BGP拓扑错误模拟配置

R1配置

---------------------------------------------

version 5.20, ESS 2207P45
#
 sysname RT1
#
 super password level 3 simple h3c
#
 domain default enable system
#
 telnet server enable
#
acl number 2000
 rule 0 permit source 192.168.200.0 0.0.0.255
acl number 2030
 rule 0 permit source 192.168.200.1 0
#
vlan 1
#
domain system
 access-limit disable
 state active
 idle-cut disable
 self-service-url disable
#               
user-group system
 group-attribute allow-guest
#               
local-user rt1  
 password simple rt1
 authorization-attribute level 2
 service-type telnet
local-user useradmin
 authorization-attribute level 2
#               
wlan rrm        
 dot11b mandatory-rate 1 2
 dot11b supported-rate 5.5 11
 dot11g mandatory-rate 1 2 5.5 11
 dot11g supported-rate 6 9 12 18 24 36 48 54
#               
attack-defense policy 1
#               
interface Aux0  
 async mode flow
 link-protocol ppp
#               
interface Cellular0/0
 async mode protocol
 link-protocol ppp
 attack-defense apply policy 1
#               
interface Ethernet0/0
 port link-mode route
 ip address 172.16.0.9 255.255.255.252
 attack-defense apply policy 1
#               
interface Ethernet0/1
 port link-mode route
 ip address 172.16.0.2 255.255.255.252
 attack-defense apply policy 1
#               
interface Ethernet0/2
 port link-mode route
 ip address 172.16.1.1 255.255.255.252
 attack-defense apply policy 1
#               
interface NULL0
#               
interface LoopBack0
 ip address 1.1.1.1 255.255.255.255
#               
interface Ethernet0/3
 port link-mode bridge
#               
interface Ethernet0/4
 port link-mode bridge
#               
interface WLAN-Radio2/0
#               
bgp 65000       
 undo synchronization
 peer 172.16.1.2 as-number 65001
 peer 2.2.2.2 as-number 65000
 peer 6.6.6.6 as-number 65000
 peer 7.7.7.7 as-number 65000
 peer 172.16.1.2 route-policy fk export
 peer 172.16.1.2 route-policy fa import
 peer 2.2.2.2 connect-interface LoopBack0
 peer 6.6.6.6 connect-interface LoopBack0
 peer 7.7.7.7 connect-interface LoopBack0
#               
ospf 1 router-id 1.1.1.1
 area 0.0.0.0   
  network 172.16.0.2 0.0.0.0
  network 172.16.0.9 0.0.0.0
  network 1.1.1.1 0.0.0.0
  network 172.16.1.1 0.0.0.0
#               
route-policy fa permit node 10
 if-match acl 2000
 apply as-path 400 600
route-policy fk permit node 10
 if-match as-path 1
route-policy fk permit node 20
#               
 snmp-agent     
 snmp-agent local-engineid 800063A203000FE2D06060
 snmp-agent community read h3c-read
 snmp-agent sys-info version v2c v3
 snmp-agent target-host trap address udp-domain 192.168.200.1 params securityname h3c-read
 undo snmp-agent trap enable voice dial
 snmp-agent trap source LoopBack0
#               
 load xml-configuration
#              
 load tr069-configuration
#               
user-interface tty 12
user-interface aux 0
user-interface vty 0 4
 acl 2030 inbound
 authentication-mode scheme
 idle-timeout 0 0
 protocol inbound telnet
#               
return

