- 由 虚拟的现实创建于10月 12, 2023 需要 7 分钟阅读时间
网络结构图
拓扑图
链路连接表
原端口 | 目的端口 | 接口描述 |
B4F03-FG1000D-主-MGMT2 | B4F03-6807核心-主-G1/1/1 | 出口防火墙-管理口 |
B4F04-FG1000D-备-MGMT2 | B4F04-6807核心-备-G2/1/1 | 出口防火墙-管理口 |
B4F03-FG1000D-主-MGMT2 | B4F03-6807核心-主-G1/1/2 | 数据中心防火墙-管理口 |
B4F04-FG1000D-备-MGMT2 | B4F04-6807核心-备-G2/1/2 | 数据中心防火墙-管理口 |
B4F03-FWB-1000D-主-1 | B4F03-6807核心-主-G1/1/3 | WAF防火墙-管理口 |
B4F04-2960X-备-G2/0/24 | B4F04-6807核心-备-G2/1/3 | 2960X-管理口 |
B4F03-FG1000D-主-Port-A | B4F03-6807核心-主-Te1/6/16 | 数据中心防火墙连接核心6807 |
B4F04-FG1000D-备-Port-A | B4F04-6807核心-备-Te2/6/16 | 数据中心防火墙连接核心6807 |
B4F03-6807核心-主-Te1/6/23 | B4F02-3850核心-主-Te1/0/19 | 服务器核心6807连接用户端核心3850 |
B4F03-6807核心-主-Te1/6/24 | B4F02-3850核心-主-Te1/0/20 | 服务器核心6807连接用户端核心3850 |
B4F04-6807核心-备-Te2/6/23 | B4F02-3850核心-备-Te2/0/19 | 服务器核心6807连接用户端核心3850 |
B4F04-6807核心-备-Te2/6/24 | B4F02-3850核心-备-Te2/0/20 | 服务器核心6807连接用户端核心3850 |
B4F03-6807核心-主-Te1/3/7 | B4F04-6807核心-备-Te2/3/7 | VSS堆叠连接线1 |
B4F03-6807核心-主-Te1/3/8 | B4F04-6807核心-备-Te2/3/8 | VSS堆叠连接线2 |
B4F03-6807核心-主-Te1/4/7 | B4F04-6807核心-备-Te2/4/7 | VSS堆叠连接线3 |
B4F03-6807核心-主-Te1/4/8 | B4F04-6807核心-备-Te2/4/8 | VSS堆叠连接线4 |
B4F03-6807核心-主-Te1/6/29 | B4F04-6807核心-备-Te2/6/29 | VSS堆叠连接线5 |
B4F03-6807核心-主-Te1/6/30 | B4F04-6807核心-备-Te2/6/30 | VSS堆叠连接线6 |
B4F03-6807核心-主-Te1/6/31 | B4F04-6807核心-备-Te2/6/31 | VSS堆叠连接线7 |
B4F03-6807核心-主-Te1/6/32 | B4F04-6807核心-备-Te2/6/32 | VSS堆叠连接线8 |
B4F03-6807核心-主-G1/1/47 | B4F04-6807核心-备-G1/1/47 | 6807 VSS链路检测线1 |
B4F03-6807核心-主-G1/1/48 | B4F04-6807核心-备-G1/1/48 | 6807 VSS链路检测线2 |
B4F03-6807核心-主-G1/1/13 | B4F03-WOC-VPN-主-ETH0 | 服务器核心6807连接WOC VPN |
B4F04-6807核心-备-G2/1/13 | B4F04-WOC-VPN-备-ETH0 | 服务器核心6807连接WOC VPN |
B4F04-FG1000D-备-Port-15 | B4F04-6807核心-备-G2/1/12 | 出口防火墙连接核心6807 |
B4F04-FWB-1000D-主-Port-4 | B4F04-6807核心-主-G1/1/12 | WAF防火墙连接核心6807 |
B4F02-VPN-1000-ETH0 | B4F03-6807核心-主-G1/1/15 | SSL VPN连接核心6807 |
B4F01-H3C-S5048E-G0/0/47 | B4F03-6807核心-主-G1/1/25 | 出口路由器交换机连接核心6807-临时 |
B4F02-R0.241-GE0/0 | B4F03-6807核心-主-G1/1/26 | 茶山时捷1941路由器连接核心6807-临时 |
B4F20-2960X-Te0/1 | B4F03-6807核心-主-Te1/6/8 | 存储服务器连接核心6807 |
B4F20-2960X-Te0/2 | B4F04-6807核心-备-Te2/6/8 | 存储服务器连接核心6807 |
6807核心配置脚本
配置vlan与接口
