0/1]port link-type trunk 
[sw1-GigabitEthernet0/0/1]port trunk allow-pass vlan 43 4

[sw1-GigabitEthernet0/0/1]interface GigabitEthernet 0/0/2
[sw1-GigabitEthernet0/0/2]port link-type trunk
[sw1-GigabitEthernet0/0/2]port trunk allow-pass vlan 43 44


备份组3:sw1为主----对应7
[sw1]interface Vlanif 43
[sw1-Vlanif43]ip address 10.4.3.1 24    
[sw1-Vlanif43]vrrp vrid 3 virtual-ip 10.4.3.100    
[sw1-Vlanif43]vrrp vrid 3 priority 120
[sw1-Vlanif43]vrrp vrid 3 preempt-mode timer delay 60
[sw1-Vlanif43]vrrp vrid 3 track interface GigabitEthernet 0/0/1 reduced 30


备份组4:sw1为备----对应8
[sw1]interface Vlanif 44
[sw1-Vlanif44]ip address 10.4.4.1 24    
[sw1-Vlanif44]vrrp vrid 4 virtual-ip 10.4.4.100


 

sw2:poblic:组3,4

[sw2]vlan batch 43 44


[sw2]interface GigabitEthernet 0/0/1    
[sw2-GigabitEthernet0/0/1]port link-type trunk 
[sw2-GigabitEthernet0/0/1]port trunk allow-pass vlan 43 44

[sw2-GigabitEthernet0/0/1]interface GigabitEthernet 0/0/2
[sw2-GigabitEthernet0/0/2]port link-type trunk
[sw2-GigabitEthernet0/0/2]port trunk allow-pass vlan 43 44

备份组3:sw2为备----对应7
[sw2]interface Vlanif 43
[sw2-Vlanif43]ip address 10.4.3.2 24    
[sw2-Vlanif43]vrrp vrid 3 virtual-ip 10.4.3.100

备份组4:sw2为主----对应8
[sw2]interface Vlanif 44
[sw2-Vlanif44]ip address 10.4.4.2 24
[sw2-Vlanif44]vrrp vrid 4 virtual-ip 10.4.4.100
[sw2-Vlanif44]vrrp vrid 4 priority 120
[sw2-Vlanif44]vrrp vrid 4 preempt-mode timer delay 60
[sw2-Vlanif44]vrrp vrid 4 track interface GigabitEthernet 0/0/1 reduced 30

fw1和2:(激活1/0/2和3)(给接口配置IP在删除)(每次打开拓扑都要补配一次来激活接口)

HRP_M[fw1]interface GigabitEthernet 1/0/2 (+B)    
HRP_M[fw1-GigabitEthernet1/0/2]ip address 1.1.1.1 24    
HRP_M[fw1-GigabitEthernet1/0/2]undo ip address 

HRP_M[fw1-GigabitEthernet1/0/2]interface GigabitEthernet 1/0/3 (+B)
HRP_M[fw1-GigabitEthernet1/0/3]ip address 2.2.2.2 24
HRP_M[fw1-GigabitEthernet1/0/3]undo  ip address 

HRP_S[fw2]interface GigabitEthernet 1/0/2
HRP_S[fw2-GigabitEthernet1/0/2]ip address 3.3.3.3 24    
HRP_S[fw2-GigabitEthernet1/0/2]undo ip address 

HRP_S[fw2-GigabitEthernet1/0/2]interface GigabitEthernet 1/0/3
HRP_S[fw2-GigabitEthernet1/0/3]ip address 3.3.3.3 24
HRP_S[fw2-GigabitEthernet1/0/3]undo ip address 

fw1:组5,6,7,8

vlan和接口配置

[fw1]vlan batch 41 42 43 44

[fw1]interface GigabitEthernet 1/0/0  ---1/0/0作为与fw2之间的心跳线的心跳口    
[fw1-GigabitEthernet1/0/0]ip address 10.10.10.1 24


