网络工程师成长日记370-阿尔斯通

这是我的第370篇原创文章,记录网络工程师行业的点点滴滴,结交IT行业有缘之人

4月20日下午,我和老大一起去西高新的高科大厦去进行H3C防火墙的安装
这是我第一次做on job training
之前虽然老大给我了一些H3C的文档,但是还是感觉心里没底.

这次我们要做的内容是一个F100-C的防火墙的安装,和一个CISCO无线AP的连接(这个是去了以后客户提出的).
F100-C防火墙上面已经做好了配置,只要进行安装就行了,当时我们认为很简单,只要一会就能完成,结果出现了无数的问题.
把防火墙连到电脑上,dis cur(就是SHOW RUN)了防火墙上的配置.
客户告诉我们,电信给他们分配的拨号IP和密码,怎么弄都不通.
随后又进行了多方面的尝试.也是不通.

和北京方面的工程师沟通,告诉我们说他们和电信进行联系,因为他们也不太清楚电信给客户方进行的配置.
于是就联系了N长时间.随后,北京打过来电话进行询问,再试,还是不通,经过多次反复,只能自己打电话给电信询问.
开始以为是拨号的密码错误,遂打电话给电信,电信告诉我们说,要想知道密码,必须给他们提供企业的证件等物品,
没办法,再和客户进行沟通,这时他们才提供了一张19号他们装网线时电信给他们留下的IP地址,并告诉我们是电信安装的专线.
对防火墙的设置进行了修改,把WAN口和Dialer0进行重新配置,再一次进行尝试,这次终于能PING通网关了,再PING客户的内网,也通.
因为客户没有对网络比较了解的,经过与北京方面的沟通才知道他们昨天装的是×××专线,而不是客户一直号称的拨号上网.
被误导了,囧死.


然后就是进行无线的安装并绑密码,绑密码的时候还出了点小问题,客户要求5位的密码
但是选择的密码协议只支持最少8位数的密码,进行了沟通,最后选择了8位的密码.
到此本次工程全部完工.
这次工程让我理解到,工程中进行沟通是非常重要的
然后就是要根据自己已知的信息对工程进行了解,知道自己需要做什么
这样才能成功快速的完成工作.


工程配置过程
由我们配通,再由北京的工程师远程登录进行修改
dis cur结果如下,IP地址等相关内容进行了修改
#
Sysname F100-C
#
clock timezone GMT+8 add 08:00:00
#
encrypt-card fast-switch
#
firewall packet-filter enable
firewall packet-filter default permit
#
insulate
#
bims enable//H3C的分支网点智能管理解决方案
bims device-id F100-C
bims ip address 100.0.0.1 port 7000
bims interval 10
bims sharekey simple cec
#
dialer-rule 1 ip permit
#
firewall statistic system enable
#
pki entity mytest
common-name F100-C
organization-unit ts
organization CEC
locality SX
state XA
country CN
#
pki domain my***
ca identifier CEC
certificate request url http://1.2.3.4/certsrv/mscep/mscep.dll //配证书
certificate request from ra
certificate request entity mytest
certificate request mode auto key-length 1024
root-certificate fingerprint sha1 12345
crl check disable
#
radius scheme system
server-type extended
#
domain system
#
local-user 654321
password 123456
service-type telnet terminal
level 3
service-type ftp
#
ike proposal 1
authentication-method rsa-signature
#
ike peer ***
exchange-mode aggressive
pre-shared-key xxxxx
id-type name
remote-name ***
remote-address 1.2.3.4
certificate domain my***
#
ipsec card-proposal s***
use encrypt-card 1/0
#
ipsec proposal ***
#
ipsec policy *** 10 isakmp
security acl 3000
ike-peer ***
proposal s***

//北京工程师在远程登录后加入了
#
dhcp server ip-pool dhcppool
network 10.1.0.2 mask 255.255.255.0
gateway-list 10.1.0.1
dns-list 10.1.1.1 10.1.1.3 10.1.1.8

#
acl number 2000 match-order auto
rule 0 permit source 10.1.1.0 0.0.0.255
rule 1 permit
#
acl number 3000
rule 0 permit ip source 1.1.1.4 0 destination 1.1.1.1 0
rule 1 deny ip
#
interface Aux0
async mode flow

#
interface Dialer1
undo link-protocol ppp
undo ppp pap local-user 7654321 password simple xxxxx
undo ip address ppp-negotiate
dialer user user
dialer-group 1
dialer bundle 1
nat outbound 2000
ipsec policy ***
原有配置,由于是专线,后全部删除

