网络结构图

拓扑图

链路连接表

原端口

目的端口

接口描述

B4F03-FG1000D-主-MGMT2

B4F03-6807核心-主-G1/1/1

出口防火墙-管理口

B4F04-FG1000D-备-MGMT2

B4F04-6807核心-备-G2/1/1

出口防火墙-管理口

B4F03-FG1000D-主-MGMT2

B4F03-6807核心-主-G1/1/2

数据中心防火墙-管理口

B4F04-FG1000D-备-MGMT2

B4F04-6807核心-备-G2/1/2

数据中心防火墙-管理口

B4F03-FWB-1000D-主-1

B4F03-6807核心-主-G1/1/3

WAF防火墙-管理口

B4F04-2960X-备-G2/0/24

B4F04-6807核心-备-G2/1/3

2960X-管理口

B4F03-FG1000D-主-Port-A

B4F03-6807核心-主-Te1/6/16

数据中心防火墙连接核心6807

B4F04-FG1000D-备-Port-A

B4F04-6807核心-备-Te2/6/16

数据中心防火墙连接核心6807

B4F03-6807核心-主-Te1/6/23

B4F02-3850核心-主-Te1/0/19

服务器核心6807连接用户端核心3850

B4F03-6807核心-主-Te1/6/24

B4F02-3850核心-主-Te1/0/20

服务器核心6807连接用户端核心3850

B4F04-6807核心-备-Te2/6/23

B4F02-3850核心-备-Te2/0/19

服务器核心6807连接用户端核心3850

B4F04-6807核心-备-Te2/6/24

B4F02-3850核心-备-Te2/0/20

服务器核心6807连接用户端核心3850

B4F03-6807核心-主-Te1/3/7

B4F04-6807核心-备-Te2/3/7

VSS堆叠连接线1

B4F03-6807核心-主-Te1/3/8

B4F04-6807核心-备-Te2/3/8

VSS堆叠连接线2

B4F03-6807核心-主-Te1/4/7

B4F04-6807核心-备-Te2/4/7

VSS堆叠连接线3

B4F03-6807核心-主-Te1/4/8

B4F04-6807核心-备-Te2/4/8

VSS堆叠连接线4

B4F03-6807核心-主-Te1/6/29

B4F04-6807核心-备-Te2/6/29

VSS堆叠连接线5

B4F03-6807核心-主-Te1/6/30

B4F04-6807核心-备-Te2/6/30

VSS堆叠连接线6

B4F03-6807核心-主-Te1/6/31

B4F04-6807核心-备-Te2/6/31

VSS堆叠连接线7

B4F03-6807核心-主-Te1/6/32

B4F04-6807核心-备-Te2/6/32

VSS堆叠连接线8

B4F03-6807核心-主-G1/1/47

B4F04-6807核心-备-G1/1/47

6807 VSS链路检测线1

B4F03-6807核心-主-G1/1/48

B4F04-6807核心-备-G1/1/48

6807 VSS链路检测线2

B4F03-6807核心-主-G1/1/13

B4F03-WOC-VPN-主-ETH0

服务器核心6807连接WOC VPN

B4F04-6807核心-备-G2/1/13

B4F04-WOC-VPN-备-ETH0

服务器核心6807连接WOC VPN

B4F04-FG1000D-备-Port-15

B4F04-6807核心-备-G2/1/12

出口防火墙连接核心6807

B4F04-FWB-1000D-主-Port-4

B4F04-6807核心-主-G1/1/12

WAF防火墙连接核心6807

B4F02-VPN-1000-ETH0

B4F03-6807核心-主-G1/1/15

SSL VPN连接核心6807

B4F01-H3C-S5048E-G0/0/47

B4F03-6807核心-主-G1/1/25

出口路由器交换机连接核心6807-临时

B4F02-R0.241-GE0/0

B4F03-6807核心-主-G1/1/26

茶山时捷1941路由器连接核心6807-临时

B4F20-2960X-Te0/1

B4F03-6807核心-主-Te1/6/8

存储服务器连接核心6807

B4F20-2960X-Te0/2

B4F04-6807核心-备-Te2/6/8

存储服务器连接核心6807

6807核心配置脚本

配置vlan与接口

vlan 19
exit
vlan 20
exit
vlan 251
exit
vlan 253
exit
vlan 3001
exit

interface Vlan1
description manage_vlan
ip address 192.168.88.2 255.255.255.0
no shutdown
exit
interface Vlan19
description server
ip address 192.168.0.1 255.255.255.0
no shutdown
exit
interface Vlan20
description server_02
ip address 192.168.5.1 255.255.255.0
no shutdown
exit
interface Vlan251
ip address 192.168.251.1 255.255.255.0
no shutdown
exit
interface Vlan253
description cisco3850
ip address 192.168.253.1 255.255.255.252
no shutdown
exit
interface Vlan3001
ip address 10.3.1.1 255.255.255.0
no shutdown
exit

