1、在核心交换机不做堆叠的情况下防火墙热备的案例 一、 需求分析 数据中心建设高可用的网络架构,但是考虑到成本和运维,想选择一种经济实惠但是稳定可靠的架构 二、 设计思路 1.为了节约公网IP地址所以在防火墙接口上面配置IP地址为内网地址,同时将公网IP地址设置成为VRRP组中的虚拟地址 2.在防火墙A和防火墙B上使用双链路做聚合,再将聚合端口配置好IP地址加入到HRP安全域中并指为HRP心跳检测端口 3.核心交换机A和核心交换机B使用多链路做聚合,再将聚合端口配置为trunk属性透传业务vlan,在核心交换机A上配置业务VL
2、AN的网关并为VRRP组中的master 在核心交换机B上配置vlan的网关并作为VRRP组中的slave同时交换机上的DHCP分配都采用全局地址池的方式并指定虚拟IP地址为业务网关。 4.核心交换机与接入交换机之间采用多链路互联,并部署MSTP保证二层链路的冗余(如果考虑到业务的负载均衡可以将不同的vlan划分到不同的mstp实例中去,这里就按单实例部署) 5. 正常情况下流量由核心交换机A和防火墙A做处理,当防火墙故障或者核心交换机故障都会触发主备的切换 6. 防火墙A上通过配置IP-link监控外网链路或者端口状态同时与HRP主备进行联动(防火墙上的业务端口down了
3、或者失效的情况触发HRP主备切换) 7. 核心交换机A上通过配置vrrp组与上行端口进行联动(一旦与防火墙互联的端口down掉或者失效将会触发vrrp主备切换) 三、设计拓扑 四、 实验拓扑 五、 主备切换测试 1.正常情况下的流量走向 2.主防火墙故障的情况 内网一台主机ping外网的测试(掉了几个包,真实情况收敛速度会快点) 备防火墙替代主防火墙的业务,快速会话同步 防火墙B上的日志(主防火墙down掉,备防火墙承担业务) ----------------------------------------------
4、 %2015-12-23 14:24:27 FW-B %%01IFNET/4/LINK_STATE(l): Line protocol on interface G igabitEthernet0/0/2 has turned into DOWN state. %2015-12-23 14:24:25 FW-B %%01VRRP/4/STATEWARNING(l): Interface: GigabitEthernet0 /0/0, Vir
5、tual Router 1 : BACKUP changed to MASTER! %2015-12-23 14:24:25 FW-B %%01VRRP/4/STATEWARNING(l): Interface: GigabitEthernet0 /0/1, Virtual Router 2 : BACKUP changed to MASTER! %2015-12-23 14:24:25 FW-B %%01VGMP/4/STATE(l): Virtual Router Management Group SL AVE : SLAVE --> MASTER --------------
6、
防火墙B上的HRP状态
------------------------------------------------------------------------------------------------------------------------
HRP_M
7、he firewall's config state is: MASTER Current state of virtual routers configured as slave: GigabitEthernet0/0/1 vrid 2 : master (peer down) GigabitEthernet0/0/0 vrid 1 : master (peer down) -------------------------------------------------------------------
8、
防火墙上B的会话表(实时同步防火墙A上的会话表,保证业务的连续性)
----------------------------------------------------------------------------------------------------------------------
HRP_M
9、 5 icmp VPN:public --> public 192.168.3.253:30527[222.222.222.2:2092]-->222.222.2 22.1:2048 icmp VPN:public --> public 192.168.3.253:30783[222.222.222.2:2093]-->222.222.2 22.1:2048 icmp VPN:public --> public 192.168.3.253:31039[222.222.222.2:2094]-->222.222.2 22.1:2048 icmp VPN:pu
10、blic --> public 192.168.3.253:31295[222.222.222.2:2095]-->222.222.2 22.1:2048 icmp VPN:public --> public 192.168.3.253:31551[222.222.222.2:2096]-->222.222.2 22.1:2048 ------------------------------------------------------------------------------------------------------------------------ 核心
11、交换A和B上的vrrp主备情况(因为和防火墙A的互联端口联动,如果防火墙A的状态异常会触发核心交换机VRRP组的切换)
--------------------------------------------------------------------------------------------------------------------------------
12、 1 Backup Vlanif2 Normal 10.0.0.1 3 Backup Vlanif3 Normal 192.168.3.254 4 Backup Vlanif4 Normal 192.168.4.254 ----------------------------------
13、
Total:3 Master:0 Backup:3 Non-active:0
14、 Normal 10.0.0.1 3 Master Vlanif3 Normal 192.168.3.254 4 Master Vlanif4 Normal 192.168.4.254 ---------------------------------------------------------------- Total:3 ---------------------------------------------
15、 此时的流量走向情况 3. 主核心交换机故障的情况 内网主机ping外网测试的情况(由于核心交换机A故障会触发STP的计算,所以收敛速度相比交换机stack和css的速度是要慢点,真实情况会在15秒左右) 核心交换机B上的vrrp情况(由于核心交换机A异常,触发核心交换机B抢占VRRP组的master) ---------------------------------------
16、
17、 10.0.0.1 3 Master Vlanif3 Normal 192.168.3.254 4 Master Vlanif4 Normal 192.168.4.254 ---------------------------------------------------------------- Total:3 Master:3 Backup:0 Non-active:0 -----------------
18、
防火墙A和防火墙B上的HRP主备情况
