配置IPSec保护的DSVPN示例

简介: 本文介绍了某大型企业通过DSVPN实现分支间VPN互联的配置方案。该企业总部与多个分支分布在不同地域,分支采用动态地址接入公网,且子网环境常变动。为满足需求,采用了OSPF路由协议和IPSec保护的DSVPN技术。配置步骤包括IP地址、公网路由、内网路由、IKE提议、安全提议及Tunnel接口等设置,并通过ping操作验证了配置结果,确保分支间数据传输的安全与稳定。

组网需求

某大型企业有总部(Hub)和多个分支(Spoke1、Spoke2……,举例中仅使用两个分支),分布在不同地域,总部和分支的子网环境会经常出现变动。分支采用动态地址接入公网。企业现网网络规划使用OSPF路由协议。

现在用户希望能够实现分支之间的VPN互联,同时对总部和分支机构以及分支机构间传输的数据进行加密保护。

配置思路

企业网络管理员可以采用如下思路进行分析:

  1. 由于分支是采用动态地址接入公网的,分支之间互相不知道对方的公网地址,因此必须采用DSVPN来实现分支之间的VPN互联。
  2. 由于分支数量较多,因此采用shortcut场景的DSVPN。
  3. 由于分支和总部的子网环境经常出现变动,为简化维护并根据企业网络规划,选择部署OSPF路由协议来实现分支/总部间的通信。
  4. 由于需要对机构之间的传输数据进行加密保护,因此采用配置IPSec保护的DSVPN来实现该功能。

注意:在DSVPN中部署IPSec时,如果两个分支位于不同NAT设备之后或者总部位于NAT设备之后,则IPSec封装模式仅支持为传输模式。

操作步骤

配置IP地址

AR1

<Huawei>sys
[Huawei]sys AR1
[AR1]int g0/0/0
[AR1-GigabitEthernet0/0/0]ip add 10.1.1.1 24
[AR1-GigabitEthernet0/0/0]q
[AR1]int lo1
[AR1-LoopBack1]ip add 172.16.1.1 24
[AR1-LoopBack1]q
[AR1]int t0/0/0
[AR1-Tunnel0/0/0]ip add 123.123.123.1 24
[AR1-Tunnel0/0/0]q

AR2

<Huawei>sys 
[Huawei]sys AR2
[AR2]int g0/0/1
[AR2-LoopBack1]ip add 10.1.2.2 24
[AR2-LoopBack1]q
[AR2]int lo1
[AR2-GigabitEthernet0/0/0]ip add 172.16.2.2 24
[AR2-GigabitEthernet0/0/0]q
[AR2]int t0/0/0
[AR2-Tunnel0/0/0]ip add 123.123.123.2 24
[AR2-Tunnel0/0/0]q

AR3

<Huawei>sys 
[Huawei]sys AR3
[AR3]int g0/0/1
[AR3-LoopBack1]ip add 10.1.3.3 24
[AR3-LoopBack1]q
[AR3]int lo1
[AR3-GigabitEthernet0/0/0]ip add 172.16.3.3 24
[AR3-GigabitEthernet0/0/0]q
[AR3]int t0/0/0
[AR3-Tunnel0/0/0]ip add 123.123.123.3 24
[AR3-Tunnel0/0/0]q

Internet

<Huawei>sys
[Huawei]sys Inernet
[Inernet]int g0/0/0
[Inernet-GigabitEthernet0/0/0]ip add 10.1.1.10 24
[Inernet-GigabitEthernet0/0/0]q
[Inernet]int g0/0/1
[Inernet-GigabitEthernet0/0/1]ip add 10.1.2.10 24
[Inernet-GigabitEthernet0/0/1]q
[Inernet]int g0/0/2
[Inernet-GigabitEthernet0/0/2]ip add 10.1.3.10 24
[Inernet-GigabitEthernet0/0/2]q