配置路由

删除原4506核心策略路由,只需要用到到飞塔防火墙的默认路由

ip route 0.0.0.0 0.0.0.0 192.168.0.21
ip route 10.1.6.0 255.255.255.0 10.3.1.254
ip route 10.3.2.0 255.255.255.0 10.3.1.254
ip route 10.16.1.0 255.255.255.0 192.168.0.250
ip route 15.0.32.0 255.255.255.0 192.168.0.201
ip route 31.2.1.2 255.255.255.255 192.168.0.253
ip route 172.16.1.88 255.255.255.255 192.168.0.244
ip route 172.16.5.0 255.255.255.0 10.3.1.254
ip route 172.29.30.0 255.255.255.0 192.168.0.201
ip route 172.29.33.0 255.255.255.0 192.168.0.201
ip route 172.29.52.0 255.255.255.0 192.168.0.201
ip route 172.29.53.0 255.255.255.0 192.168.0.201
ip route 172.100.0.2 255.255.255.255 192.168.0.200
ip route 192.168.1.0 255.255.255.0 192.168.0.200
ip route 192.168.1.103 255.255.255.255 192.168.0.20
ip route 192.168.6.0 255.255.255.0 192.168.0.250
ip route 192.168.9.0 255.255.255.0 10.3.1.254
ip route 192.168.10.0 255.255.255.0 10.3.1.254
ip route 192.168.11.0 255.255.255.0 10.3.1.254
ip route 192.168.12.0 255.255.255.0 10.3.1.254
ip route 192.168.13.0 255.255.255.0 10.3.1.254
ip route 192.168.14.0 255.255.255.0 10.3.1.254
ip route 192.168.15.0 255.255.255.0 10.3.1.254
ip route 192.168.16.0 255.255.255.0 10.3.1.254
ip route 192.168.17.0 255.255.255.0 10.3.1.254
ip route 192.168.18.0 255.255.255.0 192.168.0.207
ip route 192.168.19.0 255.255.255.0 192.168.0.207
ip route 192.168.20.0 255.255.255.0 10.3.1.254
ip route 192.168.21.0 255.255.255.0 10.3.1.254
ip route 192.168.22.0 255.255.255.0 10.3.1.254
ip route 192.168.23.0 255.255.255.0 10.3.1.254
ip route 192.168.24.0 255.255.255.0 10.3.1.254
ip route 192.168.25.0 255.255.255.0 192.168.0.207
ip route 192.168.26.0 255.255.255.0 192.168.0.207
ip route 192.168.28.0 255.255.255.0 192.168.0.207
ip route 192.168.30.0 255.255.255.0 192.168.0.248
ip route 192.168.31.0 255.255.255.0 192.168.0.254
ip route 192.168.33.0 255.255.255.0 192.168.0.252
ip route 192.168.35.0 255.255.255.0 192.168.0.251
ip route 192.168.36.0 255.255.255.0 192.168.0.207
ip route 192.168.50.0 255.255.255.0 192.168.0.207
ip route 192.168.51.0 255.255.255.0 192.168.0.207
ip route 192.168.55.0 255.255.255.0 192.168.0.207
ip route 192.168.56.0 255.255.255.0 192.168.0.207
ip route 192.168.58.0 255.255.255.0 192.168.0.207
ip route 192.168.63.0 255.255.255.0 192.168.0.207
ip route 192.168.64.0 255.255.255.0 192.168.0.207
ip route 192.168.67.0 255.255.255.0 192.168.0.207
ip route 192.168.68.0 255.255.255.0 192.168.0.207
ip route 192.168.70.0 255.255.255.0 192.168.0.207
ip route 192.168.72.0 255.255.255.0 192.168.0.207
ip route 192.168.76.0 255.255.255.0 192.168.0.207
ip route 192.168.78.0 255.255.255.0 192.168.0.207
ip route 192.168.80.0 255.255.255.0 192.168.0.207
ip route 192.168.82.0 255.255.255.0 192.168.0.207
ip route 192.168.84.0 255.255.255.0 192.168.0.207
ip route 192.168.85.0 255.255.255.0 192.168.0.207
ip route 192.168.89.0 255.255.255.0 192.168.253.2
ip route 192.168.90.0 255.255.255.0 10.3.1.254
ip route 192.168.91.0 255.255.255.0 10.3.1.254
ip route 192.168.92.0 255.255.255.0 10.3.1.254
ip route 192.168.93.0 255.255.255.0 10.3.1.254
ip route 192.168.94.0 255.255.255.0 10.3.1.254
ip route 192.168.95.0 255.255.255.0 10.3.1.254
ip route 192.168.96.0 255.255.255.0 10.3.1.254
ip route 192.168.97.0 255.255.255.0 10.3.1.254
ip route 192.168.98.0 255.255.255.0 10.3.1.254
ip route 192.168.99.0 255.255.255.0 10.3.1.254
ip route 192.168.100.0 255.255.255.0 192.168.0.241
ip route 192.168.109.0 255.255.255.0 192.168.253.2
ip route 192.168.110.0 255.255.255.0 192.168.0.241
ip route 192.168.111.0 255.255.255.0 10.3.1.254
ip route 192.168.112.0 255.255.255.0 192.168.253.2
ip route 192.168.201.0 255.255.255.0 10.3.1.254
ip route 192.168.202.0 255.255.255.0 10.3.1.254
ip route 192.168.203.0 255.255.255.0 10.3.1.254
ip route 192.168.204.0 255.255.255.0 10.3.1.254
ip route 192.168.205.0 255.255.255.0 10.3.1.254
ip route 192.168.206.0 255.255.255.0 10.3.1.254
ip route 192.168.207.0 255.255.255.0 10.3.1.254
ip route 192.168.220.0 255.255.255.0 10.3.1.254
ip route 192.168.221.0 255.255.255.0 10.3.1.254
ip route 192.168.222.0 255.255.255.0 10.3.1.254
ip route 192.168.223.0 255.255.255.0 10.3.1.254
ip route 192.168.224.0 255.255.255.0 10.3.1.254
ip route 192.168.225.0 255.255.255.0 10.3.1.254
ip route 192.168.226.0 255.255.255.0 10.3.1.254
ip route 192.168.227.0 255.255.255.0 10.3.1.254
ip route 192.168.228.0 255.255.255.0 10.3.1.254
ip route 192.168.229.0 255.255.255.0 10.3.1.254
ip route 192.168.250.0 255.255.255.0 192.168.253.2
ip route 192.168.254.0 255.255.255.0 192.168.0.241
ip route 194.168.0.0 255.255.255.0 192.168.0.4

