核心交換機各項配置 Vlan劃分、互訪、ACL管控、鏈路聚合教程
交換機的主要功能包括物理編址、網(wǎng)絡(luò)拓撲結(jié)構(gòu)、錯誤校驗、幀序列以及流控。交換機還具備了一些新的功能,如對VLAN(虛擬局域網(wǎng))的支持、對鏈路匯聚的支持,甚至有的還具有防火墻的功能。這篇文章主要為大家介紹了核心交換機配置的方法,比如給核心交換機配置Vlan劃分、互訪、ACL管控、鏈路聚合等,需要的朋友可以參考下。
概念介紹
訪問控制列表(Access Control List,ACL) 是路由器和交換機接口的指令列表,用來控制端口進出的數(shù)據(jù)包。ACL適用于所有的被路由協(xié)議,如IP、IPX、AppleTalk等。
鏈路聚合是將兩個或更多數(shù)據(jù)信道結(jié)合成一個單個的信道,該信道以一個單個的更高帶寬的邏輯鏈路出現(xiàn)。鏈路聚合一般用來連接一個或多個帶寬需求大的設(shè)備,例如連接骨干網(wǎng)絡(luò)的服務(wù)器或服務(wù)器群。
具體配置
#
!Software Version V200R001C00SPC300
sysname IT_ServerRoom #交換機名稱#
#
vlan batch 10 20 30 40 50 60 70 80 90 99 to 100 #設(shè)置Vlan#
vlan batch 110
#
lacp priority 100 #鏈路聚合優(yōu)先級設(shè)定#
#
undo http server enable
#
undo nap slave enable
#
dhcp enable #打開DHCP功能#
#
acl number 3001 #配置ACL訪控#
rule 4 permit tcp source 0.0.0.0 192.168.21.11 destination-port eq 3389 #允許指定IP使用遠程協(xié)助#
rule 5 permit tcp source 0.0.0.0 192.168.21.13 destination-port eq 3389
rule 6 permit tcp source 0.0.0.1 192.168.11.254 destination-port eq 3389
rule 7 permit tcp source 0.0.0.0 192.168.51.13 destination 0.0.0.0 192.168.11.10 destination-port eq 3389
rule 8 permit tcp source 0.0.0.0 192.168.81.31 destination 0.0.0.0 192.168.11.10 destination-port eq 3389
rule 9 permit tcp source 0.0.0.0 192.168.21.14 destination 0.0.0.0 192.168.11.12 destination-port eq 3389
rule 10 permit tcp source 0.0.0.3 192.168.21.12 destination-port eq telnet
rule 11 permit tcp source 0.0.0.1 192.168.11.254 destination-port eq telnet
rule 12 permit tcp source 0.0.0.0 192.168.21.250 destination 0.0.0.0 192.168.11.12 destination-port eq 3389
rule 100 deny tcp destination-port eq 3389 #關(guān)閉遠程協(xié)助端口#
rule 105 deny tcp destination-port eq telnet #關(guān)閉Telnet端口#
#
ip pool 1 #設(shè)置IP地址池#
gateway-list 192.168.11.254 #設(shè)置網(wǎng)關(guān)#
network 192.168.11.0 mask 255.255.255.0 #子網(wǎng)掩碼及IP區(qū)段#
excluded-ip-address 192.168.11.1 192.168.11.60 #DHCP分配時豁免的IP地址#
lease day 10 hour 0 minute 0 #IP地址有效時間#
dns-list 192.168.11.2 192.168.11.5 #DNS配置#
#
ip pool 2
gateway-list 192.168.21.254
network 192.168.21.0 mask 255.255.255.0
excluded-ip-address 192.168.21.1 192.168.21.60
lease day 10 hour 0 minute 0
dns-list 192.168.11.2 192.168.11.5
#
ip pool 3
gateway-list 192.168.31.254
network 192.168.31.0 mask 255.255.255.0
excluded-ip-address 192.168.31.1 192.168.31.60
lease day 10 hour 0 minute 0
dns-list 192.168.11.2 192.168.11.5
#
ip pool 4
gateway-list 192.168.41.254
network 192.168.41.0 mask 255.255.255.0
excluded-ip-address 192.168.41.1 192.168.41.60
lease day 10 hour 0 minute 0
dns-list 192.168.11.2 192.168.11.5
#
ip pool 5
gateway-list 192.168.51.254
network 192.168.51.0 mask 255.255.255.0
excluded-ip-address 192.168.51.1 192.168.51.60
lease day 10 hour 0 minute 0
dns-list 192.168.11.2 192.168.11.5
#
ip pool 6
gateway-list 192.168.61.254
network 192.168.61.0 mask 255.255.255.0
excluded-ip-address 192.168.61.1 192.168.61.60
lease day 10 hour 0 minute 0
dns-list 192.168.11.2 192.168.11.5
#
ip pool 7
gateway-list 192.168.71.254
network 192.168.71.0 mask 255.255.255.0
excluded-ip-address 192.168.71.1 192.168.71.60