R2配置

-----------------------------------------------------------

#
 version 5.20, ESS 2207P45
#
 sysname RT2
#
 super password level 3 simple h3c
#
 domain default enable system
#
 telnet server enable
#
acl number 2000
 rule 0 permit source 192.168.100.0 0.0.0.255
acl number 2030
 rule 0 permit source 192.168.200.1 0
#
vlan 1
#
domain system
 access-limit disable
 state active
 idle-cut disable
 self-service-url disable
#               
ike proposal 1  
#               
ike peer rt4    
 pre-shared-key simple h3c
 remote-address 172.16.1.6
#               
ipsec proposal 1
#               
ipsec policy-template huawei 1
 ike-peer rt4   
 proposal 1     
#               
ipsec policy h3c 1 isakmp template huawei
#               
user-group system
 group-attribute allow-guest
#               
local-user rt2  
 password simple rt2
 authorization-attribute level 2
 service-type telnet
local-user useradmin
 authorization-attribute level 2
#               
wlan rrm        
 dot11b mandatory-rate 1 2
 dot11b supported-rate 5.5 11
 dot11g mandatory-rate 1 2 5.5 11
 dot11g supported-rate 6 9 12 18 24 36 48 54
#               
attack-defense policy 1
#               
interface Aux0  
 async mode flow
 link-protocol ppp
#               
interface Cellular0/0
 async mode protocol
 link-protocol ppp
 attack-defense apply policy 1
#               
interface Ethernet0/0
 port link-mode route
 ip address 172.16.0.6 255.255.255.252
 attack-defense apply policy 1
#               
interface Ethernet0/1
 port link-mode route
 ip address 172.16.0.10 255.255.255.252
#               
interface Ethernet0/2
 port link-mode route
 ip address 100.0.0.1 255.255.255.0
 ipsec policy h3c
#               
interface NULL0
#               
interface LoopBack0
 ip address 2.2.2.2 255.255.255.255
#               
interface Ethernet0/3
 port link-mode bridge
#               
interface Ethernet0/4
 port link-mode bridge
#               
interface Tunnel1
 ip address 172.16.1.5 255.255.255.252
 source 100.0.0.1
 destination 200.0.0.1
#               
interface WLAN-Radio2/0
#               
bgp 65000       
 undo synchronization
 peer 1.1.1.1 as-number 65000
 peer 172.16.1.6 as-number 65001
 peer 6.6.6.6 as-number 65000
 peer 7.7.7.7 as-number 65000
 peer 1.1.1.1 connect-interface LoopBack0
 peer 172.16.1.6 route-policy fk export
 peer 172.16.1.6 route-policy fa import
 peer 6.6.6.6 connect-interface LoopBack0
 peer 7.7.7.7 connect-interface LoopBack0
#               
ospf 1 router-id 2.2.2.2
 area 0.0.0.0   
  network 2.2.2.2 0.0.0.0
  network 172.16.0.6 0.0.0.0
  network 172.16.0.10 0.0.0.0
  network 172.16.1.5 0.0.0.0
#               
route-policy fa permit node 10
 if-match acl 2000
 apply as-path 400 600
route-policy fk permit node 10
 if-match as-path 1
route-policy fk permit node 20
#               
 ip route-static 0.0.0.0 0.0.0.0 100.0.0.2
#               
 snmp-agent     
 snmp-agent local-engineid 800063A203000FE2E62FC0
 snmp-agent community read h3c-read
 snmp-agent sys-info version v2c v3
 snmp-agent target-host trap address udp-domain 192.168.200.1 params securityname h3c-read
 undo snmp-agent trap enable voice dial
 snmp-agent trap source LoopBack0
#               
 load xml-configuration
#               
 load tr069-configuration
#               
user-interface tty 12
user-interface aux 0
user-interface vty 0 4
 acl 2030 inbound
 authentication-mode scheme
 idle-timeout 0 0
 protocol inbound telnet
#

R3配置

----------------------------------------------------------

#
 sysname RT3
#
 super password level 3 simple 123
#
 domain default enable system
#
 ip ttl-expires enable
 ip unreachables enable
#
 dar p2p signature-file flash:/p2p_default.mtd
#
 port-security enable
#
acl number 2000
 rule 0 permit source 192.168.20.0 0.0.0.255
acl number 2008
 rule 0 deny source 0.0.0.0 0
 rule 5 permit
#
vlan 1
#
domain system
 access-limit disable
 state active   
 idle-cut disable
 self-service-url disable
#               
user-group system
 group-attribute allow-guest
#               
local-user admin
 password cipher .]@USE=B,53Q=^Q`MAF4<1!!
 authorization-attribute level 3
 service-type telnet
#               
wlan rrm        
 dot11b mandatory-rate 1 2
 dot11b supported-rate 5.5 11
 dot11g mandatory-rate 1 2 5.5 11
 dot11g supported-rate 6 9 12 18 24 36 48 54
#               
cwmp            
 undo cwmp enable
#               
bgp 65001       
 undo synchronization
 peer 4.4.4.4 as-number 65001
 peer 172.16.1.1 as-number 65000
 peer 5.5.5.5 as-number 65001
 peer 4.4.4.4 connect-interface LoopBack0
 peer 172.16.1.1 filter-policy 2008 export
 peer 172.16.1.1 route-policy fa import
 peer 5.5.5.5 connect-interface LoopBack0
#               
ospf 1 router-id 3.3.3.3
 area 0.0.0.0   
  network 3.3.3.3 0.0.0.0
  network 172.16.2.1 0.0.0.0
  network 172.16.2.5 0.0.0.0
  network 172.16.1.2 0.0.0.0
#               
route-policy fa permit node 10
 if-match acl 2000
 apply as-path 400 600
#               
#               
voice-setup     
 #              
 sip            
 #              
 sip-server     
  #             
  call-rule-set
  #             
  call-route    
 #              
 dial-program   
  default entity fax protocol standard-t38
  default entity fax protocol standard-t38 hb-redundancy 0
  default entity fax protocol standard-t38 lb-redundancy 0
 #              
 aaa-client     
 #              
 gk-client      
#               
 load xml-configuration
#               
 load tr069-configuration
#               
user-interface tty 12
user-interface aux 0
user-interface vty 0 4
 authentication-mode scheme
#               
return