 配置接口vlan

//用于设备管理口连接

interface GigabitEthernet1/1/1
switchport
switchport mode access
switchport access vlan 1
no shutdown
exit
interface GigabitEthernet1/1/2
switchport
switchport mode access
switchport access vlan 1
no shutdown
exit
interface GigabitEthernet1/1/3
switchport
switchport mode access
switchport access vlan 1
no shutdown
exit
interface GigabitEthernet1/1/4
switchport
switchport mode access
switchport access vlan 1
no shutdown
exit
interface GigabitEthernet2/1/1
switchport
switchport mode access
switchport access vlan 1
no shutdown
exit
interface GigabitEthernet2/1/2
switchport
switchport mode access
switchport access vlan 1
no shutdown
exit
interface GigabitEthernet2/1/3
switchport
switchport mode access
switchport access vlan 1
no shutdown
exit
interface GigabitEthernet2/1/4
switchport
switchport mode access
switchport access vlan 1
no shutdown
exit

//用于连接3850核心
interface Port-channel 31
switchport
switchport access vlan 3001
switchport mode access
exit
//连接3850核心,共4个接口捆绑
interface TenGigabitEthernet1/6/23
switchport access vlan 3001
switchport mode access
channel-group 31 mode on
no shutdown
exit
interface TenGigabitEthernet1/6/24
switchport access vlan 3001
switchport mode access
channel-group 31 mode on
no shutdown
exit
interface TenGigabitEthernet2/6/23
switchport access vlan 3001
switchport mode access
channel-group 31 mode on
no shutdown
exit
interface TenGigabitEthernet2/6/24
switchport access vlan 3001
switchport mode access
channel-group 31 mode on
no shutdown
exit
//连接数据中心3850
interface TenGigabitEthernet1/6/16
switchport mode trunk
no shutdown
exit
interface TenGigabitEthernet2/6/16
switchport mode trunk
no shutdown
exit