#
interface Ethernet0/0
description link to LAN
ip address 10.1.1.1 255.255.255.0
#
interface Ethernet0/1
#
interface Ethernet0/2
#
interface Ethernet0/3
#
interface Ethernet0/4//修改为 interface Ethernet0/4
description link to WAN
ip address 121.1.1.1 255.0.0.0
ntp-service broadcast-server
#
interface Encrypt1/0
#
interface Tunnel1
ip address 34.1.1.1 255.255.255.252
source 1.1.1.4
destination 1.1.1.1
#
interface NULL0
#
interface LoopBack0
ip address 1.1.1.4 255.255.255.255
#
firewall zone local
set priority 100
#
firewall zone trust
add interface Ethernet0/0
add interface Ethernet0/1
add interface Ethernet0/2
add interface Ethernet0/3
add interface Ethernet0/4
add interface Dialer1//后删除
add interface Tunnel1
set priority 85
statistic enable ip inzone
statistic enable ip outzone
#
firewall zone untrust
set priority 5
#
firewall zone DMZ
set priority 50
#
firewall interzone local trust
#
firewall interzone local untrust
#
firewall interzone local DMZ
#
firewall interzone trust untrust
#
firewall interzone trust DMZ
#
firewall interzone DMZ untrust
#
ip route-static 0.0.0.0 0.0.0.0 43.1.1.1 preference 60// 修改后为Ethernet 0/4 121.1.1.1,原来为dialer1 口
ip route-static 1.1.1.1 255.255.255.255 Dialer 1 preference 60// Dialer 1修改为Ethernet 0/4 121.1.1.1
ip route-static 2.2.2.2 255.0.0.0 Tunnel 1 preference 60// Dialer 1修改为Ethernet 0/4 121.1.1.1
ip route-static 3.3.3.3 255.255.255.255 Dialer 1 preference 60// Dialer 1修改为Ethernet 0/4 121.1.1.1
ip route-static 4.4.4.4 255.255.255.255 Dialer 1 preference 60// Dialer 1修改为Ethernet 0/4 121.1.1.1
ip route-static 5.5.5.5 255.255.255.255 Dialer 1 preference 60// Dialer 1修改为Ethernet 0/4 121.1.1.1
ip route-static 6.6.6.6 255.255.0.0 Tunnel 1 preference 60// Dialer 1修改为Ethernet 0/4 121.1.1.1
ip route-static7.7.7.7 255.255.255.255 Dialer 1 preference 60// Dialer 1修改为Ethernet 0/4 121.1.1.1
ip route-static 8.8.8.8 255.255.255.255 Dialer 1 preference 60// Dialer 1修改为Ethernet 0/4 121.1.1.1
ip route-static 9.9.9.9 255.255.255.255 Dialer 1 preference 60// Dialer 1修改为Ethernet 0/4 121.1.1.1
#
snmp-agent
snmp-agent local-engineid 12345678
snmp-agent community write 101zhengou
snmp-agent sys-info version all
snmp-agent trap source Ethernet0/4
#
ntp-service unicast-server 1.1.1.1
ntp-service unicast-server 2.2.2.2
ntp-service unicast-server 3.3.3.3
ntp-service unicast-server 4.4.4.4
ntp-service unicast-server 5.5.5.5
ntp-service unicast-server 6.6.6.6
ntp-service unicast-server 7.7.7.7
ntp-service unicast-server 8.8.8.8
ntp-service unicast-server 9.9.9.9
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode scheme
user privilege level 3
set authentication password simple cecipsec
此时PING内网的深圳总部,,可以PING通,完成.