将1/0/2分为2.41,2.42两个子接口对应组5,6
[fw1]interface GigabitEthernet 1/0/2.41
[fw1-GigabitEthernet1/0/2.41]ip address 10.4.1.10 24    
[fw1-GigabitEthernet1/0/2.41]vlan-type dot1q 41

[fw1-GigabitEthernet1/0/2.41]interface GigabitEthernet 1/0/2.42
[fw1-GigabitEthernet1/0/2.42]ip address 10.4.2.10 24
[fw1-GigabitEthernet1/0/2.42]vlan-type dot1q 42


将1/0/3分为3.43,3.44两个子接口对应组7,8
[fw1-GigabitEthernet1/0/2.42]interface GigabitEthernet 1/0/3.43
[fw1-GigabitEthernet1/0/3.43]ip address 10.4.3.10 24
[fw1-GigabitEthernet1/0/3.43]vlan-type dot1q 43


[fw1-GigabitEthernet1/0/2.42]interface GigabitEthernet 1/0/3.44
[fw1-GigabitEthernet1/0/3.44]ip address 10.4.4.10 24
[fw1-GigabitEthernet1/0/3.44]vlan-type dot1q 44


划分安全区域:
fw1与fw2之间dmz
fw1与vrf交换机为trust
fw1与poblic交换机为trust

[fw1]firewall zone dmz 
[fw1-zone-dmz]add interface GigabitEthernet 1/0/0
    
[fw1]firewall zone trust 
[fw1-zone-trust]add interface GigabitEthernet 1/0/2.41
[fw1-zone-trust]add interface GigabitEthernet 1/0/2.42
    
[fw1]firewall zone untrust 
[fw1-zone-untrust]add interface GigabitEthernet 1/0/3.43
[fw1-zone-untrust]add interface GigabitEthernet 1/0/3.44


防火墙双机热备配置:
----------------------------下联VRF--------------------------
VRRP备份组5:防火墙使用,FW1为Master,FW2为Backup
[fw1]interface GigabitEthernet 1/0/2.41    
[fw1-GigabitEthernet1/0/2.41]vrrp vrid 5 virtual-ip 10.4.1.200 active

VRRP备份组6:防火墙使用,FW2为Master,FW1为Backup
[fw1-GigabitEthernet1/0/2.41]interface GigabitEthernet 1/0/2.42
[fw1-GigabitEthernet1/0/2.42]vrrp vrid 6 virtual-ip 10.4.2.200 standby 

----------------------------上联Public--------------------------
VRRP备份组7:防火墙使用,FW1为Master,FW2为Backup
[fw1-GigabitEthernet1/0/2.42]interface GigabitEthernet 1/0/3.43
[fw1-GigabitEthernet1/0/3.43]vrrp vrid 7 virtual-ip 10.4.3.200 active 

VRRP备份组8:防火墙使用,FW2为Master,FW1为Backup
[fw1-GigabitEthernet1/0/3.43]interface GigabitEthernet 1/0/3.44
[fw1-GigabitEthernet1/0/3.44]vrrp vrid 8 virtual-ip 10.4.4.200 standby 

hrp心跳线配置;
[FW1]hrp mirror session enable ---快速备份功能 
[FW1]hrp interface GigabitEthernet 1/0/0 remote 10.10.10.2 ---定义心跳线和对端IP 
[FW1]hrp enable


向上的缺省路由配置:(指向poblic交换机的)
HRP_M[fw1]ip route-static 0.0.0.0 0 10.4.3.100 
HRP_M[fw1]ip route-static 0.0.0.0 0 10.4.4.100 preference 70    ---主要去往sw1的poblic(因为在备份组3中sw1为主),所以要修改只想sw2的poblic的优先级,防止等价路由

