当前位置:首页>微思动态 > >详情
全国热线电话 400-881-4699

在线留言

【干货】华为企业网络典型配置案例

发布作者:微思网络   发布时间:2017-09-11   浏览量:0

介绍:


下面为一般企业网络的结构、规划以及配置。

对内网部门划分vlan、无线配置、服务器的映射以及内网之间的互访都做了介绍。

1.各部门、服务器、无线都独立一个网段。

2.无线网络采用旁挂直接转发模式。

3.无线网络不能访问公司内网资源、只允许上网。

 

设备:


外网防火墙:USG5120

核心: S5700

接入: S3700

无线控制器:AC6005

无线AP:AP6010DN-AGN


网络拓扑:



地址规划:








操作步骤:

1.       防火墙配置。

#

 sysname FW1

#

interface GigabitEthernet0/0/0

 alias Lan

 ip address 10.10.10.1 255.255.255.0

#

interface GigabitEthernet0/0/1

 alias Wan

 ip address 202.100.1.1 255.255.255.0

#


#

firewall zone trust

 add interface GigabitEthernet0/0/0

#

firewall zone untrust

 add interface GigabitEthernet0/0/1

#

 ip route-static 0.0.0.0 0.0.0.0 202.100.1.2

 ip route-static 192.168.0.0 255.255.0.0 10.10.10.254

#

nat-policy interzone trust untrust outbound

 policy 1

  action source-nat

  easy-ip GigabitEthernet0/0/1

#


firewall packet-filter default permit interzone trust untrust direction outbound            //允许内网到外网的默认域间规则

