ENSP Demo OSPF & ETH & IPSec & WAF & WLAN
总部有六个部门,规划如图所示:
1、计划每个部门最多 100 台主机,各属一个 VLAN ,各部门互通。
2、部署 MSTP + VRRP 协议做网关冗余,VLAN 10、20、30、无线默认走 AGSW7,VLAN 40、50、60 默认走 AGSW8 ,实现负载备份,充分利用设备
3、VRRP 追踪上行链路,实现对链路的监控
4、各部门的IP地址均有 DHCP 自动分配,CSW9、CSW10 均使能DHCP全局地址池;CSW9分配 1 ~ 100 IP地址,CSW10 分配 101 ~ 200 IP地址,排除 201 ~ 254 用作网关与备用IP地址。
5、汇聚设备 ASW7、ASW8 部署链路聚合做链路冗余
6、防火墙 FW1 划分 Trust、Untrust、DMZ 区域,所有部门均可访问 DMZ 区域。
7、防火墙 FW1 使能 NAT,经NAT转换后所有部门均可访问外网。
8、防火墙 FW1 与核心交换机 CSW9、CSW10 部署 OSPF 动态路由协议,并配置为骨干区域 Area 0
9、CSW9、CSW10、AGSW7、AGSW8 配置为 OSPF Stub 区域 Area 1 ,减小路由表
10、部署无线网络 ,各部门无线网络与有线网络属同一 VLAN
分支机构有四个部门
1、各部门之间互通,共用路由器 AR2 作为网关设备。
2、防火墙 FW2 与 路由器 AR2 间使用静态路由
3、防火墙 FW2 使能 NAT,经 NAT 转换后所有部门均可访问外网
总部与分支机构的防火墙均部署 IPSec VPN ,使两地互通。
其他:
1、总部内各部门间若要隔离,可再配置 MUX-VLAN
2、总部内同一部门内若要隔离,可再配置 Super VLAN
3、总部内限制某部门访问外网,可在防火墙配置策略
4、总部内 ACSW1 2 3 等接入交换机可配置 STP 边缘端口,防止主机插拔导致 STP 收敛
5、总部内 AP 部署过多,不方便调整信道。
下面是各设备接口规划
总部设备:
模拟Internet:
分支机构设备:
各设备配置:
极为相似的配置这里不再赘述
总部:
sys
sysname ACSW1
vlan batch 10 20 30 40 50 60 100 200
int e0/0/4
p l a
p d v 10
int e0/0/1
p l t
p t a v
int e0/0/2
p l t
undo p a v a
p t a v 10 100 200
int e0/0/3
p l t
p t a v 100 200
p t p v 200
stp re
reg mstp
revision-level 1
instance 1 vlan 10 20 30
instance 2 vlan 40 50 60
instance 3 vlan 100 200
ac re
sys
sysname AGSW7
vlan batch 10 20 30 40 50 60 100 200
int g0/0/1
p l t
p t a v a
int g0/0/2
p l t
p t a v a
int g0/0/3
p l t
p t a v a
int g0/0/4
p l t
p t a v a
int g0/0/5
p l t
p t a v a
int g0/0/6
p l t
p t a v a
int g0/0/7
p l t
p t a v a
int g0/0/8
p l t
p t a v a
stp re
reg mstp
revision-level 1
instance 1 vlan 10 20 30
instance 2 vlan 40 50 60
instance 3 vlan 100 200
ac re
sys
sysname AGSW8
vlan batch 10 20 30 40 50 60 100 200
int g0/0/1
p l t
p t a v a
int g0/0/2
p l t
p t a v a
int g0/0/3
p l t
p t a v a
int g0/0/4
p l t
p t a v a
int g0/0/5
p l t
p t a v a
int g0/0/6
p l t
p t a v a
int g0/0/7
p l t
p t a v a
int g0/0/8
p l t
p t a v a
stp re
reg mstp
revision-level 1
instance 1 vlan 10 20 30
instance 2 vlan 40 50 60
instance 3 vlan 100 200
ac re
sys
sysname CSW9
vlan batch 10 20 30 40 50 60 70 100 200
stp re
reg mstp
revision-level 1
instance 1 vlan 10 20 30
instance 2 vlan 40 50 60
instance 3 vlan 100 200
ac re
stp instance 1 root primary
stp instance 3 root primary
int g0/0/1
p l t
p t a v a
int g0/0/2
p l t
p t a v a
int eth-trunk 0
mode lacp-static
lacp priority 1
int g0/0/3
eth-trunk 0
int g0/0/4
eth-trunk 0
int vlanif 70
ip add 192.168.70.1 30
int g0/0/5
p l a
p d v 70
int g0/0/6
p l t
p t a v 100 200
int vlanif 10
ip add 192.168.10.252 24
int vlanif 20
ip add 192.168.20.252 24
int vlanif 30
ip add 192.168.30.252 24
int vlanif 40
ip add 192.168.40.252 24