XiA110101-H3C]dis ip int bri
*down: administratively down
(s): spoofing
Interface IP Address Physical Protocol Description
Aux0 unassigned down up(s) Aux0 Inte...
Dialer1 unassigned up up(s) Dialer1 I...
Encrypt1/0 unassigned up up Encrypt1/...
Ethernet0/0 10.100.12.1 up up link to LAN
Ethernet0/1 unassigned down down Ethernet0...
Ethernet0/2 unassigned down down Ethernet0...
Ethernet0/3 unassigned down down Ethernet0...
Ethernet0/4 117.22.255.106 up up link to WAN
LoopBack0 1.1.1.37 up up(s) LoopBack0...
Tunnel1 172.16.18.118 up up Tunnel1 I...
[XiA110101-H3C]dis cur
#
sysname XiA110101-H3C
#
clock timezone GMT+8 add 08:00:00
#
encrypt-card fast-switch
#
firewall packet-filter enable
firewall packet-filter default permit
#
insulate
#
bims enable
bims device-id XiA110101-H3C
bims ip address 218.96.249.203 port 7777
bims interval 10
bims sharekey simple cec
#
dialer-rule 1 ip permit
#
firewall statistic system enable
#
pki entity mytest
common-name XiA110101-H3C
organization-unit ts
organization CEC
locality SX
state XA
country CN
#
pki domain my***
ca identifier CEC
certificate request url http://218.96.249.202/certsrv/mscep/mscep.dll
certificate request from ra
certificate request entity mytest
certificate request mode auto key-length 1024
root-certificate fingerprint sha1 268fed7ae09ce9fb3c187d917070bbea1f1f327a
crl check disable
#
radius scheme system
server-type extended
#
domain system
#
local-user cecipsec
password cipher RPZ^0"X<9]'Q=^Q`MAF4<1!!
service-type telnet terminal
level 3
service-type ftp
#
ike proposal 1
authentication-method rsa-signature
#
ike peer ***
exchange-mode aggressive
pre-shared-key 123456
id-type name
remote-name ***
remote-address 218.96.249.201
certificate domain my***
#
ipsec card-proposal s***
use encrypt-card 1/0
#
ipsec proposal ***
#
ipsec policy *** 10 isakmp
security acl 3000
ike-peer ***
proposal s***
#
acl number 2000 match-order auto
rule 0 permit source 10.100.12.0 0.0.0.255
rule 1 permit
#
acl number 3000
rule 0 permit ip source 1.1.1.37 0 destination 1.1.1.1 0
rule 1 deny ip
#
interface Aux0
async mode flow
#
interface Dialer1
undo link-protocol ppp
undo ppp pap local-user 029xxxxx password simple xxxxxx
undo ip address ppp-negotiate
dialer user user
dialer-group 1
dialer bundle 1
nat outbound 2000
ipsec policy ***
#
interface Ethernet0/0
description link to LAN
ip address 10.100.12.1 255.255.255.0
#
interface Ethernet0/1
#
interface Ethernet0/2
#
interface Ethernet0/3
#
interface Ethernet0/4
description link to WAN
ip address 117.22.255.106 255.0.0.0
ntp-service broadcast-server
#
interface Encrypt1/0
#
interface Tunnel1
ip address 172.16.18.118 255.255.255.252
source 1.1.1.37
destination 1.1.1.1
#
interface NULL0
#
interface LoopBack0
ip address 1.1.1.37 255.255.255.255
#
firewall zone local
set priority 100
#
firewall zone trust
add interface Ethernet0/0
add interface Ethernet0/1
add interface Ethernet0/2
add interface Ethernet0/3
add interface Ethernet0/4
add interface Dialer1
add interface Tunnel1
set priority 85
statistic enable ip inzone
statistic enable ip outzone
#
firewall zone untrust
set priority 5
#
firewall zone DMZ
set priority 50
#
firewall interzone local trust
#
firewall interzone local untrust
#
firewall interzone local DMZ
#
firewall interzone trust untrust
#
firewall interzone trust DMZ
#
firewall interzone DMZ untrust
#
ip route-static 0.0.0.0 0.0.0.0 117.22.255.105 preference 60// 修改后,原来为dialer1 口
undo ip route-static 1.1.1.1 255.255.255.255 Dialer 1 preference 60
undo ip route-static 10.0.0.0 255.0.0.0 Tunnel 1 preference 60
undo ip route-static 61.237.232.242 255.255.255.255 Dialer 1 preference 60
undo ip route-static 131.100.9.2 255.255.255.255 Dialer 1 preference 60
undo ip route-static 131.107.1.10 255.255.255.255 Dialer 1 preference 60
undo ip route-static 159.217.0.0 255.255.0.0 Tunnel 1 preference 60
undo ip route-static 202.112.10.60 255.255.255.255 Dialer 1 preference 60
undo ip route-static 202.122.113.114 255.255.255.255 Dialer 1 preference 60
undo ip route-static 210.72.145.44 255.255.255.255 Dialer 1 preference 60
undo ip route-static 210.184.110.165 255.255.255.255 Dialer 1 preference 60
undo ip route-static 218.96.0.0 255.255.0.0 Dialer 1 preference 60
undo ip route-static 218.96.50.84 255.255.255.252 Tunnel 1 preference 60
undo ip route-static 218.96.70.100 255.255.255.252 Tunnel 1 preference 60
undo ip route-static 218.96.249.201 255.255.255.255 Dialer 1 preference 60
undo ip route-static 218.96.249.202 255.255.255.255 Dialer 1 preference 60
undo ip route-static 218.96.249.203 255.255.255.255 Dialer 1 preference 60
undo ip route-static 218.96.253.160 255.255.255.224 Tunnel 1 preference 60
undo ip route-static 218.97.1.33 255.255.255.255 Dialer 1 preference 60
#
snmp-agent
snmp-agent local-engineid 000063A27F0000010000176B
snmp-agent community write xxxxxx
snmp-agent sys-info version all
snmp-agent trap source Ethernet0/4
#
ntp-service unicast-server 61.237.232.242
ntp-service unicast-server 131.107.1.10
ntp-service unicast-server 133.100.9.2
ntp-service unicast-server 202.112.10.60
ntp-service unicast-server 202.122.113.114
ntp-service unicast-server 210.72.145.44
ntp-service unicast-server 210.184.110.165
ntp-service unicast-server 218.96.249.201
ntp-service unicast-server 218.97.1.33
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode scheme
user privilege level 3
set authentication password simple xxxxx
#