vlan 19 exit vlan 20 exit vlan 251 exit vlan 253 exit vlan 3001 exit interface Vlan1 description manage_vlan ip address 192.168.88.2 255.255.255.0 no shutdown exit interface Vlan19 description server ip address 192.168.0.1 255.255.255.0 no shutdown exit interface Vlan20 description server_02 ip address 192.168.5.1 255.255.255.0 no shutdown exit interface Vlan251 ip address 192.168.251.1 255.255.255.0 no shutdown exit interface Vlan253 description cisco3850 ip address 192.168.253.1 255.255.255.252 no shutdown exit interface Vlan3001 ip address 10.3.1.1 255.255.255.0 no shutdown exit
配置路由
删除原4506核心策略路由,只需要用到到飞塔防火墙的默认路由
ip route 0.0.0.0 0.0.0.0 192.168.0.21 ip route 10.1.6.0 255.255.255.0 10.3.1.254 ip route 10.3.2.0 255.255.255.0 10.3.1.254 ip route 10.16.1.0 255.255.255.0 192.168.0.250 ip route 15.0.32.0 255.255.255.0 192.168.0.201 ip route 31.2.1.2 255.255.255.255 192.168.0.253 ip route 172.16.1.88 255.255.255.255 192.168.0.244 ip route 172.16.5.0 255.255.255.0 10.3.1.254 ip route 172.29.30.0 255.255.255.0 192.168.0.201 ip route 172.29.33.0 255.255.255.0 192.168.0.201 ip route 172.29.52.0 255.255.255.0 192.168.0.201 ip route 172.29.53.0 255.255.255.0 192.168.0.201 ip route 172.100.0.2 255.255.255.255 192.168.0.200 ip route 192.168.1.0 255.255.255.0 192.168.0.200 ip route 192.168.1.103 255.255.255.255 192.168.0.20 ip route 192.168.6.0 255.255.255.0 192.168.0.250 ip route 192.168.9.0 255.255.255.0 10.3.1.254 ip route 192.168.10.0 255.255.255.0 10.3.1.254 ip route 192.168.11.0 255.255.255.0 10.3.1.254 ip route 192.168.12.0 255.255.255.0 10.3.1.254 ip route 192.168.13.0 255.255.255.0 10.3.1.254 ip route 192.168.14.0 255.255.255.0 10.3.1.254 ip route 192.168.15.0 255.255.255.0 10.3.1.254 ip route 192.168.16.0 255.255.255.0 10.3.1.254 ip route 192.168.17.0 255.255.255.0 10.3.1.254 ip route 192.168.18.0 255.255.255.0 192.168.0.207 ip route 192.168.19.0 255.255.255.0 192.168.0.207 ip route 192.168.20.0 255.255.255.0 10.3.1.254 ip route 192.168.21.0 255.255.255.0 10.3.1.254 ip route 192.168.22.0 255.255.255.0 10.3.1.254 ip route 192.168.23.0 255.255.255.0 10.3.1.254 ip route 192.168.24.0 255.255.255.0 10.3.1.254 ip route 192.168.25.0 255.255.255.0 192.168.0.207 ip route 192.168.26.0 255.255.255.0 192.168.0.207 ip route 192.168.28.0 255.255.255.0 192.168.0.207 ip route 192.168.30.0 255.255.255.0 192.168.0.248 ip route 192.168.31.0 255.255.255.0 192.168.0.254 ip route 192.168.33.0 