当前位置:网站首页>Huawei router clock near the drainage experiment (using stream strategy)

Huawei router clock near the drainage experiment (using stream strategy)

2022-08-10 21:26:00 Lay Master Wen Tao

Router bypass experiment.

The purpose of the experiment, as shown in the figure, this experiment needs to draw the traffic from the address 10.1.2.1 to the side-mounted AR1 device when accessing two PCs, and then the AR1 device will be injected back to the AR3equipment.

The method of drainage can be used flexibly according to the specific environment. This experiment adopts the method of flow strategy.
Experimental topology
Specific configuration:
AR1:

interface GigabitEthernet0/0/0ip address 10.1.2.1 255.255.255.0ip route-static 0.0.0.0 10.1.2.2

AR2:

interface GigabitEthernet0/0/0ip address 10.1.10.1 255.255.255.0ip route-static 10.1.1.0 24 10.1.10.2ip route-static 10.2.1.0 24 10.1.10.2It is also possible to use a default route for the connected device.

AR2:

traffic classifier c1 operator or Create a traffic classifier to match traffic characteristics.The or guess here should be similar to the OR operation in programming, which is used to specify how to match the flow classification.(corrections are welcome)if-match anytraffic behavior b1 Creates a flow behavior that changes the direction of data flow.redirect ip-nexthop 10.1.10.1traffic policy p1 Creates a traffic policy and associates the created traffic classification with traffic behavior.classifier c1 behavior b1interface GigabitEthernet0/0/0ip address 10.1.2.2 255.255.255.0traffic-policy p1 inbound Finally, you need to apply this policy to the interface, paying attention to the direction.

AR2 device address planning is as follows
insert image description here
Finally, twoThe address and gateway are configured on a PC and it is OK.

Verification:
Use the device of 10.1.2.1 to ping two PCs, and perform packet capture verification on the interface of the connected device.

Insert picture description here
It can be seen that the drainage strategy is successful, and the device is attachedThe packet was successfully captured on the interface.
When the packet is returned, the data does not pass through the bypass device.If you want the return packet to also pass through the side-connected device, you should also need a flow strategy.

原网站

版权声明
本文为[Lay Master Wen Tao]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/222/202208102058084345.html