当前位置:网站首页>H3C firewall rbm+vrrp networking configuration
H3C firewall rbm+vrrp networking configuration
2022-07-06 05:51:00 【Creator of high-quality network system】

The basic networking is as above , This experiment adopts HCL Simulator complete .fw1 And fw2 establish RBM, The uplink and downlink use vrrp docking .sw3、sw4 by 2 Layer switch , Be a firewall RBM When the connection is accidentally disconnected , It can be transmitted through the switch vrrp message , by vrrp Its own negotiation mechanism realizes active and standby . stay fw1、fw2 Both use vrrp 2 Virtual address of ipsec To configure , Under normal circumstances, the flow goes fw1, Only fw1 and fw6 establish ipsec sa, because RBM Not yet ipsec Synchronization of , So normally fw2 Don't fw6 build ipsec, When the active and standby switches, the traffic goes up fw2, The flow of interest is automatically triggered fw2 and fw6 establish ipsec Tunnel , At the same time as fw6 And the only vrrp Virtual address establishment connection , Can't feel fw1 and fw2 Switch between main and backup , So you need to configure dpd Keep alive detection , When the active and standby switch, the new one can be negotiated in time ike sa and ipsec sa.
Configuration steps
One 、fw1 Basic configuration :
Configure interface ip Address and vrrp Virtual address ,g1/0/10 To act as RBM Interface
interface GigabitEthernet1/0/1
port link-mode route
ip address 1.1.1.1 255.255.255.0
vrrp vrid 1 virtual-ip 1.1.1.3 active
interface GigabitEthernet1/0/2
port link-mode route
ip address 2.2.2.1 255.255.255.0
vrrp vrid 2 virtual-ip 2.2.2.3 active
interface GigabitEthernet1/0/10
port link-mode route
ip address 10.0.0.1 255.255.255.0
Interface plus security domain ,RBM The interface does not need to add a security domain , The device is released by default
security-zone name Trust
import interface GigabitEthernet1/0/1
security-zone name Untrust
import interface GigabitEthernet1/0/2
Configure static routing
ip route-static 10.10.10.0 24 1.1.1.100
ip route-static 172.16.10.0 24 2.2.2.10
To configure RBM, The device acts as the master management device , Main standby mode
remote-backup group
data-channel interface GigabitEthernet1/0/10
configuration sync-check interval 12
local-ip 10.0.0.1
remote-ip 10.0.0.2
device-role primary
Configure detailed security policies , Let go local and trust、untrust Between domains vrrp message
security-policy ip
rule 1 name 1
action pass
source-zone local
destination-zone trust
service vrrp
rule 2 name 2
action pass
source-zone trust
destination-zone local
service vrrp
rule 3 name 3
action pass
source-zone local
destination-zone untrust
service vrrp
rule 4 name 4
action pass
source-zone untrust
destination-zone local
service vrrp
边栏推荐
- 【无标题】
- Migrate Infones to stm32
- Redistemplate common collection instructions opsforvalue (II)
- B站刘二大人-数据集及数据加载 Lecture 8
- [paper reading] nflowjs: synthetic negative data intensive anomaly detection based on robust learning
- 【SQL server速成之路】——身份验证及建立和管理用户账户
- Report on the competition status and investment decision recommendations of Guangxi hospital industry in China from 2022 to 2028
- The ECU of 21 Audi q5l 45tfsi brushes is upgraded to master special adjustment, and the horsepower is safely and stably increased to 305 horsepower
- Easy to understand IIC protocol explanation
- Embedded interview questions (IV. common algorithms)
猜你喜欢

Mysql database master-slave cluster construction

Migrate Infones to stm32
【SQL server速成之路】——身份验证及建立和管理用户账户

29io stream, byte output stream continue write line feed

C language learning notes (mind map)

Web服务连接器:Servlet
【SQL server速成之路】——身份驗證及建立和管理用戶賬戶

Report on the competition status and investment decision recommendations of Guangxi hospital industry in China from 2022 to 2028

High quality coding tool clion
![[paper reading] nflowjs: synthetic negative data intensive anomaly detection based on robust learning](/img/9c/2753f68ecec3555aaca23800dada1e.png)
[paper reading] nflowjs: synthetic negative data intensive anomaly detection based on robust learning
随机推荐
Text classification still stays at Bert? The dual contrast learning framework is too strong
Analysis of grammar elements in turtle Library
Embedded interview questions (I: process and thread)
Mysql database master-slave cluster construction
Station B Liu Erden - linear regression and gradient descent
26file filter anonymous inner class and lambda optimization
查询生产订单中某个(些)工作中心对应的标准文本码
通讯录管理系统链表实现
[string] palindrome string of codeup
华为路由器如何配置静态路由
29io stream, byte output stream continue write line feed
How to download GB files from Google cloud hard disk
Station B Liu Erden softmx classifier and MNIST implementation -structure 9
Report on the competition status and investment decision recommendations of Guangxi hospital industry in China from 2022 to 2028
[Baiwen smart home] first day of the course_ Learn Embedded and understand the development mode of bare metal and RTOS
Some easy-to-use tools make your essay style more elegant
28io stream, byte output stream writes multiple bytes
(column 22) typical column questions of C language: delete the specified letters in the string.
養了只小猫咪
入侵检测领域数据集总结