int vlanif 50
ip add 192.168.50.252 24
int vlanif 60
ip add 192.168.60.252 24
int vlanif 100
ip add 192.168.100.252 24
int vlanif 10
vrrp vrid 10 virtual-ip 192.168.10.254
vrrp vrid 10 priority 120
vrrp vrid 10 track interface g0/0/5 reduced 50
int vlanif 20
vrrp vrid 20 virtual-ip 192.168.20.254
vrrp vrid 20 priority 120
vrrp vrid 20 track interface g0/0/5 reduced 50
int vlanif 30
vrrp vrid 30 virtual-ip 192.168.30.254
vrrp vrid 30 priority 120
vrrp vrid 30 track interface g0/0/5 reduced 50
int vlanif 40
vrrp vrid 40 virtual-ip 192.168.40.254
vrrp vrid 40 priority 90
vrrp vrid 40 track interface g0/0/5
int vlanif 50
vrrp vrid 50 virtual-ip 192.168.50.254
vrrp vrid 50 priority 90
vrrp vrid 50 track interface g0/0/5
int vlanif 60
vrrp vrid 60 virtual-ip 192.168.60.254
vrrp vrid 60 priority 90
vrrp vrid 60 track interface g0/0/5
int vlanif 100
vrrp vrid 100 virtual-ip 192.168.100.254
vrrp vrid 100 priority 120
vrrp vrid 100 track interface g0/0/5 reduced 50
ospf 1 router-id 9.9.9.9
a 0
net 192.168.70.1 0.0.0.0
q
a 1
stub
net 192.168.10.0 0.0.0.255
net 192.168.20.0 0.0.0.255
net 192.168.30.0 0.0.0.255
net 192.168.40.0 0.0.0.255
net 192.168.50.0 0.0.0.255
net 192.168.60.0 0.0.0.255
net 192.168.100.0 0.0.0.255
q
dhcp enable
ip pool vlan10
network 192.168.10.0 mask 24
gateway-list 192.168.10.254
excluded-ip-address 192.168.10.101 192.168.10.253
dns-list 192.168.90.10
lease day 3
ip pool vlan20
network 192.168.20.0 mask 24
gateway-list 192.168.20.254
excluded-ip-address 192.168.20.101 192.168.20.253
dns-list 192.168.90.10
lease day 3
ip pool vlan30
network 192.168.30.0 mask 24
gateway-list 192.168.30.254
excluded-ip-address 192.168.30.101 192.168.30.253
dns-list 192.168.90.10
lease day 3
ip pool vlan40
network 192.168.40.0 mask 24
gateway-list 192.168.40.254
excluded-ip-address 192.168.40.101 192.168.40.253
dns-list 192.168.90.10
lease day 3
ip pool vlan50
network 192.168.50.0 mask 24
gateway-list 192.168.50.254
excluded-ip-address 192.168.50.101 192.168.50.253
dns-list 192.168.90.20
lease day 3
ip pool vlan60
network 192.168.60.0 mask 24
gateway-list 192.168.60.254
excluded-ip-address 192.168.60.101 192.168.60.253
dns-list 192.168.90.20
lease day 3
int vlanif 10
dhcp select global
int vlanif 20
dhcp select global
int vlanif 30
dhcp select global
int vlanif 40
dhcp select global
int vlanif 50
dhcp select global
int vlanif 60
dhcp select global
sys
sysname CSW10
vlan batch 10 20 30 40 50 60 80 100 200
stp re
reg mstp
revision-level 1
instance 1 vlan 10 20 30
instance 2 vlan 30 40 50
instance 3 vlan 100 200
ac re
stp instance 2 root primary
int g0/0/1
p l t
p t a v a
int g0/0/2
p l t
p t a v a
int eth-trunk 0