配置公网路由可达

AR1

[AR1]ospf 2 router-id 10.1.1.1
[AR1-ospf-2]area 1
[AR1-ospf-2-area-0.0.0.1]net 10.1.1.0 0.0.0.255
[AR1-ospf-2-area-0.0.0.1]q
[AR1-ospf-2]q

AR2

[AR2]ospf 2 router-id 10.1.2.2 
[AR2-ospf-2]area 1
[AR2-ospf-2-area-0.0.0.1]net 10.1.2.0 0.0.0.255
[AR2-ospf-2-area-0.0.0.1]q
[AR2-ospf-2]q

AR3

[AR3]ospf 2 router-id 10.1.3.3
[AR3-ospf-2]area 1
[AR3-ospf-2-area-0.0.0.1]net 10.1.3.0 0.0.0.255
[AR3-ospf-2-area-0.0.0.1]q
[AR3-ospf-2]q

Internet

[Inernet]ospf 2 router-id 10.1.123.10
[Inernet-ospf-2]area 1
[Inernet-ospf-2-area-0.0.0.1]ne 
[Inernet-ospf-2-area-0.0.0.1]net 10.1.1.0 0.0.0.255
[Inernet-ospf-2-area-0.0.0.1]net 10.1.2.0 0.0.0.255
[Inernet-ospf-2-area-0.0.0.1]net 10.1.3.0 0.0.0.255
[Inernet-ospf-2-area-0.0.0.1]q
[Inernet-ospf-2]q

验证配置

#查看路由表
[AR1]display ospf 2 routing 
   OSPF Process 2 with Router ID 10.1.1.1
      Routing Tables 
 Routing for Network 
 Destination        Cost  Type       NextHop         AdvRouter       Area
 10.1.1.0/24        1     Transit    10.1.1.1        10.1.1.1        0.0.0.1
 10.1.2.0/24        2     Transit    10.1.1.10       10.1.2.2        0.0.0.1
 10.1.3.0/24        2     Transit    10.1.1.10       10.1.3.3        0.0.0.1
 Total Nets: 3  
 Intra Area: 3  Inter Area: 0  ASE: 0  NSSA: 0 
 
 #ping验证
 [AR1]ping 10.1.3.3
  PING 10.1.3.3: 56  data bytes, press CTRL_C to break
    Reply from 10.1.3.3: bytes=56 Sequence=1 ttl=254 time=30 ms
    Reply from 10.1.3.3: bytes=56 Sequence=2 ttl=254 time=30 ms
    Reply from 10.1.3.3: bytes=56 Sequence=3 ttl=254 time=30 ms
    Reply from 10.1.3.3: bytes=56 Sequence=4 ttl=254 time=30 ms
    Reply from 10.1.3.3: bytes=56 Sequence=5 ttl=254 time=20 ms
  --- 10.1.3.3 ping statistics ---
    5 packet(s) transmitted
    5 packet(s) received
    0.00% packet loss
    round-trip min/avg/max = 20/28/30 ms

配置内网路由可达

AR1

[AR1]ospf 1 router-id 172.16.1.1
[AR1-ospf-1]area 0
[AR1-ospf-1-area-0.0.0.0]ne 
[AR1-ospf-1-area-0.0.0.0]network 172.16.1.0 0.0.0.255
[AR1-ospf-1-area-0.0.0.0]net 123.123.123.0 0.0.0.255
[AR1-ospf-1-area-0.0.0.0]q
[AR1-ospf-1]q

AR2

[AR2]ospf 1 router-id 172.16.2.2
[AR2-ospf-1]area 0
[AR2-ospf-1-area-0.0.0.0]net 172.16.2.0 0.0.0.255
[AR2-ospf-1-area-0.0.0.0]net 123.123.123.0 0.0.0.255
[AR2-ospf-1-area-0.0.0.0]q
[AR2-ospf-1]q

AR3

[AR3]ospf 1 router-id 172.16.3.3
[AR3-ospf-1]area 0
[AR3-ospf-1-area-0.0.0.0]net 172.16.3.0 0.0.0.255
[AR3-ospf-1-area-0.0.0.0]net 123.123.123.0 0.0.0.255
[AR3-ospf-1-area-0.0.0.0]q
[AR3-ospf-1]q

