路由策略调用工具—filter-policy(策略路由插件)

网友投稿 306 2022-09-19


路由策略调用工具—filter-policy(策略路由插件)

AR1:

display current-configuration

[V200R003C00]

#

sysname ar1

#

snmp-agent local-engineid 800007DB03000000000000

snmp-agent

#

clock timezone China-Standard-Time minus 08:00:00

#

portal local-server load portalpage.zip

#

drop illegal-mac alarm

#

set cpu-usage threshold 80 restore 75

#

aaa

authentication-scheme default

authorization-scheme default

accounting-scheme default

domain default

domain default_admin

local-user admin password cipher %$%$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$

local-user admin service-type zone Local

priority 15

#

interface GigabitEthernet0/0/0

ip address 192.168.1.1 255.255.255.0

#

interface GigabitEthernet0/0/1

ip address 10.1.1.1 255.255.255.252

#

interface GigabitEthernet0/0/2

#

interface NULL0

#

interface LoopBack0

ip address 1.1.1.1 255.255.255.255

#

ospf 1 router-id 1.1.1.1

area 0.0.0.0

network 10.1.1.0 0.0.0.3

network 192.168.1.0 0.0.0.255

#

user-interface con 0

authentication-mode password

user-interface vty 0 4

user-interface vty 16 20

#

wlan ac

#

return

AR2:

display current-configuration

[V200R003C00]

#

sysname ar2

#

snmp-agent local-engineid 800007DB03000000000000

snmp-agent

#

clock timezone China-Standard-Time minus 08:00:00

#

portal local-server load portalpage.zip

#

drop illegal-mac alarm

#

set cpu-usage threshold 80 restore 75

#

acl number 2001

rule 5 deny source 192.168.1.0 0.0.0.255

rule 10 permit

#

aaa

authentication-scheme default

authorization-scheme default

accounting-scheme default

domain default

domain default_admin

local-user admin password cipher %$%$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$

local-user admin service-type zone Local

priority 15

#

interface GigabitEthernet0/0/0

ip address 192.168.2.1 255.255.255.0

#

interface GigabitEthernet0/0/1

ip address 10.1.1.5 255.255.255.252

#

interface GigabitEthernet0/0/2

#

interface NULL0

#

interface LoopBack0

ip address 2.2.2.2 255.255.255.255

#

ospf 1 router-id 2.2.2.2

filter-policy 2001 import //接收方向

area 0.0.0.0

network 10.1.1.4 0.0.0.3

network 192.168.2.0 0.0.0.255

#

user-interface con 0

authentication-mode password

user-interface vty 0 4

user-interface vty 16 20

#

wlan ac

#

return

AR3:

display CU

display current-configuration

[V200R003C00]

#

sysname ar3

#

snmp-agent local-engineid 800007DB03000000000000

snmp-agent

#

clock timezone China-Standard-Time minus 08:00:00

#

portal local-server load portalpage.zip

#

drop illegal-mac alarm

#

set cpu-usage threshold 80 restore 75

#

aaa

authentication-scheme default

authorization-scheme default

accounting-scheme default

domain default

domain default_admin

local-user admin password cipher %$%$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$

local-user admin service-type zone Local

priority 15

#

interface GigabitEthernet0/0/0

ip address 10.1.1.2 255.255.255.252

#

interface GigabitEthernet0/0/1

ip address 10.1.1.6 255.255.255.252

#

interface GigabitEthernet0/0/2

ip address 10.1.1.9 255.255.255.252

#

interface NULL0

#

interface LoopBack0

ip address 3.3.3.3 255.255.255.255

#

ospf 1 router-id 3.3.3.3

area 0.0.0.0

network 10.1.1.0 0.0.0.3

network 10.1.1.4 0.0.0.3

network 10.1.1.8 0.0.0.3

#

user-interface con 0

authentication-mode password

user-interface vty 0 4

user-interface vty 16 20

#

wlan ac

#

return

AR4:

display CU

display current-configuration

[V200R003C00]

#

sysname ar4

#

snmp-agent local-engineid 800007DB03000000000000

snmp-agent

#

clock timezone China-Standard-Time minus 08:00:00

#

portal local-server load portalpage.zip

#

drop illegal-mac alarm

#

set cpu-usage threshold 80 restore 75

#

aaa

authentication-scheme default

authorization-scheme default

accounting-scheme default

domain default

domain default_admin

local-user admin password cipher %$%$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$

local-user admin service-type zone Local

priority 15

#

interface GigabitEthernet0/0/0

ip address 192.168.3.1 255.255.255.0

#

interface GigabitEthernet0/0/1

ip address 192.168.4.1 255.255.255.0

#

interface GigabitEthernet0/0/2

ip address 10.1.1.10 255.255.255.252

#

interface NULL0

#

interface LoopBack0

ip address 4.4.4.4 255.255.255.255

#

ospf 1 router-id 4.4.4.4

filter-policy ip-prefix prefix_1 export

import-route direct

area 0.0.0.0

network 10.1.1.8 0.0.0.3

#

ip ip-prefix prefix_1 index 10 permit 192.168.4.0 24

ip ip-prefix prefix_1 index 20 deny 192.168.3.0 24

#

user-interface con 0

authentication-mode password

user-interface vty 0 4

user-interface vty 16 20

#

wlan ac

#

return

注意事项:

ACL最后自动添加的命令为:rule 10 permit source any(任意的都通过)

ip-prefix:当所有前缀过滤列表均未匹配时,缺省情况下,存在最后一条默认匹配模式为deny;当引入的前缀列表不存在时,则默认匹配模式为permit


版权声明:本文内容由网络用户投稿,版权归原作者所有,本站不拥有其著作权,亦不承担相应法律责任。如果您发现本站中有涉嫌抄袭或描述失实的内容,请联系我们jiasou666@gmail.com 处理,核实后本网站将在24小时内删除侵权内容。

上一篇:防火墙的三种工作模式介绍(防火墙的三种工作模式介绍是)
下一篇:Java多线程 CompletionService
相关文章

 发表评论

暂时没有评论,来抢沙发吧~