收藏 分销(赏)

银行网络应急方案.doc

上传人:胜**** 文档编号:663715 上传时间:2024-01-25 格式:DOC 页数:86 大小:186KB 下载积分:11 金币
下载 相关 举报
银行网络应急方案.doc_第1页
第1页 / 共86页
银行网络应急方案.doc_第2页
第2页 / 共86页


点击查看更多>>
资源描述
银行网络应急方案 86 2020年4月19日 文档仅供参考 银行网络应急方案 XX股份有限公司 网络与安全服务部 2月 目录 一、 银行网络结构拓扑 3 二、 骨干网通信故障 3 1. 故障处理人员 3 2. 电信、联通网络通信故障 3 3. 通信故障恢复 3 4. 到总行路由器故障 4 5. 路由器故障处理 4 三、 核心交换机故障应急 5 1. 一台4506交换机故障应急 5 2. 当核心交换同时瘫痪在20分钟内保证业务正常运作 7 四、 第三方外联区网络应急 19 1. 第三方业务银联区网络应急 19 2. 其它第三方业务区网络应急 46 五、 联系方式: 56 一、 银行网络结构拓扑 二、 骨干网通信故障 1. 故障处理人员 参与人:XX、XX、XX 2. 电信、联通网络通信故障 根据到总行的两台cisco 7206路由器的日志以及实际登陆设备使用show int ATM4/0.1 、ping对端地址、show ip route、show log,查看上述相关设备和线路是否有重复重起、误码率高、异常路由、错误连接等情况即可确认故障。 3. 通信故障恢复 恢复步骤: 1)重启故障新路相连路由器,看是否能够自动恢复 2) 断电重起无法解决故障的,停止使用故障设备和线路,防止其影响网络其它部分。 3) 如系线路故障通知各有关方面(逐项对照处理): ● 如为中国电信线路故障,向31000000 报修,并通知分行办公室相关人员。 ● 如为中国联通线路故障,向XXXX 报修,并通知分行办公室相关人员。 4. 到总行路由器故障 查看日志,检查设备故障前的异常日志信息;登陆路由器使用show log,show ip int brie , show process cpu his , show ip route , ping对端地址等命令来确认故障。 5. 路由器故障处理 一旦发现到总行7206路由器故障可按以下步骤来处理: ●联系XX公司,并启动原厂商保修服务备件更换程序。 ●因为两台7206路由器是互为备份的,一台发生故障不影响实际业务,不调用库房备件和集成商备件更换,等待原厂商备件到达。 ● 对于能够在线插拔的接口模块、有standby 的引擎和电源,优先使用在线更换方式。在线更换的具体操作流程如下: a) 用笔记本电脑连接在网络设备的Console 上,启动Console 监控和记录; b) 准备好存档的系统配置,备用。如有可能,同时保存当前系统配置; c) 对故障模块上连接的线缆做好标记,小心拔下; d) 做好安全接地,拔下故障模块; e) 检查设备和模块状态,确认是否影响整个设备或其它模块正常运行,standby 模块是否正常接管; f) 做好安全接地,插上更换的备件模块; g) 检查设备和模块状态,确认是否能够正常识别新模块,是否影响其它模块运行; h) 按原样插上线缆; i) 检查线缆连接状态正常; j) 确认备件更换成功。 l 对于机箱、不能在线插拔的接口模块、或者没有standby 的引擎和电源,采用下电更换方式。下电更换的具体操作流程如下: a) 准备好存档的系统配置,备用。如有可能,同时保存当前系统配置; b) 准备好原先使用的系统软件,备用; c) 故障设备下电; d) 对需要拔除的线缆做好标记,小心拔下。如果机箱或引擎更换,需拔除所有连接线缆; e) 更换备件; f) 用笔记本电脑连接在网络设备的Console 上,启动Console 监控和记录; g) 设备上电; h) 检查系统自检情况,确认无硬件故障; i) 安装系统软件; j) 恢复系统配置; k) 冷启动,确认软硬件正常工作; l) 按原样插上其它线缆; m) 检查线缆连接状态正常; n) 确认备件更换成功。 三、 核心交换机故障应急 1. 一台4506交换机故障应急 查看日志,检查设备故障前的异常日志信息;登陆交换机使用show log,show ip int brie , show process cpu his , show ip route , ping对端地址,show vlan brie , show vtp stat , show process mem , show modul , show diag , show ip eigrp nei , show cdp nei等一系列命令来查找、确认故障。 因为两台4506核心交换机完全是热备的双机,因此一台发生故障并不影响业务运行。对于配置问题要制定正确的更改配置脚本,备份当前配置以后实施更改;对于线路问题的要制作新网线,替换故障的网线;对于硬件问题要练习XX公司,申请硬件故障维修。 对于能够在线插拔的接口模块、有standby 的引擎和电源,优先使用在线更换方式。在线更换的具体操作流程如下: a) 用笔记本电脑连接在网络设备的Console 上,启动Console 监控和记录; b) 准备好存档的系统配置,备用。如有可能,同时保存当前系统配置; c) 对故障模块上连接的线缆做好标记,小心拔下; d) 做好安全接地,拔下故障模块; e) 检查设备和模块状态,确认是否影响整个设备或其它模块正常运行,standby 模块是否正常接管; f) 做好安全接地,插上更换的备件模块; g) 检查设备和模块状态,确认是否能够正常识别新模块,是否影响其它模块运行; h) 按原样插上线缆; i) 检查线缆连接状态正常; j) 确认备件更换成功。 l 对于机箱、不能在线插拔的接口模块、或者没有standby 的引擎和电源,采用下电更换方式。下电更换的具体操作流程如下: a) 准备好存档的系统配置,备用。如有可能,同时保存当前系统配置; b) 准备好原先使用的系统软件,备用; c) 故障设备下电; d) 对需要拔除的线缆做好标记,小心拔下。如果机箱或引擎更换,需拔除所有连接线缆; e) 更换备件; f) 用笔记本电脑连接在网络设备的Console 上,启动Console 监控和记录; g) 设备上电; h) 检查系统自检情况,确认无硬件故障; i) 安装系统软件; j) 恢复系统配置; k) 冷启动,确认软硬件正常工作; l) 对于交换机要将VTP 设置为Client 模式,首先连接上行线缆,确认VTP 复制正确; m) 按原样插上其它线缆; n) 检查线缆连接状态正常; o) 确认备件更换成功。 