省赛样题
(一)网络基础信息配置
1.根据附录1拓扑图及附录2地址规划表,配置设备接口信息。
2.所有交换机和无线控制器开启SSH服务,用户名密码分别为admin、admin1234。密码为明文类型,特权密码为admin。
3.S7设备配置SNMP功能,向主机172.16.0.254发送Trap消息版本采用V2C,读写的Community为“Test”,只读的Community为“public”,开启Trap消息。
(二)配置有线网络
1.在全网Trunk链路上做VLAN修剪。
2.在S5、S6的Gi0/10-Gi0/15端口上启用端口保护。
3.在S5、S6连接PC机端口上开启Portfast和BPDUguard防护功能。
4.在S6上连接PC的接口开启BPDU防环,检测到环路后处理方式为 Shutdown-Port,并设置接口为边缘端口。
5.如果端口被 BPDU Guard检测进入 Err-Disabled状态,再过 300 秒后会自动恢复(基于接口部署策略),重新检测是否有环路。
6.在S6交换机部署DHCP Snooping功能。
7.S6交换机部署端口安全,接口Gi0/13只允许PC2通过。
(二)
S5(config-if-GigabitEthernet 0/10)#int gi 0/11
S5(config-if-GigabitEthernet 0/11)#switchport protected
S5(config-if-GigabitEthernet 0/11)#int gi 0/12
S5(config-if-GigabitEthernet 0/12)#switchport protected
S5(config-if-GigabitEthernet 0/12)#int gi 0/13
S5(config-if-GigabitEthernet 0/13)#switchport protected
S5(config-if-GigabitEthernet 0/13)#int gi 0/14
S5(config-if-GigabitEthernet 0/14)#switchport protecte
S5(config-if-GigabitEthernet 0/14)#int gi 0/15
S5(config-if-GigabitEthernet 0/15)#switchport protecte
S5(config-if-GigabitEthernet 0/15)#
S6(config)#int gi 0/10
S6(config-if-GigabitEthernet 0/10)#sw
S6(config-if-GigabitEthernet 0/10)#switchport pr
S6(config-if-GigabitEthernet 0/10)#switchport protected
S6(config-if-GigabitEthernet 0/10)#int gi 0/11
S6(config-if-GigabitEthernet 0/11)#switchport protected
S6(config-if-GigabitEthernet 0/11)#int gi 0/12
S6(config-if-GigabitEthernet 0/12)#switchport protected
S6(config-if-GigabitEthernet 0/12)#int gi 0/13
S6(config-if-GigabitEthernet 0/13)#switchport protected
S6(config-if-GigabitEthernet 0/13)#int gi 0/14
S6(config-if-GigabitEthernet 0/14)#switchport protected
S6(config-if-GigabitEthernet 0/14)#int gi 0/15
S6(config-if-GigabitEthernet 0/15)#switchport protected
S6(config-if-GigabitEthernet 0/15)#
S5(config)#spanning-tree
S5(config)#int range gi 0/1-4
S5(config-if-range)#spanning-tree bpduguard enable
S5(config-if-range)#spanning-tree portfast
S6#con
Enter configuration commands, one per line. End with CNTL/Z.
S6(config)#int range gi 0/1-16
S6(config-if-range)#ex
S6(config)#spa
S6(config)#spanning-tree
Enable spanning-tree.
S6(config)#spanning-tree
S6(config)#int range gi 0/1-16
S6(config-if-range)#spanning-tree bpduguard enable
S6(config-if-range)#spanning-tree portfast
S6(config)#rldp enable
S6(config)#int gi 0/13
S6(config-if-GigabitEthernet 0/13)#rldp port loop-detect shutdown-port
S6(config-if-GigabitEthernet 0/13)#exit
S5(config)#errdisable recovery interval 300
S6(config)#errdisable recovery interval 300
S6(config)#ip dhcp snooping
S6(config)#int range gi 0/23-24
S6(config-if-range)#ip dhcp snooping trust
Ruijie(config)#interfac GigabitEthernet 0/3
Ruijie(config-if-GigabitEthernet 0/3)# switchport port-security binding 192.168.1.2 ------>把ip地址是192.168.1.2的终端定在交换机的Gi0/3接口
Ruijie(config-if-GigabitEthernet 0/3)#switchport port-security ------>开启端口安全功能
S3:
spanning-tree
spanning-tree mst configuration
instance 1 vlan 1,10,20,30,40,100
revision 1
name test
instance 0 vlan 2-9, 11-19, 21-29, 31-39, 41-99, 101-4094
instance 1 vlan 1, 10, 20, 30, 40, 100
exit
spanning-tree mst 1 priority 8192
spanning-tree mst 0 priority 4096
S4:
spanning-tree
spanning-tree mst configuration
instance 1 vlan 1,10,20,30,40,100
revision 1
name test
