网络拓扑规划与配置之详细记录

Updated on in 网络 with 465 views

最近拿到网络配置实训的题目,其主要包含设备配置部分和服务器配置部分,都拿来认真的做了一下,准备做一次完整的记录(保不定以后就摸不到交换机路由器了)。

此篇主要讲述的是设备的配置与规划,服务器的配置部分其实比较简单,且大互联网都能找到。文档比较长主要需求点如下:

  • 基础配置
  • VLAN 配置
  • VRRP 配置
  • MSTP 配置
  • OSPF 配置
  • PPP 配置
  • L2TP VPN 配置
  • NAT 配置
  • IPSec 配置

拓扑及地址规划

该项目中分别由总公司网络和分公司网络两部分组成;总公司有人事部、财务部、销售部和技术部四个部门,杭州分公司设有销售二部。

总公司的网络采用双核心架构,以实现网络的高可用性和高可靠性,并采用双出口的网络接入模式,都使用路由器接入城域网和互联网。允许 SOHO 办公和出差的员工能够方便、快捷、安全的访问总公司内网服务器群。

image.png

根据上门的拓扑图在 GNS 中进行规划连线转化为下面的有详细说明的拓扑结构,包括接口地址,VLAN 地址、OSPF 区域都有详细的标注,这是在配置之前比较关键的一步。

image.png

最后通过上图整理一份详细的接口地址表、VLAN 名称表和服务器地址表

接口地址表

VLAN 名称表

服务器地址表

兼容真实环境

做好这些拓扑规划之后,还必须适配真实实验室的环境。这个时候问题就出现了。

第一个问题,拓扑中一共需要三台交换机设备,而实验室机柜缺一台,此时考虑将分公司的交换机去掉改成直连路由器。

第二个问题,实验室设备的中路由器一共四台,且串口线已经两两相连,无法改动,此时只能按照实验室设备的摆放规划哪台路由器需要做什么。

第三个问题是有两台路由器只有一个 S 口,此时需要考虑用 F 口替代,下表即指定了哪些接口替代哪些接口的具体方案。

问题还是挺多的,整理完这些问题之后就可以上手配置了。

此时需要一条 Console 线,Windows 系统可以考虑用 SCRT 或者 PUTTY 连接,而 Mac 系统的话只需要下面这条命令连接设备。

screen /dev/cu.usbserial-AH06DB0K 9600

该命令其实也意为指定 Console 口和波特率。

基础配置

基础配置即一些接口地址的配置,有了前面地址表的完整规划之后,配置也就非常的方便了。

OUT

interface Serial 2/0
 ip address 61.160.5.2 255.255.255.248
 clock rate 64000
!
interface FastEthernet 0/0
 ip address 61.160.5.9 255.255.255.248
!
interface FastEthernet 0/1
 ip address 12.1.1.254 255.255.255.0
!

ISP

interface Serial 2/0
 ip address 200.1.0.2 255.255.255.0
!
interface Serial 3/0
 ip address 200.2.0.2 255.255.255.0
 clock rate 64000
!

RHQ

interface Serial 2/0
 ip address 61.160.5.6 255.255.255.248
!
interface Serial 3/0
 ip address 200.1.0.1 255.255.255.0
 clock rate 64000
!
interface FastEthernet 0/0
 ip address 172.16.3.2 255.255.255.252
!
interface FastEthernet 0/1
 ip address 172.16.4.2 255.255.255.252
!

RBR

interface Serial 2/0
 ip address 200.2.0.1 255.255.255.0
!
interface FastEthernet 0/0
 ip address 10.70.0.254 255.255.0.0
!
interface FastEthernet 0/1
 ip address 61.160.5.14 255.255.255.248
!
interface Loopback 0
 ip address 2.2.2.2 255.255.255.255
!

VLAN 配置

配置完路由器接口,接着配置一下交换机的 VLAN,和三层交换机 VLAN 的接口,此时的 VLAN 的名称和地址需要根据接口地址表和 VLAN 名称表配置,也相对简单。

SAS

vlan 10
 name personnel
!
vlan 20
 name finance
!
vlan 30
 name sales_master
!
vlan 40
 name technology
!
vlan 50
 name server
!
interface FastEthernet 0/2
 switchport access vlan 50
!
interface FastEthernet 0/3
 switchport access vlan 50
!
interface FastEthernet 0/10
 switchport mode trunk
!