mode lacp-static
lacp priority 2
int g0/0/3
eth-trunk 0
int g0/0/4
eth-trunk 0
int vlanif 80
ip add 192.168.80.1 30
int g0/0/5
p l a
p d v 80
int g0/0/6
p l t
p t a v 100 200
int vlanif 10
ip add 192.168.10.253 24
int vlanif 20
ip add 192.168.20.253 24
int vlanif 30
ip add 192.168.30.253 24
int vlanif 40
ip add 192.168.40.253 24
int vlanif 50
ip add 192.168.50.253 24
int vlanif 60
ip add 192.168.60.253 24
int vlanif 100
ip add 192.168.100.253 24
int vlanif 10
vrrp vrid 10 virtual-ip 192.168.10.254
vrrp vrid 10 priority 90
vrrp vrid 10 track interface g0/0/5
int vlanif 20
vrrp vrid 20 virtual-ip 192.168.20.254
vrrp vrid 20 priority 90
vrrp vrid 20 track interface g0/0/5
int vlanif 30
vrrp vrid 30 virtual-ip 192.168.30.254
vrrp vrid 30 priority 90
vrrp vrid 30 track interface g0/0/5
int vlanif 40
vrrp vrid 40 virtual-ip 192.168.40.254
vrrp vrid 40 priority 120
vrrp vrid 40 track interface g0/0/5 reduced 50
int vlanif 50
vrrp vrid 50 virtual-ip 192.168.50.254
vrrp vrid 50 priority 120
vrrp vrid 50 track interface g0/0/5 reduced 50
int vlanif 60
vrrp vrid 60 virtual-ip 192.168.60.254
vrrp vrid 60 priority 120
vrrp vrid 60 track interface g0/0/5 reduced 50
int vlanif 100
vrrp vrid 100 virtual-ip 192.168.100.254
vrrp vrid 100 priority 90
vrrp vrid 100 track interface g0/0/5
ospf 1 router-id 10.10.10.10
a 0
net 192.168.80.1 0.0.0.0
q
a 1
stub
net 192.168.10.0 0.0.0.255
net 192.168.20.0 0.0.0.255
net 192.168.30.0 0.0.0.255
net 192.168.40.0 0.0.0.255
net 192.168.50.0 0.0.0.255
net 192.168.60.0 0.0.0.255
net 192.168.100.0 0.0.0.255
q
dhcp enable
ip pool vlan10
network 192.168.10.0 mask 24
gateway-list 192.168.10.254
excluded-ip-address 192.168.10.1 192.168.10.100
excluded-ip-address 192.168.10.201 192.168.10.253
dns-list 192.168.90.10
lease day 3
ip pool vlan20
network 192.168.20.0 mask 24
gateway-list 192.168.20.254
excluded-ip-address 192.168.20.1 192.168.20.100
excluded-ip-address 192.168.20.201 192.168.20.253
dns-list 192.168.90.10
lease day 3
ip pool vlan30
network 192.168.30.0 mask 24
gateway-list 192.168.30.254
excluded-ip-address 192.168.30.1 192.168.30.100
excluded-ip-address 192.168.30.201 192.168.30.253
dns-list 192.168.90.10
lease day 3
ip pool vlan40
network 192.168.40.0 mask 24
gateway-list 192.168.40.254
excluded-ip-address 192.168.40.1 192.168.40.100
excluded-ip-address 192.168.40.201 192.168.40.253
dns-list 192.168.90.10
lease day 3
ip pool vlan50
network 192.168.50.0 mask 24
gateway-list 192.168.50.254
excluded-ip-address 192.168.50.1 192.168.50.100
excluded-ip-address 192.168.50.201 192.168.50.253
dns-list 192.168.90.20
lease day 3
ip pool vlan60
network 192.168.60.0 mask 24
gateway-list 192.168.60.254