instance 0 vlan 2-9, 11-19, 21-29, 31-39, 41-99, 101-4094
instance 1 vlan 1, 10, 20, 30, 40, 100
exit
spanning-tree mst 0 priority 8192
spanning-tree mst 1 priority 4096
VLAN | VRRP备份组号(VRID) | VRRP 虚拟IP |
VLAN10 | 10 | 193.1.10.254 |
VLAN20 | 20 | 193.1.20.254 |
VLAN30 | 30 | 193.1.30.254 |
VLAN40 | 40 | 193.1.40.254 |
VLAN100(交换机间) | 100 | 193.1.100.254 |
S3:
vlan 10
vlan 20
vlan 30
vlan 100
interface vlan 10
ip address 193.1.10.252 255.255.255.0
vrrp 10 ip 193.1.10.254
vrrp 10 priority 120
interface vlan 20
ip address 193.1.20.252 255.255.255.0
vrrp 20 ip 193.1.20.254
vrrp 20 priority 120
interface vlan 30
ip address 193.1.30.252 255.255.255.0
vrrp 30 ip 193.1.30.254
vrrp 30 priority 120
interface vlan 40
ip address 193.1.40.252 255.255.255.0
vrrp 40 ip 193.1.40.254
vrrp 40 priority 120
interface vlan 100
ip address 193.1.100.252 255.255.255.0
vrrp 100 ip 193.1.100.254
vrrp 100 priority 120
S4:
vlan 10
vlan 20
vlan 30
vlan 100
interface vlan 10
ip address 193.1.10.253 255.255.255.0
vrrp 10 ip 193.1.10.254
vrrp 10 priority 150
interface vlan 20
ip address 193.1.20.253 255.255.255.0
vrrp 20 ip 193.1.20.254
vrrp 20 priority 150
interface vlan 30
ip address 193.1.30.253 255.255.255.0
vrrp 30 ip 193.1.30.254
vrrp 30 priority 150
interface vlan 40
ip address 193.1.40.253 255.255.255.0
vrrp 40 ip 193.1.40.254
vrrp 40 priority 150
interface vlan 100
ip address 193.1.100.253 255.255.255.0
vrrp 100 ip 193.1.100.254
vrrp 100 priority 150
S2
switch virtual domain 1
switch 2 priority 150
switch 2 description S6000-2
exit
vsl-port
port-member interface TenGigabitEthernet 0/51
port-member interface TenGigabitEthernet 0/52
end
switch convert mode virtual
S1
switch virtual domain 1
switch 1 priority 120
switch 1 description S6000-1
exit
vsl-port
port-member interface TenGigabitEthernet 0/51
port-member interface TenGigabitEthernet 0/52
end
switch convert mode virtual
S2:
int gi 1/0/47
no switchport
exit
int gi 2/0/47
no switchport
exit
switch virtual domain 1
dual-active detection bfd
dual-active bfd interface gi1/0/47
dual-active bfd interface gi2/0/47
exit
R1:
router ospf 10
network 10.1.0.8 0.0.0.3 area 0
network 11.1.0.1 0.0.0.0 area 0
network 12.1.0.0 0.0.0.255 area 0
network 13.1.0.0 0.0.0.255 area 0
S2/S1:
rou ospf 10
net 192.1.20.0 0.0.0.255 area 0
net 192.1.30.0 0.0.0.255 area 0
net 192.1.100.0 0.0.0.255 area 0
net 10.1.0.9 0.0.0.3 area 0
net 11.1.0.31 0.0.0.0 area 0
AC1:
router ospf 10
network 11.1.0.21 0.0.0.0 area 0
network 192.1.100.0 0.0.0.255 area 0
AC2:
router ospf 10
network 11.1.0.22 0.0.0.0 area 0
network 192.1.100.0 0.0.0.255 area 0
EG1:
router ospf 10
network 10.1.0.0 0.0.0.255 area 0
network 11.1.0.11 0.0.0.0 area 0
S3:
router ospf 10
network 10.1.0.0 0.0.0.255 area 0
network 193.1.10.0 0.0.0.255 area 0
network 193.1.20.0 0.0.0.255 area 0
network 193.1.30.0 0.0.0.255 area 0
network 193.1.40.0 0.0.0.255 area 0
network 193.1.100.0 0.0.0.255 area 0
S4:
router ospf 10
network 10.1.0.0 0.0.0.255 area 0
network 11.1.0.34 0.0.0.0 area 0
network 193.1.10.0 0.0.0.255 area 0
network 193.1.20.0 0.0.0.255 area 0
network 193.1.30.0 0.0.0.255 area 0
network 193.1.40.0 0.0.0.255 area 0
network 193.1.100.0 0.0.0.255 area 0
EG2:
ip route 0.0.0.0 0.0.0.0 10.1.0.22
ip route 11.1.0.3 255.255.255.255 10.1.0.22
