交換機上劃分了2個VRF,A跟B,防火牆旁掛,想讓這2個業務互訪經過防火牆,交換機跟防火牆該如何對接,路由該怎麼寫
(0)
最佳答案
要實現兩個VRF(A和B)之間的互訪,並確保流量經過旁掛的防火牆,可以采用以下策略:
1. **接口配置**:在交換機上,為每個VRF分別配置接口。例如,可以為VRF A配置一個VLAN接口,為VRF B配置另一個VLAN接口。同時,確保這些接口的IP地址與防火牆的相應接口在同一網段。
2. **防火牆配置**:在防火牆上,創建兩個安全域(或安全區域),分別對應VRF A和VRF B。為每個安全域配置相應的接口,並確保這些接口的IP地址與交換機的VLAN接口在同一網段。
3. **路由配置**:在交換機上,需要配置靜態路由,將VRF A的流量指向防火牆的VRF A接口,VRF B的流量指向防火牆的VRF B接口。例如,如果VRF A的默認網關是10.1.1.1(防火牆的VRF A接口),VRF B的默認網關是10.2.1.1(防火牆的VRF B接口),則在交換機上配置如下路由:
```
ip route-static vpn-instance VRF_A 0.0.0.0 0.0.0.0 10.1.1.1
ip route-static vpn-instance VRF_B 0.0.0.0 0.0.0.0 10.2.1.1
```
同時,在防火牆上也需要配置相應的靜態路由,將流量導向交換機的VLAN接口。
4. **安全策略**:在防火牆上,配置安全策略允許VRF A和VRF B之間的流量通過。這通常涉及創建安全規則,指定源和目的安全域,以及允許的服務或協議。
通過以上步驟,可以確保VRF A和VRF B之間的流量通過旁掛的防火牆進行,同時保證了網絡的安全性。
(0)
防火牆配置子接口 寫靜態就行
Host A、Host B和Host C通過接入交換機Switch、路由器Router與Internet通信。出於安全考慮,需要在路由器Router上部署SecBlade插卡Device起安全防護作用,應用需求如下:
· Switch將Host A、Host B和Host C分別劃分在VLAN 10、VLAN 20和VLAN 30,透傳Host與Internet之間的流量。
· Router與Host、Internet和Device三層對接,下行口和Route-Aggregation1.100劃分在VPN host,上行口和Route-Aggregation1.200劃分在VPN internet,查靜態路由表轉發Host與Internet之間的流量。
· Device與Router三層對接,查靜態路由表轉發Host與Internet之間的流量。
圖2-2 三層直路部署SecBlade插卡(劃分VRF)組網圖
設備 | 接口 | IP地址 | 設備 | 接口 | IP地址 |
Host A | - | 192.168.10.15/24 | Device | RAGG1.100 | 10.1.1.2/30 |
Host B | - | 192.168.20.15/24 |
| RAGG1.200 | 10.1.1.5/30 |
Host C | - | 192.168.30.15/24 |
|
|
|
Router | GE1/0/1.10 | 192.168.10.1/24 |
|
|
|
| GE1/0/1.20 | 192.168.20.1/24 |
|
|
|
| GE1/0/1.30 | 192.168.30.1/24 |
|
|
|
| RAGG1.100 | 10.1.1.1/30 |
|
|
|
| RAGG1.200 | 10.1.1.6/30 |
|
|
|
# 創建VLAN 10、VLAN 20和VLAN 30,將GigabitEthernet1/0/1、GigabitEthernet1/0/2和GigabitEthernet1/0/3分別加入VLAN 10、VLAN 20和VLAN 30。
<Switch> system-view
[Switch] vlan 10
[Switch-vlan10] port gigabitethernet 1/0/1
[Switch-vlan10] quit
[Switch] vlan 20
[Switch-vlan20] port gigabitethernet 1/0/2
[Switch-vlan20] quit
[Switch] vlan 30
[Switch-vlan30] port gigabitethernet 1/0/3
[Switch-vlan30] quit
# 將GigabitEthernet1/0/4的鏈路類型配置為Trunk,並允許VLAN 10、VLAN 20和VLAN 30的報文通過。
[Switch] interface gigabitethernet 1/0/4
[Switch-GigabitEthernet1/0/4] port link-type trunk
[Switch-GigabitEthernet1/0/4] port trunk permit vlan 10 20 30
[Switch-GigabitEthernet1/0/4] quit
# 創建VPN實例host與internet。
[Router] ip vpn-instance host
[Router-vpn-instance-host] quit
[Router] ip vpn-instance internet
[Router-vpn-instance-internet] quit
# 創建三層聚合接口1。
[Router] interface route-aggregation 1
[Router-Route-Aggregation1] quit
# 創建三層聚合子接口Route-Aggregation1.100和Route-Aggregation1.200,開啟Dot1q終結功能,分別終結VLAN 100和VLAN 200,綁定VPN實例並配置接口IP。
[Router] interface route-aggregation 1.100
[Router-Route-Aggregation1.100] vlan-type dot1q vid 100
[Router-Route-Aggregation1.100] ip binding vpn-instance host
[Router-Route-Aggregation1.100] ip address 10.1.1.1 30
[Router-Route-Aggregation1.100] quit
[Router] interface route-aggregation 1.200
[Router-Route-Aggregation1.200] vlan-type dot1q vid 200
[Router-Route-Aggregation1.200] ip binding vpn-instance internet