配置IKE提议

AR1

[AR1]ike prop 1
[AR1-ike-proposal-1]dh group5
[AR1-ike-proposal-1]authentication-algorithm sha1 
#配置IKEv2协商时所使用的伪随机数产生函数的算法(简称PRF算法)
[AR1-ike-proposal-1]prf aes-xcbc-128
[AR1-ike-proposal-1]q
[AR1]

AR2

[AR2]ike prop 1
[AR2-ike-proposal-1]dh group5
[AR2-ike-proposal-1]authentication-algorithm sha1
[AR2-ike-proposal-1]prf aes-xcbc-128 
[AR2-ike-proposal-1]q

AR3

[AR3]ike prop 1
[AR3-ike-proposal-1]dh group5
[AR3-ike-proposal-1]authentication-algorithm sha1 
[AR3-ike-proposal-1]prf aes-xcbc-128 
[AR3-ike-proposal-1]q

配置IKE对等体

AR1

[AR1]ike peer 1 v2 
[AR1-ike-peer-1]ike-proposal 1
[AR1-ike-peer-1]pre-shared-key cipher 20wl
#配置IKE对等体中的DPD检测模式
[AR1-ike-peer-1]dpd type periodic
#配置IKE对等体的DPD空闲时间40秒
[AR1-ike-peer-1]dpd idle-time 40
[AR1-ike-peer-1]q

AR2

[AR2]ike peer 1 v2 
[AR2-ike-peer-1]ike-proposal 1
[AR2-ike-peer-1]pre-shared-key cipher 20wl
[AR2-ike-peer-1]dpd type periodic
[AR2-ike-peer-1]dpd idle-time 40
[AR2-ike-peer-1]q

AR3

[AR3]ike peer 1 v2 
[AR3-ike-peer-1]ike-proposal 1
[AR3-ike-peer-1]pre-shared-key cipher 20wl
[AR3-ike-peer-1]dpd type periodic
[AR3-ike-peer-1]dpd idle-time 40
[AR3-ike-peer-1]q

创建安全提议

AR1

[AR1]ipsec prop 1
#配置IPSec安全提议使用的安全协议
[AR1-ipsec-proposal-1]transform ah-esp
#配置AH协议使用的认证算法
[AR1-ipsec-proposal-1]ah authentication-algorithm sha2-256
[AR1-ipsec-proposal-1]esp authentication-algorithm sha2-256
[AR1-ipsec-proposal-1]esp encryption-algorithm aes-192
[AR1-ipsec-proposal-1]q

AR2

[AR2]ipsec prop 1
[AR2-ipsec-proposal-1]transform ah-esp
[AR2-ipsec-proposal-1]ah authentication-algorithm sha2-256
[AR2-ipsec-proposal-1]esp authentication-algorithm sha2-256
[AR2-ipsec-proposal-1]esp encryption-algorithm aes-192
[AR2-ipsec-proposal-1]q

AR3

[AR3]ipsec prop 1
[AR3-ipsec-proposal-1]transform ah-esp
[AR3-ipsec-proposal-1]ah authentication-algorithm sha2-256
[AR3-ipsec-proposal-1]esp authentication-algorithm sha2-256
[AR3-ipsec-proposal-1]esp encryption-algorithm aes-192
[AR3-ipsec-proposal-1]q

配置安全框架

AR1

[AR1]ipsec profile 1
[AR1-ipsec-profile-1]ike-peer 1
[AR1-ipsec-profile-1]proposal 1
[AR1-ipsec-profile-1]q

AR2

[AR2]ipsec profile 1
[AR2-ipsec-profile-1]ike-peer 1
[AR2-ipsec-profile-1]proposal 1
[AR2-ipsec-profile-1]q

AR3

[AR3]ipsec profile 1
[AR3-ipsec-profile-1]ike-peer 1
[AR3-ipsec-profile-1]proposal 1
[AR3-ipsec-profile-1]q