ip route 11.1.0.35 255.255.255.255 10.1.0.13
S5(config)#ip rout 0.0.0.0 0.0.0.0 10.1.0.14
S5(config)#ip rout 11.1.0.3 255.255.255.255 10.1.0.14
S5(config)#ip rout 11.1.0.12 255.255.255.255 10.1.0.14
12
R1(config)#rou ospf 10
R1(config-router)#passive-interface vlan 10
R1(config-router)#passive-interface vlan 20
R1(config-router)#passive-interface vlan 30
S2(config)#rou ospf 10
S2(config-router)#passive-interface vlan 20
S2(config-router)#passive-interface vlan 30
S2(config-router)#passive-interface vlan 100
S2(config-router)#passive-interface gi 2/0/1
AC1(config)#rou ospf 10
AC1(config-router)#passive-interface vlan 100
AC2(config)#rou ospf 10
AC2(config-router)#passive-interface vlan 100
EG1(config)#rou ospf 10
EG1(config-router)#passive-interface gi 0/1
EG1(config-router)#passive-interface gi 0/2
EG1(config-router)#passive-interface gi 0/3
S3(config)#rou ospf 10
S3(config-router)#passive-interface vlan 10
S3(config-router)#passive-interface vlan 20
S3(config-router)#passive-interface vlan 30
S3(config-router)#passive-interface vlan 40
S3(config-router)#passive-interface vlan 100
S3(config-router)#passive-interface gi 0/24
S4(config)#rou ospf 10
S4(config-router)#passive-interface vlan 10
S4(config-router)#passive-interface vlan 20
S4(config-router)#passive-interface vlan 30
S4(config-router)#passive-interface vlan 40
S4(config-router)#passive-interface vlan 100
S4(config-router)#passive-interface gi 0/24
S4(config)#rou ospf 10
S4(config-router)#router-id 11.1.0.34
S4(config-router)#default-information originate
S3(config)#rou ospf 10
S3(config-router)#router-id 11.1.0.33
S3(config-router)#default-information originate
EG1(config)#rou ospf 10
EG1(config-router)#router-id 11.1.0.11
EG1(config-router)#default-information originate
AC2(config)#rou ospf 10
AC2(config-router)#router-id 11.1.0.22
AC2(config-router)#default-information originate
AC1(config)#rou ospf 10
AC1(config-router)#router-id 11.1.0.21
AC1(config-router)#default-information originate
S2(config)#rou ospf 10
S2(config-router)#router-id 11.1.0.31
S2(config-router)#default-information originate
S2(config)#ip rout 0.0.0.0 0.0.0.0 loopback 0
S2(config-router)#rou ospf 10
S2(config-router)#redistribute static metric-type 1 subnets
R1(config-if-Loopback 0)#rou bgp 100
R1(config-router)#neighbor 11.1.0.2 remote-as 100
R1(config-router)#neighbor 11.1.0.2 update-source lo 0
R1(config-router)#redistribute ospf 10
R1(config-router)#neighbor 11.1.0.3 remote-as 100
R1(config-router)#neighbor 11.1.0.3 update-source lo 0
R1(config-router)#redistribute ospf 10
R1(config-router)#redistribute bgp subnets
R1(config-router)#
R2(config)#rou bgp 100
R2(config-router)#neighbor 11.1.0.1 remote-as 100
R2(config-router)#neighbor 11.1.0.1 update-source lo 0
R2(config-router)#neighbor 11.1.0.3 remote-as 100
R2(config-router)#neighbor 11.1.0.3 update-source lo 0
R2(config-router)#redistribute ospf 10
R2(config-router)#rou ospf 10
R2(config-router)#redistribute bgp subnets
R3(config-if-Loopback 0)#rou bgp 100
R3(config-router)#neighbor 11.1.0.1 remote-as 100
R3(config-router)#neighbor 11.1.0.1 update-source lo 0
R3(config-router)#neighbor 11.1.0.2 remote-as 100
R3(config-router)#neighbor 11.1.0.2 update-source lo 0
R3(config-router)#redistribute ospf 10
R3(config-router)#rou ospf 10