R4配置

--------------------------------------------------------

#
 sysname RT4
#
 ipsec cpu-backup enable
#
 undo cryptoengine enable
#
 domain default enable system
#
acl number 2000
 rule 0 permit source 192.168.10.0 0.0.0.255
#
acl number 3000
 rule 0 permit ip source 192.168.200.0 0.0.0.255 destination 192.168.20.0 0.0.0.255
acl number 3030
 rule 0 permit ip source 192.168.20.0 0.0.0.255 destination 192.168.200.0 0.0.0.255
#
vlan 1
#
domain system
 access-limit disable
 state active
 idle-cut disable
 self-service-url disable
#               
ike proposal 1  
#               
ike peer rt2    
 pre-shared-key simple h3c
 remote-address 172.16.1.5
#               
ipsec proposal 1
#               
ipsec policy h3c 1 isakmp
 security acl 3000
 ike-peer rt2   
 proposal 1     
#               
traffic classifier oa operator and
 if-match acl 3030
#               
traffic behavior oa
 queue af bandwidth pct 50
#               
qos policy h3c  
 classifier oa behavior oa
#               
local-user rt4  
 password simple h3c
#               
bgp 65001       
 undo synchronization
 peer 5.5.5.5 as-number 65001
 peer 172.16.1.5 as-number 65000
 peer 3.3.3.3 as-number 65001
 peer 5.5.5.5 default-route-advertise
 peer 5.5.5.5 connect-interface LoopBack0
 peer 172.16.1.5 route-policy fa import
 peer 3.3.3.3 default-route-advertise
 peer 3.3.3.3 connect-interface LoopBack0
#               
ospf 1 router-id 4.4.4.4
 area 0.0.0.0   
  network 4.4.4.4 0.0.0.0
  network 172.16.2.2 0.0.0.0
  network 172.16.2.9 0.0.0.0
  network 172.16.1.6 0.0.0.0
#               
route-policy fa permit node 10
 if-match acl 2000
 apply as-path 400 600
#               
 ip route-static 0.0.0.0 0.0.0.0 200.0.0.2
#               
user-interface con 0
user-interface aux 0
user-interface vty 0 4
#               
return          
R5配置

-------------------------------------------------------------------

#
 sysname RT5
#
 ipsec cpu-backup enable
#
 undo cryptoengine enable
#
 domain default enable system
#
acl number 2000
 rule 0 permit source 192.168.20.0 0.0.0.255
acl number 2001
 rule 0 permit source 192.168.10.0 0.0.0.255
#
acl number 3030
 rule 5 permit ip source 192.168.200.0 0.0.0.255 destination 192.168.20.0 0.0.0.255
#
vlan 1
#
domain system
 access-limit disable
 state active
 idle-cut disable
 self-service-url disable
#               
traffic classifier oa operator and
 if-match acl 3030
#               
traffic behavior oa
 queue af bandwidth pct 50
#               
qos policy h3c  
 classifier oa behavior oa
#               
local-user rt5  
 password simple rt5
 service-type ppp
#               
bgp 65001       
 network 192.168.100.1 255.255.255.255
 network 192.168.200.1 255.255.255.255
 undo synchronization
 peer 4.4.4.4 as-number 65001
 peer 3.3.3.3 as-number 65001
 peer 4.4.4.4 route-policy fk import
 peer 4.4.4.4 connect-interface LoopBack0
 peer 3.3.3.3 route-policy fk import
 peer 3.3.3.3 connect-interface LoopBack0
#               
ospf 1 router-id 5.5.5.5
 area 0.0.0.0   
  network 5.5.5.5 0.0.0.0
  network 172.16.2.6 0.0.0.0
  network 172.16.2.10 0.0.0.0
#               
route-policy fa permit node 10
 if-match acl 2000
 apply local-preference 400
route-policy fa permit node 20
route-policy fk permit node 10
 if-match acl 2001
 apply local-preference 400
route-policy fk permit node 20
#               
user-interface con 0
user-interface aux 0
user-interface vty 0 4
#               
return