配置Tunnel接口

AR1

[AR1]int t0/0/0
[AR1-Tunnel0/0/0]tunnel-protocol gre p2mp 
[AR1-Tunnel0/0/0]source g0/0/0
#开启将动态注册的分支加入NHRP组播成员表功能
[AR1-Tunnel0/0/0]nhrp entry multicast dynamic 
#设置OSPF接口的网络类型
[AR1-Tunnel0/0/0]ospf network-type p2mp
#NHRP redirect功能
[AR1-Tunnel0/0/0]nhrp redirect
#在Tunnel接口上应用IPSec安全框架
[AR1-Tunnel0/0/0]ipsec profile 1
[AR1-Tunnel0/0/0]q

AR2

[AR2]int t0/0/0
[AR2-Tunnel0/0/0]tunnel-protocol gre p2mp 
[AR2-Tunnel0/0/0]source g0/0/1
#指定tunnel接口地址和官网地址,总部节点上生成关于本分支节点的NHRP peer表项。
[AR2-Tunnel0/0/0]nhrp entry 123.123.123.1 10.1.1.1 register 
[AR2-Tunnel0/0/0]ospf network-type p2mp
#NHRP shortcut功能
[AR2-Tunnel0/0/0]nhrp shortcut 
[AR2-Tunnel0/0/0]ipsec profile 1
[AR2-Tunnel0/0/0]q

AR3

[AR3]int t0/0/0
[AR3-Tunnel0/0/0]tunnel-protocol gre p2mp 
[AR3-Tunnel0/0/0]source g0/0/1
[AR3-Tunnel0/0/0]nhrp entry 123.123.123.1 10.1.1.1 register 
[AR3-Tunnel0/0/0]ospf network-type p2mp
[AR3-Tunnel0/0/0]nhrp shortcut 
[AR3-Tunnel0/0/0]ipsec profile 1
[AR3-Tunnel0/0/0]q

验证

检查DSVPN配置

AR1

[AR1]display nhrp peer all
------------------------------------------------------------------------------- 
Protocol-addr   Mask  NBMA-addr       NextHop-addr    Type         Flag         
------------------------------------------------------------------------------- 
123.123.123.2   32    10.1.2.2        123.123.123.2   dynamic      route tunnel 
------------------------------------------------------------------------------- 
Tunnel interface: Tunnel0/0/0
Created time    : 00:11:19
Expire time     : 01:49:13
------------------------------------------------------------------------------- 
Protocol-addr   Mask  NBMA-addr       NextHop-addr    Type         Flag         
------------------------------------------------------------------------------- 
123.123.123.3   32    10.1.3.3        123.123.123.3   dynamic      route tunnel 
------------------------------------------------------------------------------- 
Tunnel interface: Tunnel0/0/0
Created time    : 00:07:31
Expire time     : 01:52:56
Number of nhrp peers: 2

AR2

[AR2]display nhrp peer all
------------------------------------------------------------------------------- 
Protocol-addr   Mask  NBMA-addr       NextHop-addr    Type         Flag         
------------------------------------------------------------------------------- 
123.123.123.1   32    10.1.1.1        123.123.123.1   static       hub          
------------------------------------------------------------------------------- 
Tunnel interface: Tunnel0/0/0
Created time    : 00:11:27
Expire time     : --
Number of nhrp peers: 1

AR3

[AR2]display nhrp peer all
------------------------------------------------------------------------------- 
Protocol-addr   Mask  NBMA-addr       NextHop-addr    Type         Flag         
------------------------------------------------------------------------------- 
123.123.123.1   32    10.1.1.1        123.123.123.1   static       hub          
------------------------------------------------------------------------------- 
Tunnel interface: Tunnel0/0/0
Created time    : 00:11:27
Expire time     : --
Number of nhrp peers: 1