excluded-ip-address 192.168.60.1 192.168.60.100
excluded-ip-address 192.168.60.201 192.168.60.253
dns-list 192.168.90.20
lease day 3
int vlanif 10
dhcp select global
int vlanif 20
dhcp select global
int vlanif 30
dhcp select global
int vlanif 40
dhcp select global
int vlanif 50
dhcp select global
int vlanif 60
dhcp select global
sys
sysname FW1
firewall zone trust
add int g1/0/0
add int g1/0/1
firewall zone untrust
add int g1/0/3
firewall zone dmz
add int g1/0/2
int g1/0/0
ip add 192.168.70.2 30
service-m ping permit
service-m ssh permit
service-m http permit
service-m https permit
int g1/0/1
ip add 192.168.80.2 30
ip add 192.168.70.2 30
service-m ping permit
service-m ssh permit
service-m http permit
service-m https permit
int g1/0/2
ip add 192.168.90.2 24
ip add 192.168.70.2 30
service-m ping permit
service-m ssh permit
service-m http permit
service-m https permit
int g1/0/3
ip add 12.0.0.1 30
ip add 192.168.70.2 30
service-m ping permit
service-m ssh permit
service-m http permit
service-m https permit
q
ip route-static 0.0.0.0 0 12.0.0.2
ospf 1 router-id 1.1.1.1
defulat-route-advertise
a 0
net 192.168.70.2 0.0.0.0
net 192.168.80.2 0.0.0.0
net 192.168.90.2 0.0.0.0
security-policy
rule name 1
aaction permit
nat-policy
rule name 1
source-address 192.168.0.0 0.0.255.255
destination-address 172.16.0.0 0.0.255.255
action no-nat
rule name 2
source-address 172.16.0.0 0.0.255.255
destination-address 192.168.0.0 0.0.255.255
action no-nat
rule name 5
source-zone trust
destination-zone untrust
action source-nat easy-ip
acl 3000
rule 5 permit ip source 192.168.0.0 0.0.255.255 destination 172.16.0.0 0.0.255.255
ipsec proposal ipsecvpn
encapsulation-mode tunnel
transform esp
esp authentication-algorithm sha2-256
esp encryption-algorithm aes-128
ike proposal 1
authentication-method pre-share
authentication-algorithm sha2-256
encryption-algorithm aes-256
dh group14
sa duration 3600
ike peer 1
exchange-mode main
pre-shared-key cipher zx@123
ike-proposal 1
remote-address 23.0.0.1
local-id 12
remote-id 23
ipsec policy ipsecvpn 1 isakmp
security acl 3000
proposal ipsecvpn
ike-peer 1
int g1/0/3
ipsec policy ipsecvpn
分支机构:
sys
sysname ACSW15
vlan batch 10 20
int e0/0/1
p l t
p t a v a
int e0/0/2
p l a
p d v 10
sys
sysname AGSW13
vlan batch 10 20
int g0/0/1
p l t
p t a v a
int g0/0/2
p l t
p t a v a
int g0/0/3
p l t
p t a v a
sys
sysname AGSW14
vlan batch 30 40
int g0/0/1
p l t
p t a v a
int g0/0/2
p l t
p t a v a
int g0/0/3
p l t
p t a v a
sys
sysname AR2
dhcp enable
int g0/0/0
ip add 172.16.50.1 30
int g0/0/1.10
dot1q termination vid 10
ip add 172.16.10.254 24
arp broadcast enable
dhcp select interface
int g0/0/1.20