255.255.255.0 192.168.0.252 ip route 192.168.35.0 255.255.255.0 192.168.0.251 ip route 192.168.36.0 255.255.255.0 192.168.0.207 ip route 192.168.50.0 255.255.255.0 192.168.0.207 ip route 192.168.51.0 255.255.255.0 192.168.0.207 ip route 192.168.55.0 255.255.255.0 192.168.0.207 ip route 192.168.56.0 255.255.255.0 192.168.0.207 ip route 192.168.58.0 255.255.255.0 192.168.0.207 ip route 192.168.63.0 255.255.255.0 192.168.0.207 ip route 192.168.64.0 255.255.255.0 192.168.0.207 ip route 192.168.67.0 255.255.255.0 192.168.0.207 ip route 192.168.68.0 255.255.255.0 192.168.0.207 ip route 192.168.70.0 255.255.255.0 192.168.0.207 ip route 192.168.72.0 255.255.255.0 192.168.0.207 ip route 192.168.76.0 255.255.255.0 192.168.0.207 ip route 192.168.78.0 255.255.255.0 192.168.0.207 ip route 192.168.80.0 255.255.255.0 192.168.0.207 ip route 192.168.82.0 255.255.255.0 192.168.0.207 ip route 192.168.84.0 255.255.255.0 192.168.0.207 ip route 192.168.85.0 255.255.255.0 192.168.0.207 ip route 192.168.89.0 255.255.255.0 192.168.253.2 ip route 192.168.90.0 255.255.255.0 10.3.1.254 ip route 192.168.91.0 255.255.255.0 10.3.1.254 ip route 192.168.92.0 255.255.255.0 10.3.1.254 ip route 192.168.93.0 255.255.255.0 10.3.1.254 ip route 192.168.94.0 255.255.255.0 10.3.1.254 ip route 192.168.95.0 255.255.255.0 10.3.1.254 ip route 192.168.96.0 255.255.255.0 10.3.1.254 ip route 192.168.97.0 255.255.255.0 10.3.1.254 ip route 192.168.98.0 255.255.255.0 10.3.1.254 ip route 192.168.99.0 255.255.255.0 10.3.1.254 ip route 192.168.100.0 255.255.255.0 192.168.0.241 ip route 192.168.109.0 255.255.255.0 192.168.253.2 ip route 192.168.110.0 255.255.255.0 192.168.0.241 ip route 192.168.111.0 255.255.255.0 10.3.1.254 ip route 192.168.112.0 255.255.255.0 192.168.253.2 ip route 192.168.201.0 255.255.255.0 10.3.1.254 ip route 192.168.202.0 255.255.255.0 10.3.1.254 ip route 192.168.203.0 255.255.255.0 10.3.1.254 ip route 192.168.204.0 255.255.255.0 10.3.1.254 ip route 192.168.205.0 255.255.255.0 10.3.1.254 ip route 192.168.206.0 255.255.255.0 10.3.1.254 ip route 192.168.207.0 255.255.255.0 10.3.1.254 ip route 192.168.220.0 255.255.255.0 10.3.1.254 ip route 192.168.221.0 255.255.255.0 10.3.1.254 ip route 192.168.222.0 255.255.255.0 10.3.1.254 ip route 192.168.223.0 255.255.255.0 10.3.1.254 