SA1

vlan 10
 name personnel
!
vlan 20
 name finance
!
vlan 30
 name sales_master
!
vlan 40
 name technology
!
vlan 50
 name server
!
interface FastEthernet 0/1
 switchport mode trunk
!
interface FastEthernet 0/2
 switchport access vlan 10
!
interface FastEthernet 0/3
 switchport access vlan 20
!
interface FastEthernet 0/4
 switchport access vlan 30
!
interface FastEthernet 0/5
 switchport access vlan 40
!
interface FastEthernet 0/10
 switchport mode trunk
!

SC1 & SC2

vlan 10
 name personnel
!
vlan 20
 name finance
!
vlan 30
 name sales_master
!
vlan 40
 name technology
!
vlan 50
 name server
!
interface FastEthernet 0/1
 switchport mode trunk
!
interface FastEthernet 0/10
 switchport mode trunk
!

VRRP 配置

SC1

VRRP 只需要在每个 VLAN 接口下配置虚拟 IP 和优先级即可,SC1 VLAN50 的优先级为 120,其余为默认的 100,而 SC2 正好与 SC1 相反配置。

interface VLAN 10
 ip address 10.10.0.253 255.255.0.0
 vrrp 1 ip 10.10.0.252
!
interface VLAN 20
 ip address 10.20.0.253 255.255.0.0
 vrrp 2 ip 10.20.0.252
!
interface VLAN 30
 ip address 10.30.0.253 255.255.0.0
 vrrp 3 ip 10.30.0.252
!
interface VLAN 40
 ip address 10.40.0.253 255.255.0.0
 vrrp 4 ip 10.40.0.252
!
interface VLAN 50
 vrrp 5 priority 120
 vrrp 5 ip 10.50.0.252
!

SC2

interface VLAN 10
 ip address 10.10.0.254 255.255.0.0
 vrrp 1 priority 120
 vrrp 1 ip 10.10.0.252
!
interface VLAN 20
 ip address 10.20.0.254 255.255.0.0
 vrrp 2 priority 120
 vrrp 2 ip 10.20.0.252
!
interface VLAN 30
 ip address 10.30.0.254 255.255.0.0
 vrrp 3 priority 120
 vrrp 3 ip 10.30.0.252
!
interface VLAN 40
 ip address 10.40.0.254 255.255.0.0
 vrrp 4 priority 120
 vrrp 4 ip 10.40.0.252
!
interface VLAN 50
 ip address 10.50.0.254 255.255.0.0
 vrrp 5 ip 10.50.0.252
!

MSTP 配置

MSTP 需要在四个交换机上都配置一下,并且在三层交换机声明一下主备。

SAS & SA1

spanning-tree
spanning-tree mst configuration
 revision 1
 name MSTP
 instance 0 vlan 1-9, 11-19, 21-29, 31-39, 41-49, 51-4094
 instance 10 vlan 10, 20
 instance 20 vlan 30, 40
 instance 30 vlan 50
!

SC1

spanning-tree
spanning-tree mst configuration
 revision 1
 name MSTP
 instance 0 vlan 1-9, 11-19, 21-29, 31-39, 41-49, 51-4094
 instance 10 vlan 10, 20
 instance 20 vlan 30, 40
 instance 30 vlan 50
spanning-tree mst 10 priority 4096
spanning-tree mst 20 priority 4096
spanning-tree mst 30 priority 0
!

SC2

spanning-tree
spanning-tree mst configuration
 revision 1
 name MSTP
 instance 0 vlan 1-9, 11-19, 21-29, 31-39, 41-49, 51-4094
 instance 10 vlan 10, 20
 instance 20 vlan 30, 40
 instance 30 vlan 50
spanning-tree mst 10 priority 0
spanning-tree mst 20 priority 0
spanning-tree mst 30 priority 4096
!

OSPF 配置

OSPF 配置需要注意的是 router-id 的配置,OSPF 虚链路的配置,以及虚链路的 MD5 加密。

ISP

router ospf 10
 router-id 3.3.3.3
 network 200.1.0.0 0.0.0.255 area 10
 network 200.2.0.0 0.0.0.255 area 10
!

RHQ

router ospf 10
 router-id 1.1.1.1
 network 10.99.0.0 0.0.255.255 area 0
 network 172.16.3.0 0.0.0.3 area 0
 network 172.16.4.0 0.0.0.3 area 0
 network 200.1.0.0 0.0.0.255 area 10
 area 10 virtual-link 2.2.2.2 authentication message-digest
 area 10 virtual-link 2.2.2.2 message-digest-key 1 md5 cisco123
 default-information originate always metric 150
!
ip route 0.0.0.0 0.0.0.0 Serial 2/0
!