beijing xiugaihou
[XiA110101-H3C]dis cur
#
sysname XiA110101-H3C
#
clock timezone GMT+8 add 08:00:00
#
encrypt-card fast-switch
#
firewall packet-filter enable
firewall packet-filter default permit
#
insulate
#
bims enable
bims device-id XiA110101-H3C
bims ip address 218.96.249.203 port 7777
bims interval 10
bims sharekey simple cec
#
dialer-rule 1 ip permit
#
firewall statistic system enable
#
pki entity mytest
common-name XiA110101-H3C
organization-unit ts
organization CEC
locality SX
state XA
country CN
#
pki domain my***
ca identifier CEC
certificate request url http://218.96.249.202/certsrv/mscep/mscep.dll
certificate request from ra
certificate request entity mytest
certificate request mode auto key-length 1024
root-certificate fingerprint sha1 268fed7ae09ce9fb3c187d917070bbea1f1f327a
crl check disable
#
radius scheme system
server-type extended
#
domain system
#
local-user cecipsec
password cipher RPZ^0"X<9]'Q=^Q`MAF4<1!!
service-type telnet terminal
level 3
service-type ftp
#
ike proposal 1
authentication-method rsa-signature
#
ike peer ***
exchange-mode aggressive
pre-shared-key 123456
id-type name
remote-name ***
remote-address 218.96.249.201
certificate domain my***
#
ipsec card-proposal s***
use encrypt-card 1/0
#
ipsec proposal ***
#
ipsec policy *** 10 isakmp
security acl 3000
ike-peer ***
proposal s***
#
acl number 2000 match-order auto
rule 0 permit source 10.100.12.0 0.0.0.255
rule 1 permit
#
acl number 3000
rule 0 permit ip source 1.1.1.37 0 destination 1.1.1.1 0
rule 1 deny ip
#
interface Aux0
async mode flow
#
interface Dialer1
link-protocol ppp
ppp pap local-user 029xxxxx password simple xxxx
ip address ppp-negotiate
dialer user user
dialer-group 1
dialer bundle 1
nat outbound 2000
ipsec policy ***
#
interface Ethernet0/0
description link to LAN
ip address 10.100.12.1 255.255.255.0
#

interface Ethernet0/1
#
interface Ethernet0/2
#
interface Ethernet0/3
#
interface Ethernet0/4
description link to WAN
ip address 117.22.255.106 255.0.0.0
ipsec policy ***
ntp-service broadcast-server
#
interface Encrypt1/0
#
interface Tunnel1
ip address 172.16.18.118 255.255.255.252
source 1.1.1.37
destination 1.1.1.1
#
interface NULL0
#
interface LoopBack0
ip address 1.1.1.37 255.255.255.255
#

firewall zone local
set priority 100
#
firewall zone trust
add interface Ethernet0/0
add interface Ethernet0/1
add interface Ethernet0/2
add interface Ethernet0/3
add interface Ethernet0/4
add interface Dialer1
add interface Tunnel1
set priority 85
statistic enable ip inzone
statistic enable ip outzone
#
firewall zone untrust
set priority 5
#
firewall zone DMZ
set priority 50
#
firewall interzone local trust
#
firewall interzone local untrust