ip route 192.168.224.0 255.255.255.0 10.3.1.254 ip route 192.168.225.0 255.255.255.0 10.3.1.254 ip route 192.168.226.0 255.255.255.0 10.3.1.254 ip route 192.168.227.0 255.255.255.0 10.3.1.254 ip route 192.168.228.0 255.255.255.0 10.3.1.254 ip route 192.168.229.0 255.255.255.0 10.3.1.254 ip route 192.168.250.0 255.255.255.0 192.168.253.2 ip route 192.168.254.0 255.255.255.0 192.168.0.241 ip route 194.168.0.0 255.255.255.0 192.168.0.4
配置接口vlan
//用于设备管理口连接
interface GigabitEthernet1/1/1 switchport switchport mode access switchport access vlan 1 no shutdown exit interface GigabitEthernet1/1/2 switchport switchport mode access switchport access vlan 1 no shutdown exit interface GigabitEthernet1/1/3 switchport switchport mode access switchport access vlan 1 no shutdown exit interface GigabitEthernet1/1/4 switchport switchport mode access switchport access vlan 1 no shutdown exit interface GigabitEthernet2/1/1 switchport switchport mode access switchport access vlan 1 no shutdown exit interface GigabitEthernet2/1/2 switchport switchport mode access switchport access vlan 1 no shutdown exit interface GigabitEthernet2/1/3 switchport switchport mode access switchport access vlan 1 no shutdown exit interface GigabitEthernet2/1/4 switchport switchport mode access switchport access vlan 1 no shutdown exit //用于连接3850核心 interface Port-channel 31 switchport switchport access vlan 3001 switchport mode access exit //连接3850核心,共4个接口捆绑 interface TenGigabitEthernet1/6/23 switchport access vlan 3001 switchport mode access channel-group 31 mode on no shutdown exit interface TenGigabitEthernet1/6/24 switchport access vlan 3001 switchport mode access channel-group 31 mode on no shutdown exit interface TenGigabitEthernet2/6/23 switchport access vlan 3001 switchport mode access channel-group 31 mode on no shutdown exit interface TenGigabitEthernet2/6/24 switchport access vlan 3001 switchport mode access channel-group 31 mode on no shutdown exit //连接数据中心3850 interface TenGigabitEthernet1/6/16 switchport mode trunk no shutdown exit interface TenGigabitEthernet2/6/16 switchport mode trunk no shutdown exit //连接深信服VPN interface GigabitEthernet1/1/13 switchport switchport mode access switchport access vlan 19 spanning-tree portfast no shutdown exit interface