当前位置:网站首页>Huawei router clock near the drainage experiment (using stream strategy)
Huawei router clock near the drainage experiment (using stream strategy)
2022-08-10 21:26:00 【Lay Master Wen Tao】
Router bypass experiment.
The purpose of the experiment, as shown in the figure, this experiment needs to draw the traffic from the address 10.1.2.1 to the side-mounted AR1 device when accessing two PCs, and then the AR1 device will be injected back to the AR3equipment.
The method of drainage can be used flexibly according to the specific environment. This experiment adopts the method of flow strategy.
Specific configuration:
AR1:
interface GigabitEthernet0/0/0ip address 10.1.2.1 255.255.255.0ip route-static 0.0.0.0 10.1.2.2
AR2:
interface GigabitEthernet0/0/0ip address 10.1.10.1 255.255.255.0ip route-static 10.1.1.0 24 10.1.10.2ip route-static 10.2.1.0 24 10.1.10.2It is also possible to use a default route for the connected device.
AR2:
traffic classifier c1 operator or Create a traffic classifier to match traffic characteristics.The or guess here should be similar to the OR operation in programming, which is used to specify how to match the flow classification.(corrections are welcome)if-match anytraffic behavior b1 Creates a flow behavior that changes the direction of data flow.redirect ip-nexthop 10.1.10.1traffic policy p1 Creates a traffic policy and associates the created traffic classification with traffic behavior.classifier c1 behavior b1interface GigabitEthernet0/0/0ip address 10.1.2.2 255.255.255.0traffic-policy p1 inbound Finally, you need to apply this policy to the interface, paying attention to the direction.
AR2 device address planning is as follows
Finally, twoThe address and gateway are configured on a PC and it is OK.
Verification:
Use the device of 10.1.2.1 to ping two PCs, and perform packet capture verification on the interface of the connected device.
It can be seen that the drainage strategy is successful, and the device is attachedThe packet was successfully captured on the interface.
When the packet is returned, the data does not pass through the bypass device.If you want the return packet to also pass through the side-connected device, you should also need a flow strategy.
边栏推荐
猜你喜欢
Knowledge map Knowledge Graph
设备管理中数据聚类处理
LeetCode-498-对角线遍历
Rider调试ASP.NET Core时报thread not gc-safe的解决方法
Detailed explanation and use of each module of ansible
玩转doxygen 之RT-THREAD
我的世界整合包 云服务器搭建方法(ECS)
TCL:事务的特点,语法,测试例——《mysql 从入门到内卷再到入土》
Future-oriented IT infrastructure management architecture - Unified IaaS
参天生长大模型:昇腾AI如何强壮模型开发与创新之根?
随机推荐
Kubernetes 笔记 / 入门 / 生产环境 / 用部署工具安装 Kubernetes / 用 kubeadm 启动集群 / 用 kubeadm 创建集群
.NET现代应用的产品设计 - DDD实践
石油化工行业商业供应链管理系统:标准化供应商管理,优化企业供应链采购流程
npm WARN config global `--global`, `--local` are deprecated. Use `--location=global` instead.
DDL:视图——《mysql 从入门到内卷再到入土》
In 2021 China industrial Internet security competition (competition) in fujian province and the first industry of fujian province Internet innovation competition
labelme-屏蔽拖拽的事件
CGO Preliminary Cognition and Basic Data Type Conversion
2022.8.9 模拟赛
Auto.js找图找色常用功能
Future与CompletableFuture
图数据库(Neo4j)入门
B. Codeforces Subsequences
DELETE:删除操作语法&使用例——《mysql 从入门到内卷再到入土》
labelme-5.0.1版本编辑多边形闪退
第五届“强网杯”全国网络安全挑战赛(线上赛)
玩转doxygen 之RT-THREAD
ctfshow-osint
《mysql 从入门到内卷再到入土》——Mysql基础 学习笔记目录
【vulhub】MySql身份认证绕过漏洞复现(CVE-2012-2122)