向下的缺省路由配置:(指向vrf交换机的)
HRP_M[fw1]ip route-static 192.168.0.0 16 192.168.1.100 ----在备份组1中sw1为主
HRP_M[fw1]ip route-static 192.168.0.0 16 192.168.2.100 preference 70

HRP_M[fw1]display ip routing-table protocol static ---查看静

:16

HRP_S[fw2]display vrrp brief ---查看vgmp组信息
:18

:18

安全策略:
HRP_M[fw1]security-policy (+B)    
HRP_M[fw1-policy-security]rule name 1 (+B)  ---从trust 到 untrust 
HRP_M[fw1-policy-security-rule-1]source-zone trust  (+B)    ---源区域
HRP_M[fw1-policy-security-rule-1]destination-zone untrust  (+B)     --目的区域
HRP_M[fw1-policy-security-rule-1]source-address 192.168.0.0 16 (+B)  ---源ip,目的为any不写
HRP_M[fw1-policy-security-rule-1]action permit  (+B)   ---动作允许

然后主设备(fw1)会把安全策略同步给备设备(fw2),可以在sw2上查看

fw2:组5,6,7,8

vlan和接口配置

[fw2]vlan batch 41 to 44


[fw2]interface GigabitEthernet 1/0/0
[fw2-GigabitEthernet1/0/0]ip address 10.10.10.2 24

将1/0/2分为2.41,2.42两个子接口对应组5,6
[fw2]interface GigabitEthernet 1/0/2.41
[fw2-GigabitEthernet1/0/2.41]ip address 10.4.1.20 24    
[fw2-GigabitEthernet1/0/2.41]vlan-type dot1q 41

[fw2-GigabitEthernet1/0/2.41]interface GigabitEthernet 1/0/2.42
[fw2-GigabitEthernet1/0/2.42]ip address 10.4.2.20 24
[fw2-GigabitEthernet1/0/2.42]vlan-type dot1q 42


将1/0/3分为3.43,3.44两个子接口对应组7,8
[fw2-GigabitEthernet1/0/2.42]interface GigabitEthernet 1/0/3.43
[fw2-GigabitEthernet1/0/3.43]ip address 10.4.3.20 24
[fw2-GigabitEthernet1/0/3.43]vlan-type dot1q 43

[fw2-GigabitEthernet1/0/3.43]interface GigabitEthernet 1/0/3.44
[fw2-GigabitEthernet1/0/3.44]ip address 10.4.4.20 24
[fw2-GigabitEthernet1/0/3.44]vlan-type dot1q 44


划分安全区域:
[fw2]firewall zone dmz 
[fw2-zone-dmz]add interface GigabitEthernet 1/0/0
    
[fw2]firewall zone trust 
[fw2-zone-trust]add interface GigabitEthernet 1/0/2.41
[fw2-zone-trust]add interface GigabitEthernet 1/0/2.42

[fw2]firewall zone untrust 
[fw2-zone-untrust]add interface GigabitEthernet 1/0/3.43
[fw2-zone-untrust]add interface GigabitEthernet 1/0/3.44

防火墙双机热备配置:
----------------------------下联VRF--------------------------
VRRP备份组5:防火墙使用,FW1为Master,FW2为Backup
[fw2]interface GigabitEthernet 1/0/2.41
[fw2-GigabitEthernet1/0/2.41]vrrp vrid 5 virtual-ip 10.4.1.200 standby 

VRRP备份组6:防火墙使用,FW2为Master,FW1为Backup
[fw2]interface GigabitEthernet 1/0/2.42
[fw2-GigabitEthernet1/0/2.42]vrrp vrid 6 virtual-ip 10.4.2.200 active 


----------------------------上联Public--------------------------
VRRP备份组7:防火墙使用,FW1为Master,FW2为Backup
[fw2]interface GigabitEthernet 1/0/3.43    
[fw2-GigabitEthernet1/0/3.43]vrrp vrid 7 virtual-ip 10.4.3.200 standby 