GigabitEthernet2/1/13 switchport switchport mode access switchport access vlan 19 spanning-tree portfast no shutdown exit //连接出口防火墙 interface GigabitEthernet1/1/12 switchport switchport mode access switchport access vlan 19 spanning-tree portfast no shutdown exit interface GigabitEthernet2/1/12 switchport switchport mode access switchport access vlan 19 spanning-tree portfast no shutdown exit //连接SSL VPN interface GigabitEthernet1/1/15 switchport switchport mode access switchport access vlan 19 spanning-tree portfast no shutdown exit //连接H3C交换机-出口路由器 interface GigabitEthernet1/1/25 switchport switchport mode access switchport access vlan 19 spanning-tree portfast no shutdown exit //连接茶山时捷1941路由器 interface GigabitEthernet1/1/26 switchport switchport mode access switchport access vlan 19 spanning-tree portfast no shutdown exit //存储服务器连接核心6807 interface Port-channel 8 switchport mode trunk exit interface TenGigabitEthernet1/6/8 switchport mode trunk channel-group 8 mode on no shutdown exit interface TenGigabitEthernet2/6/8 switchport mode trunk channel-group 8 mode on no shutdown exit
配置ACL策略
配置服务器网段ACL策略
ip access-list extended allow_server_3389_acl permit ip host 192.168.5.109 host 192.168.0.230 permit ip host 192.168.0.230 host 192.168.5.109 deny ip host 192.168.0.230 192.168.5.0 0.0.0.255 deny ip host 192.168.0.230 192.168.0.0 0.0.0.255 permit tcp 192.168.0.0 0.0.0.255 eq 3389 host 192.168.5.113 permit tcp 192.168.0.0 0.0.0.255 eq 22 host 192.168.5.113 permit tcp host 192.168.72.5 eq 3389 any deny tcp any eq 3389 any deny tcp any eq 22 any permit ip any any exit interface Vlan19 ip access-group allow_server_3389_acl in exit interface Vlan20 ip access-group allow_server_3389_acl in exit 配置登陆设备ACL策略 ip access-list extended vty_acl permit tcp host 192.168.13.43 any permit tcp host 192.168.206.250 any permit tcp host 192.168.13.168 any permit tcp host 192.168.13.41 any permit tcp host 192.168.13.51 any permit tcp host 192.168.13.28 any permit tcp host 192.168.13.123 any permit tcp host 192.168.207.111 any exit line vty 0 4 access-class vty_acl in exit
业务测试IP表与测试人员
服务器IP表
(美宜佳内部自行提供)
测试人员
(美宜佳内部自行安排)
连通性测试
测试名称 | 测试目标 | 测试方案 | 备注说明 | |
连通性测试 | 网络设备基本连通性测试,包括: | 根据应用系统的连通要求,采用ping 命令进行测试, | 根据网络系统中的路由、访问关系VLAN的划分等设计,对网络基本连通性进行测试。 | |