dot1q termination vid 20
ip add 172.16.20.254 24
arp broadcast enable
dhcp select interface
int g2/0/0.30
dot1q termination vid 30
ip add 172.16.30.254 24
arp broadcast enable
dhcp select interface
int g2/0/0.40
dot1q termination vid 40
ip add 172.16.40.254 24
arp broadcast enable
dhcp select interface
ip route-static 0.0.0.0 0 172.16.50.2
sys
sysname FW2
int g1/0/1
ip add 172.16.50.2 30
int g1/0/0
ip add 23.0.0.1 30
firewall zone trust
add interface g1/0/1
firewall zone untrust
add interface g1/0/0
ip route-static 0.0.0.0 0 23.0.0.2
ip route-static 172.16.0.0 16 172.16.50.1
security-policy
rule name 1
action permit
nat-policy
rule name 1
source-address 172.16.0.0 0.0.255.255
destination-address 192.168.0.0 0.0.255.255
action no-nat
rule name 2
source-address 192.168.0.0 0.0.255.255
destination-address 172.16.0.0 0.0.255.255
action no-nat
rule name 5
source-zone trust
destination-zone untrust
action source-nat easy-ip
int g1/0/1
service-manage ping permit
service-manage ssh permit
service-manage http permit
service-manage https permit
int g1/0/0
service-manage ping permit
service-manage ssh permit
service-manage http permit
service-manage https permit
acl 3000
rule 5 permit ip source 172.16.0.0 0.0.255.255 destination 192.168.0.0 0.0.255.255
ipsec proposal ipsecvpn
encapsulation-mode tunnel
transform esp
esp authentication-algorithm sha2-256
esp encryption-algorithm aes-128
ike proposal 1
authentication-method pre-share
authentication-algorithm sha2-256
encryption-algorithm aes-256
dh group14
sa duration 3600
ike peer 1
exchange-mode main
pre-shared-key cipher zx@123
ike-proposal 1
remote-address 12.0.0.1
local-id 23
remote-id 12
ipsec policy ipsecvpn 1 isakmp
security acl 3000
proposal ipsecvpn
ike-peer 1
int g1/0/0
ipsec policy ipsecvpn
AC配置
sys
sysname AC1
vlan batch 200
stp re
reg mstp
revision-level 1
instance 1 vlan 10 20 30
instance 2 vlan 30 40 50
instance 3 vlan 100 200
ac re
dhcp enable
int vlan 200
ip add 192.168.200.254 24
dhcp select interface
capture-packet
capwap source interface vlanif 200
int g0/0/1
p l t
p t a v a
q
vlan pool vlan123456
vlan 10 20 30 40 50 60
wlan
security-profile name 1
security wpa-wpa2 psk pass-phrase zxc@1234 aes
q
ssid-profile name 1
ssid vlan100_wifi
vap-profile name 1
security-profile 1
ssid-profile 1
service-vlan vlan123456
q
ap auth-mode no-auth
ap-group name default
vap-profile 1 wlan 1 radio all
【推荐】国内首个AI IDE,深度理解中文开发场景,立即下载体验Trae
【推荐】编程新体验,更懂你的AI,立即体验豆包MarsCode编程助手
【推荐】抖音旗下AI助手豆包,你的智能百科全书,全免费不限次数
【推荐】轻量又高性能的 SSH 工具 IShell:AI 加持,快人一步
· DeepSeek 开源周回顾「GitHub 热点速览」
· 记一次.NET内存居高不下排查解决与启示
· 物流快递公司核心技术能力-地址解析分单基础技术分享
· .NET 10首个预览版发布:重大改进与新特性概览!
· .NET10 - 预览版1新功能体验(一)