[Router-Route-Aggregation1.200] ip address 10.1.1.6 30
[Router-Route-Aggregation1.200] quit
# 將FortyGigE2/0/1和FortyGigE2/0/2加入到聚合組1中。
[Router] interface range fortygige 2/0/1 fortygige 2/0/2
[Router-if-range] port link-aggregation group 1
[Router-if-range] quit
# 創建三層子接口GigabitEthernet1/0/1.10、GigabitEthernet1/0/1.20和GigabitEthernet1/0/1.30,開啟Dot1q終結功能,分別終結VLAN 10、VLAN 20和VLAN 30,綁定VPN實例並配置接口IP。
[Router] interface gigabitethernet 1/0/1.10
[Router-GigabitEthernet1/0/1.10] vlan-type dot1q vid 10
[Router-GigabitEthernet1/0/1.10] ip binding vpn-instance host
[Router-GigabitEthernet1/0/1.10] ip address 192.168.10.1 24
[Router-GigabitEthernet1/0/1.10] quit
[Router] interface gigabitethernet 1/0/1.20
[Router-GigabitEthernet1/0/1.20] vlan-type dot1q vid 20
[Router-GigabitEthernet1/0/1.20] ip binding vpn-instance host
[Router-GigabitEthernet1/0/1.20] ip address 192.168.20.1 24
[Router-GigabitEthernet1/0/1.20] quit
[Router] interface gigabitethernet 1/0/1.30
[Router-GigabitEthernet1/0/1.30] vlan-type dot1q vid 30
[Router-GigabitEthernet1/0/1.30] ip binding vpn-instance host
[Router-GigabitEthernet1/0/1.30] ip address 192.168.30.1 24
[Router-GigabitEthernet1/0/1.30] quit
# 配置GigabitEthernet1/0/2接口IP,綁定VPN實例。
[Router] interface gigabitethernet 1/0/2
[Router-GigabitEthernet1/0/2] ip binding vpn-instance internet
[Router-GigabitEthernet1/0/2] ip address 20.1.1.1 24
[Router-GigabitEthernet1/0/2] quit
# 配置靜態路由指導上下行流量轉發。
[Router] ip route-static vpn-instance host 20.1.1.0 24 vpn-instance host 10.1.1.2
[Router] ip route-static vpn-instance internet 192.168.10.0 24 vpn-instance internet 10.1.1.5
[Router] ip route-static vpn-instance internet 192.168.20.0 24 vpn-instance internet 10.1.1.5
[Router] ip route-static vpn-instance internet 192.168.30.0 24 vpn-instance internet 10.1.1.5
# 創建三層聚合接口1。
<Device> system-view
[Device] interface route-aggregation 1
[Device-Route-Aggregation1] quit
# 創建三層聚合子接口Route-Aggregation1.100和Route-Aggregation1.200,開啟Dot1q終結功能,分別終結VLAN 100和VLAN 200,並配置接口IP。
[Device] interface route-aggregation 1.100
[Device-Route-Aggregation1.100] vlan-type dot1q vid 100
[Device-Route-Aggregation1.100] ip address 10.1.1.2 30
[Device-Route-Aggregation1.100] quit
[Device] interface route-aggregation 1.200
[Device-Route-Aggregation1.200] vlan-type dot1q vid 200
[Device-Route-Aggregation1.200] ip address 10.1.1.5 30
[Device-Route-Aggregation1.200] quit
# 將FortyGigE1/0/1和FortyGigE1/0/2加入到聚合組1中。
[Device] interface range fortygige 1/0/1 fortygige 1/0/2
[Device-if-range] port link-aggregation group 1
[Device-if-range] quit
# 將Route-Aggregation1.100和Route-Aggregation1.200分別加入安全域Trust和Untrust中。
[Device] security-zone name trust
[Device-security-zone-Trust] import interface route-aggregation 1.100
[Device-security-zone-Trust] quit
[Device] security-zone name untrust
[Device-security-zone-Untrust] import interface route-aggregation 1.200
[Device-security-zone-Untrust] quit
# 配置安全策略允許域間報文通過。
[Device] security-policy ip
[Device-security-policy-ip] rule name trust-untrust