功能测 试 | 交换机虚网划分(VLAN)功能测试) | 内部网络支持全局VLAN划分:相同VLAN的设备连通性测试; | 根据系统的连通要求,采用 | 根据网络系统中的路由、VLAN划分设计对交换机VLAN功能进行测试。 |
业务内容测试
(美宜佳内部提供)
割接方案
割接准备
主要目的是为割接做好必要的准备,减少真正割接时一些不必要的工作,节约时间;另外万一在割接失败情况下很容易恢复到原来的网络。其准备工作包括如下:
1、首先考察线路连接情况。测试链路是否正常,然后对链路作标记,另外还要标记连接到对端设备的信息。
2、设备端口配置及连接信息,标识设备位置以及各个端口的用途,并用标签做好标记。
3、原有设备4506核心交换机连接信息表,并用标签做好标记。
4、提前布设好网线跳线与光纤跳线,并打好标签标记
割接思路
本割接方案总体思想是"替换",由于本次割接新增的核心交换机设备主要是取代原有核心的设备,使新的核心交换机6807与原有的3850用户端核心交换机互联。在割接的过程中,将原接入到4506旧核心的网线与光纤接入到新的核心交换机,并且通过设置,使新旧设备可以互相通信。最后完成整个网络系统的割接,将原有的网络设备连接到6807堆叠核心交换机。思路如下:
- 6807核心交换机的网线与光纤跳线提前接到接口上并且整理好线路与标签
- 原来接入到4506核心交换机的网线与光纤接口依然接在原有的位置上,4506核心交换机的配置不做更改,只断开连接到4506核心交换机对端的接口,万一割接失败可以快速回退。
- 割接开始后,先断开所有连接到4506交换机对端接口上网线与光纤接口。
- 把连接到6807核心交换机的所有接口接上对应的设备上。
- 测试网络连通性,测试通过后,割接成功,完成割接。
- 测试失败,在有限的时间内无法解决问题,启用回退方案。
- 回退方案,在对应的设备上断开与6807连接的断开,接上连接到原有核心4506连接的端口,完成回退。
割接具体步骤
断开连接到4506核心对端接口的顺序表
序号 | 目的设备端位置与端口 | 原4506核心端接口(不需要拔线) | 接口描述 | 开始时间点 |
1 | B4F04-FG1000D-备-Port-A | 4506核心原接口不变 | 数据中心防火墙连接核心6807 | 2:30:00 |
2 | B4F03-FG1000D-主-Port-A | 数据中心防火墙连接核心6807 | 2:30:00 | |
3 | B4F04-FG1000D-备-Port-15 | 出口防火墙连接核心6807 | 2:30:00 | |
4 | B4F04-FWB-1000D-主-Port-4 | WAF防火墙连接核心6807 | 2:30:00 | |
5 | B4F04-WOC-VPN-备-ETH0 | 服务器核心6807连接WOC VPN | 2:30:00 | |
6 | B4F03-WOC-VPN-主-ETH0 | 服务器核心6807连接WOC VPN | 2:30:00 | |
7 | B4F02-3850核心-主-Te1/0/19 | 服务器核心6807连接用户端核心3850 | 2:30:30 | |
8 | B4F02-3850核心-主-Te1/0/20 | 服务器核心6807连接用户端核心3850 | 2:30:30 | |
9 | B4F02-3850核心-备-Te2/0/19 | 服务器核心6807连接用户端核心3850 | 2:30:30 | |
10 | B4F02-3850核心-备-Te2/0/20 | 服务器核心6807连接用户端核心3850 | 2:30:30 | |
11 | B4F02-VPN-1000-ETH0 | SSL VPN连接核心6807 | 2:30:30 | |
12 | B4F01-H3C-S5048E-G0/0/47 | 出口路由器交换机连接核心6807-临时 | 2:30:30 | |
13 | B4F02-R0.241-GE0/0 | 茶山时捷1941路由器连接核心6807-临时 | 2:30:30 | |
14 | B4F20-2960X-Te0/1 | 存储服务器连接核心6807 | 2:30:30 | |
15 | B4F03-FG1000D-主-MGMT2 | 出口防火墙-管理口 | 2:31:00 | |
16 | B4F04-FG1000D-备-MGMT2 | 出口防火墙-管理口 | 2:31:00 | |
17 | B4F03-FG1000D-主-MGMT2 | 数据中心防火墙-管理口 | 2:31:00 | |
18 | B4F04-FG1000D-备-MGMT2 | 数据中心防火墙-管理口 | 2:31:00 | |
19 | B4F03-FWB-1000D-主-1 | WAF防火墙-管理口 | 2:31:00 | |
20 | B4F04-2960X-备-G2/0/24 | 2960X-管理口 | 2:31:00 |
接上连接到6807核心对端接口的顺序表
序号 | 目的设备端位置与端口 | 6807核心端接口(已经提前连接) | 接口描述 | 开始时间点 |
1 | B4F03-FG1000D-主-Port-A | B4F03-6807核心-主-Te1/6/16 | 数据中心防火墙连接核心6807 | 2:31:00 |
