VRF虚拟路由转发

实验拓扑

PC1 访问R1,流量由Core交换机的VRF A进入vlan21到达防火墙,防火墙转发到vlan22回到Core交换机后再转发至R1。ACC-CoreVRF-FW-Core-R1开启ospf

配置命令

#ACC设备

sys
sysn ACC
vlan 10
int vlan 10
ip addr 192.168.10.254 24
int g0/0/2
port link-type access
port default vlan 10

vlan 100
int vlan 100
ip addr 192.168.100.2 24
int 0/0/1
port link-type trunk
port trunk allow vlan 100
undo port trunk allow vlan 1

ospf 1 router-id 3.3.3.3
area 0
network 192.168.100.2 0.0.0.0
network 192.168.10.0 0.0.0.255

#Core设备

sys
sysn Core
vlan batch 11 21 to 22 100
vlan 100
ip vpn-instance A
route-dist 1:1

int g0/0/3
port link-type trunk
port trunk allow vlan 100
int vlan 100
ip bind vpn-instance A
ip addr 192.168.100.1 24

int g0/0/4
port link-type trunk
port trunk allow vlan 21
int vlan 21
ip bind vpn-instance A
ip addr 192.168.21.1 24


int g0/0/5
port link-type trunk
port trunk allow vlan 22
int vlan 22
ip addr 192.168.22.1 24 

ospf 1 router-id 192.168.11.1
area 0
network 192.168.11.1 0.0.0.0
network 192.168.22.1 0.0.0.0

ospf 2 router-id 192.168.21.1 vpn-instance A
area 0
network 192.168.21.1 0.0.0.0
network 192.168.100.1 0.0.0.0

#FW设备

sys
sysn FW
icmp ttl-exceeded send
vlan batch 21 to 22

int g1/0/4
portswitch
port link-type trunk
port trunk allow-pass vlan 21
int vlan 21
ip address 192.168.21.2 24

int g1/0/5
portswitch
port link-type trunk
port trunk allow-pass vlan 22
int vlan 22
ip address 192.168.22.2 24

firewall zone trust
add interface Vlanif21
firewall zone untrust
add interface Vlanif22

security-policy
rule name FW_Core
source-zone local
source-zone trust
source-zone untrust
destination-zone local
destination-zone trust
destination-zone untrust
service icmp
action permit

ospf 1 router-id 2.2.2.2
area 0
network 192.168.21.2 0.0.0.0
network 192.168.22.2 0.0.0.0

#R1设备

sys
sysn R1
int g0/0/0
ip addr 192.168.11.2 24
int lo0
ip addr 1.1.1.1 32

ospf 1 router-id 1.1.1.1 
area 0 
network 1.1.1.1 0.0.0.0 
network 192.168.11.2 0.0.0.0

结果验证