国产探花免费观看_亚洲丰满少妇自慰呻吟_97日韩有码在线_资源在线日韩欧美_一区二区精品毛片,辰东完美世界有声小说,欢乐颂第一季,yy玄幻小说排行榜完本

首頁 > 學院 > 網絡通信 > 正文

實戰Cisco: MPLS VPN: Cisco & Juniper together

2019-11-05 00:09:18
字體:
來源:轉載
供稿:網友

  最近做了個用Cisco 和 Juniper 路由器做PE的MPLS VPN實驗。實驗中R1 (Cisco)和R2 (Juniper)通過ATM 骨干互聯, P-Network使用ISIS作為IGP協議,R2作為MP-BGP的路由反射器。Juniper 與 Cisco 在端口互聯和IGP、BGP路由協議互操作上感覺很好,沒有碰到什么問題。
  
  實驗中使用loopback 端口來模擬VPN用戶網絡。和cisco的概念不一樣,Juniper的Loopback 端口只有一個,但可以劃分子端口(在使用MPLS VPN時),只能使用/32的地址。
  
  可能熟悉Juniper 命令行接口的朋友比較少
  
  具體配置:
  Cisco 路由器配置:
  !
  version 12.3
  service timestamps debug uptime
  service timestamps log uptime
  no service passWord-encryption
  !
  hostname R1
  !
  !
  ip subnet-zero
  no ip source-route
  ip cef
  ip vrf vpn_a
  rd 2:1
  route-target eXPort 111:1
  route-target import 111:1
  route-target import 111:2
  !
  ip vrf vpn_b
  rd 3:304
  route-target export 222:304
  route-target export 111:2
  route-target import 222:3
  route-target import 111:1
  !
  mpls label PRotocol ldp
  mpls ldp logging neighbor-changes
  no FTP-server write-enable
  !
  !
  !
  !
  interface Loopback0
  ip address 192.168.40.1 255.255.255.255
  ip router isis
  !
  interface Loopback200
  ip vrf forwarding vpn_a
  ip address 10.10.64.1 255.255.255.0
  !
  interface Loopback300
  ip vrf forwarding vpn_b
  ip address 10.10.65.1 255.255.255.0
  !
  interface ATM2/0
  no ip address
  no atm ilmi-keepalive
  !
  interface ATM2/0.1 point-to-point
  ip address 192.168.34.4 255.255.255.0
  ip router isis
  pvc 1/134
  protocol ip 192.168.34.3
  brvpn_adcast
  encapsulation aal5snap
  !
  tag-switching ip
  !
  router isis
  net 47.0001.0000.0000.4444.00
  !
  router bgp 65888
  no synchronization
  bgp router-id 192.168.40.1
  bgp log-neighbor-changes
  neighbor rr-server peer-group
  neighbor rr-server remote-as 65888
  neighbor rr-server update-source Loopback0
  neighbor 192.168.30.1 peer-group rr-server
  no auto-summary
  !
  address-family vpnv4
  neighbor 192.168.30.1 activate
  neighbor 192.168.30.1 send-community both
  exit-address-family
  !
  address-family ipv4 vrf vpn_b
  redistribute connected
  no auto-summary
  no synchronization
  exit-address-family
  !
  no ip http server
  ip classless
  !
  !
  !
  !
  line con 0
  line aux 0
  line vty 0 4
  login
  !
  !
  end
  
  Juniper 路由器配置:
  
  version 6.0R1.5;
  system {
  host-name R2;
  login {
  user juny {
  uid 2001;
  class super-user;
  authentication {
  encrypted-password "$1$fhr423rkSB$0/fnrTsdfljwerWbeHX0"; # SECRET-DATA
  }
  }
  }
  services {
  telnet;
  }
  }
  chassis {
  no-source-route;
  }
  interfaces {
  at-0/0/1 {
  description "To ATM Backbone";
  atm-options {
  vpi 1 {
  maximum-vcs 1023;
  }
  }
  unit 2 {
  encapsulation atm-snap;
  vci 1.134;
  family inet {
  address 192.168.34.3/24;
  }
  family iso;
  family mpls;
  }
  }
  vt-0/3/0 {
  unit 200 {
  family inet;
  family mpls;
  }
  unit 300 {
  family inet;
  family mpls;
  }
  
  }
  lo0 {
  unit 0 {
  family inet {
  address 192.168.30.1/32;
  }
  family iso {
  address 47.0001.0000.0000.3333.00;
  }
  }
  unit 200 {
  description "For vpn_a ";
  family inet {
  address 10.10.0.1/32;
  }
  }
  unit 300 {
  description "For vpn_b ";
  family inet {
  address 10.10.1.1/32;
  }
  }
  