[Device-security-policy-ip-0-trust-untrust] action pass
[Device-security-policy-ip-0-trust-untrust] source-zone trust
[Device-security-policy-ip-0-trust-untrust] destination-zone untrust
[Device-security-policy-ip-0-trust-untrust] quit
[Device-security-policy-ip] rule name untrust-trust
[Device-security-policy-ip-1-untrust-trust] action pass
[Device-security-policy-ip-1-untrust-trust] source-zone untrust
[Device-security-policy-ip-1-untrust-trust] destination-zone trust
[Device-security-policy-ip-1-untrust-trust] quit
[Device-security-policy-ip] quit
# 配置靜態路由指導上下行流量轉發。
[Device] ip route-static 192.168.10.0 24 10.1.1.1
[Device] ip route-static 192.168.20.0 24 10.1.1.1
[Device] ip route-static 192.168.30.0 24 10.1.1.1
[Device] ip route-static 20.1.1.0 24 10.1.1.6
# Host A上ping測試Internet的連通性,可以ping通Internet地址20.1.1.1。
C:\>ping 20.1.1.1
Pinging 20.1.1.1 with 32 bytes of data:
Reply from 20.1.1.1: bytes=32 time=3ms TTL=254
Reply from 20.1.1.1: bytes=32 time=2ms TTL=254
Reply from 20.1.1.1: bytes=32 time=1ms TTL=254
Reply from 20.1.1.1: bytes=32 time=2ms TTL=254
Ping statistics for 20.1.1.1:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 1ms, Maximum = 3ms, Average = 2ms
# Host B上ping測試Internet的連通性,可以ping通Internet地址20.1.1.1。
C:\>ping 20.1.1.1
Pinging 20.1.1.1 with 32 bytes of data:
Reply from 20.1.1.1: bytes=32 time=3ms TTL=254
Reply from 20.1.1.1: bytes=32 time=2ms TTL=254
Reply from 20.1.1.1: bytes=32 time=1ms TTL=254
Reply from 20.1.1.1: bytes=32 time=2ms TTL=254
Ping statistics for 20.1.1.1:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 1ms, Maximum = 3ms, Average = 2ms
# Host C上ping測試Internet的連通性,可以ping通Internet地址20.1.1.1。
C:\>ping 20.1.1.1
Pinging 20.1.1.1 with 32 bytes of data:
Reply from 20.1.1.1: bytes=32 time=3ms TTL=254
Reply from 20.1.1.1: bytes=32 time=2ms TTL=254
Reply from 20.1.1.1: bytes=32 time=1ms TTL=254
Reply from 20.1.1.1: bytes=32 time=2ms TTL=254
Ping statistics for 20.1.1.1:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 1ms, Maximum = 3ms, Average = 2ms
# 在Device上檢查會話表,存在Host與20.1.1.1的會話表。
[Device] display session table ipv4
Slot 1:
Initiator:
Source IP/port: 192.168.10.15/12005
Destination IP/port: 20.1.1.1/2048
DS-Lite tunnel peer: -
VPN instance/VLAN ID/Inline ID: -/-/-
Protocol: ICMP(1)
Inbound interface: Route-Aggregation1.100
Source security zone: Trust
Initiator:
Source IP/port: 192.168.20.15/12005
Destination IP/port: 20.1.1.1/2048
DS-Lite tunnel peer: -
VPN instance/VLAN ID/Inline ID: -/-/-
Protocol: ICMP(1)
Inbound interface: Route-Aggregation1.100
Source security zone: Trust
Initiator:
Source IP/port: 192.168.30.15/12005
Destination IP/port: 20.1.1.1/2048
DS-Lite tunnel peer: -
VPN instance/VLAN ID/Inline ID: -/-/-
Protocol: ICMP(1)
Inbound interface: Route-Aggregation1.100
Source security zone: Trust
(0)
子接口跟核心互聯的IP需要規劃新的全局互聯地址是嗎還是
子接口跟核心互聯的IP需要規劃新的全局互聯地址是嗎還是
親~登錄後才可以操作哦!
確定你的郵箱還未認證,請認證郵箱或綁定手機後進行當前操作
舉報
×
侵犯我的權益
×
侵犯了我企業的權益
×
抄襲了我的內容
×
原文鏈接或出處
誹謗我
×
對根叔社區有害的內容
×
不規範轉載
×
舉報說明