//连接深信服VPN
interface GigabitEthernet1/1/13
switchport
switchport mode access
switchport access vlan 19
spanning-tree portfast
no shutdown
exit
interface GigabitEthernet2/1/13
switchport
switchport mode access
switchport access vlan 19
spanning-tree portfast
no shutdown
exit
//连接出口防火墙
interface GigabitEthernet1/1/12
switchport
switchport mode access
switchport access vlan 19
spanning-tree portfast
no shutdown
exit
interface GigabitEthernet2/1/12
switchport
switchport mode access
switchport access vlan 19
spanning-tree portfast
no shutdown
exit
//连接SSL VPN
interface GigabitEthernet1/1/15
switchport
switchport mode access
switchport access vlan 19
spanning-tree portfast
no shutdown
exit
//连接H3C交换机-出口路由器
interface GigabitEthernet1/1/25
switchport
switchport mode access
switchport access vlan 19
spanning-tree portfast
no shutdown
exit
//连接茶山时捷1941路由器
interface GigabitEthernet1/1/26
switchport
switchport mode access
switchport access vlan 19
spanning-tree portfast
no shutdown
exit
//存储服务器连接核心6807
interface Port-channel 8
switchport mode trunk
exit
interface TenGigabitEthernet1/6/8
switchport mode trunk
channel-group 8 mode on
no shutdown
exit
interface TenGigabitEthernet2/6/8
switchport mode trunk
channel-group 8 mode on
no shutdown
exit

配置ACL策略

配置服务器网段ACL策略

ip access-list extended allow_server_3389_acl
permit ip host 192.168.5.109 host 192.168.0.230
permit ip host 192.168.0.230 host 192.168.5.109
deny ip host 192.168.0.230 192.168.5.0 0.0.0.255
deny ip host 192.168.0.230 192.168.0.0 0.0.0.255
permit tcp 192.168.0.0 0.0.0.255 eq 3389 host 192.168.5.113
permit tcp 192.168.0.0 0.0.0.255 eq 22 host 192.168.5.113
permit tcp host 192.168.72.5 eq 3389 any
deny tcp any eq 3389 any
deny tcp any eq 22 any
permit ip any any
exit
interface Vlan19
ip access-group allow_server_3389_acl in
exit
interface Vlan20
ip access-group allow_server_3389_acl in
exit

配置登陆设备ACL策略
ip access-list extended vty_acl
permit tcp host 192.168.13.43 any
permit tcp host 192.168.206.250 any
permit tcp host 192.168.13.168 any
permit tcp host 192.168.13.41 any
permit tcp host 192.168.13.51 any
permit tcp host 192.168.13.28 any
permit tcp host 192.168.13.123 any
permit tcp host 192.168.207.111 any
exit
line vty 0 4
access-class vty_acl in
exit

业务测试IP表与测试人员

服务器IP表

(美宜佳内部自行提供)

测试人员

(美宜佳内部自行安排)

连通性测试

测试名称

测试目标


测试方案

备注说明

连通性测试

网络设备基本连通性测试,包括:
在局域网内,可互访网段设备的连通性测试,
在局域网内,不可互访网段设备的连通性测试。
与Internet的连通性测试。


根据应用系统的连通要求,采用ping 命令进行测试,
——根据设计要求,可互访的不同网段中,从主机ping其他的设备地址,要求能连通,无丢包;
——不能互访的网段,随机选择设备地址,ping应该不连通。
——允许访问Internet的主机设备应能ping通Internet上的合法地址。

根据网络系统中的路由、访问关系VLAN的划分等设计,对网络基本连通性进行测试。

功能测 试

交换机虚网划分(VLAN)功能测试)

内部网络支持全局VLAN划分:相同VLAN的设备连通性测试;
不同VLAN的设备连通性测试。

根据系统的连通要求,采用
ping命令进行测试,
——根据要求,任意两个相同VLAN的主机互ping地址,要求能连通,无丢包;
一一根据要求,任意两个不同VLAN的主机互ping地址,要求不能连通。