检查IPSec SA信息

AR1

[AR1]display ipsec sa
===============================
Interface: Tunnel0/0/0
 Path MTU: 1500
===============================
  -----------------------------
  IPSec profile name: "1"
  Mode              : PROF-Template
  -----------------------------
    Connection ID     : 4
    Encapsulation mode: Tunnel
    Tunnel local      : 10.1.1.1
    Tunnel remote     : 10.1.3.3
    Qos pre-classify  : Disable
    [Outbound ESP SAs] 
      SPI: 3091581073 (0xb845c891)
      Proposal: ESP-ENCRYPT-AES-192 SHA2-256-128
      SA remaining key duration (bytes/sec): 1887433396/2860
      Max sent sequence-number: 34
      UDP encapsulation used for NAT traversal: N
    [Outbound AH SAs] 
      SPI: 1755157590 (0x689d9456)
      Proposal: SHA2-256-128
      SA remaining key duration (bytes/sec): 1887436800/2860
      Max sent sequence-number: 34
      UDP encapsulation used for NAT traversal: N
    [Inbound AH SAs] 
      SPI: 1133922043 (0x439646fb)
      Proposal: SHA2-256-128
      SA remaining key duration (bytes/sec): 1887436800/2860
      Max received sequence-number: 30
      Anti-replay window size: 32
      UDP encapsulation used for NAT traversal: N
    [Inbound ESP SAs] 
      SPI: 3135250784 (0xbae02160)
      Proposal: ESP-ENCRYPT-AES-192 SHA2-256-128
      SA remaining key duration (bytes/sec): 1887433944/2860
      Max received sequence-number: 30
      Anti-replay window size: 32
      UDP encapsulation used for NAT traversal: N
  -----------------------------
  IPSec profile name: "1"
  Mode              : PROF-Template
  -----------------------------
    Connection ID     : 2
    Encapsulation mode: Tunnel
    Tunnel local      : 10.1.1.1
    Tunnel remote     : 10.1.2.2
    Qos pre-classify  : Disable
    [Outbound ESP SAs] 
      SPI: 2677832054 (0x9f9c7976)
      Proposal: ESP-ENCRYPT-AES-192 SHA2-256-128
      SA remaining key duration (bytes/sec): 1887432440/2636
      Max sent sequence-number: 44
      UDP encapsulation used for NAT traversal: N
    [Outbound AH SAs] 
      SPI: 345017806 (0x14908dce)
      Proposal: SHA2-256-128
      SA remaining key duration (bytes/sec): 1887436800/2636
      Max sent sequence-number: 44
      UDP encapsulation used for NAT traversal: N
    [Inbound AH SAs] 
      SPI: 339028987 (0x14352bfb)
      Proposal: SHA2-256-128
      SA remaining key duration (bytes/sec): 1887436800/2636
      Max received sequence-number: 40
      Anti-replay window size: 32
      UDP encapsulation used for NAT traversal: N
    [Inbound ESP SAs] 
      SPI: 3435456947 (0xccc4e9b3)
      Proposal: ESP-ENCRYPT-AES-192 SHA2-256-128
      SA remaining key duration (bytes/sec): 1887433040/2636
      Max received sequence-number: 40
      Anti-replay window size: 32
      UDP encapsulation used for NAT traversal: N