firewall interzone local DMZ
#
firewall interzone trust untrust
#
firewall interzone trust DMZ
#
firewall interzone DMZ untrust
#
ip route-static 0.0.0.0 0.0.0.0 117.22.255.105 preference 60
ip route-static 1.1.1.1 255.255.255.255 Ethernet 0/4 117.22.255.105 preference 60
ip route-static 61.237.232.242 255.255.255.255 Ethernet 0/4 117.22.255.105 preference 60
ip route-static 131.100.9.2 255.255.255.255 Ethernet 0/4 117.22.255.105 preference 60
ip route-static 131.107.1.10 255.255.255.255 Ethernet 0/4 117.22.255.105 preference 60
ip route-static 202.112.10.60 255.255.255.255 Ethernet 0/4 117.22.255.105 preference 60
ip route-static 202.122.113.114 255.255.255.255 Ethernet 0/4 117.22.255.105 preference 60
ip route-static 210.72.145.44 255.255.255.255 Ethernet 0/4 117.22.255.105 preference 60
ip route-static 210.184.110.165 255.255.255.255 Ethernet 0/4 117.22.255.105 preference 60
ip route-static 218.96.0.0 255.255.0.0 Ethernet 0/4 117.22.255.105 preference 60
ip route-static 218.96.249.201 255.255.255.255 Ethernet 0/4 117.22.255.105 preference 60
ip route-static 218.96.249.202 255.255.255.255 Ethernet 0/4 117.22.255.105 preference 60
ip route-static 218.96.249.203 255.255.255.255 Ethernet 0/4 117.22.255.105 preference 60
ip route-static 218.97.1.33 255.255.255.255 Ethernet 0/4 117.22.255.105 preference 60
#
snmp-agent
snmp-agent local-engineid 000063A27F0000010000176B
snmp-agent community write xxxxx
snmp-agent sys-info version all
snmp-agent trap source Ethernet0/4
#
ntp-service unicast-server 61.237.232.242
ntp-service unicast-server 131.107.1.10
ntp-service unicast-server 133.100.9.2
ntp-service unicast-server 202.112.10.60
ntp-service unicast-server 202.122.113.114
ntp-service unicast-server 210.72.145.44
ntp-service unicast-server 210.184.110.165
ntp-service unicast-server 218.96.249.201
ntp-service unicast-server 218.97.1.33
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode scheme
user privilege level 3
set authentication password simple cecipsec
#
return

[XiA110101-H3C]
%Apr 20 17:50:43:438 2009 XiA110101-H3C PKI/4/Verify_CA_Root_Cert:CA root certificate of the domain my*** is trusted.
%Apr 20 17:50:49:830 2009 XiA110101-H3C PKI/4/Update_CA_Cert:Update CA certificates of the Domain my*** successfully.
%Apr 20 17:50:49:831 2009 XiA110101-H3C PKI/4/CA_Cert_Retrieval:Retrieval CA certificates of the domain my*** successfully.
%Apr 20 17:50:54:232 2009 XiA110101-H3C PKI/4/Local_Cert_Request:Request local certificate of the domain my*** successfully.

===============================
内网所能PING出去的ip
Microsoft Windows XP [版本 5.1.2600]
(C) 版权所有 1985-2001 Microsoft Corp.

C:\Documents and Settings\Administrator>ping 172.16.18.118

Pinging 172.16.18.118 with 32 bytes of data:

Reply from 172.16.18.118: bytes=32 time=3ms TTL=255
Reply from 172.16.18.118: bytes=32 time=3ms TTL=255
Reply from 172.16.18.118: bytes=32 time=2ms TTL=255
Reply from 172.16.18.118: bytes=32 time=1ms TTL=255

Ping statistics for 172.16.18.118:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 1ms, Maximum = 3ms, Average = 2ms

C:\Documents and Settings\Administrator>ping www.baidu.com
^C
C:\Documents and Settings\Administrator>nslookup www.baidu.com
DNS request timed out.
timeout was 2 seconds.
Can't find server name for address 218.30.19.40: Timed out
Default servers are not available
Server: UnKnown
Address: 218.30.19.40

DNS request timed out.
timeout was 2 seconds.
DNS request timed out.
timeout was 2 seconds.
*** Request to UnKnown timed-out

C:\Documents and Settings\Administrator>ping 117.22.255.106

Pinging 117.22.255.106 with 32 bytes of data:

Reply from 117.22.255.106: bytes=32 time=2ms TTL=255
Reply from 117.22.255.106: bytes=32 time=1ms TTL=255
Reply from 117.22.255.106: bytes=32 time=1ms TTL=255
Reply from 117.22.255.106: bytes=32 time=1ms TTL=255

Ping statistics for 117.22.255.106:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 1ms, Maximum = 2ms, Average = 1ms

C:\Documents and Settings\Administrator>ping 117.22.255.105

Pinging 117.22.255.105 with 32 bytes of data:

Request timed out.
Request timed out.
Request timed out.
Request timed out.

