JUNIPER-SSG Series Sub-interface (single-arm routing) application

Source: Internet
Author: User

First:

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/6E/7E/wKioL1V-hYWjsz4IAAIEV-U82q8049.jpg "title=" 1.png " alt= "Wkiol1v-hywjsz4iaaiev-u82q8049.jpg"/>


Iii. analysis and pre-planning

Planning as ↑

Analyze customer's tentative topology scheme to realize multi-VLAN communication. G0/0/48 Port made trunk, theoretically sw-a will only let 10.10.0.X/24 host, Juniper Firewall ping vlanif1-6 can go, this is the problem, only 10.10.0.X/24 host, The port will be able to go to the juniper device without making the case. Then you can realize that the direction of one-arm routing!! (*^__^*)


"Single-arm routing definition Literacy"

single-arm routing (router-on-a-stick) refers to an interface on the router by configuring the sub-interface (or "logical interface", there is no real physical interface) to achieve interoperability between different VLANs (virtual local area networks) that were isolated from each other ( this time because the driver interface device is Juniper device, firewall through the policy can be achieved between VLANs independent, if not to do the strategy is the interconnection )

Advantages: the realization of communication between different VLANs helps to understand and learn the VLAN principle and sub-interface concepts.

Disadvantages: easy to become a network single point of failure, configuration is slightly complex, the practical significance is not big.

Four, firewall configuration:

The WEB-UI is configured as follows:

Step-1, drop down select Sub-if

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/6E/82/wKiom1V-hFSCaKEjAACfICwghT8667.jpg "title=" 2.png " alt= "Wkiom1v-hfscakejaacficwght8667.jpg"/>

Step-2, fill in the parameters

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/6E/7E/wKioL1V-hhXRBYutAAGmAEnhNEc186.jpg "title=" 3.png " alt= "Wkiol1v-hhxrbyutaagmaenhnec186.jpg"/>

Set interface "ethernet0/1.1" Tag2 zone "Trust"

Set interface "ethernet0/1.2" tag3 Zone "Trust" # Create sub-interfaces in e0/1 and make VLAN tags

Set interface ethernet0/1.1 IP 10.10.2.1/24 #IP configuration

Set interface ethernet0/1.1 NAT

Set interface ethernet0/1.2 IP 10.10.3.1/24 #IP configuration

Set interface ethernet0/1.2 NAT

(PS: note Interface and area, and VLAN tag, here the 10.10.2.1/24 is sw-a Vlanif2, so here to correspond together,), click-ok output such as


650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/6E/7E/wKioL1V-hkrz36eTAAGDehKtemE688.jpg "title=" 4.png " alt= "Wkiol1v-hkrz36etaagdehkteme688.jpg"/>


Please note that once the sub-interface is established, the default is up, and once the main interface is down, the sub-interface is down. After this one by one correspondence is established, the communication between the VLANs has been successfully completed. The Test VLAN port is normal, which is one-arm routing. In order to better let you understand the single-arm routing, I found a diagram, we look down.

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/6E/7E/wKioL1V-hmniFBAwAAER3N2Pctw849.jpg "title=" 5.png " alt= "Wkiol1v-hmnifbawaaer3n2pctw849.jpg"/>


Theoretically, vlan10 and vlan20 can not ping each other, but through the introduction of the single-arm routing will be able to achieve their interconnection. (in layman's words, it is in the fa0/0 through the sub-interface mode of multiple gateways)

V. Review of implementation

Single-arm routing long application in small and medium-sized enterprises, when the enterprise can not budget to buy three-tier switch, through the two-layer switch to achieve multi-VLAN interoperability.

The implementation of the cross-border delivery, because the customer needs inter-VLAN interoperability, I have not done here strategy, the following is a simple introduction of the SSG series of strategic configuration.

2 network segments are forbidden to access each other, this can be added according to the actual needs .

Set policy ID from ' trust ' to ' trust ' "10.10.2.1/24" "10.10.3.1/24" "any" denylog

Set Policy ID 35

Exit

Set policy ID from "trust" to "trust" "10.10.3.1/24" "10.10.2.1/24" "any" denylog

Set Policy ID 34

Then configure the Untrust-trust access policy, independent of each other, to do their own security policy can:

Set policy ID of "utrust" to "Trust" "Any" "10.10.2.1/24" "any" Deny log

Set Policy ID 36

Set policy ID PNS from "utrust" to "Trust" "Any" "10.10.3.1/24" "any" Deny log

Set Policy ID 37










This article from "from Zero to One" blog, reproduced please contact the author!

JUNIPER-SSG Series Sub-interface (single-arm routing) application

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.