2 | B4F04-FG1000D-备-Port-A | B4F04-6807核心-备-Te2/6/16 | 数据中心防火墙连接核心6807 | 2:31:00 |
3 | B4F04-FWB-1000D-主-Port-4 | B4F04-6807核心-主-G1/1/12 | WAF防火墙连接核心6807 | 2:31:00 |
4 | B4F04-FG1000D-备-Port-15 | B4F04-6807核心-备-G2/1/12 | 出口防火墙连接核心6807 | 2:31:00 |
5 | B4F03-WOC-VPN-主-ETH0 | B4F03-6807核心-主-G1/1/13 | 服务器核心6807连接WOC VPN | 2:31:00 |
6 | B4F04-WOC-VPN-备-ETH0 | B4F04-6807核心-备-G2/1/13 | 服务器核心6807连接WOC VPN | 2:31:00 |
7 | B4F02-3850核心-主-Te1/0/19 | B4F03-6807核心-主-Te1/6/23 | 服务器核心6807连接用户端核心3850 | 2:31:30 |
8 | B4F02-3850核心-主-Te1/0/20 | B4F03-6807核心-主-Te1/6/24 | 服务器核心6807连接用户端核心3850 | 2:31:30 |
9 | B4F02-3850核心-备-Te2/0/19 | B4F04-6807核心-备-Te2/6/23 | 服务器核心6807连接用户端核心3850 | 2:31:30 |
10 | B4F02-3850核心-备-Te2/0/20 | B4F04-6807核心-备-Te2/6/24 | 服务器核心6807连接用户端核心3850 | 2:31:30 |
11 | B4F02-VPN-1000-ETH0 | B4F03-6807核心-主-G1/1/15 | SSL VPN连接核心6807 | 2:31:30 |
12 | B4F01-H3C-S5048E-G0/0/47 | B4F03-6807核心-主-G1/1/25 | 出口路由器交换机连接核心6807-临时 | 2:31:30 |
13 | B4F02-R0.241-GE0/0 | B4F03-6807核心-主-G1/1/26 | 茶山时捷1941路由器连接核心6807-临时 | 2:31:30 |
14 | B4F20-2960X-Te0/1 | B4F03-6807核心-主-Te1/6/8 | 存储服务器连接核心6807 | 2:31:30 |
15 | B4F03-FG1000D-主-MGMT2 | B4F03-6807核心-主-G1/1/1 | 出口防火墙-管理口 | 2:32:00 |
16 | B4F04-FG1000D-备-MGMT2 | B4F04-6807核心-备-G2/1/1 | 出口防火墙-管理口 | 2:32:00 |
17 | B4F03-FG1000D-主-MGMT2 | B4F03-6807核心-主-G1/1/2 | 数据中心防火墙-管理口 | 2:32:00 |
18 | B4F04-FG1000D-备-MGMT2 | B4F04-6807核心-备-G2/1/2 | 数据中心防火墙-管理口 | 2:32:00 |
19 | B4F03-FWB-1000D-主-1 | B4F03-6807核心-主-G1/1/3 | WAF防火墙-管理口 | 2:32:00 |
20 | B4F04-2960X-备-G2/0/24 | B4F04-6807核心-备-G2/1/3 | 2960X-管理口 | 2:32:00 |
回退方案
先断开连接到6807核心目的设备的端口,后连接4506核心目的设备的端口,测试连通性,测试业务,成功回退。
断开连接到6807核心对端的接口
序号 | 目的设备端位置与端口 | 原6807核心端接口(已经提前连接) | 接口描述 | 开始时间点 |
1 | B4F04-FG1000D-备-Port-A | B4F04-6807核心-备-Te2/6/16 | 数据中心防火墙连接核心6807 | 2:55:00 |
2 | B4F03-FG1000D-主-Port-A | B4F03-6807核心-主-Te1/6/16 | 数据中心防火墙连接核心6807 | 2:55:00 |
3 | B4F04-FG1000D-备-Port-15 | B4F04-6807核心-备-G2/1/12 | 出口防火墙连接核心6807 | 2:55:00 |
4 | B4F04-FWB-1000D-主-Port-4 | B4F04-6807核心-主-G1/1/12 | WAF防火墙连接核心6807 | 2:55:00 |
5 | B4F04-WOC-VPN-备-ETH0 | B4F04-6807核心-备-G2/1/13 | 服务器核心6807连接WOC VPN | 2:55:00 |
6 | B4F03-WOC-VPN-主-ETH0 | B4F03-6807核心-主-G1/1/13 | 服务器核心6807连接WOC VPN | 2:55:00 |
7 | B4F02-3850核心-主-Te1/0/19 | B4F03-6807核心-主-Te1/6/23 | 服务器核心6807连接用户端核心3850 | 2:55:30 |