#



2.       LSW配置。

#

sysname LSW1

#

vlan batch 10 88 101 to 104 200

#

dhcp enable

#

interface Vlanif10

 ip address 10.10.10.254 255.255.255.0

#

interface Vlanif101

 description Server

 ip address 192.168.101.254 255.255.255.0

#

interface Vlanif102

 ip address 192.168.102.254 255.255.255.0

#

interface Vlanif103

 ip address 192.168.103.254 255.255.255.0

#

interface Vlanif104

 description WLAN-STA

 ip address 192.168.104.254 255.255.255.0

 dhcp select interface

 dhcp server dns-list 192.168.101.2

#

interface Vlanif200

 description Manager

 ip address 192.168.200.254 255.255.255.0

#

interface GigabitEthernet0/0/1

 port link-type trunk

 port trunk allow-pass vlan all

#

interface GigabitEthernet0/0/2

 port link-type trunk

 port trunk allow-pass vlan all

#

interface GigabitEthernet0/0/8

 port link-type trunk

 port trunk allow-pass vlan 88 200

#

interface GigabitEthernet0/0/11

 port link-type access

 port default vlan 101

#

interface GigabitEthernet0/0/24

 port link-type access

 port default vlan 10

#

ip route-static 0.0.0.0 0.0.0.0 10.10.10.1

#

3.       LSW2配置。

#

sysname LSW2

#

vlan batch 88 102 to 104 200

#

interface Vlanif200

 ip address 192.168.200.2 255.255.255.0

#

interface Ethernet0/0/1

 port link-type access

 port default vlan 102

#

interface Ethernet0/0/22

 port link-type trunk

 port trunk pvid vlan 88

 port trunk allow-pass vlan 88 104

#

interface GigabitEthernet0/0/1

 port link-type trunk

 port trunk allow-pass vlan all

#

ip route-static 0.0.0.0 0.0.0.0 192.168.200.254

#

4.       LSW3配置。

#

sysname LSW3

#

vlan batch 88 102 to 104 200

#

interface Vlanif200

 ip address 192.168.200.3 255.255.255.0

#

interface Ethernet0/0/1

 port link-type access

 port default vlan 103

#

interface Ethernet0/0/22

 port link-type trunk

 port trunk pvid vlan 88

 port trunk allow-pass vlan 88 104

#

interface GigabitEthernet0/0/1

 port link-type trunk

 port trunk allow-pass vlan all

#

ip route-static 0.0.0.0 0.0.0.0 192.168.200.254

#

5.       AC6005配置。

Vlan 88为无线AP管理网段、配置DHCP为AP分配地址。

#

sysname AC6005

#

vlan batch 88 200

#

dhcp enable

#

interface Vlanif88

 ip address 192.168.88.6 255.255.255.0

 dhcp select interface

#

interface Vlanif200

 ip address 192.168.200.6 255.255.255.0

#

interface GigabitEthernet0/0/8

 port link-type trunk

 port trunk allow-pass vlan 88 200

#

interface Wlan-Ess104

 port hybrid untagged vlan 104

#

wlan

 wlan ac source interface vlanif88

 ap-auth-mode no-auth

 wmm-profile name wmm1 id 1

 traffic-profile name tra1 id 1

 security-profile name sec1 id 1

 service-set name ser1 id 1

  wlan-ess 104

  ssid HUAWEI

  traffic-profile id 1

  security-profile id 1

  service-vlan 104

 radio-profile name radio1 id 1

  wmm-profile id 1

#

等待AP上线后、AP绑定射频与服务集。

#

 ap 0 radio 0

  radio-profile id 1

  service-set id 1 wlan 1

 ap 1 radio 0

  radio-profile id 1

  service-set id 1 wlan 1

#

无线网络测试。



6.       内网服务器映射到外网、供外部用户访问。

#

 nat server protocol tcp global 202.100.1.1 www inside 192.168.101.2 www

#

并要在防火墙配置转发策略、允许访问服务器。防火墙默认为拒绝访问。

#

policy interzone trust untrust inbound

 policy 1

  action permit

  policy service service-set http

  policy destination 192.168.101.2 0

#

测试从外网访问内部服务器。

服务器设置:



客户端访问测试:



7.       部门之间互访测试。

CLIENT1 PING CLIENT2



8.       访问之间做限制、无线接入用户无法访问销售部门、技术部门和服务器。

访问限制配置在核心交换机上:

#

acl number 3000

 rule 5 permit ip source 192.168.104.0 0.0.0.255 destination 192.168.101.0 0.0.0.255

 rule 10 permit ip source 192.168.104.0 0.0.0.255 destination 192.168.102.0 0.0.0.255

 rule 15 permit ip source 192.168.104.0 0.0.0.255 destination 192.168.103.0 0.0.0.255

#

traffic classifier c1

 if-match acl 3000

#

traffic behavior b1

 deny

#

traffic policy p1

 classifier c1 behavior b1

#

drop-profile default

#

vlan 104

 traffic-policy p1 inbound

#

配置后测试:


☂☂☂☂☂☂☂☂


有些命令已更改,下面贴一下现在的命令:

现在在用的AC6005配置


http secure-server ssl-policy default_policy 
http server enable 

vlan batch 88 90 99 

authentication-profile name dot1x_authen_profile 
authentication-profile name mac_authen_profile 
authentication-profile name portal_authen_profile 
authentication-profile name macportal_authen_profile 

dot1x-access-profile name dot1x_access_profile 
mac-access-profile name mac_access_profile 

dhcp enable 

diffserv domain default 

radius-server template default 

pki realm default 
enrollment self-signed 

ssl policy default_policy type server 
pki-realm default                        

acl number 2001  
rule 10 permit source 192.168.0.199 0 
rule 15 permit source 192.168.0.6 0 

free-rule-template name default_free_rule 

portal-access-profile name portal_access_profile 

ip pool 1 

aaa 
authentication-scheme default 
authentication-scheme radius 
  authentication-mode radius 
authorization-scheme default 
accounting-scheme default 
domain default 
domain default_admin 
local-user admin password irreversible-cipher %^%#6)l-&>+[)GN^jMDkBIsT}^nA4Kp^B3a4z|&lbvb-9vv'$uRxD~@k4'.E*O+L%^%# 
local-user admin privilege level 15 
local-user admin service-type telnet http 
local-user telnet password irreversible-cipher %^%#c.izI-/~[HN4utOqT_X:F=_s0!<mj*=8amdc)si1hd2xh9m!' 
local-user telnet privilege level 15     

interface Vlanif1 
ip address 169.254.1.1 255.255.0.0 

interface Vlanif88 
ip address 10.1.88.1 255.255.255.0 
dhcp select interface 

interface Vlanif99 
ip address 192.168.1.224 255.255.254.0 

interface GigabitEthernet0/0/1 
port link-type trunk 
port trunk allow-pass vlan 2 to 4094 

interface GigabitEthernet0/0/2 

interface GigabitEthernet0/0/3 

interface GigabitEthernet0/0/4 

interface GigabitEthernet0/0/5 

interface GigabitEthernet0/0/6            

interface GigabitEthernet0/0/7 

interface GigabitEthernet0/0/8 
port link-type trunk 
port trunk allow-pass vlan 2 to 4094 

interface NULL0 

info-center timestamp log format-date 

undo snmp-agent 

ssh client first-time enable 
stelnet server enable 
undo telnet ipv6 server enable 
ssh server secure-algorithms cipher aes256_ctr aes128_ctr aes256_cbc aes128 3des 
ssh server secure-algorithms hmac sha2_256 sha2_256_96 sha1 sha1_96 md5 md5_96 
ssh client secure-algorithms cipher aes256_ctr aes128_ctr aes256_cbc aes128 3des 
ssh client secure-algorithms hmac sha2_256 sha2_256_96 sha1 sha1_96 md5 md5_96 

capwap source interface vlanif88 

user-interface maximum-vty 8              
user-interface con 0 
authentication-mode password 
set authentication password cipher %^%#,s$,*,)&YGuva(Y
l~0.CX_0a5_k&r,~zZzPxrXR(NHFj(%^%# 
user-interface vty 0 4 
acl 2001 inbound 
authentication-mode aaa 
protocol inbound all 
user-interface vty 5 7 
acl 2001 inbound 
authentication-mode aaa 
protocol inbound ssh 
user-interface vty 16 20 
protocol inbound all 

