
Fastethernet 0/0 模拟第一个ISP接入端口,Fastethernet 0/1模拟第二个ISP接入端口,地址分别为 Fastethernet 0/0 的ip地址192.168.1.2 255.255.255.0 对端ISP地址192.168.1.1 255.255.255.0
Fastethernet 0/1 的ip地址192.168.2.2 255.255.255.0 对端ISP地址192.168.2.1 255.255.255.0
通过策略路由后对不同原地址数据流量进行分流,使得不同原地址主机通过不同ISP接口访问Internet,并为不同原地址主机同不同NAT地址进行转换。
具体配置:
version 12.2
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname Router
!!
ip subnet-zero
!!
call rsvp-sync
!
interface FastEthernet0/0 --------------------假设该端口为ISP 1接入端口
ip address 192.168.1.2 255.255.255.0 --------分配地址
ip nat outside --------指定为NAT Outside端口
duplex auto
speed auto
!
interface FastEthernet0/1 --------------------假设该端口为ISP 2接入端口
ip address 192.168.2.2 255.255.255.0 --------分配地址
ip nat outside --------指定为NAT Outside端口
duplex auto
speed auto
!
interface Ethernet1/0 --------------------假设该端口为内部网络端口
ip address 100.100.255.254 255.255.0.0 --------分配地址
ip nat inside --------指定为NAT Inside端口
ip policy route-map t0 --------在该端口上使用route-map t0进行策略控制
half-duplex
!
ip nat inside source list 1 interface FastEthernet0/0 overload ------Nat转换,指定原地址为100.100.23.0的主机使用Fastethernet 0/0的地址进行转换
ip nat inside source list 2 interface FastEthernet0/1 overload ------Nat转换,指定原地址为100.100.24.0的主机使用Fastethernet 0/1的地址进行转换
ip classless
ip route 0.0.0.0 0.0.0.0 192.168.2.1 ------静态路由,对Internet的访问通过192.168.2.1(ISP2)链路
ip route 0.0.0.0 0.0.0.0 192.168.1.1 ------静态路由,对Internet的访问通过192.168.1.1(ISP1)链路
ip http server
静太路由不起很大的作用,因为存在策略路由,主要是set int 要求有显示的去往目的的路由
!
access-list 1 permit 100.100.23.0 0.0.0.255 ----访问控制列表1,用于过滤原地址,允许100.100.23.0网段主机流量通过
access-list 2 permit 100.100.24.0 0.0.0.255 ----访问控制列表2,用于过滤原地址,允许100.100.23.0网段主机流量通过
如果做set int 备份,则acl1,acl2应该允许所有的,进行nat
route-map t0 permit 10 ----定义route-map t0,permit序列为10
match ip address 1 ----检查原地址,允许100.100.23.0 网段地址
set interface FastEthernet0/0 ----指定出口为Fastethetnet 0/0
(set interface FastEthernet0/1) 我认为可以做备份
!
route-map t0 permit 20 ----定义route-map t0,permit序列为20
match ip address 2 ----检查原地址,允许100.100.24.0 网段地址
set interface FastEthernet0/1 ----指定出口为Fastethetnet 0/1
!
(set interface FastEthernet0/1) 我认为可做备份 !
dial-peer cor custom
!
line con 0
line aux 0
line vty 0 4
!
end
效果检验: 察看路由表
Router#show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
100.0.0.0/16 is subnetted, 1 subnets
C 100.100.0.0 is directly connected, Ethernet1/0
C 192.168.1.0/24 is directly connected, FastEthernet0/0
C 192.168.2.0/24 is directly connected, FastEthernet0/1
S* 0.0.0.0/0 [1/0] via 192.168.1.1
[1/0] via 192.168.2.1
发现静态路由存在两条路径!
察看ip Nat translations
Router#sho ip nat translations
Pro Inside global Inside local Outside local Outside global
icmp 192.168.1.2:1024 100.100.23.23:1024 1.1.1.1:1024 1.1.1.1:1024
icmp 192.168.2.2:1280 100.100.24.23:1280 1.1.1.1:1280 1.1.1.1:1280
由于路由器外部存在1.1.1.1的地址,用于模拟Internet公网地址,发现不同网段内部主机流量确实已经从不同出口访问外部资源,并且使用了不同Nat进行地址转换!