2. 当核心交换同时瘫痪在20分钟内保证业务正常运作 现有2台备用的cisco3550,在两台核心cisco4506同事瘫痪后,将其作为核心交换来保证业务的正常运作,同时保持原有的网络拓扑及网络核心的安全策略和qos。 3550核心交换配置定义 设备命名 hostname production 设备软件版本 使用支持动态路由协议的IOS:c3550-i5k2l2q3-mz.121-13.EA1a.bin Vlan定义 1 default active Fa0/1, Fa0/2, Fa0/35, Fa0/36 Fa0/37, Fa0/38, Fa0/39, Fa0/40 Fa0/41, Fa0/42, Fa0/43, Fa0/44 Fa0/45, Fa0/46, Fa0/47, Fa0/48 2 vlan0002 active Fa0/10, Fa0/21, Fa0/25, Fa0/34 Gi0/1, Gi0/2 3 vlan0003 active Fa0/5, Fa0/8, Fa0/11, Fa0/12 Fa0/17, Fa0/19, Fa0/20, Fa0/22 Fa0/28, Fa0/29, Fa0/30, Fa0/32 4 vlan0004 active Fa0/13, Fa0/18, Fa0/27 5 vlan0005 active Fa0/7 6 vlan0006 active 10 vlan0010 active Fa0/4, Fa0/6, Fa0/14 20 vlan0020 active 30 vlan0030 active 40 vlan0040 active 50 VLAN0050 active 60 VLAN0060 active 63 vlan0063 active 128 vlan0128 active Fa0/3, Fa0/24, Fa0/26, Fa0/31 Fa0/33 195 vlan195 active Fa0/16, Fa0/23 196 vlan196 active 255 VLAN0255 active Fa0/9, Fa0/15 Ip地址分配及hsrp interface Vlan1 no ip address no ip redirects shutdown standby 10 priority 100 standby 10 preempt ! interface Vlan2 ip address 10.20.191.2 255.255.255.0 ip access-group 101 in no ip redirects standby 20 ip 10.20.191.1 standby 20 priority 150 standby 20 preempt ! interface Vlan3 ip address 10.20.189.2 255.255.255.0 ip access-group 101 in no ip redirects standby 30 ip 10.20.189.1 standby 30 priority 150 standby 30 preempt ! interface Vlan4 ip address 10.20.187.66 255.255.255.192 no ip redirects standby 40 ip 10.20.187.65 standby 40 priority 150 standby 40 preempt ! interface Vlan5 ip address 10.20.187.2 255.255.255.192 no ip redirects standby 50 ip 10.20.187.1 standby 50 priority 150 standby 50 preempt ! interface Vlan6 no ip address no ip redirects shutdown standby 60 ip 10.20.185.3 standby 60 priority 150 standby 60 preempt ! interface Vlan10 ip address 10.20.0.2 255.255.255.0 ip access-group 103 in no ip redirects standby 100 ip 10.20.0.1 standby 100 timers 5 15 standby 100 priority 200 standby 100 preempt standby 100 track Vlan10 50 ! interface Vlan20 no ip address no ip redirects standby 110 timers 5 15 standby 110 priority 150 standby 110 preempt standby 110 track Vlan20 50 ! interface Vlan30 no ip address ip access-group 101 in no ip redirects shutdown standby 120 ip 10.20.198.100 standby 120 timers 5 15 standby 120 priority 200 standby 120 preempt standby 120 track Vlan30 50 ! interface Vlan40 no ip address ip access-group 101 in no ip redirects shutdown standby 130 ip 10.20.197.100 standby 130 timers 5 15 standby 130 priority 150 standby 130 preempt standby 130 track Vlan40 50 ! interface Vlan50 ip address 10.20.1.2 255.255.255.0 ip helper-address 10.20.0.10 no ip redirects standby 150 ip 10.20.1.1 standby 150 timers 5 15 standby 150 priority 150 