首页 » 网站建设 » centosphpsqlsrv技巧_Centos8 安装frr软件实现SRV6 BE

centosphpsqlsrv技巧_Centos8 安装frr软件实现SRV6 BE

duote123 2024-12-03 0

扫一扫用手机浏览

文章目录 [+]

解释:

PE1 、P、PE2 互联地址运行IPv6,利用动态路由ospf 使其lo 接口互通 PE1、PE2 、P运行SRv6 设置PE1 PE2 设备配置End.DX4终极实现CE1和CE4 IPv4地址互访

centosphpsqlsrv技巧_Centos8 安装frr软件实现SRV6 BE centosphpsqlsrv技巧_Centos8 安装frr软件实现SRV6 BE 网站建设

设备互联配置

配置设备之间的IPv6地址,IPv4略

centosphpsqlsrv技巧_Centos8 安装frr软件实现SRV6 BE centosphpsqlsrv技巧_Centos8 安装frr软件实现SRV6 BE 网站建设
(图片来自网络侵删)

PE1配置

PE1 配置:TYPE=EthernetPROXY_METHOD=noneBROWSER_ONLY=noIPV6INIT=yesIPV6_AUTOCONF=noIPV6_DEFROUTE=yesIPV6_FAILURE_FATAL=noIPV6_ADDR_GEN_MODE=stable-privacyNAME=ens4DEVICE=ens4ONBOOT=yesIPV6ADDR=2001:12::1/64 //和P设备互联接口地址

P配置

//ens4网卡和PE1设备互联地址[root@P network-scripts]# cat ifcfg-ens4 TYPE=EthernetPROXY_METHOD=noneBROWSER_ONLY=noIPV6INIT=yesIPV6_AUTOCONF=noIPV6_DEFROUTE=yesIPV6_FAILURE_FATAL=noIPV6_ADDR_GEN_MODE=stable-privacyNAME=ens4DEVICE=ens4ONBOOT=yesIPV6ADDR=2001:12::2/64//ens5网卡和PE1设备互联地址[root@P network-scripts]# cat ifcfg-ens5TYPE=EthernetPROXY_METHOD=noneBROWSER_ONLY=noIPV6INIT=yesIPV6_AUTOCONF=noIPV6_DEFROUTE=yesIPV6_FAILURE_FATAL=noIPV6_ADDR_GEN_MODE=stable-privacyNAME=ens5

PE2配置

PE2 配置:TYPE=EthernetPROXY_METHOD=noneBROWSER_ONLY=noIPV6INIT=yesIPV6_AUTOCONF=noIPV6_DEFROUTE=yesIPV6_FAILURE_FATAL=noIPV6_ADDR_GEN_MODE=stable-privacyNAME=ens5DEVICE=ens5ONBOOT=yesIPV6ADDR=2001:23::3/64

配置PE1 P PE2支持srv6

PE1配置支持srv6

vim /etc/sysctl.confnet.ipv4.ip_forward=1 //开启IPv4转发net.ipv6.conf.all.forwarding=1 //开启IPv6转发net.ipv6.conf.all.seg6_enabled=1 //开启srv6 支持net.ipv4.conf.all.rp_filter = 0 //系统是否开启对数据包源地址的校验0 关闭//使配置生效sysctl -p

P配置支持srv6

vim /etc/sysctl.confnet.ipv4.ip_forward=1net.ipv6.conf.all.forwarding=1net.ipv6.conf.all.seg6_enabled=1net.ipv4.conf.all.rp_filter = 0//使配置生效sysctl -p

PE2配置支持srv6

vim /etc/sysctl.confnet.ipv4.ip_forward=1net.ipv6.conf.all.forwarding=1net.ipv6.conf.all.seg6_enabled=1net.ipv4.conf.all.rp_filter = 0//使配置生效sysctl -p

利用FRR ospf配置PE P设备IPv6路由互通

首先须要操作系统安装frr软件,然后进行配置,安装过程略

PE1设备配置

systemctl start frr //启用frr做事vtysh //进入frr掌握台interface lo ipv6 address 1::1/128 //设置loopback0 地址router ospf6 ospf6 router-id 1.1.1.1 //ospf routerid redistribute kernel //重发布 内核路由 interface ens4 area 0 //接口发布 interface lo area 0 //接口发布