VRRP备份组8:防火墙使用,FW2为Master,FW1为Backup
[fw2]interface GigabitEthernet 1/0/3.44
[fw2-GigabitEthernet1/0/3.44]vrrp vrid 8 virtual-ip 10.4.4.200 active 

hrp配置:
[fw2]hrp mirror session enable 
[fw2]hrp interface GigabitEthernet 1/0/0 remote 10.10.10.1
[fw2]hrp enable


向上的缺省路由配置:(指向poblic交换机的)
HRP_S[fw2]ip route-static 0.0.0.0 0 10.4.3.100 preference 70
HRP_S[fw2]ip route-static 0.0.0.0 0 10.4.4.100 

向下的静态路由配置:(指向vrf交换机的)
这里配指向192.168.0.0/16是为了方便直接包括(2.0和3.0)
HRP_S[fw2]ip route-static 192.168.0.0 16 10.4.1.100 preference 70
HRP_S[fw2]ip route-static 192.168.0.0 16 10.4.2.100 

HRP_S[fw2]display ip routing-table protocol static ---查看静态路由表
:17

:17

 HRP_S[fw2]display vrrp brief ---查看vgmp组信息


:19


HRP_S[fw2]display  security-policy rule all ---查看sw2上的安全策略


:20

核心到边界

ospf(上面那个sw1,2的poblic和路由器5,6):

SW1-SW2:VLAN 102 --- 10.12.0.0/24 

SW1-R5:VLAN 105 ---- 10.15.0.0/24 

SW2-R6:VLAN 206 ---- 10.26.0.0/24 

R5-R6: ---- 10.56.0.0/24

sw1(poblic):


vlan和接口配置:

[sw1]vlan  batch 102 105


[sw1]interface GigabitEthernet 0/0/7
[sw1-GigabitEthernet0/0/7]port link-type access 
[sw1-GigabitEthernet0/0/7]port default vlan 105
[sw1-GigabitEthernet0/0/7]undo stp enable

[sw1]interface GigabitEthernet 0/0/2 ---之前已经配置过trunk,只要继续添加即可
[sw1-GigabitEthernet0/0/2]port trunk allow-pass vlan 102 105
[sw1-GigabitEthernet0/0/2]undo stp enable

[sw1]interface Vlanif 102
[sw1-Vlanif102]ip address 10.12.0.1 24

[sw1-Vlanif102]interface Vlanif 105    
[sw1-Vlanif105]ip address 10.15.0.1 24


ospf2配置;
这里用进程号2来和vrf进行区分
[sw1]ospf 2 router-id 1.1.1.1
[sw1-ospf-2]area 0
[sw1-ospf-2-area-0.0.0.0]network 10.12.0.1 0.0.0.0
[sw1-ospf-2-area-0.0.0.0]network 10.15.0.1 0.0.0.0

sw2(poblic):

vlan和接口配置:

[sw2]vlan batch 102 206

[sw2]interface GigabitEthernet 0/0/7
[sw2-GigabitEthernet0/0/7]port link-type access 
[sw2-GigabitEthernet0/0/7]port default vlan 206
[sw2-GigabitEthernet0/0/7]undo stp enable 

[sw2]interface GigabitEthernet 0/0/2
[sw2-GigabitEthernet0/0/2]port trunk allow-pass vlan 102 206
[sw2-GigabitEthernet0/0/2]undo stp enable

[sw2]interface Vlanif 102
[sw2-Vlanif102]ip address 10.12.0.2 24

[sw2-Vlanif102]interface Vlanif 206
[sw2-Vlanif206]ip address 10.26.0.2 24

ospf2配置:
[sw2]ospf 2 router-id 2.2.2.2
[sw2-ospf-2]area 0
[sw2-ospf-2-area-0.0.0.0]network 10.12.0.2 0.0.0.0
[sw2-ospf-2-area-0.0.0.0]network 10.26.0.2 0.0.0.0