Ping statistics for 117.22.255.105:
Packets: Sent = 4, Received = 0, Lost = 4 (100% loss),

C:\Documents and Settings\Administrator>

======================================
最终配置
[XiA110101-H3C]dis cur
#
sysname XiA110101-H3C
#
clock timezone GMT+8 add 08:00:00
#
encrypt-card fast-switch
#
firewall packet-filter enable
firewall packet-filter default permit
#
insulate
#
bims enable
bims device-id XiA110101-H3C
bims ip address 218.96.249.203 port 7777
bims interval 10
bims sharekey simple cec
#
dialer-rule 1 ip permit
#
firewall statistic system enable
#
pki entity mytest
common-name XiA110101-H3C
organization-unit ts
organization CEC
locality SX
state XA
country CN
#
pki domain my***
ca identifier CEC
certificate request url http://218.96.249.202/certsrv/mscep/mscep.dll
certificate request from ra
certificate request entity mytest
certificate request mode auto key-length 1024
root-certificate fingerprint sha1 268fed7ae09ce9fb3c187d917070bbea1f1f327a
crl check disable
#
radius scheme system
server-type extended
#
domain system
#
local-user cecipsec
password cipher RPZ^0"X<9]'Q=^Q`MAF4<1!!
service-type telnet terminal
level 3
service-type ftp
#
ike proposal 1
authentication-method rsa-signature
#
ike peer ***
exchange-mode aggressive
pre-shared-key xxxxxx
id-type name
remote-name ***
remote-address x.x.x.x
certificate domain my***
#
ipsec card-proposal s***
use encrypt-card 1/0
#
ipsec proposal ***
#
ipsec policy *** 10 isakmp
security acl 3000
ike-peer ***
proposal s***
#
dhcp server ip-pool dhcppool
network 10.100.12.0 mask 255.255.255.0
gateway-list 10.100.12.1
dns-list 10.100.0.2 10.100.0.3 10.3.1.8
#
acl number 2000 match-order auto
rule 0 permit source 10.100.12.0 0.0.0.255
rule 1 permit
#
acl number 3000
rule 0 permit ip source 1.1.1.37 0 destination 1.1.1.1 0
rule 1 deny ip
#
interface Aux0
async mode flow
#
interface Ethernet0/0
description link to LAN
ip address 10.100.12.1 255.255.255.0
#
interface Ethernet0/1
#
interface Ethernet0/2
#
interface Ethernet0/3

interface Ethernet0/4
description link to WAN
ip address 117.22.255.106 255.0.0.0
ipsec policy ***
ntp-service broadcast-server
#
interface Encrypt1/0
#
interface Tunnel1
ip address 172.16.18.118 255.255.255.252
source 1.1.1.37
destination 1.1.1.1
#
interface NULL0
#
interface LoopBack0
ip address 1.1.1.37 255.255.255.255
#
firewall zone local
set priority 100
#
firewall zone trust
add interface Ethernet0/0
add interface Ethernet0/1
add interface Ethernet0/2
add interface Ethernet0/3
add interface Ethernet0/4
add interface Tunnel1
set priority 85
statistic enable ip inzone
statistic enable ip outzone
#
firewall zone untrust
set priority 5
#
firewall zone DMZ
set priority 50
#
firewall interzone local trust
#
firewall interzone local untrust
#
firewall interzone local DMZ
#
firewall interzone trust untrust
#
firewall interzone trust DMZ

firewall interzone DMZ untrust
#
ip route-static 0.0.0.0 0.0.0.0 117.22.255.105 preference 60
ip route-static 1.1.1.1 255.255.255.255 Ethernet 0/4 117.22.255.105 preference 60
ip route-static 10.0.0.0 255.0.0.0 Tunnel 1 preference 60
ip route-static 61.237.232.242 255.255.255.255 Ethernet 0/4 117.22.255.105 preference 60
ip route-static 131.100.9.2 255.255.255.255 Ethernet 0/4 117.22.255.105 preference 60
ip route-static 131.107.1.10 255.255.255.255 Ethernet 0/4 117.22.255.105 preference 60
ip route-static 159.217.0.0 255.255.0.0 Tunnel 1 preference 60
ip route-static 202.112.10.60 255.255.255.255 Ethernet 0/4 117.22.255.105 preference 60
ip route-static 202.122.113.114 255.255.255.255 Ethernet 0/4 117.22.255.105 preference 60
ip route-static 210.72.145.44 255.255.255.255 Ethernet 0/4 117.22.255.105 preference 60
ip route-static 210.184.110.165 255.255.255.255 Ethernet 0/4 117.22.255.105 preference 60
ip route-static 218.96.0.0 255.255.0.0 Ethernet 0/4 117.22.255.105 preference 60
ip route-static 218.96.50.84 255.255.255.252 Tunnel 1 preference 60
ip route-static 218.96.70.100 255.255.255.252 Tunnel 1 preference 60
ip route-static 218.96.249.201 255.255.255.255 Ethernet 0/4 117.22.255.105 preference 60
ip route-static 218.96.249.202 255.255.255.255 Ethernet 0/4 117.22.255.105 preference 60
ip route-static 218.96.249.203 255.255.255.255 Ethernet 0/4 117.22.255.105 preference 60
ip route-static 218.96.253.160 255.255.255.224 Tunnel 1 preference 60
ip route-static 218.97.1.33 255.255.255.255 Ethernet 0/4 117.22.255.105 preference 60
#
snmp-agent
snmp-agent local-engineid 000063A27F0000010000176B
snmp-agent community write zqw101
snmp-agent sys-info version all
snmp-agent trap source Ethernet0/4
#
ntp-service unicast-server 61.237.232.242
ntp-service unicast-server 131.107.1.10
ntp-service unicast-server 133.100.9.2
ntp-service unicast-server 202.112.10.60
ntp-service unicast-server 202.122.113.114
ntp-service unicast-server 210.72.145.44
ntp-service unicast-server 210.184.110.165
ntp-service unicast-server 218.96.249.201
ntp-service unicast-server 218.97.1.33
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode scheme
user privilege level 3
set authentication password simple xxxxxx
#
return
[XiA110101-H3C]