SW1配置

-----------------------------------------------------------

#
 sysname SW1
#
 domain default enable system
#
 burst-mode enable
#
 undo ip http enable
#
 password-recovery enable
#
vlan 1
#
vlan 10
#
vlan 20
#
vlan 30
#
domain system
 access-limit disable
 state active
 idle-cut disable
 self-service-url disable
#               
user-group system
#               
stp region-configuration
 region-name h3c
 instance 1 vlan 10
 instance 2 vlan 20
 active region-configuration
#               
 stp instance 0 root primary
 stp enable     
#               
bgp 65000       
 network 192.168.10.0 route-policy fa
 network 192.168.20.0
 undo synchronization
 peer 1.1.1.1 as-number 65000
 peer 2.2.2.2 as-number 65000
 peer 1.1.1.1 connect-interface LoopBack0
 peer 2.2.2.2 connect-interface LoopBack0
#               
ospf 1 router-id 6.6.6.6
 area 0.0.0.0   
  network 6.6.6.6 0.0.0.0
  network 172.16.0.1 0.0.0.0
#               
route-policy fa permit node 10
 if-match acl 2000
 apply local-preference 400
#               
user-interface aux 0
user-interface vty 0 4
#               
return

SW2配置

-----------------------------------------------------------

#
 sysname SW2
#
 super password level 3 cipher $c$3$nbNypWi5fBQG/0cezZ0kQlLgfhZBVkx+anDhOHBaSwsLC8U=
#
 domain default enable system
#
 burst-mode enable
#
 undo ip http enable
#
 password-recovery enable
#
vlan 1
#
vlan 10
#
vlan 20
#
vlan 30
#
domain system
 access-limit disable
 state active   
 idle-cut disable
 self-service-url disable
#               
user-group system
#               
stp region-configuration
 region-name h3c
 instance 1 vlan 10
 instance 2 vlan 20
 active region-configuration
#               
 stp instance 0 root secondary
 stp enable     
#               
bgp 65000       
 network 192.168.10.0
 network 192.168.20.0 route-policy fa
 undo synchronization
 peer 1.1.1.1 as-number 65000
 peer 2.2.2.2 as-number 65000
 peer 1.1.1.1 connect-interface LoopBack0
 peer 2.2.2.2 connect-interface LoopBack0
#               
ospf 1 router-id 7.7.7.7
 area 0.0.0.0   
  network 7.7.7.7 0.0.0.0
  network 172.16.0.5 0.0.0.0
#               
route-policy fa permit node 10
 if-match acl 2000
 apply local-preference 400
#               
user-interface aux 0
 user privilege level 2
user-interface vty 0 4
#               
return

SW3配置

--------------------------------------------------------

#
 sysname SW3
#
 super password level 3 cipher *\Y0``CC]‘I.BI/aC,8H/Q!!
#
radius scheme system
#
domain system
#
 stp bpdu-protection
 stp enable
stp region-configuration
 instance 1 vlan 10
 instance 2 vlan 20
 active region-configuration
#
vlan 1
#
vlan 10
#
vlan 20
#
user-interface aux 0
 user privilege level 2
 idle-timeout 0 0                         
user-interface vty 0 4                    
#                                         
return

BGP拓扑错误模拟配置

时间: 2024-10-17 01:32:59

BGP拓扑错误模拟配置的相关文章

BGP拓扑正确配置

R1的配置 ----------------------------------------------------------------------------- sysname RT1# super password level 3 simple h3c# domain default enable system# telnet server enable#acl number 2000 rule 0 permit source 192.168.200.0 0.0.0.255acl num