------------------------------------------------------------------------------------------------------------------------------
HRP_M
19、01IFNET/4/LINK_STATE(l): Line protocol on interface Gi gabitEthernet0/0/1 has turned into DOWN state. 2015-12-23 14:46:28 FW-A %%01VRRP/4/STATEWARNING(l): Interface: GigabitEthernet0/ 0/1, Virtual Router 2 : MASTER changed to INITIALIZE! 2015-12-23 14:46:28 FW-A %%01VGMP/4/STATE(l): Virtual Ro
20、uter Management Group MAS TER : MASTER --> MASTER_TO_SLAVE 2015-12-23 14:46:28 FW-A %%01VGMP/4/STATE(l): Virtual Router Management Group MAS TER : MASTER_TO_SLAVE --> SLAVE 2015-12-23 14:46:28 FW-A %%01VRRP/4/STATEWARNING(l): Interface: GigabitEthernet0/ 0/0, Virtual Router 1 : MASTER cha
21、nged to BACKUP!
HRP_S
22、slave
HRP_M
23、 这种情况下流量的走向情况 4. 主链路中断的情况 内网主机ping外网地址时候的情况(让主链路中断的情况下,会触发防火墙的hrp主备切换,但是不会触发核心交换机的vrrp主备切换) 防火墙A和防火墙B上的HRP主备情况 -------------------------------------------------------
24、
HRP_S
25、Ethernet0/0/0 vrid 1 : initialize (down)
HRP_S
26、0/0/0 vrid 1 : master (peer down)
核心交换机A和核心交换机B的vrrp主备情况
---------------------------------------------------------------------------------------------------------------------------------
27、 1 Master Vlanif2 Normal 10.0.0.1 3 Master Vlanif3 Normal 192.168.3.254 4 Master Vlanif4 Normal 192.168.4.254 ------------------------
28、
Total:3 Master:3 Backup:0 Non-active:0
29、 Normal 10.0.0.1 3 Backup Vlanif3 Normal 192.168.3.254 4 Backup Vlanif4 Normal 192.168.4.254 ---------------------------------------------------------------- Total:3 Master:0 Backup:3 Non-active:0 <
30、Core-B>
---------------------------------------------------------------------------------------------------------------------------------
这种情况下的流量走向
六、设备配置
1. 防火墙A配置
HRP_M
31、81520e0 active region-configuration # interface GigabitEthernet0/0/0 alias GE0/MGMT ip address 172.31.0.1 255.255.255.0 vrrp vrid 1 virtual-ip 222.222.222.2 255.255.255.0 master vrrp virtual-mac enable # interface GigabitEthernet0/0/1 ip address 10.0.0.2 255.255.255.0 vrrp vrid 2 v
32、irtual-ip 10.0.0.254 master vrrp virtual-mac enable # interface GigabitEthernet0/0/2 ip address 1.1.1.1 255.255.255.252 # interface GigabitEthernet0/0/3 # interface GigabitEthernet0/0/4 # interface GigabitEthernet0/0/5 # interface GigabitEthernet0/0/6 # interface GigabitEthernet0/0/7
33、 # interface GigabitEthernet0/0/8 # interface NULL0 alias NULL0 # firewall zone local set priority 100 # firewall zone trust set priority 85 add interface GigabitEthernet0/0/1 # firewall zone untrust set priority 5 add interface GigabitEthernet0/0/0 # firewall zone dmz set
34、priority 50 # firewall zone name hrp set priority 95 add interface GigabitEthernet0/0/2 # aaa local-user admin password cipher %$%$wJn>:F9}OK>IC%K%pW8"1md[%$%$ local-user admin service-type web terminal telnet local-user admin level 15 authentication-scheme default # authorizatio
35、n-scheme default # accounting-scheme default # domain default # # nqa-jitter tag-version 1 # ip route-static 192.168.3.0 255.255.255.0 10.0.0.1 ip route-static 192.168.4.0 255.255.255.0 10.0.0.1 # banner enable # user-interface con 0 authentication-mode none user-interface
36、 vty 0 4 authentication-mode none protocol inbound all # slb # right-manager server-group # sysname FW-A # l2tp domain suffix-separator @ # hrp mirror session enable hrp enable hrp interface GigabitEthernet0/0/2 # firewall packet-filter default permit interzone local trust d
37、irection inbound firewall packet-filter default permit interzone local trust direction outbound firewall packet-filter default permit interzone local untrust direction inbound firewall packet-filter default permit interzone local untrust direction outbound firewall packet-filter default perm