根据网络系统中的路由、VLAN划分设计对交换机VLAN功能进行测试。

业务内容测试

(美宜佳内部提供)

割接方案

割接准备

主要目的是为割接做好必要的准备,减少真正割接时一些不必要的工作,节约时间;另外万一在割接失败情况下很容易恢复到原来的网络。其准备工作包括如下:

1、首先考察线路连接情况。测试链路是否正常,然后对链路作标记,另外还要标记连接到对端设备的信息。

2、设备端口配置及连接信息,标识设备位置以及各个端口的用途,并用标签做好标记。

3、原有设备4506核心交换机连接信息表,并用标签做好标记。

4、提前布设好网线跳线与光纤跳线,并打好标签标记

割接思路

本割接方案总体思想是"替换",由于本次割接新增的核心交换机设备主要是取代原有核心的设备,使新的核心交换机6807与原有的3850用户端核心交换机互联。在割接的过程中,将原接入到4506旧核心的网线与光纤接入到新的核心交换机,并且通过设置,使新旧设备可以互相通信。最后完成整个网络系统的割接,将原有的网络设备连接到6807堆叠核心交换机。思路如下:

  1. 6807核心交换机的网线与光纤跳线提前接到接口上并且整理好线路与标签
  2. 原来接入到4506核心交换机的网线与光纤接口依然接在原有的位置上,4506核心交换机的配置不做更改,只断开连接到4506核心交换机对端的接口,万一割接失败可以快速回退。
  3. 割接开始后,先断开所有连接到4506交换机对端接口上网线与光纤接口。
  4. 把连接到6807核心交换机的所有接口接上对应的设备上。
  5. 测试网络连通性,测试通过后,割接成功,完成割接。
  6. 测试失败,在有限的时间内无法解决问题,启用回退方案。
  7. 回退方案,在对应的设备上断开与6807连接的断开,接上连接到原有核心4506连接的端口,完成回退。

割接具体步骤

断开连接到4506核心对端接口的顺序表

序号

目的设备端位置与端口

原4506核心端接口(不需要拔线)

接口描述

开始时间点

1

B4F04-FG1000D-备-Port-A

4506核心原接口不变

数据中心防火墙连接核心6807

2:30:00

2

B4F03-FG1000D-主-Port-A


数据中心防火墙连接核心6807

2:30:00

3

B4F04-FG1000D-备-Port-15


出口防火墙连接核心6807

2:30:00

4

B4F04-FWB-1000D-主-Port-4


WAF防火墙连接核心6807

2:30:00

5

B4F04-WOC-VPN-备-ETH0


服务器核心6807连接WOC VPN

2:30:00

6

B4F03-WOC-VPN-主-ETH0


服务器核心6807连接WOC VPN

2:30:00

7

B4F02-3850核心-主-Te1/0/19


服务器核心6807连接用户端核心3850

2:30:30

8

B4F02-3850核心-主-Te1/0/20


服务器核心6807连接用户端核心3850

2:30:30

9

B4F02-3850核心-备-Te2/0/19


服务器核心6807连接用户端核心3850

2:30:30

10

B4F02-3850核心-备-Te2/0/20


服务器核心6807连接用户端核心3850

2:30:30

11

B4F02-VPN-1000-ETH0


SSL VPN连接核心6807

2:30:30

12

B4F01-H3C-S5048E-G0/0/47


出口路由器交换机连接核心6807-临时

2:30:30

13

B4F02-R0.241-GE0/0


茶山时捷1941路由器连接核心6807-临时

2:30:30

14

B4F20-2960X-Te0/1


存储服务器连接核心6807

2:30:30

15

B4F03-FG1000D-主-MGMT2


出口防火墙-管理口

2:31:00

16

B4F04-FG1000D-备-MGMT2


出口防火墙-管理口

2:31:00

17

B4F03-FG1000D-主-MGMT2


数据中心防火墙-管理口

2:31:00

18

B4F04-FG1000D-备-MGMT2


数据中心防火墙-管理口

2:31:00

19

B4F03-FWB-1000D-主-1


WAF防火墙-管理口

2:31:00

20

B4F04-2960X-备-G2/0/24


2960X-管理口

2:31:00

接上连接到6807核心对端接口的顺序表

序号

目的设备端位置与端口

6807核心端接口(已经提前连接)