注:大部分多ISP情况下都要使用NAT地址转换功能,但有些特殊情况下不需使用NAT功能,如果不是用NAT,就将配置中的有关NAT的配置去掉,
如此配置中去掉 ip nat inside source list 1 interface FastEthernet0/0 overload 和ip nat inside source list 2 interface FastEthernet0/1 overload
以及在端口上去掉ip Nat outside和ip nat inside的配置,就可以实现不用NAT的策略路由。
以上试验可以实现基于原地址的策略路由功能,可以根据内网原地址进行不同流量通过不同ISP接口访问Internet的功能,但仍没有实现双链路相互备份的功能,即当任意一条链路出现故障的时候无法自动使用另一条链路进行备份,造成一部分相应的内网主机无法访问的情况。
路由器电信、网通双线路智能切换配置指导
一。配置访问控制列表,定义访问目的地址为网通的地址段
System View: return to User View with Ctrl+Z. [Quidway]acl num 3100 [Quidway-acl-adv-3100] 可以直接复制粘贴如下规则: rule 0 permit ip destination 60.0.0.0 0.7.255.255 rule 1 permit ip destination 60.0.0.0 0.8.255.255 rule 2 permit ip destination 60.0.0.0 0.9.255.255 rule 3 permit ip destination 60.0.0.0 0.10.255.255 rule 4 permit ip destination 60.0.0.0 0.11.255.255 rule 5 permit ip destination 60.8.0.0 0.3.255.255 rule 6 permit ip destination 60.12.0.0 0.0.255.255 rule 7 permit ip destination 60.13.0.0 0.0.63.255 rule 8 permit ip destination 60.13.128.0 0.0.127.255 rule 9 permit ip destination 60.16.0.0 0.15.255.255 rule 10 permit ip destination 60.208.0.0 0.7.255.255 rule 11 permit ip destination 60.216.0.0 0.1.255.255 rule 12 permit ip destination 60.220.0.0 0.3.255.255 rule 13 permit ip destination 61.48.0.0 0.3.255.255 rule 14 permit ip destination 61.52.0.0 0.1.255.255 rule 15 permit ip destination 61.54.0.0 0.0.255.255 rule 16 permit ip destination 61.55.0.0 0.0.255.255 rule 17 permit ip destination 61.133.0.0 0.0.127.255 rule 18 permit ip destination 61.134..0 0.0.63.255 rule 19 permit ip destination 61.134.128.0 0.0.127.255 rule 20 permit ip destination 61.135.0.0 0.0.255.255 rule 21 permit ip destination 61.136.0.0 0.0.255.255 rule 22 permit ip destination 61.138.0.0 0.0.127.255 rule 23 permit ip destination 61.139.128.0 0.0.63.255 rule 24 permit ip destination 61.148.0.0 0.0.255.255 rule 25 permit ip destination 61.149.0.0 0.0.255.255 rule 26 permit ip destination 61.156.0.0 0.0.255.255 rule 27 permit ip destination 61.158.0.0 0.0.255.255 rule 28 permit ip destination 61.159.0.0 0.0.63.255 rule 29 permit ip destination 61.161.0.0 0.0.63.255 rule 30 permit ip destination 61.161.128.0 0.0.127.255 rule 31 permit ip destination 61.162.0.0 0.0.255.255 rule 32 permit ip destination 61.163.0.0 0.0.255.255 rule 33 permit ip destination 61.167.0.0 0.0.255.255 rule 34 permit ip destination 61.168.0.0 0.0.255.255 rule 35 permit ip destination 61.176.0.0 0.0.255.255 rule 36 permit ip destination 61.179.0.0 0.0.255.255 rule 37 permit ip destination 61.180.128.0 0.0.127.255 rule 38 permit ip destination 61.181.0.0 0.0.255.255 rule 39 permit ip destination 61.182.0.0 0.0.255.255 rule 40 permit ip destination 61.1.0.0 0.0.127.255 rule 41 permit ip destination 202.32.0.0 0.31.255.255 rule 42 permit ip destination 202.96..0 0.0.31.255 rule 43 permit ip destination 202.97.128.0 0.0.127.255 rule 44 permit ip destination 202.98.0.0 0.0.31.255 rule 45 permit ip destination 202.99.0.0 0.0.255.255 rule 46 permit ip destination 202.102.128.0 0.0.63.255 rule 47 permit ip destination 202.102.224.0 0.0.1.255 rule 48 permit ip destination 202.106.0.0 0.0.255.255 rule 49 permit ip destination 202.107.0.0 0.0.127.255 rule 50 permit ip destination 202.108.0.0 0.0.255.255 rule 51 permit ip destination 202.110.0.0 0.0.127.255 