R3(config-router)#redistribute bgp subnets
R1(config-router)#rou bgp 100
R1(config-router)#neighbor 11.1.0.2 remote-as 100
R1(config-router)#neighbor 11.1.0.2 update-source loopback 0
R1(config-router)#neighbor 11.1.0.3 remote-as 100
R1(config-router)#neighbor 11.1.0.3 update-source loopback 0
R2(config-router)#rou bgp 100
R2(config-router)#neighbor 11.1.0.1 remote-as 100
R2(config-router)#neighbor 11.1.0.1 update-source loopback 0
R2(config-router)#neighbor 11.1.0.3 remote-as 100
R2(config-router)#neighbor 11.1.0.3 update-source loopback 0
R3(config-router)#rou bgp 100
R3(config-router)#neighbor 11.1.0.1 remote-as 100
R3(config-router)#neighbor 11.1.0.1 update-source loopback 0
R3(config-router)#neighbor 11.1.0.2 remote-as 100
R3(config-router)#neighbor 11.1.0.2 update-source loopback 0
R3(config-router)#redistribute connected
R3(config-router)#network 11.1.0.0 mask 255.255.255.0
R2(config-router)#net 10.1.0.0 mask 255.255.255.0
R2(config-router)#redistribute connected
S4(config)#int rang vLAN 10,20,30,40,100
S4(config-if-range)#ip ospf cost 5
S3(config)#int range vlan 10,20,30,40,100
S3(config-if-range)#ip ospf cost 10
S6(config)#int rang gi 0/5-16
S6(config-if-range)#rate-limit input 10240 1024
R3(config)#int gigabitEthernet 0/0
R3(config-if-GigabitEthernet 0/0)#rate-limit output 10000000 1024 2048 ction transmit exceed-action drop
R3(config-if-GigabitEthernet 0/0)#$0000 1000000 2000000 conform-action transm$
(三)
EG1(config)#service dhcp
EG1(config)#ip dhcp pool yonghu
EG1(dhcp-config)#exit
EG1(config)#ip dhcp pool yonghu
EG1(dhcp-config)#network 193.1.20.0 255.255.255.0
EG1(dhcp-config)#dns-server 8.8.8.8
EG1(dhcp-config)#default-router 193.1.20.254
EG1(dhcp-config)#exit
EG1(config)#ip dhcp pool AP
EG1(dhcp-config)#network 193.1.10.0 255.255.255.0
EG1(dhcp-config)#dns-server 8.8.8.8
EG1(dhcp-config)#default-router 193.1.10.254
S5(config)#service dhcp
S5(config)#ip dhcp pool Yonghu
S5(dhcp-config)#network 194.1.20.0 255.255.255.0
S5(dhcp-config)#default-router 194.1.20.254
S5(dhcp-config)#dns-server 5.5.5.5
S5(dhcp-config)#exit
S5(config)#ip dhcp pool ap
S5(dhcp-config)#network 194.1.10.0 255.255.255.0
S5(dhcp-config)#default-router 194.1.10.254
S5(dhcp-config)#dns-server 5.5.5.5
AC1(config)#vlan 100
AC1(config-vlan)#vlan 10
AC1(config-vlan)#vlan 20
AC1(config-vlan)#int vlan 20
AC1(config-if-VLAN 20)#ip ad 193.1.20.252 255.255.255.0
AC1(config-if-VLAN 20)#vlan 100
AC1(config-vlan)#exit
AC1(config)#wlan-config 1 Test-GZ_66
AC1(config-wlan)#enable-broad-ssid
AC1(config-wlan)#exit
AC1(config)#ap-group GZ
AC1(config-group)#interface-mapping 1 20
AC1(config-group)#exit
AC1(config)#ip rout 0.0.0.0 0.0.0.0 193.1.100.252
AC1(config-if-Loopback 0)#ip ad 11.0.1.22 255.255.255.255
AC1(config-if-Loopback 0)#exit
AC1(config)#vlan 10
AC1(config-vlan)#vlan 20
AC1(config-vlan)#vlan 100
AC1(config-vlan)#int vlan 20
AC1(config-if-VLAN 20)#exit
AC1(config)#show wlan-config summary
Total Wlan Num : 1
Wlan id Profile Name SSID STA NUM
-------- -------------------- -------------------- --------
1 Test-GZ_66 0
AC1(config)#wlan-c
AC1(config)#wlan-config 1 Test-GZ_66
AC1(config-wlan)#enable-broad-ssid
AC1(config-wlan)#exit
AC1(config)#ap-group GZ
AC1(config-group)#int
AC1(config-group)#interface-mapping 1 20