P设备配置

systemctl start frrvtyshinterface lo ipv6 address 2::2/128!router ospf6 ospf6 router-id 2.2.2.2 redistribute kernel interface lo area 0 interface ens4 area 0 interface ens5 area 0

PE2设备配置

systemctl start frrvtyshinterface lo ipv6 address 3::3/128!router ospf6 ospf6 router-id 3.3.3.3 redistribute kernel interface ens5 area 0 interface lo area 0

查看PE P设备IPv6路由表

PE1设备查看路由表,可以看到PE2 P设备的路由都学到了

PE1# show ipv6 route ospf6 Codes: K - kernel route, C - connected, S - static, R - RIPng, O - OSPFv3, I - IS-IS, B - BGP, N - NHRP, T - Table, v - VNC, V - VNC-Direct, A - Babel, D - SHARP, F - PBR, f - OpenFabric, > - selected route, - FIB route, q - queued, r - rejected, b - backupO 1::1/128 [110/10] is directly connected, lo, weight 1, 01:34:28O> 2::2/128 [110/11] via fe80::b1b2:75c:7d92:417b, ens4, weight 1, 01:34:25O> 3::3/128 [110/12] via fe80::b1b2:75c:7d92:417b, ens4, weight 1, 01:34:25O 2001:12::/64 [110/1] is directly connected, ens4, weight 1, 01:34:29O> 2001:23::/64 [110/2] via fe80::b1b2:75c:7d92:417b, ens4, weight 1, 01:34:25O> fc00:3::a/128 [110/2] via fe80::b1b2:75c:7d92:417b, ens4, weight 1, 01:22:44

P设备查看路由表

P# show ipv6 route ospf6 Codes: K - kernel route, C - connected, S - static, R - RIPng, O - OSPFv3, I - IS-IS, B - BGP, N - NHRP, T - Table, v - VNC, V - VNC-Direct, A - Babel, D - SHARP, F - PBR, f - OpenFabric, > - selected route, - FIB route, q - queued, r - rejected, b - backupO> 1::1/128 [110/11] via fe80::e8b3:48c7:ee06:c8ae, ens4, weight 1, 01:36:28O 2::2/128 [110/10] is directly connected, lo, weight 1, 01:39:07O> 3::3/128 [110/11] via fe80::e164:747f:7d78:b1a3, ens5, weight 1, 01:38:55O 2001:12::/64 [110/1] is directly connected, ens4, weight 1, 01:36:33O 2001:23::/64 [110/1] is directly connected, ens5, weight 1, 01:39:00O> fc00:1::a/128 [110/1] via fe80::e8b3:48c7:ee06:c8ae, ens4, weight 1, 01:26:04O> fc00:3::a/128 [110/1] via fe80::e164:747f:7d78:b1a3, ens5, weight 1, 01:24:48

PE2设备查看路由表

PE2# show ipv6 route ospf6 Codes: K - kernel route, C - connected, S - static, R - RIPng, O - OSPFv3, I - IS-IS, B - BGP, N - NHRP, T - Table, v - VNC, V - VNC-Direct, A - Babel, D - SHARP, F - PBR, f - OpenFabric, > - selected route, - FIB route, q - queued, r - rejected, b - backupO> 1::1/128 [110/12] via fe80::40ad:d879:cdc0:b4fb, ens5, weight 1, 01:35:09O> 2::2/128 [110/11] via fe80::40ad:d879:cdc0:b4fb, ens5, weight 1, 01:35:14O 3::3/128 [110/10] is directly connected, lo, weight 1, 01:40:35O> 2001:12::/64 [110/2] via fe80::40ad:d879:cdc0:b4fb, ens5, weight 1, 01:35:14O 2001:23::/64 [110/1] is directly connected, ens5, weight 1, 01:37:41O> fc00:1::a/128 [110/2] via fe80::40ad:d879:cdc0:b4fb, ens5, weight 1, 01:24:45

配置SRv6-TE隧道

PE1配置

PE1 配置://设置srv6 源端口为lo 接口ip sr tunsrc set 1::1 //设置目的地200.1.1.0/24 走srv6 TE隧道ip route add 200.1.1.0/24 encap seg6 mode encap segs fc00:2::a,fc00:3::a dev ens4//对目的地址为 PE1 end.DX4 sid fc00:1::a 的数据包 ,实行End.DX4, 解封装SRv6报文,将报文送到下一跳地址为 100.1.1.2ip -6 route add fc00:1::a/128 encap seg6local action End.DX4 nh4 100.1.1.2 dev ens5