rule 52 permit ip destination 202.110.192.0 0.0.63.255 rule 53 permit ip destination 202.111.128.0 0.0.63.255 rule 54 permit ip destination 210.51.0.0 0.0.255.255 rule 55 permit ip destination 210.52.0.0 0.1.255.255 rule 56 permit ip destination 218.4.0.0 0.3.255.255 rule 57 permit ip destination 218.10.0.0 0.1.255.255 rule 58 permit ip destination 218.21.128.0 0.0.127.255 rule 59 permit ip destination 218.24.0.0 0.1.255.255 rule 60 permit ip destination 218.26.0.0 0.0.255.255 rule 61 permit ip destination 218.27.0.0 0.0.255.255 rule 62 permit ip destination 218.28.0.0 0.1.255.255 rule 63 permit ip destination 218.56.0.0 0.3.255.255 rule permit ip destination 218.60.0.0 0.1.255.255 rule 65 permit ip destination 218.62.0.0 0.0.127.255 rule 66 permit ip destination 218.67.128.0 0.0.127.255 rule 67 permit ip destination 218.68.0.0 0.1.255.255 rule 68 permit ip destination 219.141.128.0 0.0.127.255 rule 69 permit ip destination 219.142.0.0 0.1.255.255 rule 70 permit ip destination 219.154.0.0 0.1.255.255 rule 71 permit ip destination 219.156.0.0 0.1.255.255 rule 72 permit ip destination 219.158.0.0 0.0.255.255 rule 73 permit ip destination 219.159.0.0 0.0.63.255 rule 74 permit ip destination 221.0.0.0 0.3.255.255 rule 75 permit ip destination 221.4.0.0 0.1.255.255 rule 76 permit ip destination 221.6.0.0 0.0.255.255 rule 77 permit ip destination 221.7.128.0 0.0.127.255 rule 78 permit ip destination 221.8.0.0 0.1.255.255 rule 79 permit ip destination 221.10.0.0 0.0.255.255 rule 80 permit ip destination 221.11.0.0 0.0.127.255 rule 81 permit ip destination 221.12.0.0 0.3.255.255 rule 82 permit ip destination 221.12.0.0 0.0.127.255 rule 83 permit ip destination 221.12.128.0 0.0.63.255 rule 84 permit ip destination 221.192.0.0 0.3.255.255 rule 85 permit ip destination 221.196.0.0 0.1.255.255 rule 86 permit ip destination 221.199.0.0 0.0.31.255 rule 87 permit ip destination 221.199.32.0 0.0.15.255 rule 88 permit ip destination 221.199.128.0 0.0.63.255 rule permit ip destination 221.199.192.0 0.0.15.255 rule 90 permit ip destination 221.200.0.0 0.3.255.255 rule 91 permit ip destination 221.204.0.0 0.1.255.255 rule 92 permit ip destination 221.207.0.0 0.0.63.255 rule 93 permit ip destination 221.208.0.0 0.15.255.255 rule 94 permit ip destination 222.128.0.0 0.3.255.255 rule 95 permit ip destination 222.132.0.0 0.3.255.255 rule 96 permit ip destination 222.136.0.0 0.7.255.255 rule 97 permit ip destination 222.160.0.0 0.3.255.255 注:以上规则已经包含大部分网通地址段,如有更新可以动态添加。 二。定义策略路由指定访问网通地址段的数据报文下一跳为网通网关 [Quidway]route-policy auto permit node 1 %New sequence of this list [Quidway-route-policy]if-match acl 3100 [Quidway-route-policy]apply ip-address next-hop 10.1.1.2 [Quidway-route-policy]dis this # route-policy auto permit node 1 if-match acl 3100 apply ip-address next-hop 10.1.1.2 # return [Quidway-route-policy] 注:上面配置中以地址10.1.1.2为例作为网通网关地址,应用中可根据实际需要修改。 三。在连接局域网接口下应用此策略路由 [Quidway]int e3/0 [Quidway-Ethernet3/0]dis this # interface Ethernet3/0 ip address 192.168.1.1 255.255.255.0 # return [Quidway-Ethernet3/0]ip policy route-policy auto [Quidway-Ethernet3/0]dis this # interface Ethernet3/0 ip address 192.168.1.1 255.255.255.0 ip policy route-policy auto # return [Quidway-Ethernet3/0] 四。配置默认路由器经过电信网关 ip route-static 0.0.0.0 0.0.0.0 20.1.1.2 preference 60