AC1(config-group)#exit
AC1(config)#ip rout 0.0.0.0 0.0.0.0 11.1.0.31
AC1(config)#no ip rout 0.0.0.0 0.0.0.0 11.1.0.31
AC1(config)#no ip rout 0.0.0.0 0.0.0.0 193.1.100.252
AC1(config)#ip rout 0.0.0.0 0.0.0.0 11.1.0.11
AC1(config)#int vlan 100
AC1(config-if-VLAN 100)#ip ad 192.1.100.2 255.255.255.0
AC1(config-if-VLAN 100)#int lo 0
AC1(config-if-Loopback 0)#ip ad 11.1.0.21 255.255.255.255
AC1(config-if-Loopback 0)#exit
AC1(config)#int gi 0/1
EG1(config)#ip rout 11.1.0.21 255.255.255.255 10.1.0.18
EG1(config)#
AC1(config)#wlan-config 2 Test-JL_01
AC1(config-wlan)#enable-broad-ssid
AC1(config-wlan)#exit
AC1(config)#ap-group JL
AC1(config-group)#interface-mapping 2 20
AC1(config-group)#exit
AC1(config)#ip rout 0.0.0.0 0.0.0.0 11.1.0.35
ip dhcp pool Yonghu
network 194.1.20.0 255.255.255.0
dns-server 5.5.5.5
default-router 194.1.20.254
ip dhcp pool ap
network 194.1.10.0 255.255.255.0
dns-server 5.5.5.5
default-router 194.1.10.254
S5(config)#ip rout 11.1.0.21 255.255.255.255 10.1.0.14
AC2(config)#wlan-config 1 Test-GZ_66
AC2(config-wlan)#exit
AC2(config)#wlan-config 2 Test-JL_01
AC2(config-wlan)#exit
AC2(config)#wlan-config 1 Test-GZ_66
AC2(config-wlan)#enable-broad-ssid
AC2(config-wlan)#exit
AC2(config)#wlan-config 2 Test-JL_01
AC2(config-wlan)#enable-broad-ssid
AC2(config-wlan)#exit
AC2(config)#ap-group GZ
AC2(config-group)#interface-mapping 1 20
AC2(config-group)#interface-mapping 2 20
AC2(config-group)#exit
AC2(config)#ip rout 0.0.0.0 0.0.0.0 11.1.0.11
AC2(config)#ip rout 0.0.0.0 0.0.0.0 11.1.0.35
S5(config)#ip rout 11.1.0.21 255.255.255.255 10.1.0.14
S5(config)#ip rout 11.1.0.22 255.255.255.255 10.1.0.14
3333
S2(config)#service dhcp
S2(config)#ip dhcp pool AP1
S2(dhcp-config)#network 193.1.10.0 255.255.255.0
S2(dhcp-config)#default-router 193.1.10.254
S2(dhcp-config)#option 138 ip 11.1.0.31
S2(dhcp-config)#exit
S2(config)#ip dhcp pool PC1
S2(dhcp-config)#network 193.1.20.0 255.255.255.0
S2(dhcp-config)#default-router 193.1.20.254
S2(dhcp-config)#option 138 ip 11.1.0.31
S2(dhcp-config)#exit
S2(config)#ip rout 11.1.0.21 255.255.255.255 193.1.100.2
S2(config)#ip rout 11.1.0.22 255.255.255.255 193.1.100.3
AC1(config)#wlan-config 1 AP1
AC1(config)#show wlan-config summary
Total Wlan Num : 1
Wlan id Profile Name SSID STA NUM
-------- -------------------- -------------------- --------
1 Test-GZ_66 0
AC1(config)#wlan-config 2 AP1
AC1(config-wlan)#enable-broad-ssid
AC1(config-wlan)#exit
AC1(config)#ap-group AP1
AC1(config-group)#interface-mapping 2 10
AC1(config-group)#show ap-config summary
========= show ap status =========
Radio: Radio ID or Band: 2.4G = 1#, 5G = 2#
E = enabled, D = disabled, N = Not exist, V = Virtual AP
Current Sta number
Channel: * = Global
Power Level = Percent
Online AP number: 0
Offline AP number: 0
AP Name IP Address Mac Address Radio Radio Up/Off time State
---------------------------------------- --------------- -------------- ------------------- ------------------- ------------- -----
AC1(config-group)#exit
AC1(config)#ap-config PC1
AC2(config)#ap-g
AC2(config)#wlan-config 1 AP1
AC2(config-wlan)#enable-broad-ssid
AC2(config-wlan)#exit
AC2(config)#vlan 10
AC2(config-vlan)#vlan 20
AC2(config-vlan)#exit
AC2(config)#ap-group AP1
AC2(config-group)#interface-mapping 1 10
AC2(config-group)#exit