AR2

[AR2]display ipsec sa
===============================
Interface: Tunnel0/0/0
 Path MTU: 1500
===============================
  -----------------------------
  IPSec profile name: "1"
  Mode              : PROF-ISAKMP
  -----------------------------
    Connection ID     : 2
    Encapsulation mode: Tunnel
    Tunnel local      : 10.1.2.2
    Tunnel remote     : 10.1.1.1
    Qos pre-classify  : Disable
    [Outbound ESP SAs] 
      SPI: 3435456947 (0xccc4e9b3)
      Proposal: ESP-ENCRYPT-AES-192 SHA2-256-128
      SA remaining key duration (bytes/sec): 1887433224/2704
      Max sent sequence-number: 38
      UDP encapsulation used for NAT traversal: N
    [Outbound AH SAs] 
      SPI: 339028987 (0x14352bfb)
      Proposal: SHA2-256-128
      SA remaining key duration (bytes/sec): 1887436800/2704
      Max sent sequence-number: 38
      UDP encapsulation used for NAT traversal: N
    [Inbound AH SAs] 
      SPI: 345017806 (0x14908dce)
      Proposal: SHA2-256-128
      SA remaining key duration (bytes/sec): 1887436800/2704
      Max received sequence-number: 41
      Anti-replay window size: 32
      UDP encapsulation used for NAT traversal: N
    [Inbound ESP SAs] 
      SPI: 2677832054 (0x9f9c7976)
      Proposal: ESP-ENCRYPT-AES-192 SHA2-256-128
      SA remaining key duration (bytes/sec): 1887432728/2704
      Max received sequence-number: 41
      Anti-replay window size: 32
      UDP encapsulation used for NAT traversal: N

AR3

[AR3]display ipsec sa
===============================
Interface: Tunnel0/0/0
 Path MTU: 1500
===============================
  -----------------------------
  IPSec profile name: "1"
  Mode              : PROF-ISAKMP
  -----------------------------
    Connection ID     : 2
    Encapsulation mode: Tunnel
    Tunnel local      : 10.1.3.3
    Tunnel remote     : 10.1.1.1
    Qos pre-classify  : Disable
    [Outbound ESP SAs] 
      SPI: 3135250784 (0xbae02160)
      Proposal: ESP-ENCRYPT-AES-192 SHA2-256-128
      SA remaining key duration (bytes/sec): 1887433852/2820
      Max sent sequence-number: 31
      UDP encapsulation used for NAT traversal: N
    [Outbound AH SAs] 
      SPI: 1133922043 (0x439646fb)
      Proposal: SHA2-256-128
      SA remaining key duration (bytes/sec): 1887436800/2820
      Max sent sequence-number: 31
      UDP encapsulation used for NAT traversal: N
    [Inbound AH SAs] 
      SPI: 1755157590 (0x689d9456)
      Proposal: SHA2-256-128
      SA remaining key duration (bytes/sec): 1887436800/2820
      Max received sequence-number: 35
      Anti-replay window size: 32
      UDP encapsulation used for NAT traversal: N
    [Inbound ESP SAs] 
      SPI: 3091581073 (0xb845c891)
      Proposal: ESP-ENCRYPT-AES-192 SHA2-256-128
      SA remaining key duration (bytes/sec): 1887433300/2820
      Max received sequence-number: 35
      Anti-replay window size: 32
      UDP encapsulation used for NAT traversal: N

检查OSPF路由

AR1

[AR1]display ospf 1 routing 
   OSPF Process 1 with Router ID 172.16.1.1
      Routing Tables 
 Routing for Network 
 Destination        Cost  Type       NextHop         AdvRouter       Area
 123.123.123.1/32   0     Stub       123.123.123.1   172.16.1.1      0.0.0.0
 172.16.1.0/24      1     Stub       172.16.1.1      172.16.1.1      0.0.0.0
 123.123.123.2/32   1562  Stub       123.123.123.2   172.16.2.2      0.0.0.0
 123.123.123.3/32   1562  Stub       123.123.123.3   172.16.3.3      0.0.0.0
 172.16.2.0/24      1563  Stub       123.123.123.2   172.16.2.2      0.0.0.0
 172.16.3.0/24      1563  Stub       123.123.123.3   172.16.3.3      0.0.0.0
 Total Nets: 6  
 Intra Area: 6  Inter Area: 0  ASE: 0  NSSA: 0