lease day 10 hour 0 minute 0
dns-list 192.168.11.2 192.168.11.5
#
ip pool 8
gateway-list 192.168.81.254
network 192.168.81.0 mask 255.255.255.0
excluded-ip-address 192.168.81.1 192.168.81.60
lease day 10 hour 0 minute 0
dns-list 192.168.11.2 192.168.11.5
#
ip pool 9
gateway-list 192.168.91.254
network 192.168.91.0 mask 255.255.255.0
excluded-ip-address 192.168.91.1 192.168.91.60
lease day 10 hour 0 minute 0
dns-list 192.168.11.2 192.168.11.5
#
ip pool 10
gateway-list 192.168.101.254
network 192.168.101.0 mask 255.255.255.0
excluded-ip-address 192.168.101.1 192.168.101.60
lease day 10 hour 0 minute 0
dns-list 192.168.11.2 192.168.11.5
#
ip pool 11
gateway-list 192.168.111.254
network 192.168.111.0 mask 255.255.255.0
excluded-ip-address 192.168.111.1 192.168.111.60
lease day 10 hour 0 minute 0
dns-list 192.168.11.2 192.168.11.5
#
aaa
authentication-scheme default
authorization-scheme default
accounting-scheme default
domain default
domain default_admin
local-user admin password cipher %$%$O9hP7mbdf4Q#E\vU4j#wX3ypg%$%$@!@$
local-user admin service-type http
#
interface Vlanif1
ip address 192.168.66.254 255.255.255.0
#
interface Vlanif10 #實現(xiàn)Vlan間互訪#
ip address 192.168.11.254 255.255.255.0
dhcp select global
#
interface Vlanif20
ip address 192.168.21.254 255.255.255.0
dhcp select global
#
interface Vlanif30
ip address 192.168.31.254 255.255.255.0
dhcp select global
#
interface Vlanif40
ip address 192.168.41.254 255.255.255.0
dhcp select global
#
interface Vlanif50
ip address 192.168.51.254 255.255.255.0
dhcp select global
#
interface Vlanif60
ip address 192.168.61.254 255.255.255.0
dhcp select global
#
interface Vlanif70
ip address 192.168.71.254 255.255.255.0
dhcp select global
#
interface Vlanif80
ip address 192.168.81.254 255.255.255.0
dhcp select global
#
interface Vlanif90
ip address 192.168.91.254 255.255.255.0
dhcp select global
#
interface Vlanif99
ip address 10.0.0.2 255.255.255.0
#
interface Vlanif100
ip address 192.168.101.254 255.255.255.0
dhcp select global
#
interface Vlanif110
ip address 192.168.111.254 255.255.255.0
dhcp select global
#
interface MEth0/0/1
ip address 192.168.88.1 255.255.255.0
#
interface Eth-Trunk1 #鏈路聚合設(shè)置#
port link-type trunk #鏈路聚合后的模式#
port trunk allow-pass vlan 2 to 4094 #允許通過的Vlan標簽#
mode lacp-static #鏈路聚合模式#
max active-linknumber 2 #最大在線端口#
#
interface GigabitEthernet0/0/1 #各端口配置#
port link-type access
port default vlan 10
loopback-detect enable #環(huán)路檢測#
#
interface GigabitEthernet0/0/2
port link-type access
port default vlan 10
loopback-detect enable
#
interface GigabitEthernet0/0/3
port link-type access
port default vlan 10
loopback-detect enable
#
interface GigabitEthernet0/0/4
port link-type access
port default vlan 10
loopback-detect enable
#
interface GigabitEthernet0/0/5
port link-type access
port default vlan 110
#
interface GigabitEthernet0/0/6
port link-type access
port default vlan 110
loopback-detect enable
#
interface GigabitEthernet0/0/7
port link-type access
port default vlan 100
loopback-detect enable
#
interface GigabitEthernet0/0/8
port link-type access