38、it interzone local dmz direction inbound firewall packet-filter default permit interzone local dmz direction outbound firewall packet-filter default permit interzone local hrp direction inbound firewall packet-filter default permit interzone local hrp direction outbound firewall packet-filte
39、r default permit interzone trust untrust direction inbound firewall packet-filter default permit interzone trust untrust direction outbound firewall packet-filter default permit interzone trust dmz direction inbound firewall packet-filter default permit interzone trust dmz direction outbound
40、 firewall packet-filter default permit interzone hrp trust direction inbound firewall packet-filter default permit interzone hrp trust direction outbound firewall packet-filter default permit interzone dmz untrust direction inbound firewall packet-filter default permit interzone dmz untrust di
41、rection outbound firewall packet-filter default permit interzone hrp untrust direction inbound firewall packet-filter default permit interzone hrp untrust direction outbound firewall packet-filter default permit interzone hrp dmz direction inbound firewall packet-filter default permit interz
42、one hrp dmz direction outbound # nat address-group 1 222.222.222.2 222.222.222.2 # ip df-unreachables enable # firewall ipv6 session link-state check firewall ipv6 statistic system enable # dns resolve # firewall statistic system enable # pki ocsp response cache refresh interval
43、0 pki ocsp response cache number 0 # undo dns proxy # license-server domain # web-manager enable # nat-policy interzone trust untrust outbound policy 0 action source-nat policy source 192.168.3.0 mask 24 policy source 192.168.4.0 mask 24 address-group 1 # return HRP_M<
44、FW-A>
2. 防火墙B配置
HRP_S
45、2 255.255.255.0 slave vrrp virtual-mac enable # interface GigabitEthernet0/0/1 ip address 10.0.0.3 255.255.255.0 vrrp vrid 2 virtual-ip 10.0.0.254 slave vrrp virtual-mac enable # interface GigabitEthernet0/0/2 ip address 1.1.1.2 255.255.255.252 # interface GigabitEthernet0/0/3 # i
46、nterface GigabitEthernet0/0/4 # interface GigabitEthernet0/0/5 # interface GigabitEthernet0/0/6 # interface GigabitEthernet0/0/7 # interface GigabitEthernet0/0/8 # interface NULL0 alias NULL0 # firewall zone local set priority 100 # firewall zone trust set priority 85 add inter
47、face GigabitEthernet0/0/1 # firewall zone untrust set priority 5 add interface GigabitEthernet0/0/0 # firewall zone dmz set priority 50 # firewall zone name hrp set priority 95 add interface GigabitEthernet0/0/2 # aaa local-user admin password cipher %$%$e~3G@/}FG"N@E]=,y}OG1cZQ%
48、 local-user admin service-type web terminal telnet local-user admin level 15 authentication-scheme default # authorization-scheme default # accounting-scheme default # domain default # # nqa-jitter tag-version 1 # ip route-static 192.168.3.0 255.255.255.0 10.0.0.1 ip
49、route-static 192.168.4.0 255.255.255.0 10.0.0.1 # banner enable # user-interface con 0 authentication-mode none user-interface vty 0 4 authentication-mode none protocol inbound all # slb # right-manager server-group # sysname FW-B # l2tp domain suffix-separator @ # hrp mirror session enable hrp enable hrp interface GigabitEthernet0/0/2 # firewall packet-filter default permit interzone local trust direction inbound firewall packet-filter default permit interzone local trust direction outbound firewall packet-filter default permit interzone loca