接口描述

开始时间点

1

B4F03-FG1000D-主-Port-A

B4F03-6807核心-主-Te1/6/16

数据中心防火墙连接核心6807

2:31:00

2

B4F04-FG1000D-备-Port-A

B4F04-6807核心-备-Te2/6/16

数据中心防火墙连接核心6807

2:31:00

3

B4F04-FWB-1000D-主-Port-4

B4F04-6807核心-主-G1/1/12

WAF防火墙连接核心6807

2:31:00

4

B4F04-FG1000D-备-Port-15

B4F04-6807核心-备-G2/1/12

出口防火墙连接核心6807

2:31:00

5

B4F03-WOC-VPN-主-ETH0

B4F03-6807核心-主-G1/1/13

服务器核心6807连接WOC VPN

2:31:00

6

B4F04-WOC-VPN-备-ETH0

B4F04-6807核心-备-G2/1/13

服务器核心6807连接WOC VPN

2:31:00

7

B4F02-3850核心-主-Te1/0/19

B4F03-6807核心-主-Te1/6/23

服务器核心6807连接用户端核心3850

2:31:30

8

B4F02-3850核心-主-Te1/0/20

B4F03-6807核心-主-Te1/6/24

服务器核心6807连接用户端核心3850

2:31:30

9

B4F02-3850核心-备-Te2/0/19

B4F04-6807核心-备-Te2/6/23

服务器核心6807连接用户端核心3850

2:31:30

10

B4F02-3850核心-备-Te2/0/20

B4F04-6807核心-备-Te2/6/24

服务器核心6807连接用户端核心3850

2:31:30

11

B4F02-VPN-1000-ETH0

B4F03-6807核心-主-G1/1/15

SSL VPN连接核心6807

2:31:30

12

B4F01-H3C-S5048E-G0/0/47

B4F03-6807核心-主-G1/1/25

出口路由器交换机连接核心6807-临时

2:31:30

13

B4F02-R0.241-GE0/0

B4F03-6807核心-主-G1/1/26

茶山时捷1941路由器连接核心6807-临时

2:31:30

14

B4F20-2960X-Te0/1

B4F03-6807核心-主-Te1/6/8

存储服务器连接核心6807

2:31:30

15

B4F03-FG1000D-主-MGMT2

B4F03-6807核心-主-G1/1/1

出口防火墙-管理口

2:32:00

16

B4F04-FG1000D-备-MGMT2

B4F04-6807核心-备-G2/1/1

出口防火墙-管理口

2:32:00

17

B4F03-FG1000D-主-MGMT2

B4F03-6807核心-主-G1/1/2

数据中心防火墙-管理口

2:32:00

18

B4F04-FG1000D-备-MGMT2

B4F04-6807核心-备-G2/1/2

数据中心防火墙-管理口

2:32:00

19

B4F03-FWB-1000D-主-1

B4F03-6807核心-主-G1/1/3

WAF防火墙-管理口

2:32:00

20

B4F04-2960X-备-G2/0/24

B4F04-6807核心-备-G2/1/3

2960X-管理口

2:32:00

回退方案

先断开连接到6807核心目的设备的端口,后连接4506核心目的设备的端口,测试连通性,测试业务,成功回退。

断开连接到6807核心对端的接口

序号

目的设备端位置与端口

原6807核心端接口(已经提前连接)

