I come, I see, I conquer

                    —Gaius Julius Caesar

  博客园 :: 首页 :: 新随笔 :: 联系 :: 订阅 :: 管理 ::

目标:AR1和AR2之间为广域网域。二者配置GRE,完成后确保两个区域的终端能互通。

网络图

 

配置说明

(1)配置各设备接口ip

(2)配置各设备静态路由

(3)配置防火墙上接口加入区域,及开通区域间流量inbound和outbound的permit

(4)配置AR上的gre,即创建tunnel接口,配置tunnel接口的协议为gre,配置source和destination为公网的本和对端ip

 

配置命令

LSW1:

#
sysname LSW1
#
vlan batch 10 20 1000
#
interface Vlanif1
#
interface Vlanif10
ip address 10.10.10.254 255.255.255.0
#
interface Vlanif20
ip address 10.10.20.254 255.255.255.0
#
interface Vlanif1000
ip address 192.168.20.1 255.255.255.252
#
interface MEth0/0/1
#
interface Ethernet0/0/1
port link-type access
port default vlan 1000
#
interface Ethernet0/0/2
port link-type access
port default vlan 10
#
interface Ethernet0/0/3
port link-type access
port default vlan 10
#
interface Ethernet0/0/4
port link-type access
port default vlan 20
#
interface NULL0
#
ip route-static 10.10.30.0 255.255.255.0 192.168.20.2
#

FW2:

<FW2>dis cur
22:50:42 2022/04/01
#
stp region-configuration
region-name f0eee215704f
active region-configuration
#
interface GigabitEthernet0/0/0
alias GE0/MGMT
ip address 192.168.10.2 255.255.255.252
#
interface GigabitEthernet0/0/1
ip address 192.168.20.2 255.255.255.252
#
interface NULL0
alias NULL0
#
firewall zone local
set priority 100
#
firewall zone trust
set priority 85
add interface GigabitEthernet0/0/0
#
firewall zone untrust
set priority 5
#
firewall zone dmz
set priority 50
add interface GigabitEthernet0/0/1
#
ip route-static 10.10.10.0 255.255.255.0 192.168.20.1
ip route-static 10.10.20.0 255.255.255.0 192.168.20.1
ip route-static 10.10.30.0 255.255.255.0 192.168.10.1
#
firewall packet-filter default permit interzone local trust direction inbound
firewall packet-filter default permit interzone local trust direction outbound
firewall packet-filter default permit interzone local untrust direction outbound
firewall packet-filter default permit interzone local dmz direction outbound
firewall packet-filter default permit interzone trust dmz direction inbound ////custom config
firewall packet-filter default permit interzone trust dmz direction outbound ////custom config
#

AR1:

interface GigabitEthernet0/0/0
ip address 172.16.1.1 255.255.255.252
#
interface GigabitEthernet0/0/1
ip address 192.168.10.1 255.255.255.252
#
interface NULL0
#
interface Tunnel0/0/1
ip address 1.1.1.1 255.255.255.255
tunnel-protocol gre
source 172.16.1.1
destination 172.16.1.2
#

ip route-static 10.10.10.0 255.255.255.0 192.168.10.2
ip route-static 10.10.20.0 255.255.255.0 192.168.10.2
ip route-static 10.10.30.0 255.255.255.0 Tunnel0/0/1
ip route-static 10.10.xx.0 255.255.255.0 Tunnel0/0/1 //静态路由好多啊。能用ospf吗?
ip route-static 10.10.cc.0 255.255.255.0 Tunnel0/0/1
ip route-static 10.10.dd.0 255.255.255.0 Tunnel0/0/1
ip route-static 10.10.xx.0 255.255.255.0 Tunnel0/0/1
....

抓包验证(红圈为抓包点):

 

笔记:

仅配置ip后,LSW与防火墙虽然同网段,但相互之间不通。即,从fw ping与它的接口连接的对端的设备ip不通,反之也不通。这就涉及local区与其他区通信的问题

firewall zone local ///local区不能用命令加入任何接口
set priority 100
#
firewall zone trust
set priority 85
#
firewall zone untrust
set priority 5
#
firewall zone dmz
set priority 50
#

若将某接口if1加入了zone trust,if2加入了untrust,if3加入了dmz。并且有以下包过滤配置
#
firewall packet-filter default permit interzone local trust direction inbound
firewall packet-filter default permit interzone local trust direction outbound
firewall packet-filter default permit interzone local untrust direction outbound
firewall packet-filter default permit interzone local dmz direction outbound

则从fw可以ping通与if1连接的对着端设备接口ip
从与if1连接的对着端设备可以ping通if1

从fw可以ping通与if2连接的对着端设备接口ip,反之不行
从fw可以ping通与if3连接的对着端设备接口ip,反之不行


注:
inbound: 低优先级到高优先级
outbound: 高优先级到低优先级

 

posted on 2022-04-01 22:55  jcsu  阅读(180)  评论(0)    收藏  举报