standby 150 preempt standby 150 track Vlan150 ! interface Vlan63 no ip address no ip redirects ! interface Vlan128 ip address 10.20.128.4 255.255.255.0 ip access-group 101 in no ip redirects standby 160 ip 10.20.128.8 standby 160 timers 5 15 standby 160 priority 150 standby 160 preempt standby 160 track Vlan128 50 ! interface Vlan150 no ip address shutdown ! interface Vlan195 ip address 10.20.195.2 255.255.255.0 no ip redirects standby 195 ip 10.20.195.1 standby 195 priority 150 standby 195 preempt ! interface Vlan196 no ip address no ip redirects shutdown standby 196 ip 10.20.196.1 standby 196 priority 100 standby 196 preempt ! interface Vlan255 ip address 10.20.255.2 255.255.255.0 no ip redirects standby 255 ip 10.20.255.1 standby 255 priority 200 standby 255 preempt 路由策略 router eigrp 20 redistribute static network 10.20.0.0 0.0.255.255 no auto-summary no eigrp log-neighbor-changes ip route 0.0.0.0 0.0.0.0 10.20.191.18 ip route 10.20.9.1 255.255.255.255 10.20.191.18 ip route 10.20.9.111 255.255.255.255 10.20.191.18 ip route 10.20.184.0 255.255.255.0 10.20.191.18 ip route 10.20.186.0 255.255.255.0 10.20.191.18 ip route 10.20.186.245 255.255.255.255 10.20.191.18 ip route 10.20.210.3 255.255.255.255 10.20.255.15 ip route 10.20.210.4 255.255.255.255 10.20.255.16 ip route 10.20.210.5 255.255.255.255 10.20.255.17 ip route 10.20.210.11 255.255.255.255 10.20.191.18 ip route 10.20.210.12 255.255.255.255 10.20.191.18 ip route 10.20.210.13 255.255.255.255 10.20.191.18 ip route 10.20.210.14 255.255.255.255 10.20.191.18 interface Vlan2 ip address 10.20.191.2 255.255.255.0 ip access-group 101 in interface Vlan3 ip address 10.20.189.2 255.255.255.0 ip access-group 101 in interface Vlan30 no ip address ip access-group 101 in interface Vlan40 no ip address ip access-group 101 in interface Vlan128 ip address 10.20.128.4 255.255.255.0 ip access-group 101 in access-list 101 permit ip host 10.20.0.240 host 10.20.186.246 access-list 101 permit ip host 10.20.0.240 host 10.20.186.245 access-list 101 deny ip 192.168.0.0 0.0.255.255 10.0.128.0 0.255.63.255 access-list 101 deny ip 192.168.0.0 0.0.255.255 172.16.0.0 0.0.255.255 access-list 101 deny ip 192.168.0.0 0.0.255.255 10.0.192.0 0.255.63.255 access-list 101 deny ip 10.0.0.0 0.255.63.255 10.0.128.0 0.255.63.255 access-list 101 deny ip 10.0.0.0 0.255.63.255 172.16.0.0 0.0.255.255 access-list 101 deny ip 10.0.0.0 0.255.63.255 10.0.192.0 0.255.63.255 access-list 101 permit ip any any interface Vlan10 ip address 10.20.0.2 255.255.255.0 ip access-group 103 in access-list 103 permit ip host 10.20.0.245 host 10.20.184.10 access-list 103 permit ip host 10.20.0.240 host 10.20.184.10 access-list 103 permit ip host 10.20.0.240 host 10.20.186.246 access-list 103 permit ip host 10.20.0.240 host 