 

r5:

接口配置:
[r5]interface GigabitEthernet 0/0/0
[r5-GigabitEthernet0/0/0]ip address 10.15.0.5 24

[r5-GigabitEthernet0/0/0]interface GigabitEthernet 0/0/1
[r5-GigabitEthernet0/0/1]ip address 10.56.0.5 24

ospf1配置:

[r5]ospf 1 router-id 5.5.5.5    
[r5-ospf-1]area 0
[r5-ospf-1-area-0.0.0.0]network 10.15.0.5 0.0.0.0
[r5-ospf-1-area-0.0.0.0]network 10.56.0.5 0.0.0.0

r6:

接口配置:

[r6]interface GigabitEthernet 0/0/0
[r6-GigabitEthernet0/0/0]ip address 10.26.0.6 24

[r6-GigabitEthernet0/0/0]interface GigabitEthernet 0/0/1
[r6-GigabitEthernet0/0/1]ip address 10.56.0.6 24

ospf1配置:

[r6]ospf 1 router-id 6.6.6.6
[r6-ospf-1]area 0
[r6-ospf-1-area-0.0.0.0]network 10.26.0.6 0.0.0.0
[r6-ospf-1-area-0.0.0.0]network 10.56.0.6 0.0.0.0

[sw1]display ospf peer brief  ----查看ospf邻居表

:21,22,23,24

 

 

 

 

 缺省

路由配置:(指向isp)

r5:

[r5]interface GigabitEthernet 0/0/2
[r5-GigabitEthernet0/0/2]ip address 12.0.0.5 24


[r5]ip route-static 0.0.0.0 0 12.0.0.100  ---缺省路由


[r5]ospf 1
[r5-ospf-2]default-route-advertise  ----下放缺省路由

[r5]acl 2000
[r5-acl-basic-2000]rule permit source 192.168.0.0 0.0.255.255 ---抓取流量

[r5]interface GigabitEthernet 0/0/2
[r5-GigabitEthernet0/0/2]nat outbound 2000  ----nat配置

r6:

[r6]interface GigabitEthernet 0/0/2    
[r6-GigabitEthernet0/0/2]ip address 13.0.0.6 24


[r6]ip route-static 0.0.0.0 0 13.0.0.100


[r6]ospf 1
[r6-ospf-2]default-route-advertise


[r6]acl 2000
[r6-acl-basic-2000]rule permit source 192.168.0.0 0.0.255.255


[r6]interface GigabitEthernet 0/0/2
[r6-GigabitEthernet0/0/2]nat outbound 2000

isp:

[isp100]interface GigabitEthernet0/0/0
[isp100-GigabitEthernet0/0/0]ip address 12.0.0.100 24

[isp100-GigabitEthernet0/0/0]interface GigabitEthernet0/0/1
[isp100-GigabitEthernet0/0/1]ip address 13.0.0.100 24

[isp100]interface LoopBack 0
[isp100-LoopBack0]ip address 100.1.1.1 24

 

sw3,4:

[sw3]display ip routing-table  --查看路由表
[sw3]display ospf lsdb  --查看lsdb表

 :25,26

sw1,2:

[sw1]display ip routing-table vpn-instance vrf
:27,28

将sw1上poblic上去往192.168.2.0和3.0的静态路由重发表给r5,6,防止r5,6因为没有回程路由丢弃来自2.0和3.0的信息
[sw1-ospf-2]import-route static 
[sw2-ospf-2]import-route static 

测试;

192.168.2.1-100.1.1.1

[sw3]tracert -a 192.168.2.1 100.1.1.1
去往10.4.3.1是sw1的poblic
12.0.0.100 120是路由器isp
说明可以到达

 :29

用pc1和2来测100.1.1.1

PC>ping 100.1.1.1

PC>tracert 100.1.1.1---可以看到从pc1到isp的路径


pc1-sw3-sw1的vrf-fw1(不回)-sw1的poblic-r5(边界路由器,不回)-isp

:30.31

 