  }
  }
  routing-options {
  router-id 192.168.30.1;
  autonomous-system 65888;
  }
  protocols {
  
  mpls {
  interface at-0/0/1.2;
  }
  bgp {
  local-address 192.168.30.1;
  group rr-client {
  type internal;
  local-address 192.168.30.1;
  family inet-vpn {
  any;
  }
  cluster 192.168.30.1;
  neighbor 192.168.10.1;
  neighbor 192.168.20.1;
  neighbor 192.168.40.1;
  neighbor 192.168.50.1;
  neighbor 192.168.60.1;
  }
  }
  isis {
  level 2 wide-metrics-only;
  interface at-0/0/1.2;
  interface lo0.0;
  }
  ldp {
  interface at-0/0/1.2;
  interface lo0.0;
  }
  }
  policy-options {
  policy-statement vpn_a-import {
  term a {
  from community [ vpn_a vpn_a-im ];
  then accept;
  }
  term b {
  then reject;
  }
  }
  policy-statement vpn_a-export {
  term a {
  from protocol direct;
  then {
  community add vpn_a;
  accept;
  }
  }
  term b {
  then reject;
  }
  }
  policy-statement vpn_b-import {
  term a {
  from community [ vpn_b-province-to-city vpn_b-r4-site1 vpn_a ];
  then accept;
  }
  term b {
  then reject;
  }
  }
  policy-statement vpn_b-export {
  term a {
  from protocol direct;
  then {
  community add vpn_b-site1-to-province;
  community add vpn_a-im;
  accept;
  }
  }
  term b {
  then reject;
  }
  }
  community vpn_a members target:111:1;
  community vpn_a-im members target:111:2;
  community vpn_b members target:111:2;
  community vpn_b-province-to-city members target:222:1;
  community vpn_b-r4-site1 members target:222:304;
  community vpn_b-site1-to-province members target:222:3;
  }
  routing-instances {
  
  vpn_a {
  description "For vpn_a";
  instance-type vrf;
  interface lo0.200;
  interface vt-0/3/0.200;
  route-distinguisher 2:1;
  vrf-import vpn_a-import;
  vrf-export vpn_a-export;
  routing-options {
  auto-export;
  }
  }
  vpn_b {
  description "For vpn_b";
  instance-type vrf;
  interface lo0.300;
  interface vt-0/3/0.300;
  route-distinguisher 3:3;
  vrf-import vpn_b-import;
  vrf-export vpn_b-export;
  routing-options {
  auto-export;
  }
  }
  }
  
  
  
  幾點說明:
  1.Cisco 默認使用TDP標簽分發協議,要和其他廠商互聯,需指定使用LDP標簽分發協議。
不管是TDP還是LDP,都需要啟用CEF來支持。
  配置命令:mpls label protocol ldp
  
  2.假如VPN Site 1 要和Site 2 及Site 3 互通,但是要求Site 2 和Site 3 不能互通時,使用VPN Overlay功能。 cisco 的配置方法簡單明了:
  
  ip vrf site1
  ro im 1:2
  ro im 1:3
  ro ex 1:1
  
  ip vrf site2
  ro im 1:1
  ro ex 1:2
  
  ip vrf site3
  ro im 1:1
  ro ex 1:3
  
  Juniper的配置方法:首先要給route target 命名, 然后在策略policy-statement中引用,最后指定routing-instance使用指定的策略。除此之外Juniper 要啟用routing-instance的auto-export 特性,否則site1的在該PE上的直連路由不能導入到同一PE的另一個site中。
  
  3.源路由對有VPN Overlay 的環境來說是一種威脅。假如VPN Site 1 能夠和Site 2 及Site 3 互通,但是策略要求Site 2 和Site 3 不能互通,Site 2 的用戶有可能通過源路由技術經Site 1 到達 Site 3。
  Cisco 路由器禁止源路由配置命令:
  
  no ip source-route
  
  Juniper 路由器禁止源路由配置命令:
  
  chassis {
  no-source-route;
  }
  
  4.PE接CE端口問題:
  
  根據Juniper公司工程師介紹,由于Juniper 的主要用戶為ISP, 所以設計的時候禁止用戶Ping PE的端口,以增強P-network的安全性,該特性不能被關閉。
  
  在實驗中,我們首先發現,在PE上ping 不通某些直連的地址,嘗試過多種處理方法之后,以下這種方法有較好的效果,但系統必須要配置有TUNNEL硬件板卡。
  配置命令:
  
  interfaces {
  vt-0/3/0 {
  unit 200 {
  family inet;
  family mpls;
  }
  unit 300 {
  family inet;
  family mpls;
  }
  
  }
  
  經過這樣處理之后,PE設備ping 不在同一臺PE下的地址時正常了。但當兩個VPN Site都接在同一個PE下時,測試仍不正常:
  * PE從Site 1內ping屬于該Site的地址:OK;
  * PE從Site 1內ping 從Site 2 導入的地址時:失敗
  
  所以該問題尚未完全解決。

發表評論 共有條評論
用戶名: 密碼:
驗證碼: 匿名發表
主站蜘蛛池模板: 宁远县| 平塘县| 呼玛县| 宣威市| 宾阳县| 兴和县| 文水县| 汽车| 大庆市| 固阳县| 安溪县| 博野县| 嘉荫县| 会昌县| 泸定县| 石林| 上高县| 衢州市| 博白县| 红河县| 共和县| 尚志市| 龙泉市| 临沭县| 泰安市| 溧阳市| 巴彦县| 会宁县| 体育| 郎溪县| 高雄市| 临泽县| 象山县| 丹江口市| 松溪县| 遂溪县| 黔江区| 盐边县| 天峨县| 射阳县| 南投市|