10.20.186.245 access-list 103 permit ip host 10.20.0.245 host 10.20.184.18 access-list 103 permit ip host 10.20.0.240 host 10.20.184.18 access-list 103 permit ip host 10.20.0.245 host 10.20.184.12 access-list 103 permit ip host 10.20.0.240 host 10.20.184.5 access-list 103 permit ip host 10.20.0.21 host 10.20.184.20 access-list 103 permit ip 10.20.0.0 0.0.0.255 host 10.20.184.3 access-list 103 permit ip 10.20.0.0 0.0.0.255 host 10.20.184.4 access-list 103 permit ip 10.20.0.0 0.0.0.255 host 10.20.184.7 access-list 103 permit ip 10.20.0.0 0.0.0.255 host 10.20.184.30 access-list 103 permit ip 10.20.0.0 0.0.0.255 host 10.20.184.13 access-list 103 permit ip 10.20.0.0 0.0.0.255 host 10.20.184.15 access-list 103 permit ip 10.20.0.0 0.0.0.255 host 10.20.184.16 access-list 103 permit ip 10.20.0.0 0.0.0.255 host 10.20.184.20 access-list 103 permit ip 10.20.2.0 0.0.0.255 host 10.20.184.13 access-list 103 permit ip 10.20.3.0 0.0.0.255 host 10.20.184.13 access-list 103 permit ip 10.20.0.0 0.0.0.255 host 10.20.184.17 access-list 103 permit ip host 10.20.0.245 host 10.20.184.19 access-list 103 permit ip host 10.20.0.240 host 10.20.184.19 access-list 103 deny ip 192.168.0.0 0.0.255.255 10.0.128.0 0.255.63.255 access-list 103 deny ip 192.168.0.0 0.0.255.255 172.16.0.0 0.0.255.255 access-list 103 deny ip 192.168.0.0 0.0.255.255 10.0.192.0 0.255.63.255 access-list 103 deny ip 10.0.0.0 0.255.63.255 10.0.128.0 0.255.63.255 access-list 103 deny ip 10.0.0.0 0.255.63.255 172.16.0.0 0.0.255.255 access-list 103 deny ip 10.0.0.0 0.255.63.255 10.0.192.0 0.255.63.255 access-list 103 permit ip any any Qos 作为核心交换机无需在此配置qos 安全策略 aaa new-model aaa authentication login spdb-acs group tacacs+ enable aaa accounting exec spdb-acs start-stop group tacacs+ aaa accounting commands 0 spdb-acs start-stop group tacacs+ aaa accounting commands 1 spdb-acs start-stop group tacacs+ aaa accounting commands 2 spdb-acs start-stop group tacacs+ aaa accounting commands 3 spdb-acs start-stop group tacacs+ aaa accounting commands 4 spdb-acs start-stop group tacacs+ aaa accounting commands 5 spdb-acs start-stop group tacacs+ aaa accounting commands 6 spdb-acs start-stop group tacacs+ aaa accounting commands 7 spdb-acs start-stop group tacacs+ aaa accounting commands 8 spdb-acs start-stop group tacacs+ aaa accounting commands 9 spdb-acs start-stop group tacacs+ aaa accounting commands 10 spdb-acs start-stop group tacacs+ aaa accounting commands 11 spdb-acs start-stop group tacacs+ aaa accounting commands 12 spdb-acs start-stop group tacacs+ aaa accounting commands 13 spdb-acs start-stop group tacacs+ aaa accounting commands 14 spdb-acs start-stop group tacacs+ aaa accounting commands 15 spdb-acs start-stop group tacacs+ ip tacacs source-interface Loopback0 tacacs-server