AR2

[AR2]display ospf 1 routing 
   OSPF Process 1 with Router ID 172.16.2.2
      Routing Tables 
 Routing for Network 
 Destination        Cost  Type       NextHop         AdvRouter       Area
 123.123.123.2/32   0     Stub       123.123.123.2   172.16.2.2      0.0.0.0
 172.16.2.0/24      1     Stub       172.16.2.2      172.16.2.2      0.0.0.0
 123.123.123.1/32   1562  Stub       123.123.123.1   172.16.1.1      0.0.0.0
 123.123.123.3/32   3124  Stub       123.123.123.1   172.16.3.3      0.0.0.0
 172.16.1.0/24      1563  Stub       123.123.123.1   172.16.1.1      0.0.0.0
 172.16.3.0/24      3125  Stub       123.123.123.1   172.16.3.3      0.0.0.0
 Total Nets: 6  
 Intra Area: 6  Inter Area: 0  ASE: 0  NSSA: 0

AR3

[AR3]display ospf 1 routing 
   OSPF Process 1 with Router ID 172.16.3.3
      Routing Tables 
 Routing for Network 
 Destination        Cost  Type       NextHop         AdvRouter       Area
 123.123.123.3/32   0     Stub       123.123.123.3   172.16.3.3      0.0.0.0
 172.16.3.0/24      1     Stub       172.16.3.3      172.16.3.3      0.0.0.0
 123.123.123.1/32   1562  Stub       123.123.123.1   172.16.1.1      0.0.0.0
 123.123.123.2/32   3124  Stub       123.123.123.1   172.16.2.2      0.0.0.0
 172.16.1.0/24      1563  Stub       123.123.123.1   172.16.1.1      0.0.0.0
 172.16.2.0/24      3125  Stub       123.123.123.1   172.16.2.2      0.0.0.0
 Total Nets: 6  
 Intra Area: 6  Inter Area: 0  ASE: 0  NSSA: 0

执行ping操作,查看配置结果

AR2

[AR2]ping -a 172.16.2.2 172.16.3.3
  PING 172.16.3.3: 56  data bytes, press CTRL_C to break
    Reply from 172.16.3.3: bytes=56 Sequence=1 ttl=255 time=30 ms
    Reply from 172.16.3.3: bytes=56 Sequence=2 ttl=255 time=20 ms
    Reply from 172.16.3.3: bytes=56 Sequence=3 ttl=255 time=30 ms
    Reply from 172.16.3.3: bytes=56 Sequence=4 ttl=255 time=30 ms
    Reply from 172.16.3.3: bytes=56 Sequence=5 ttl=255 time=30 ms
  --- 172.16.3.3 ping statistics ---
    5 packet(s) transmitted
    5 packet(s) received
    0.00% packet loss
    round-trip min/avg/max = 20/28/30 ms
    
    
    