P配置

P设备配置://设置srv6 TE End.Xip -6 route add fc00:2::a/128 encap seg6local action End.X nh6 2001:23::3 dev ens5ip -6 route add fc00:2::aa/128 encap seg6local action End.X nh6 2001:12::1 dev ens4

PE2配置

PE2 配置://设置srv6 源端口为lo 接口ip sr tunsrc set 3::3 #设置srv6 源端口为lo 接口//设置目的地100.1.1.0/24 走srv6 TE隧道 ip route add 100.1.1.0/24 encap seg6 mode encap segs fc00:2::aa,fc00:1::a dev ens5//对目的地址为 PE2 end.DX4 sid fc00:3::a的数据包 ,实行End.DX4, 解封装SRv6报文,将报文送到下一跳地址为 200.1.1.2ip -6 route add fc00:3::a/128 encap seg6local action End.DX4 nh4 200.1.1.2 dev ens4

PE和P设备路由表信息

PE1设备主机路由表

//IPv4路由表[root@PE1 ~]# ip r200.1.1.0/24 encap seg6 mode encap segs 2 [ fc00:2::a fc00:3::a ] dev ens4 scope link //IPv6路由表[root@PE1 ~]# ip -6 rfc00:1::a encap seg6local action End.DX4 nh4 100.1.1.2 dev ens5 metric 1024 pref mediumfc00:2::a nhid 21 via fe80::b1b2:75c:7d92:417b dev ens4 proto ospf metric 20 pref mediumfc00:2::aa nhid 21 via fe80::b1b2:75c:7d92:417b dev ens4 proto ospf metric 20 pref mediumfc00:3::a nhid 21 via fe80::b1b2:75c:7d92:417b dev ens4 proto ospf metric 20 pref medium

P设备主机路由表

P设备只有IPv6地址,以是路由表只有IPv6

[root@P ~]# ip -6 rfc00:1::a nhid 53 via fe80::e8b3:48c7:ee06:c8ae dev ens4 proto ospf metric 20 pref mediumfc00:2::a encap seg6local action End.X nh6 2001:23::3 dev ens5 metric 1024 pref mediumfc00:2::aa encap seg6local action End.X nh6 2001:12::1 dev ens4 metric 1024 pref mediumfc00:3::a nhid 50 via fe80::e164:747f:7d78:b1a3 dev ens5 proto ospf metric 20 pref medium

PE2设备主机路由表

//IPv4路由表[root@PE2 ~]# ip r100.1.1.0/24 encap seg6 mode encap segs 2 [ fc00:2::aa fc00:1::a ] dev ens5 scope link //IPv6路由表[root@PE2 ~]# ip -6 rfc00:1::a nhid 23 via fe80::40ad:d879:cdc0:b4fb dev ens5 proto ospf metric 20 pref mediumfc00:2::a nhid 23 via fe80::40ad:d879:cdc0:b4fb dev ens5 proto ospf metric 20 pref mediumfc00:2::aa nhid 23 via fe80::40ad:d879:cdc0:b4fb dev ens5 proto ospf metric 20 pref mediumfc00:3::a encap seg6local action End.DX4 nh4 200.1.1.2 dev ens4 metric 1024 pref medium

CE1 CE2测试连通性

通过以下截图CE1和CE2 终极通过SRv6 BE隧道实现IPv4地址的互通

设备抓包

P设备ens4接口

P设备ens4接口,可以看到ipv6的封装报文中有源地址,目的地址,以及SR的list列表,还有内层的IPv4地址

PE2 ens5接口抓包

标签:

相关文章

互联网时代,域名的重要性及例子分析

随着互联网的飞速发展,域名已经成为企业、个人在虚拟世界中的标识,是网络营销、品牌建设的重要基石。一个好的域名,不仅能提升企业的知名...

网站建设 2024-12-05 阅读0 评论0

互联网创业平台,赋能创新,引领未来

随着互联网技术的飞速发展,我国互联网创业平台如雨后春笋般涌现。这些平台不仅为创业者提供了丰富的资源和支持,还助力了我国创新创业生态...

网站建设 2024-12-05 阅读0 评论0