AC2(config)#ap-config AP1
AC2(config-ap)#ap-group AP1
AC2(config-ap)#exit
AC2(config)#show wlan-config summary
AC1(config)#wlan hot-backup 11.1.0.22
AC1(config-hotbackup)#context 10
AC1(config-hotbackup-ctx)#priority level 6
AC1(config-hotbackup-ctx)#ap-group AP1
AC1(config-hotbackup-ctx)#exit
AC1(config-hotbackup)#wlan hot-backup enable
AC1(config-hotbackup)#show wlan hot-backup
AC2(config)#wlan hot-backup 11.1.0.21
AC2(config-hotbackup)#context 10
AC2(config-hotbackup-ctx)#priority level 7
AC2(config-hotbackup-ctx)#ap-group AP1
AC2(config-hotbackup-ctx)#exit
AC2(config-hotbackup)#wlan hot-backup enable
AC2(config-hotbackup)#exit
AC2(config)#end
AC2(config)#wlansec 1
AC2(config-wlansec)#security rsn enable
AC2(config-wlansec)#security rsn ciphers aes enable
AC2(config-wlansec)#security ren ak
AC2(config-wlansec)#security rsn akm psk enable
AC2(config-wlansec)#security rsn akm psk set-key ascii 12345678
AC1(config)#wlansec 1
AC1(config-wlansec)#security rsn enable
AC1(config-wlansec)#security rsn ciphers aes enable
AC1(config-wlansec)#security rsn akm psk enable
AC1(config-wlansec)#security rsn akm psk set-key ascii 12345678
AC1(config)#wlan-config 2
AC1(config-wlan)#wlan-based per-user-limit d
AC1(config-wlan)#wlan-based per-user-limit down-streams a
AC1(config-wlan)#$ average-data-rate 800 burst-data-rate 1600
AC1(config)#schedule session 1
AC1(config)#schedule session 2
AC1(config)#schedule session 1
AC1(config)#schedule session 1 time-range 1 period Mon to Fri t
AC1(config)#$-range 1 period Mon to Fri time 21:00 to 23:30
AC1(config)#wlan-config 1
AC1(config-wlan)#schedule session 1
AC1(config-wlan)#exit
AC1(config)#sntp enable
AC2(config)#schedule session 1
AC2(config)#schedule session 1 time-range 1 period Mon to Fri t
AC2(config)#$-range 1 period Mon to Fri time 21:00 to 23:30
AC2(config)#wlan-config 1
AC2(config-wlan)#schedule session 1
AC2(config-wlan)#exit
AC2(config)#sntp enable
(四)
广州分布
全网可达配置
EG1(config)#ip rout 193.1.0.0 255.255.0.0 10.1.0.1
EG1(config)#ip rout 193.1.0.0 255.255.0.0 10.1.0.2
EG1(config)#ip access-list standard ACL110
EG1(config-std-nacl)#permit 10.1.0.0 0.0.255.255
EG1(config-std-nacl)#permit 11.1.0.0 0.0.0.255
EG1(config-std-nacl)#permit 193.1.10.0 0.0.0.255
EG1(config-std-nacl)#permit 193.1.20.0 0.0.0.255
EG1(config-std-nacl)#permit 193.1.30.0 0.0.0.255
EG1(config-std-nacl)#permit 193.1.40.0 0.0.0.255
EG1(config-std-nacl)#permit 193.1.100.0 0.0.0.255
配置策略路由
EG1(config)#route-map ACL110 permit
EG1(config-route-map)#match ip address ACL110
EG1(config-route-map)#set ip next-hop 10.1.0.17
EG1(config-route-map)#ex
应用策略路由
EG1(config)#int gi 0/3
EG1(config-if-GigabitEthernet 0/3)#ip policy route-map ACL110
EG1(config-if-GigabitEthernet 0/3)#exit
EG1(config)#ip rout 11.1.0.34 255.255.255.255 10.1.0.5
EG1(config)#ip rout 11.1.0.33 255.255.255.255 10.1.0.1
S3(config)#ip rout 10.1.0.0 255.255.255.0 10.1.0.2
S3(config)#ip rout 11.1.0.11 255.255.255.255 10.1.0.2
S4(config)#ip rout 10.1.0.0 255.255.255.0 10.1.0.6
S4(config)#ip rout 11.1.0.11 255.255.255.255 10.1.0.6
吉林分部:
R1(config)#ip rout 12.1.0.0 255.255.255.0 12.1.0.2
R1(config)#ip rout 13.1.0.0 255.255.255.0 13.1.0.3
R1(config)#ip access-list standard ACL110
R1(config-std-nacl)#permit 10.1.0.0 0.0.0.255