[AR2]display nhrp peer all
------------------------------------------------------------------------------- 
Protocol-addr   Mask  NBMA-addr       NextHop-addr    Type         Flag         
------------------------------------------------------------------------------- 
123.123.123.1   32    10.1.1.1        123.123.123.1   static       hub          
------------------------------------------------------------------------------- 
Tunnel interface: Tunnel0/0/0
Created time    : 00:55:09
Expire time     : --
------------------------------------------------------------------------------- 
Protocol-addr   Mask  NBMA-addr       NextHop-addr    Type         Flag         
------------------------------------------------------------------------------- 
123.123.123.3   32    10.1.3.3        123.123.123.3   dynamic      route tunnel 
------------------------------------------------------------------------------- 
Tunnel interface: Tunnel0/0/0
Created time    : 00:21:48
Expire time     : 01:38:30
------------------------------------------------------------------------------- 
Protocol-addr   Mask  NBMA-addr       NextHop-addr    Type         Flag         
------------------------------------------------------------------------------- 
123.123.123.2   32    10.1.2.2        123.123.123.2   dynamic      local        
------------------------------------------------------------------------------- 
Tunnel interface: Tunnel0/0/0
Created time    : 00:21:48
Expire time     : 01:38:12
------------------------------------------------------------------------------- 
Protocol-addr   Mask  NBMA-addr       NextHop-addr    Type         Flag         
------------------------------------------------------------------------------- 
172.16.2.20     24    10.1.2.2        123.123.123.2   dynamic      local        
------------------------------------------------------------------------------- 
Tunnel interface: Tunnel0/0/0
Created time    : 00:21:30
Expire time     : 01:38:30
------------------------------------------------------------------------------- 
Protocol-addr   Mask  NBMA-addr       NextHop-addr    Type         Flag         
------------------------------------------------------------------------------- 
172.16.3.3      32    10.1.3.3        123.123.123.3   dynamic      route network
------------------------------------------------------------------------------- 
Tunnel interface: Tunnel0/0/0
Created time    : 00:16:46
Expire time     : 01:43:14
------------------------------------------------------------------------------- 
Protocol-addr   Mask  NBMA-addr       NextHop-addr    Type         Flag         
------------------------------------------------------------------------------- 
172.16.3.10     24    10.1.3.3        123.123.123.3   dynamic      route network
------------------------------------------------------------------------------- 
Tunnel interface: Tunnel0/0/0
Created time    : 00:12:21
Expire time     : 01:47:39
Number of nhrp peers: 6
相关文章
|
机器学习/深度学习 人工智能 自然语言处理
视觉 注意力机制——通道注意力、空间注意力、自注意力
本文介绍注意力机制的概念和基本原理,并站在计算机视觉CV角度,进一步介绍通道注意力、空间注意力、混合注意力、自注意力等。
12811 58
|
6月前
|
网络协议 网络虚拟化 Python
配置BGP/MPLS IP VPN示例——详解版
本文介绍了BGP/MPLS IP VPN的配置示例,分部1与分部2只能和总部通信,不能互相通信。通过MPLS VPN实现分部与总部间的通信,使用BGP协议传递路由。配置包括接口IP地址设置、OSPF域内互通、PE上的VPN实例配置、MP-IBGP配置、PE与CE间EBGP对等体关系建立、MPLS及MPLS LDP功能配置,并验证了配置结果。最终测试显示,同一VPN下的CE设备可相互Ping通,不同VPN下的CE设备则不能。
配置BGP/MPLS IP VPN示例——详解版
|
11月前
|
网络虚拟化
配置BGP/MPLS IP VPN示例
本文介绍了通过配置MPLS VPN实现分部与总部之间的通信需求。具体要求为分部1和分部2只能与总部通信,而分部之间不能通信。配置思路包括使用BGP协议传递路由,并将各分部分别划分到不同的VPN实例中(VPN1、VPN2、VPN3),通过设置RD和Target属性确保路由隔离。操作步骤涵盖设备IP地址配置、MPLS域内互通、PE上的VPN实例配置、接口绑定、MP-IBGP配置、CE与PE间的路由交换及MPLS LDP功能配置。最终验证显示,同一VPN内的CE设备可以相互通信,不同VPN的CE设备则无法通信,满足了组网需求。
配置BGP/MPLS IP VPN示例
|
10月前
|
安全 网络安全 网络虚拟化
GRE over IPsec 之总部静态固定 IP 与分部 PPPoE 动态 IP 部署 Hub_and_Spoke
在现代企业网络中,广域网(WAN)连接的安全性和可靠性至关重要。GRE over IPsec 是一种常用的方案,它将 GRE 隧道与 IPsec 加密相结合,实现数据安全传输。本文将详细介绍如何在总部使用静态固定 IP 和分部使用 PPPoE 动态 IP 的环境下,部署 Hub-and-Spoke 模式的 GRE over IPsec 配置。
385 14
|
人工智能 自然语言处理 IDE
|
传感器 运维 监控
|
存储 运维 监控
|
监控 负载均衡 安全
思科无线 LAN 控制器(WLC)基本配置详解
【4月更文挑战第22天】
2870 2
思科无线 LAN 控制器(WLC)基本配置详解
|
开发框架 JavaScript 安全
WIndows Server 2016 部署 Web服务(简单篇)
WIndows Server 2016 部署 Web服务(简单篇)
607 2
|
自然语言处理 搜索推荐 SEO
如何使用 Google 搜索引擎保姆级教程(附链接)
如何使用 Google 搜索引擎保姆级教程(附链接)