RBR

router ospf 10
 router-id 2.2.2.2
 network 10.70.0.0 0.0.255.255 area 20
 network 200.2.0.0 0.0.0.255 area 10
 area 10 virtual-link 1.1.1.1 authentication message-digest
 area 10 virtual-link 1.1.1.1 message-digest-key 1 md5 cisco123
 default-information originate always metric 150
!
ip route 0.0.0.0 0.0.0.0 FastEthernet 0/1
!

SC1

router ospf 10
 network 10.10.0.0 0.0.255.255 area 0
 network 10.20.0.0 0.0.255.255 area 0
 network 10.30.0.0 0.0.255.255 area 0
 network 10.40.0.0 0.0.255.255 area 0
 network 10.50.0.0 0.0.255.255 area 0
 network 172.16.3.0 0.0.0.3 area 0
!

SC2

router ospf 10
 network 10.10.0.0 0.0.255.255 area 0
 network 10.20.0.0 0.0.255.255 area 0
 network 10.30.0.0 0.0.255.255 area 0
 network 10.40.0.0 0.0.255.255 area 0
 network 10.50.0.0 0.0.255.255 area 0
 network 172.16.4.0 0.0.0.3 area 0
!

PPP 配置

PPP 需求使用的是 CHAP 认证,CHAP 分单向人证和双向认证,需求中明确指定了主验方和被验方,即为单向验证,之后在 ISP 两边分别配置 PPP 握手协议即可。

RBR

username ISP password netlab
!
interface Serial 2/0
 encapsulation PPP
 ip ospf authentication message-digest
 ip ospf message-digest-key 1 md5 cisco123
 ip address 200.2.0.1 255.255.255.0
!

ISP

username RHQ password netlab
username RBR password netlab
!
interface Serial 2/0
 encapsulation PPP
 ip ospf authentication message-digest
 ip ospf message-digest-key 1 md5 cisco123
 ip address 200.1.0.2 255.255.255.0
!
interface Serial 3/0
 encapsulation PPP
 ppp authentication chap
 ip ospf authentication message-digest
 ip ospf message-digest-key 1 md5 cisco123
 ip address 200.2.0.2 255.255.255.0
 clock rate 64000
!

RHQ

username ISP password netlab
!
interface Serial 3/0
 encapsulation PPP
 ppp authentication chap
 ip ospf authentication message-digest
 ip ospf message-digest-key 1 md5 cisco123
 ip address 200.1.0.1 255.255.255.0
 clock rate 64000
!

L2TP VPN 配置

这一部分采坑比较多,思科模拟器上配置是好的,到了锐捷设备上是各种炸,最后尝试拨号时段时序,左后把协议从 l2tp 改成 any 之后稍稳定下来了。

配置其实就是四步走:

  1. 开启 VPDN 并建立分组
  2. 创建 VPN 的用户名和密码,客户端拨号使用
  3. 创建环回口供 VPN 虚拟模板配置 IP 使用,该环回口即 VPN 地址池的网关
  4. 创建 VPN 虚拟模板,创建 VPN 分配的地址池,绑定环回口和地址池即可

RHQ

vpdn enable
!
vpdn-group L2TP
 accept-dialin
  protocol any
  virtual-template 1
!
username vpn password cisco123
!
interface Loopback 99
 ip address 10.99.0.254 255.255.0.0
!
interface Virtual-Template 1
 ppp authentication chap
 ip nat inside
 ip unnumbered Loopback 99
 peer default ip address pool VPN_POOL
!
ip local pool VPN_POOL 10.99.0.200 10.99.0.240
!

NAT 配置 & IPSEC 配置

总公司和分公司都需要出公网,需要在 RHQ 和 RAR 上分别配置 NAT,可以通过端口复用的方法或者静态绑定的方法完成配置。

IPSEC VPN 配置需要对 NAT 的流量进行一次排流,并重新匹配,这两个过程一般都是先配置好 NAT 测试成功后继而在配置 IPSEC,为了方便,我讲最后的 NAT 和 IPSEC 的配置放在一起。