R1(config-std-nacl)#per 12.1.0.0 0.0.0.255
R1(config-std-nacl)#permit 13.1.0.0 0.0.0.255
R1(config-std-nacl)#permit 192.1.20.0 0.0.0.255
R1(config-std-nacl)#permit 192.1.30.0 0.0.0.255
R1(config-std-nacl)#permit 192.1.100.0 0.0.0.255
R1(config-std-nacl)#ex
R1(config)#route-map ACL110 permit
R1(config-route-map)#match ip address ACL110
R1(config-route-map)#set ip next-hop 12.1.0.2
R1(config-route-map)#set ip next-hop 12.1.0.2
R1(config-if-FastEthernet 1/0)#int vlan 20
R1(config-if-VLAN 20)#ip policy route-map ACL110
R1(config-if-VLAN 20)#int vlan 30
R1(config-if-VLAN 30)#ip policy route-map ACL110
R1(config-if-VLAN 30)#ex
R1(config)#ip rout 11.1.0.31 255.255.255.255 10.1.0.9
R1(config)#ip rout 11.1.0.21 255.255.255.255 10.1.0.9
R1(config)#ip rout 11.1.0.22 255.255.255.255 10.1.0.9
北京本部
EG2(config)#ip rout 10.1.0.0 255.255.255.0 10.1.0.22
EG2(config)#ip rout 11.1.0.3 255.255.255.255 10.1.0.22
EG2(config)#ip access-list standard ACL110
EG2(config-std-nacl)#permit 10.1.0.0 0.0.0.255
EG2(config-std-nacl)#permit 11.1.0.0 0.0.0.255
EG2(config-std-nacl)#permit 194.1.10.0 0.0.0.255
EG2(config-std-nacl)#permit 194.1.20.0 0.0.0.255
EG2(config-std-nacl)#ex
EG2(config)#route-map ACL110 permit
EG2(config-route-map)#match ip address ACL110
EG2(config-route-map)#set ip next-hop 10.1.0.22
EG2(config-route-map)#int gi 0/3
EG2(config-if-GigabitEthernet 0/3)#ip policy route-map ACL110
EG2(config-if-GigabitEthernet 0/3)#ex
EG2(config)#ip rout 11.1.0.35 255.255.255.255 10.1.0.13
EG2(config)#ip access-list extended 102
10 permit icmp any host 194.1.10.254
20 permit icmp any host 194.1.20.254
30 permit icmp any host 10.1.0.13
40 permit icmp any host 11.1.0.35
50 permit tcp any host 10.1.0.18 eq telnet
60 permit icmp any 10.1.0.0 0.0.0.255
70 permit tcp any host 10.1.0.18
80 permit tcp any 194.1.10.0 0.0.0.255 eq telnet
90 permit tcp any 194.1.20.0 0.0.0.255 eq telnet
100 permit tcp any 10.1.0.0 0.0.0.255 eq telnet
110 permit tcp any 11.1.0.0 0.0.0.255 eq telnet
120 permit ip any host 194.1.10.254
130 permit ip any host 194.1.20.254
140 permit ip any host 10.1.0.13
150 permit ip any host 11.1.0.35
160 permit ip host 14.1.0.3 any
170 permit ip host 13.1.0.3 any
180 permit ip host 10.1.0.22 any
190 permit ip host 11.1.0.3 any
EG2(config)#ip session filter 102
1、配置总部路由器和各分支路由器,使其能够正常访问互联网
保证在分支路由器上能够ping通总部路由器外网口公网IP地址。
2、在总部出口路由器上配置动态态IPSEC VPN隧道
(1)配置isakmp策略
crypto isakmp policy 1 //创建新的isakmp策略
encryption 3des //指定使用3DES进行加密
authentication pre-share //指定认证方式为“预共享密码”,如使用数字证书配置“authentication rsa-sig”,如使用数字信封配置“authentication digital-email”。
(2)配置预共享密钥
crypto isakmp key 0 ruijie address 0.0.0.0 0.0.0.0 //配置预共享密钥为“ruijie”,IPSEC客户端也必须配置相同的密钥。由于对端的 ip地址是动态的,因此使用address 0.0.0.0 0.0.0.0代表所有ipsec客户端
(3)配置ipsec加密转换集
crypto ipsec transform-set myset esp-des esp-md5-hmac //指定ipsec使用esp封装des加密、MD5检验
(4)配置动态ipsec加密图
crypto dynamic-map dymymap 5 //新建名为“dymymap”的动态ipsec加密图
set transform-set myset //指定加密转换集为“myset”
(5)将动态ipsec加密图映射到静态的ipsec加密图中
crypto map mymap 10 ipsec-isakmp dynamic dymymap //将动态的“dymymap”ipsec加密图映射至静态ipsec加密图mymap中
(6)将加密图应用到接口
interface GigabitEthernet 0/0
crypto map mymap
3、在总部路由器上配置路由,将各分支网段路由指向出口
ip route 192.168.1.0 255.255.255.0 10.0.0.2
ip route 192.168.2.0 255.255.255.0 10.0.0.2
ip route 192.168.3.0 255.255.255.0 10.0.0.2
......