wlan 
traffic-profile name default 
traffic-profile name p1 
  rate-limit client up 10000 
  rate-limit client down 10000 
security-profile name default 
security-profile name default-wds 
  security wpa2 psk pass-phrase %^%#ro!\MZ&k0HRECV*riy463<sxn$c8}e=l\tek9z&e%^%# 
security-profile name default-mesh 
  security wpa2 psk pass-phrase %^%#hu]^OSnh2FiGXx.ps+]5'^foJ-kjG!Gua<ednioj%^%# 
security-profile name tftc 
  security wpa-wpa2 psk pass-phrase %^%#GjOs
7\AA(QnC($)c1R]5sx!`C)\|f(ci'$0%^%# aes 
security-profile name T-yf5 
  security wpa-wpa2 dot1x aes 
security-profile name Tguest 
  security wpa-wpa2 psk pass-phrase %^%#+:@Z/_w;dJC`8v7cS@`!<g=;7lkied!w)r2p^h`9%^%# 
ssid-profile name tftc 
  ssid T-YF 
  max-sta-number 20 
ssid-profile name T-yf5 
  ssid T-yf5 
  max-sta-number 23 
ssid-profile name tftc5 
  ssid T-yf5 
  max-sta-number 30 
ssid-profile name Tguest 
  ssid T-G09 
ssid-profile name default 
vap-profile name tftc 
  service-vlan vlan-id 99 
  ssid-profile tftc 
  security-profile tftc 
  traffic-profile p1 
vap-profile name T-yf5                   
  service-vlan vlan-id 99 
  ssid-profile T-yf5 
  security-profile tftc 
vap-profile name Tguest 
  service-vlan vlan-id 90 
  ssid-profile Tguest 
  security-profile Tguest 
vap-profile name default 
  service-mode disable 
wds-profile name default 
mesh-handover-profile name default 
mesh-profile name default 
regulatory-domain-profile name default 
regulatory-domain-profile name domain 
air-scan-profile name default 
rrm-profile name default 
  airtime-fair-schedule enable 
  dynamic-edca enable 
  sta-load-balance dynamic enable 
  sta-load-balance dynamic start-threshold 5 
  sta-load-balance dynamic gap-threshold 5 
  sta-load-balance dynamic deny-threshold 1 
rrm-profile name rrmtftc 
  sta-load-balance dynamic enable         
  sta-load-balance dynamic start-threshold 5 
  sta-load-balance dynamic gap-threshold 5 
  sta-load-balance dynamic deny-threshold 1 
radio-2g-profile name default 
radio-2g-profile name ra2gtftc 
  rrm-profile rrmtftc 
radio-5g-profile name default 
radio-5g-profile name ra5gtftc 
wids-profile name default 
ap-system-profile name default 
provision-ap 
port-link-profile name default 
wired-port-profile name default 
ap auth-mode no-auth 
ap-group name tftc 
  regulatory-domain-profile domain 
  radio 0 
   radio-2g-profile ra2gtftc 
   vap-profile tftc wlan 1 
   coverage distance 1 
  radio 1 
   vap-profile tftc wlan 1 
ap-group name tftc5 
  radio 0                                 
   vap-profile default wlan 1 
  radio 1 
   vap-profile T-yf5 wlan 1 
ap-group name Tguest 
  radio 0 
   vap-profile Tguest wlan 1 
  radio 1 
   vap-profile Tguest wlan 1 
ap-group name default 
ap-id 0 type-id 29 ap-mac 94** ap-sn 210**
  ap-group tftc 
  radio 0 
   channel 20mhz 5 
ap-id 1 type-id 29 ap-mac e8** ap-sn 210**
  ap-group tftc 
  radio 0 
   channel 20mhz 3 
ap-id 2 type-id 29 ap-mac 94** ap-sn 210** 
  ap-group Tguest 
ap-id 3 type-id 29 ap-mac 94** ap-sn 210**
  ap-group tftc 
  radio 0 
   channel 20mhz 8 
ap-id 10 type-id 19 ap-mac 74** ap-sn 210**
  ap-group tftc5 
  radio 0 
   radio disable 
ap-id 11 type-id 19 ap-mac 74** ap-sn 210**
  ap-group tftc5 
  radio 0 
   radio disable 
ap-id 12 type-id 19 ap-mac 90** ap-sn 210**
  ap-group tftc5 
  radio 0 
   radio disable 
ap update sftp-server ip-address 192.168.0.199 sftp-username administrator sftp-password cipher %^%#4OSaR5

来源:厦门ccna培训哪家好之华为企业互动社区   

链接:http://support.huawei.com/huaweiconnect/enterprise/forum.php?mod=viewthread&tid=295783&extra=page%3D&page=1



返回顶部