8 | B4F02-3850核心-主-Te1/0/20 | B4F03-6807核心-主-Te1/6/24 | 服务器核心6807连接用户端核心3850 | 2:55:30 |
9 | B4F02-3850核心-备-Te2/0/19 | B4F04-6807核心-备-Te2/6/23 | 服务器核心6807连接用户端核心3850 | 2:55:30 |
10 | B4F02-3850核心-备-Te2/0/20 | B4F04-6807核心-备-Te2/6/24 | 服务器核心6807连接用户端核心3850 | 2:55:30 |
11 | B4F02-VPN-1000-ETH0 | B4F03-6807核心-主-G1/1/15 | SSL VPN连接核心6807 | 2:55:30 |
12 | B4F01-H3C-S5048E-G0/0/47 | B4F03-6807核心-主-G1/1/25 | 出口路由器交换机连接核心6807-临时 | 2:55:30 |
13 | B4F02-R0.241-GE0/0 | B4F03-6807核心-主-G1/1/26 | 茶山时捷1941路由器连接核心6807-临时 | 2:55:30 |
14 | B4F20-2960X-Te0/1 | B4F03-6807核心-主-Te1/6/8 | 存储服务器连接核心6807 | 2:55:30 |
15 | B4F03-FG1000D-主-MGMT2 | B4F03-6807核心-主-G1/1/1 | 出口防火墙-管理口 | 2:56:00 |
16 | B4F04-FG1000D-备-MGMT2 | B4F04-6807核心-备-G2/1/1 | 出口防火墙-管理口 | 2:56:00 |
17 | B4F03-FG1000D-主-MGMT2 | B4F03-6807核心-主-G1/1/2 | 数据中心防火墙-管理口 | 2:56:00 |
18 | B4F04-FG1000D-备-MGMT2 | B4F04-6807核心-备-G2/1/2 | 数据中心防火墙-管理口 | 2:56:00 |
19 | B4F03-FWB-1000D-主-1 | B4F03-6807核心-主-G1/1/3 | WAF防火墙-管理口 | 2:56:00 |
20 | B4F04-2960X-备-G2/0/24 | B4F04-6807核心-备-G2/1/3 | 2960X-管理口 | 2:56:00 |
接上连接到4506核心对端的接口
序号 | 目的设备端位置与端口 | 原4506核心端接口(不需要拔线) | 接口描述 | 开始时间点 |
1 | B4F03-FG1000D-主-Port-A | 4506核心原接口不变 | 数据中心防火墙连接核心6807 | 2:56:00 |
2 | B4F04-FG1000D-备-Port-A | 数据中心防火墙连接核心6807 | 2:56:00 | |
3 | B4F04-FWB-1000D-主-Port-4 | WAF防火墙连接核心6807 | 2:56:00 | |
4 | B4F04-FG1000D-备-Port-15 | 出口防火墙连接核心6807 | 2:56:00 | |
5 | B4F03-WOC-VPN-主-ETH0 | 服务器核心6807连接WOC VPN | 2:56:00 | |
6 | B4F04-WOC-VPN-备-ETH0 | 服务器核心6807连接WOC VPN | 2:56:00 | |
7 | B4F02-3850核心-主-Te1/0/19 | 服务器核心6807连接用户端核心3850 | 2:56:30 | |
8 | B4F02-3850核心-主-Te1/0/20 | 服务器核心6807连接用户端核心3850 | 2:56:30 | |
9 | B4F02-3850核心-备-Te2/0/19 | 服务器核心6807连接用户端核心3850 | 2:56:30 | |
10 | B4F02-3850核心-备-Te2/0/20 | 服务器核心6807连接用户端核心3850 | 2:56:30 | |
11 | B4F02-VPN-1000-ETH0 | SSL VPN连接核心6807 | 2:56:30 | |
12 | B4F01-H3C-S5048E-G0/0/47 | 出口路由器交换机连接核心6807-临时 | 2:56:30 | |
13 | B4F02-R0.241-GE0/0 | 茶山时捷1941路由器连接核心6807-临时 | 2:56:30 | |
14 | B4F20-2960X-Te0/1 | 存储服务器连接核心6807 | 2:56:30 | |
15 | B4F03-FG1000D-主-MGMT2 | 出口防火墙-管理口 | 2:57:00 | |
16 | B4F04-FG1000D-备-MGMT2 | 出口防火墙-管理口 | 2:57:00 | |
17 | B4F03-FG1000D-主-MGMT2 | 数据中心防火墙-管理口 | 2:57:00 | |
18 | B4F04-FG1000D-备-MGMT2 | 数据中心防火墙-管理口 | 2:57:00 | |
19 | B4F03-FWB-1000D-主-1 | WAF防火墙-管理口 | 2:57:00 | |
20 | B4F04-2960X-备-G2/0/24 | 2960X-管理口 | 2:57:00 |
- 无标签
添加评论