一、拓扑图
二、实验要求
1. pc地址请自行规划,vlan已给出
2. 服务器地址自行规划,vlan,网段已给出
3. 交换机互联链路捆绑保证冗余性
4. 内网pc网关集中于核心交换机,交换机vlan 40互联路由器
,地址网段已给出
5.配置静态路由实现内外网互通(内网主机在公网上使用公网地址访问外网)
内网有线无线用户以拨号的形式访问外网(PPPoE)
6.外网主机vlan、地址网段已给出,自行规划地址及网关
7. 外网客户端可以访问内网FTP服务器(隐藏服务器内网地址)
8.利用基本ACL/高级ACL实现
pc1 不能访问服务器
pc3 不能访问pc4
注意:交换机也可以
调用ACL,可以使用traffic-filter 命令
9. 无线部分配置要求:管理vlan100,业务vlan101
AC作为服务器,为AP分配地址,接口地址池
SW3作为服务器为用户分配地址,接口地址池
AP管理组、安全模板、域管理模板、SSID模板、VAP模板等请自行规划,
用户能正确获取地址并连接无线网络为准,AC建立CAPWAP隧道源接口地址为vlanfi接口
三、配置命令
AR4:
[ar4]dis cu
[V200R003C00]
#sysname ar4
#board add 0/4 2SA
#undo info-center enable
#
acl number 2000 rule 10 permit source 192.168.10.0 0.0.0.255 rule 20 permit source 192.168.20.0 0.0.0.255 rule 101 permit source 192.168.101.0 0.0.0.255
#
aaa authentication-scheme defaultauthorization-scheme defaultaccounting-scheme defaultdomain default domain default_admin local-user admin password cipher %$%$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$local-user admin service-type http
#nat address-group 4 200.1.1.10 200.1.1.20
#
interface Serial4/0/0link-protocol pppppp chap user huaweippp chap password cipher %$%$smyT5"wVxGLN>.Eku2fN,.^~%$%$ip address 200.1.1.1 255.255.255.0 nat server protocol tcp global 200.1.1.21 ftp inside 192.168.30.1 ftpnat outbound 2000 address-group 4
#
interface Serial4/0/1link-protocol ppp
#
interface GigabitEthernet0/0/1ip address 10.1.1.2 255.255.255.0
#
ip route-static 0.0.0.0 0.0.0.0 Serial4/0/0
ip route-static 192.168.10.0 255.255.255.0 10.1.1.1
ip route-static 192.168.20.0 255.255.255.0 10.1.1.1
ip route-static 192.168.30.0 255.255.255.0 10.1.1.1
ip route-static 192.168.100.0 255.255.255.0 10.1.1.1
ip route-static 192.168.101.0 255.255.255.0 10.1.1.1
#
return
S3:
[Sw3]dis cu
#
sysname Sw3
#
undo info-center enable
#
vlan batch 10 20 30 40 100 to 101
#
dhcp enable
#
acl number 3000rule 10 deny ip source 192.168.10.1 0 destination 192.168.30.1 0
#
aaaauthentication-scheme defaultauthorization-scheme defaultaccounting-scheme defaultdomain defaultdomain default_adminlocal-user admin password simple adminlocal-user admin service-type http
#
interface Vlanif1
#
interface Vlanif10ip address 192.168.10.254 255.255.255.0dhcp select interface
#
interface Vlanif20ip address 192.168.20.254 255.255.255.0dhcp select interface
#
interface Vlanif30ip address 192.168.30.254 255.255.255.0dhcp select interface
#
interface Vlanif40ip address 10.1.1.1 255.255.255.0
#
interface Vlanif101ip address 192.168.101.254 255.255.255.0dhcp select interface
#
interface MEth0/0/1
#
interface Eth-Trunk1port link-type trunkport trunk allow-pass vlan 10 100 to 101
#
interface Eth-Trunk2port link-type trunkport trunk allow-pass vlan 20 100 to 101
#
interface GigabitEthernet0/0/1port link-type accessport default vlan 40
#
interface GigabitEthernet0/0/2port link-type accessport default vlan 30traffic-filter outbound acl 3000
#
interface GigabitEthernet0/0/3eth-trunk 1
#
interface GigabitEthernet0/0/4eth-trunk 1
#
interface GigabitEthernet0/0/5eth-trunk 2
#
interface GigabitEthernet0/0/6eth-trunk 2
#
interface GigabitEthernet0/0/7port link-type trunkport trunk allow-pass vlan 100 to 101
#
interface GigabitEthernet0/0/8
#
ip route-static 0.0.0.0 0.0.0.0 10.1.1.2#
return
AC:
[AC6605]dis cu
#
vlan batch 100 to 101
#
dhcp enable
#
interface Vlanif100ip address 192.168.100.254 255.255.255.0dhcp select interface
#
interface GigabitEthernet0/0/1port link-type trunkport trunk allow-pass vlan 100 to 101
#
interface GigabitEthernet0/0/2
#undo info-center enable
#
capwap source interface vlanif100
#
wlantraffic-profile name defaultsecurity-profile name defaultsecurity-profile name wlan-netsecurity wpa-wpa2 psk pass-phrase %^%#.],$1'A0v3fyOs28$.VWFo(}Xn*W@G&FB.*W!@V~