接口描述

开始时间点

1

B4F04-FG1000D-备-Port-A

B4F04-6807核心-备-Te2/6/16

数据中心防火墙连接核心6807

2:55:00

2

B4F03-FG1000D-主-Port-A

B4F03-6807核心-主-Te1/6/16

数据中心防火墙连接核心6807

2:55:00

3

B4F04-FG1000D-备-Port-15

B4F04-6807核心-备-G2/1/12

出口防火墙连接核心6807

2:55:00

4

B4F04-FWB-1000D-主-Port-4

B4F04-6807核心-主-G1/1/12

WAF防火墙连接核心6807

2:55:00

5

B4F04-WOC-VPN-备-ETH0

B4F04-6807核心-备-G2/1/13

服务器核心6807连接WOC VPN

2:55:00

6

B4F03-WOC-VPN-主-ETH0

B4F03-6807核心-主-G1/1/13

服务器核心6807连接WOC VPN

2:55:00

7

B4F02-3850核心-主-Te1/0/19

B4F03-6807核心-主-Te1/6/23

服务器核心6807连接用户端核心3850

2:55:30

8

B4F02-3850核心-主-Te1/0/20

B4F03-6807核心-主-Te1/6/24

服务器核心6807连接用户端核心3850

2:55:30

9

B4F02-3850核心-备-Te2/0/19

B4F04-6807核心-备-Te2/6/23

服务器核心6807连接用户端核心3850

2:55:30

10

B4F02-3850核心-备-Te2/0/20

B4F04-6807核心-备-Te2/6/24

服务器核心6807连接用户端核心3850

2:55:30

11

B4F02-VPN-1000-ETH0

B4F03-6807核心-主-G1/1/15

SSL VPN连接核心6807

2:55:30

12

B4F01-H3C-S5048E-G0/0/47

B4F03-6807核心-主-G1/1/25

出口路由器交换机连接核心6807-临时

2:55:30

13

B4F02-R0.241-GE0/0

B4F03-6807核心-主-G1/1/26

茶山时捷1941路由器连接核心6807-临时

2:55:30

14

B4F20-2960X-Te0/1

B4F03-6807核心-主-Te1/6/8

存储服务器连接核心6807

2:55:30

15

B4F03-FG1000D-主-MGMT2

B4F03-6807核心-主-G1/1/1

出口防火墙-管理口

2:56:00

16

B4F04-FG1000D-备-MGMT2

B4F04-6807核心-备-G2/1/1

出口防火墙-管理口

2:56:00

17

B4F03-FG1000D-主-MGMT2

B4F03-6807核心-主-G1/1/2

数据中心防火墙-管理口

2:56:00

18

B4F04-FG1000D-备-MGMT2

B4F04-6807核心-备-G2/1/2

数据中心防火墙-管理口

2:56:00

19

B4F03-FWB-1000D-主-1

B4F03-6807核心-主-G1/1/3

WAF防火墙-管理口

2:56:00

20

B4F04-2960X-备-G2/0/24

B4F04-6807核心-备-G2/1/3

2960X-管理口

2:56:00

接上连接到4506核心对端的接口

序号

目的设备端位置与端口

原4506核心端接口(不需要拔线)

接口描述

开始时间点

1

B4F03-FG1000D-主-Port-A

4506核心原接口不变

数据中心防火墙连接核心6807

2:56:00

2

B4F04-FG1000D-备-Port-A


数据中心防火墙连接核心6807

2:56:00

3

B4F04-FWB-1000D-主-Port-4


WAF防火墙连接核心6807

2:56:00

4

B4F04-FG1000D-备-Port-15


出口防火墙连接核心6807

2:56:00

5

B4F03-WOC-VPN-主-ETH0


服务器核心6807连接WOC VPN

2:56:00

6

B4F04-WOC-VPN-备-ETH0


服务器核心6807连接WOC VPN

2:56:00

7

B4F02-3850核心-主-Te1/0/19


服务器核心6807连接用户端核心3850

2:56:30

8

B4F02-3850核心-主-Te1/0/20


服务器核心6807连接用户端核心3850

2:56:30

9

B4F02-3850核心-备-Te2/0/19


服务器核心6807连接用户端核心3850

2:56:30

10

B4F02-3850核心-备-Te2/0/20


服务器核心6807连接用户端核心3850

2:56:30

11

B4F02-VPN-1000-ETH0


SSL VPN连接核心6807

2:56:30

12

B4F01-H3C-S5048E-G0/0/47


出口路由器交换机连接核心6807-临时

2:56:30

13

B4F02-R0.241-GE0/0


茶山时捷1941路由器连接核心6807-临时

2:56:30

14

B4F20-2960X-Te0/1


存储服务器连接核心6807

2:56:30

15

B4F03-FG1000D-主-MGMT2


出口防火墙-管理口

2:57:00

16

B4F04-FG1000D-备-MGMT2


出口防火墙-管理口

2:57:00

17

B4F03-FG1000D-主-MGMT2


数据中心防火墙-管理口

2:57:00

18

B4F04-FG1000D-备-MGMT2


数据中心防火墙-管理口

2:57:00

19

B4F03-FWB-1000D-主-1


WAF防火墙-管理口

2:57:00

20

B4F04-2960X-备-G2/0/24


2960X-管理口

2:57:00

  • 无标签

0 评论

你还没有登录。你所做的任何更改会将作者标记为匿名用户。 如果你已经拥有帐户,请登录