 

关闭sw1上的某个接口看pc1是否可以继续ping通100.1.1.1

PC>ping 100.1.1.1 -t  ---长ping100.1.1.1


然后关闭sw1的vrf的0/0/1接口
[sw1-GigabitEthernet0/0/1]shutdown 

没断还在继续


:32
 


[sw1]display vrrp brief


:33


HRP_S[fw1]display vrrp brief 


:34


HRP_M[fw2]display vrrp brief 


:35


[SW2]display  vrrp brief


:36

HRP_M[fw2]display hrp state ---查看现在的fw2vgmp状态


:37


这边的peer为44996是因为在这个接口上有两个vrrp组,一个vrrp是减2,两个就是减4

将sw1的vrf0/0/1接口恢复
[sw1-GigabitEthernet0/0/1]undo shutdown

HRP_S[fw2]display hrp state


:39

然后发现sw1对应fw1的接口有反了,因为拓扑上的接口好显示错了位置,所以要将vlanif41,43两个active的vgmp组的监控接口反过来

拓扑修改后:47

在sw1进行修改

[sw1-Vlanif41]undo vrrp vrid 1 track interface GigabitEthernet
[sw1-Vlanif41]vrrp vrid 1 track interface GigabitEthernet 0/0/1 reduced 30


[sw1-Vlanif43]undo vrrp vrid 3 track interface GigabitEthernet 
[sw1-Vlanif43]vrrp vrid 3 track interface GigabitEthernet 0/0/3 reduced 30

用pc2做测试关闭sw2的0/0/3口,这里sw2没有配错

PC>ping 100.1.1.1 -t  ---长ping100.1.1.1

[SW2]interface GigabitEthernet 0/0/3
[SW2-GigabitEthernet0/0/3]shutdown 

[SW2]display vrrp brief


:40

HRP_S[fw2]display vrrp brief 
HRP_S[fw2]display hrp state


:41

关闭fw1上的1/0/2.41子接口

 

HRP_M[fw1-GigabitEthernet1/0/2.41]shutdown 
HRP_S[fw1]display vrrp brief


:42


HRP_S[fw1]display hrp state


:43

HRP_M[fw2]display vrrp brief 
HRP_M[fw2]display hrp state


:44

pc1长ping100.1.1.1


:45


HRP_S[fw1-GigabitEthernet1/0/2.41]undo shutdown ----恢复1/0/2.41子接口

HRP_M[fw1]display vrrp brief 
HRP_M[fw1]display hrp state


:46


 

相关文章:

  • AI壁纸创作技巧01:蓝色敖闰
  • undo log、redo log和bin log详解
  • Unity3D 对象实例化详解
  • 第二十三天 实践分布式软总线,实现两个设备之间的简单通信
  • 通过Nginx负载均衡+Keepalived实现业务高可用
  • Unity:使用DoTween实现按钮的缩放
  • Ubuntu 22.04 安装Nvidia驱动加速deepseek
  • 大模型RAG中的retrieve策略
  • AE 安装包 绿色版(Win,Mac)(2018-2025)合集
  • conda env remove与conda remove
  • RuoYi使用$.modal.closeTab方法关闭当前tab标签页刷新另外一个tab标签页
  • Python毕业设计选题:基于Python的社区爱心养老管理系统设计与实现_django
  • 国漫工业化革命:AI如何让“一人团队”产出影视级动画?
  • Bend Labs弯曲传感器:柔性设计,多轴测量,高精度传感
  • 时间无关和时间相关的N-S方程
  • 凸函数和凹函数的定义怎么来的?
  • openssl的aes128_ECB加密解密运算实例
  • 【精】使用 Apktool 反编译 APK 并重新签名的详细教程
  • 工具MyBatis Generator(MBG)
  • 网页聊天室测试报告