当前位置:网站首页>Huawei router clock near the drainage experiment (using stream strategy)
Huawei router clock near the drainage experiment (using stream strategy)
2022-08-10 21:26:00 【Lay Master Wen Tao】
Router bypass experiment.
The purpose of the experiment, as shown in the figure, this experiment needs to draw the traffic from the address 10.1.2.1 to the side-mounted AR1 device when accessing two PCs, and then the AR1 device will be injected back to the AR3equipment.
The method of drainage can be used flexibly according to the specific environment. This experiment adopts the method of flow strategy.
Specific configuration:
AR1:
interface GigabitEthernet0/0/0ip address 10.1.2.1 255.255.255.0ip route-static 0.0.0.0 10.1.2.2
AR2:
interface GigabitEthernet0/0/0ip address 10.1.10.1 255.255.255.0ip route-static 10.1.1.0 24 10.1.10.2ip route-static 10.2.1.0 24 10.1.10.2It is also possible to use a default route for the connected device.
AR2:
traffic classifier c1 operator or Create a traffic classifier to match traffic characteristics.The or guess here should be similar to the OR operation in programming, which is used to specify how to match the flow classification.(corrections are welcome)if-match anytraffic behavior b1 Creates a flow behavior that changes the direction of data flow.redirect ip-nexthop 10.1.10.1traffic policy p1 Creates a traffic policy and associates the created traffic classification with traffic behavior.classifier c1 behavior b1interface GigabitEthernet0/0/0ip address 10.1.2.2 255.255.255.0traffic-policy p1 inbound Finally, you need to apply this policy to the interface, paying attention to the direction.
AR2 device address planning is as follows
Finally, twoThe address and gateway are configured on a PC and it is OK.
Verification:
Use the device of 10.1.2.1 to ping two PCs, and perform packet capture verification on the interface of the connected device.
It can be seen that the drainage strategy is successful, and the device is attachedThe packet was successfully captured on the interface.
When the packet is returned, the data does not pass through the bypass device.If you want the return packet to also pass through the side-connected device, you should also need a flow strategy.
边栏推荐
猜你喜欢
随机推荐
Mark!画出漂亮的神经网络图!神经网络可视化工具集锦搜集
[Golang]从0到1写一个web服务(上)
根心与根轴
机器学习笔记:t-SNE
[SWPUCTF 2021 新生赛] web
通用线程:POSIX 线程详解,第 2部分
MATLAB神经网络拟合工具箱Neural Net Fitting使用方法
SELECT:简单的查询操作语法&使用例——《mysql 从入门到内卷再到入土》
ctfshow-osint
基于Pix4Dmapper的空间三维模型重建应用——空间分析选址
化学制品制造业数智化供应链管理系统:建立端到端供应链采购一体化平台
2021年中国工业互联网安全大赛(福建省选拔赛) 暨首届福建省工业互联网创新大赛
Are you hungry - Institution tree radio
面向未来的 IT 基础设施管理架构——融合云(Unified IaaS)
Common functions of Auto.js to find pictures and colors
姜还是老的辣,看看老战哥的老底儿和严谨劲儿
Before implementing MES management system, these three questions to consider
Redis Command Manual
ENVI最小距离、最大似然、支持向量机遥感影像分类
INSERT:插入操作语法&使用例——《mysql 从入门到内卷再到入土》