host 10.100.64.57 tacacs-server host 10.100.64.54 tacacs-server key s9y8 logging trap debugging logging source-interface Loopback0 logging 10.20.189.24 logging 10.100.64.65 line vty 0 4 exec-timeout 5 0 accounting commands 0 spdb-acs accounting commands 1 spdb-acs accounting commands 2 spdb-acs accounting commands 3 spdb-acs accounting commands 4 spdb-acs accounting commands 5 spdb-acs accounting commands 6 spdb-acs accounting commands 7 spdb-acs accounting commands 8 spdb-acs accounting commands 9 spdb-acs accounting commands 10 spdb-acs accounting commands 11 spdb-acs accounting commands 12 spdb-acs accounting commands 13 spdb-acs accounting commands 14 spdb-acs accounting commands 15 spdb-acs accounting exec spdb-acs login authentication spdb-acs 网管配置 access-list 10 permit 10.100.64.68 access-list 10 permit 10.100.64.69 access-list 10 permit 10.100.64.66 access-list 10 permit 10.100.64.67 access-list 10 permit 10.100.64.65 snmp-server community public RO snmp-server community read RO 10 snmp-server trap-source Loopback0 snmp-server enable traps snmp authentication warmstart snmp-server enable traps config snmp-server enable traps entity snmp-server enable traps rtr snmp-server enable traps vtp snmp-server host 10.20.189.24 public snmp-server host 10.100.64.65 read 其它配置 service timestamps debug datetime localtime show-timezone service timestamps log datetime localtime show-timezone service password-encryption no ip domain-lookup ip cef load-sharing algorithm original clock timezone BJT 8 ntp source Loopback0 ntp server 10.100.64.70 monitor session 1 source vlan 1 , 10 , 192 rx monitor session 1 destination interface Fa0/5 网络实施 前期准备 一、8条交叉线(2条做trunk,6条连向楼层交换机) 二、将楼层交换机的fa0/47和48口空出来,并做好相应的配置 实施步骤 第一步:两台3550上架并加电启用(预计3分钟) 第二步:将连接hp小机的光纤接口连到3550上(预计1分钟) cisco4506主的gigabit1/1对应3550主的gigabit0/1 cisco4506主的gigabit2/2对应3550主的gigabit0/2 cisco4506备的gigabit1/1对应3550主的gigabit0/1 cisco4506备的gigabit2/2对应3550主的gigabit0/2 第三步:将现成的交叉线在3550主备之间互连做ether-channel(预计1分钟) 3550主的fa0/47对应3550备的fa0/47 3550主的fa0/48对应3550备的fa0/48 第四步:将连在cisco4506上所有的电口都挪向3550上(预计5分钟) cisco4506主的fa2/3对应3550主的fa0/3 cisco4506主的fa2/4对应3550主的fa0/4 以此类推 cisco4506主的fa2/34对应3550主的fa0/34 cisco4506备的fa2/3对应3550备的fa0/3 cisco4506备的fa2/4对应3550备的fa0/4 以此类推 cisco4506备的fa2/34对应3550备的fa0/34 第五步:3台楼层交换机与3550之间的互连(预计3分钟) 3550主的fa0/41对应255.15的fa0/47 3550主的fa0/43对应255.16的fa0/47 3550主的fa0/45对应255.17的fa0/47 3550备的fa0/41对应25
展开阅读全文

开通  VIP会员、SVIP会员  优惠大
下载10份以上建议开通VIP会员
下载20份以上建议开通SVIP会员


开通VIP      成为共赢上传

当前位置:首页 > 应用文书 > 其他

移动网页_全站_页脚广告1

关于我们      便捷服务       自信AI       AI导航        抽奖活动

©2010-2025 宁波自信网络信息技术有限公司  版权所有

客服电话:4009-655-100  投诉/维权电话:18658249818

gongan.png浙公网安备33021202000488号   

icp.png浙ICP备2021020529号-1  |  浙B2-20240490  

关注我们 :微信公众号    抖音    微博    LOFTER 

客服