ping 深圳总部

C:\Documents and Settings\Administrator>ping 10.100.0.1

Pinging 10.100.0.1 with 32 bytes of data:

Reply from 10.100.0.1: bytes=32 time=99ms TTL=249
Reply from 10.100.0.1: bytes=32 time=96ms TTL=249
Reply from 10.100.0.1: bytes=32 time=96ms TTL=249
Reply from 10.100.0.1: bytes=32 time=99ms TTL=249

Ping statistics for 10.100.0.1:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 96ms, Maximum = 99ms, Average = 97ms

C:\Documents and Settings\Administrator>ping 10.100.0.1

Pinging 10.100.0.1 with 32 bytes of data:

Reply from 10.100.0.1: bytes=32 time=116ms TTL=248
Reply from 10.100.0.1: bytes=32 time=103ms TTL=248
Reply from 10.100.0.1: bytes=32 time=112ms TTL=248
Reply from 10.100.0.1: bytes=32 time=96ms TTL=248

Ping statistics for 10.100.0.1:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 96ms, Maximum = 116ms, Average = 106ms

C:\Documents and Settings\Administrator>

[XiA110101-H3C]dis ip int bri
*down: administratively down
(s): spoofing
Interface IP Address Physical Protocol Description
Aux0 unassigned down up(s) Aux0 Inte...
Dialer1 unassigned down down Dialer1 I...
Encrypt1/0 unassigned up up Encrypt1/...
Ethernet0/0 10.100.12.1 up up link to LAN
Ethernet0/1 unassigned down down Ethernet0...
Ethernet0/2 unassigned down down Ethernet0...
Ethernet0/3 unassigned down down Ethernet0...
Ethernet0/4 unassigned up down link to WAN
LoopBack0 1.1.1.37 up up(s) LoopBack0...
Tunnel1 172.16.18.118 up down Tunnel1 I...
[XiA110101-H3C]
#Apr 20 23:48:10:748 2009 XiA110101-H3C IFNET/4/TRAP:1.3.6.1.6.3.1.1.5.4Interface 1854 is Up
%Apr 20 23:48:10:750 2009 XiA110101-H3C IFNET/4/UPDOWN:Line protocol on the interface Dialer1:0 is UP

#Apr 20 23:48:10:954 2009 XiA110101-H3C IFNET/4/TRAP:1.3.6.1.6.3.1.1.5.3Interface 1854 is Down
%Apr 20 23:48:10:955 2009 XiA110101-H3C IFNET/4/UPDOWN:Line protocol on the interface Dialer1:0 is DOWN

#Apr 20 23:48:29:056 2009 XiA110101-H3C IFNET/4/TRAP:1.3.6.1.6.3.1.1.5.4Interface 1862 is Up
%Apr 20 23:48:29:057 2009 XiA110101-H3C IFNET/4/UPDOWN:Line protocol on the interface Dialer1:0 is UP

#Apr 20 23:48:29:264 2009 XiA110101-H3C IFNET/4/TRAP:1.3.6.1.6.3.1.1.5.3Interface 1862 is Down
%Apr 20 23:48:29:266 2009 XiA110101-H3C IFNET/4/UPDOWN:Line protocol on the interface Dialer1:0 is DOWN

转载于:https://blog.51cto.com/13448371/2083820

网络工程师成长日记370-阿尔斯通相关推荐

  1. signature=6217a496579a029c7524d3521cec3dea,网络工程师成长日记370-阿尔斯通

    网络工程师成长日记370-阿尔斯通 这是我的第370篇原创文章,记录网络工程师行业的点点滴滴,结交IT行业有缘之人 4月20日下午,我和老大一起去西高新的高科大厦去进行H3C防火墙的安装 这是我第一次 ...