修复SharePoint 2013 Search 拓扑错误

Problem 当创建和配置SharePoint 2013 Search Service Application成功之后,进入详细配置页后,在Search Application Topology节点下显示如下错误: Unable to retrieve topology component health states. This may be because the admin component is not up and running Resolution 注: 花了很长时间去排查这个问

SharePoint 关于拓扑错误的解决方案

Issue Topology报错信息:SharePoint Web Services Round Robin Service Load Balancer Event: EndpointFailure. Affected Endpoint 主要是两种类型的"SharePoint Service":MetadataWebService.svc和ProfileService.svc,如下图所示: Troubleshooting 这是在SharePoint Farm中常见的错误,一般是多层Sh

错误1083:配置成在该可执行程序中运行的这个服务不能执行该服务 【解决】

原本服务每次运行都是好好的,结果突然又一次安装后,在启动时,报:错误1083:配置成在该可执行程序中运行的这个服务不能执行该服务 网上查了一些资料,都没搞定.在检查ProjectInstaller.cs文件的设计视图时,发现这个页面有2个serviceInstaller和1个serviceProcessInstaller,删除其中一个serviceInstaller后,重新生成然后安装,居然正常了. 总结应该是无意中多添加serviceInstaller组件造成报的该错误. 问题解决.

java web 404错误页面配置

java web 404错误页面配置:注意红框的地方,在工程的web.xml文件里的最开头加入如下的内容便可,但是也有问题,针对以.action后缀名和.jsp后缀名不起作用, 因为后面配置了一些拦截器专门拦截.action和.jsp文件

zoj3780 Paint the Grid Again 拓扑排序模拟

比赛时候看完题目就觉得是拓扑排序,当时心里隐隐觉得跟相框叠加那个题有点相似的 然后wzy问我no solution 是什么情况,我就一直去想是不是构成了什么排列就一定是no solution 其实只用再参考相框叠加那个题往前想一丁点就够了,就是从最后涂的那一层开始往前找,每一次都必然有一行或一整列是一样的 每次按逆字母序删除这一行或列就是了. 拓扑排序的题总是类似而且简单的,找到关系,敲代码完全不存在问题. #include <iostream> #include <cstring>

ArcGIS拓扑检查步骤与修正拓扑错误技巧

一幅人工或自动矢量化后的数据,在正式应用数据之前,应根据要求检查和修正各种拓扑错误! 根据几年来摸索出的经验,现总结几种方法和大家讨论,欢迎大家来参加讨论和指正. 1 .在workstation 工作站下 ,编辑检查数据,此法要求源数据为 coverage,且是在黑乎乎的界面下进行操作,虽然也可以设置编辑菜单,但总体还是要用到很多命令,比较麻烦. 第一步:把文件转为 coverage格式,进去catalog,设置其各项容限值(在文件属性中 tolerance项,根据精度要求设置) 第二步:进入a

错误1919,配置ODBC数据源MS Access Database时发生错误ODEC错误

WIN7 64位旗舰版安装OFFICE2003 提示:“错误1919,配置ODBC数据源MS Access Database时发生错误ODEC错误” 在64位系统上,32位软件的注册表的信息不是直接在在Software下,而是在Software\Wow6432Node下才是32位软件的注册信息. 只有64位软件才是直接在Software下的. 找一台win7 32位操作系统的机器导出注册表,位置如下: HKEY_CURRENT_USER\Software\ODBC HKEY_LOCAL_MACH

【高级】华为设备部署运营商网络架构-ISIS+BGP+IPv6理论及配置实战

1.实验拓扑        使用ENSP模拟器(版本v100R002C001.2.00.350) 2.实验需求 1)  通过ISIS将AS内部的直连和环回口路由宣告 2)  通过配置BGP协议将所有的用户业务路由宣告 3)  通过配置路由反射器实现市内.省内业务路由互传 4)  通过建立EBGP邻居实现全省和国干互联网路由互传 5)  通过巧妙配置黑洞路由实现用户业务网段聚合 6)  使用双协议栈方案实现ipv6网络平滑过渡现网方案实战 3.实验步骤 1)  IP规划 AR1接口ip地址: GE