4、在分支路由器上配置静态IPSEC VPN隧道(以分支1为例)
(1)配置ipsec感兴趣流
access-list 101 permit ip 192.168.1.0 0.0.0.255 192.168.0.0 0.0.0.255 //指定感兴趣流为源地址192.168.1.0/24,目的地址为192.168.0.0/24的网段。
(2)配置isakmp策略
crypto isakmp keepalive 5 periodic //配置IPSEC DPD探测功能
crypto isakmp policy 1 //创建新的isakmp策略
authentication pre-share //指定认证方式为“预共享密码”,如使用数字证书配置“authentication rsa-sig”,如使用数字信封配置“authentication digital-email”。
encryption 3des //指定使用3DES进行加密
(3)配置预共享密钥
crypto isakmp key 0 ruijie address 10.0.0.1 //指定peer 10.0.0.1的预共享密钥为“ruijie”,与总部出口路由器上配置的一致。如使用数字证书/信封认证则无需配置。
(4)配置ipsec加密转换集
crypto ipsec transform-set myset esp-des esp-md5-hmac //指定ipsec使用esp封装des加密、MD5检验
(5)配置ipsec加密图
crypto map mymap 5 ipsec-isakmp //新建名称为“mymap”的加密图
set peer 10.0.0.1 //指定peer地址
set transform-set myset //指定加密转换集为“myset”
match address 101 //指定感兴趣流为ACL 101
(6)将加密图应用到接口
interface dialer 0
crypto map mymap
5、在分支路由器上配置路由,将总部网段路由指向出口
ip route 192.168.0.0 255.255.255.0 dialer 0
1、配置路由器R1和R2,使R1和R2能够正常访问互联网,并互相能够ping通。
2、在R1配置静态IPSEC VPN隧道
(1)配置ipsec感兴趣流
access-list 101 permit ip 192.168.0.0 0.0.0.255 192.168.1.0 0.0.0.255 //指定感兴趣流为源地址192.168.0.0/24,目的地址为192.168.1.0/24的网段。
(2)配置isakmp策略
crypto isakmp keepalive 5 periodic //配置IPSEC DPD探测功能
crypto isakmp policy 1//创建新的isakmp策略
authentication pre-share //指定认证方式为“预共享密码”,如使用数字证书配置“authentication rsa-sig”,如使用数字信封配置“authentication digital-email”。
group 2 //
encryption 3des//指定使用3DES进行加密
(3)配置预共享密钥
crypto isakmp key 0 ruijie address 10.0.0.1 //指定peer 10.0.0.1的预共享密钥为“ruijie”,对端也必须配置一致的密钥。如使用数字证书/信封认证则无需配置。
(4)配置ipsec加密转换集
crypto ipsec transform-set myset esp-des esp-md5-hmac //指定ipsec使用esp封装des加密、MD5检验
(5)配置ipsec加密图
crypto map mymap 5 ipsec-isakmp //新建名称为“mymap”的加密图
set peer 10.0.0.1//指定peer地址
set transform-set myset//指定加密转换集“myset”
match address 101//指定感兴趣流为ACL 101
(6)将加密图应用到接口
interface F0/0
crypto map mymap
3、在R1配置路由,将局域网2网段路由指向出口
ip route 192.168.1.0 255.255.255.0 10.0.0.2
4、在R2配置静态IPSEC VPN隧道
(1)配置ipsec感兴趣流
access-list 101 permit ip 192.168.1.0 0.0.0.255 192.168.0.0 0.0.0.255 //指定感兴趣流为源地址192.168.1.0/24,目的地址为192.168.0.0/24的网段。
(2)配置isakmp策略
crypto isakmp policy 1//创建新的isakmp策略
authentication pre-share //指定认证方式为“预共享密码”,如使用数字证书配置“authentication rsa-sig”,如使用数字信封配置“authentication digital-email”。
encryption 3des//指定使用3DES进行加密
(3)配置预共享密钥
crypto isakmp key 0 ruijie address 10.0.0.2 //指定peer 10.0.0.1的预共享密钥为“ruijie”,对端也必须配置一致的密钥。如使用数字证书/信封认证则无需配置。
(4)配置ipsec加密转换集
crypto ipsec transform-set myset esp-des esp-md5-hmac //指定ipsec使用esp封装des加密、MD5检验
(5)配置ipsec加密图
crypto map mymap 5 ipsec-isakmp //新建名称为“mymap”的加密图
set peer 10.0.0.2//指定peer地址
set transform-set myset//指定加密转换集“myset”
match address 101//指定感兴趣流为ACL 101
(6)将加密图应用到接口
interface FastEthernet0/0
crypto map mymap
5、在R2配置路由,将局域网2网段路由指向出口
ip route 192.168.0.0 255.255.255.0 10.0.0.1
标签:0.0,赛项,职业院校,255.255,AC1,2022,ip,router,config
From: https://blog.51cto.com/u_15964895/6191127