  2. 网络工程师成长日记333-某城市政府项目

    网络工程师成长日记333-某城市政府项目 这是我的第333篇原创文章,记录网络工程师行业的点点滴滴,结交IT行业有缘之人 直接上干货,拓扑图: 工程目的:排除故障 配置如下: LinWei#show ...

  3. 网络工程师成长日记365-IBIS西安工程回忆录

    网络工程师成长日记365-IBIS西安工程回忆录 这是我的第365篇原创文章,记录网络工程师行业的点点滴滴,结交IT行业有缘之人 我的第一次真实工程经历 5.26日这一天我的心情是格外的兴奋,激动. ...

  4. 网络工程师成长日记421-某银行技术支持

    网络工程师成长日记421-某银行技术支持 这是我的第421篇原创文章,记录网络工程师行业的点点滴滴,结交IT行业有缘之人 由于昨天的任务没有完成,客户要求我们今天继续去完成昨晚没有完成的任务. 今天良 ...

  5. 网络工程师成长日记417-西安如家酒店无线覆盖技术支持

    网络工程师成长日记417-西安如家酒店无线覆盖技术支持 这是我的第417篇原创文章,记录网络工程师行业的点点滴滴,结交IT行业有缘之人 西安某汉庭连锁酒店WIFI部署项目报告 29日中午,我们来到位于 ...

  6. 网络工程师成长日记382-西部数据Juniper网络设备调试

    网络工程师成长日记382-西部数据Juniper网络设备调试 这是我的第382篇原创文章,记录网络工程师行业的点点滴滴,结交IT行业有缘之人 西部数据Juniper网络设备调试 早上九点怀着无比激动的 ...

  7. 网络工程师成长日记368-榆林通信大楼项目回忆录

    网络工程师成长日记368-榆林通信大楼项目回忆录 这是我的第368篇原创文章,记录网络工程师行业的点点滴滴,结交IT行业有缘之人 中铁20局榆林通讯大楼工程回忆录 学习网络工程师也有一段时间了,在这段 ...

  8. 网络工程师成长日记384-商南PIX防火墙网络项目回忆录

    网络工程师成长日记384-商南PIX防火墙网络项目回忆录 这是我的第384篇原创文章,记录网络工程师行业的点点滴滴,结交IT行业有缘之人 原文链接: http://www.xacisco.net/bl ...

  9. 网络工程师成长日记309-西安李宁项目

    网络工程师成长日记309-西安李宁项目 这是我的第309篇原创文章,记录网络工程师行业的点点滴滴,结交IT行业有缘之人   李宁西北总代理工程报告 这个项目搞了一晚上,真的是太锻炼人了 项目虽然不是什 ...

最新文章

  1. 调用本地html_requests-html:最简单的爬虫框架,看完你就会了
  2. 软件工程第五章3(1)
  3. SendMessage 设置TMemo组件的边界
  4. 《Python入门到精通》函数
  5. vue slot的使用介绍
  6. 计算机网路网络层之IP协议(4)——有类IP地址
  7. python jupyter
  8. 微信小程序云开发教程-JavaScript入门(5)-函数异步同步
  9. 2021-04-25
  10. java模板引擎哪个好_Java 常用模板引擎推荐
  11. SVPWM matlab建模
  12. H5 Laya 字体
  13. 个人号微信API接口
  14. 学习随笔#13 模型预测控制(MPC)
  15. Android 项目必备(二十)-->NFC 的基本使用
  16. ARM920T(S3C2440)的中断系统
  17. 将pdf文档转换成高清图片
  18. 【知识兔】Excel查找替换的6大典型用法
  19. 各国家 MCC 和 MNC 列表
  20. CTF-SMB信息泄露【简单易懂】

热门文章

  1. HTTP 错误 500.19 - Internal Server Error 无法访问请求的页面,因为该页的相关配置数据无效。...
  2. Oracle修改字段类型方法
  3. Hadoop-MapReduce 入门
  4. 第二版全新博客园win phone 客户端
  5. #ifdef #else #endif 的用法
  6. MPLS ×××实验之OSPF sham-link
  7. FMS3系列(六):使用远程共享对象(SharedObject)实现多人时时在线聊天(Flex | Flash)
  8. 2/2 pymysql:基础操作总结
  9. Android 启动界面的制作
  10. [python 练习] 计算个税