RBR

time-range WORK_TIME
 periodic Daily 9:00 to 18:00
!
username ISP password netlab
!
ip access-list extended 100
 10 deny ip 10.70.0.0 0.0.255.255 10.10.0.0 0.0.255.255
 20 deny ip 10.70.0.0 0.0.255.255 10.20.0.0 0.0.255.255
 30 deny ip 10.70.0.0 0.0.255.255 10.30.0.0 0.0.255.255
 40 deny ip 10.70.0.0 0.0.255.255 10.40.0.0 0.0.255.255
 50 deny ip 10.70.0.0 0.0.255.255 10.50.0.0 0.0.255.255
 60 permit ip 10.70.0.0 0.0.255.255 any time-range WORK_TIME
!
ip access-list extended 120
 10 permit ip 10.70.0.0 0.0.255.255 10.10.0.0 0.0.255.255
 20 permit ip 10.70.0.0 0.0.255.255 10.20.0.0 0.0.255.255
 30 permit ip 10.70.0.0 0.0.255.255 10.30.0.0 0.0.255.255
 40 permit ip 10.70.0.0 0.0.255.255 10.40.0.0 0.0.255.255
 50 permit ip 10.70.0.0 0.0.255.255 10.50.0.0 0.0.255.255
!
crypto isakmp policy 1
 authentication pre-share
 hash md5
!
crypto isakmp key 7 02404a241b096f517c address 61.160.5.6
crypto ipsec transform-set TRAN  esp-3des esp-md5-hmac
crypto map VPN_MAP 1 ipsec-isakmp
 set peer 61.160.5.6
 set transform-set TRAN
 match address 120
!
ip nat pool NAT_POOL 61.160.5.10 61.160.5.13 netmask 255.255.255.248
ip nat inside source list 100 pool NAT_POOL
!
interface FastEthernet 0/0
 ip nat inside
 ip address 10.70.0.254 255.255.0.0
!
interface FastEthernet 0/1
 ip nat outside
 ip address 61.160.5.14 255.255.255.248
 crypto map VPN_MAP
!

RHQ

ip access-list standard 1
 10 permit 10.50.0.0 0.0.255.255
!
ip access-list extended 100
 10 permit ip host 10.50.0.1 any
 20 permit ip host 10.50.0.2 any
!
ip access-list extended 110
 10 deny ip 10.10.0.0 0.0.255.255 10.70.0.0 0.0.255.255
 20 deny ip 10.20.0.0 0.0.255.255 10.70.0.0 0.0.255.255
 30 deny ip 10.30.0.0 0.0.255.255 10.70.0.0 0.0.255.255
 40 deny ip 10.40.0.0 0.0.255.255 10.70.0.0 0.0.255.255
 50 deny ip 10.50.0.0 0.0.255.255 10.70.0.0 0.0.255.255
 60 permit ip 10.50.0.0 0.0.255.255 any
 70 permit ip 10.40.0.0 0.0.255.255 any
 80 permit ip 10.30.0.0 0.0.255.255 any
 90 permit ip 10.20.0.0 0.0.255.255 any
 100 permit ip 10.10.0.0 0.0.255.255 any
!
ip access-list extended 120
 10 permit ip 10.10.0.0 0.0.255.255 10.70.0.0 0.0.255.255
 20 permit ip 10.20.0.0 0.0.255.255 10.70.0.0 0.0.255.255
 30 permit ip 10.30.0.0 0.0.255.255 10.70.0.0 0.0.255.255
 40 permit ip 10.40.0.0 0.0.255.255 10.70.0.0 0.0.255.255
 50 permit ip 10.50.0.0 0.0.255.255 10.70.0.0 0.0.255.255
!
crypto isakmp policy 1
 authentication pre-share
 hash md5
!
crypto isakmp key 7 03403e0b0531527d46 address 61.160.5.14
crypto ipsec transform-set TRAN  esp-3des esp-md5-hmac
crypto map VPN_MAP 1 ipsec-isakmp
 set peer 61.160.5.14
 set transform-set TRAN
 match address 120
!
interface Serial 2/0
 ip nat outside
 ip address 61.160.5.6 255.255.255.248
 crypto map VPN_MAP
!
interface Serial 3/0
 encapsulation PPP
 ppp authentication chap
 ip ospf authentication message-digest
 ip ospf message-digest-key 1 md5 cisco123
 ip address 200.1.0.1 255.255.255.0
 clock rate 64000
!
interface FastEthernet 0/0
 ip nat inside
 ip address 172.16.3.2 255.255.255.252
!
interface FastEthernet 0/1
 ip nat inside
 ip address 172.16.4.2 255.255.255.252
!
ip nat pool NAT_POOL 61.160.5.3 61.160.5.5 netmask 255.255.255.248
ip nat inside source static tcp 10.50.0.1 80 61.160.5.6 80
ip nat inside source static tcp 10.50.0.2 20 61.160.5.6 20
ip nat inside source static tcp 10.50.0.2 21 61.160.5.6 21
ip nat inside source list 100 interface Serial 2/0 overload
ip nat inside source list 110 pool NAT_POOL
!

至此所有的配置都已经完成,总结一下有助于以后查阅。


标题:网络拓扑规划与配置之详细记录
作者:Jeffrey

Responses
取消