%^%# aessecurity-profile name default-wdssecurity-profile name default-meshssid-profile name defaultssid-profile name wlan-netssid wlan-netvap-profile name defaultvap-profile name wlan-netforward-mode tunnelservice-vlan vlan-id 101ssid-profile wlan-netsecurity-profile wlan-netwds-profile name defaultmesh-handover-profile name defaultmesh-profile name defaultregulatory-domain-profile name defaultair-scan-profile name defaultrrm-profile name defaultradio-2g-profile name defaultradio-5g-profile name defaultwids-spoof-profile name defaultwids-profile name defaultwireless-access-specificationap-system-profile name defaultport-link-profile name defaultwired-port-profile name defaultserial-profile name preset-enjoyor-toeap ap-group name defaultap-group name ap-group1radio 0vap-profile wlan-net wlan 1radio 1vap-profile wlan-net wlan 1ap-id 1 type-id 61 ap-mac 00e0-fc39-4180 ap-sn 210235448310AD5CEC06ap-name area1ap-group ap-group1ap-id 2 type-id 61 ap-mac 00e0-fcf9-1830 ap-sn 2102354483102877682Dap-name area2ap-group ap-group1provision-ap
#
return
S7:
[s7]]dis cu
#
sysname s7]
#
undo info-center enable
#
vlan batch 10 100 to 101
#
interface Vlanif1
#
interface MEth0/0/1
#
interface Eth-Trunk1port link-type trunkport trunk allow-pass vlan 10 100 to 101
#
interface GigabitEthernet0/0/1port link-type accessport default vlan 10
#
interface GigabitEthernet0/0/2port link-type accessport default vlan 10
#
interface GigabitEthernet0/0/3eth-trunk 1
#
interface GigabitEthernet0/0/4eth-trunk 1
#
interface GigabitEthernet0/0/5port link-type trunkport trunk pvid vlan 100port trunk allow-pass vlan 100 to 101
#
interface GigabitEthernet0/0/6
#
return
S8:
[s8]dis cu
#
sysname s8
#
undo info-center enable
#
vlan batch 20 100 to 101
#
acl number 3001rule 10 deny ip source 192.168.20.3 0 destination 192.168.20.4 0
#
drop-profile default
#
aaaauthentication-scheme defaultauthorization-scheme defaultaccounting-scheme defaultdomain defaultdomain default_adminlocal-user admin password simple adminlocal-user admin service-type http
#
interface Vlanif1
#
interface MEth0/0/1
#
interface Eth-Trunk2port link-type trunkport trunk allow-pass vlan 20 100 to 101
#
interface GigabitEthernet0/0/1port link-type accessport default vlan 20
#
interface GigabitEthernet0/0/2port link-type accessport default vlan 20traffic-filter outbound acl 3001
#
interface GigabitEthernet0/0/3
#
interface GigabitEthernet0/0/4port link-type trunkport trunk pvid vlan 100port trunk allow-pass vlan 100 to 101
#
interface GigabitEthernet0/0/5eth-trunk 2
#
interface GigabitEthernet0/0/6eth-trunk 2
#
interface GigabitEthernet0/0/7
#
interface NULL0
#
return
AR5:
[ar5]dis cu
[V200R003C00]
#sysname ar5
#board add 0/4 2SA
#undo info-center enable
#
dhcp enable
#
aaa authentication-scheme defaultauthorization-scheme defaultaccounting-scheme defaultdomain default domain default_admin local-user admin password cipher %$%$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$local-user admin service-type httplocal-user huawei password cipher %$%$"5_":.XY0UJ:+GUN5>^>>I#9%$%$local-user huawei privilege level 15local-user huawei service-type ppp
#
firewall zone Localpriority 15
#
interface Serial4/0/0link-protocol pppppp authentication-mode chap ip address 200.1.1.2 255.255.255.0
#
interface Serial4/0/1link-protocol ppp
#
interface GigabitEthernet0/0/0
#
interface GigabitEthernet0/0/0.1
#
interface GigabitEthernet0/0/0.2
#
interface GigabitEthernet0/0/1
#
interface GigabitEthernet0/0/1.1dot1q termination vid 100ip address 172.16.100.254 255.255.255.0 arp broadcast enable
#
interface GigabitEthernet0/0/1.2dot1q termination vid 200ip address 172.16.200.254 255.255.255.0 arp broadcast enable
#
interface GigabitEthernet0/0/2
#
interface NULL0
#
ip route-static 0.0.0.0 0.0.0.0 Serial4/0/0
#
return
S6:
[s6]dis cu
#
sysname s6
#
undo info-center enable
#
vlan batch 100 200
#
interface Vlanif1
#
interface MEth0/0/1
#
interface GigabitEthernet0/0/1port link-type trunkport trunk allow-pass vlan 100 200
#
interface GigabitEthernet0/0/2port link-type accessport default vlan 100
#
interface GigabitEthernet0/0/3port link-type accessport default vlan 200
#
interface GigabitEthernet0/0/4
#
interface GigabitEthernet0/0/5
#
interface NULL0
#
user-interface con 0
user-interface vty 0 4
#
return
完成过程可参照前面其他文章,文章仅为个人学习资料