port default vlan 100
loopback-detect enable
#
interface GigabitEthernet0/0/9
port link-type access
port default vlan 90
loopback-detect enable
#
interface GigabitEthernet0/0/10
port link-type access
port default vlan 90
loopback-detect enable
#
interface GigabitEthernet0/0/11
port link-type access
port default vlan 60
loopback-detect enable
#
interface GigabitEthernet0/0/12
port link-type access
port default vlan 60
loopback-detect enable
#
interface GigabitEthernet0/0/13
port link-type access
port default vlan 70
loopback-detect enable
#
interface GigabitEthernet0/0/14
loopback-detect enable
#
interface GigabitEthernet0/0/15
loopback-detect enable
#
interface GigabitEthernet0/0/16
loopback-detect enable
#
interface GigabitEthernet0/0/17 #鏈路聚合端口配置1#
eth-trunk 1
lacp priority 100 #高優(yōu)先級#
#
interface GigabitEthernet0/0/18 #鏈路聚合端口配置2#
eth-trunk 1
lacp priority 100
#
interface GigabitEthernet0/0/19 #鏈路聚合端口配置3#
eth-trunk 1 #備用鏈路,2用1備#
#
interface GigabitEthernet0/0/20
loopback-detect enable
#
interface GigabitEthernet0/0/21
port link-type trunk
port trunk allow-pass vlan 10 20 30 40 50 60 70 80 90 100
port trunk allow-pass vlan 110
loopback-detect enable
#
interface GigabitEthernet0/0/22
port link-type trunk
port trunk allow-pass vlan 10 20 30 40 50 60 70 80 90 100
port trunk allow-pass vlan 110
loopback-detect enable
#
interface GigabitEthernet0/0/23 #連接防火墻配置#
port link-type access
port default vlan 99
loopback-detect enable
#
interface GigabitEthernet0/0/24
port link-type access
port default vlan 99
loopback-detect enable
#
interface NULL0
#
arp static 192.168.81.13 7427-ea35-eedf
#
ip route-static 0.0.0.0 0.0.0.0 10.0.0.1 #靜態(tài)路由#
ip route-static 192.168.10.0 255.255.255.0 192.168.71.1
ip route-static 192.168.12.0 255.255.255.0 192.168.71.2
ip route-static 192.168.118.0 255.255.255.0 192.168.111.1
#
traffic-filter inbound acl 3001 #全局啟用ACL管控#
#
snmp-agent #利用Cacti監(jiān)控192.168.11.151,配置SNMP#
snmp-agent local-engineid 800007DB037054F5DFC580
snmp-agent community read cipher %$%$@(=VHL9T2A-VkMN9{/I'MJ\SJ%$%$
snmp-agent sys-info version all
snmp-agent group v3 public
snmp-agent target-host trap address udp-domain 192.168.11.151 params securityname public
#
user-interface con 0 #console口密碼#
authentication-mode password
set authentication password cipher %$%$Q]]8BRT8^WMuCf9~]%QX~@7.\~)c#$!;K>.194{FaqXM&$F=8%$%$@#
user-interface vty 0 4 #Telnet密碼#
authentication-mode password
user privilege level 3
set authentication password cipher %$%$%'cJU]0{$8$:m91'RKYxGYsja6iDE%48L>!hl'$Av[8vK6ypk%$%$@#$#
user-interface vty 16 20
#
相關(guān)閱讀:交換機硬件故障常見問題
電源故障:
由于外部供電不穩(wěn)定,或者電源線路老化或者雷擊等原因?qū)е码娫磽p壞或者風(fēng)扇停止,從而不能正常工作。
由于電源緣故而導(dǎo)致機內(nèi)其他部件損壞的事情也經(jīng)常發(fā)生。
如果面板上的POWER指示燈是綠色的,就表示是正常的;如果該指示燈滅了,則說明交換機沒有正常供電。
這類問題很容易發(fā)現(xiàn),也很容易解決,同時也是最容易預(yù)防的。
針對這類故障,首先應(yīng)該做好外部電源的供應(yīng)工作,一般通過引入獨立的電力線來提供獨立的電源,并添加穩(wěn)壓器來避免瞬間高壓或低壓現(xiàn)象。
如果條件允許,可以添加UPS(不間斷電源)來保證交換機的正常供電,有的UPS提供穩(wěn)壓功能,而有的沒有,選擇時要注意。
在機房內(nèi)設(shè)置專業(yè)的避雷措施,來避免雷電對交換機的傷害。現(xiàn)在有很多做避雷工程的專業(yè)公司,實施網(wǎng)絡(luò)布線時可以考慮。
核心交換機各項配置 Vlan劃分、互訪、ACL管控、鏈路聚合相關(guān)文章: