1、eNSP简介
eNSP(Enterprise Network Simulation Platform)是一款由华为公司开发的网络仿真平台,用于模拟企业级网络环境。用户可以在eNSP中创建虚拟的网络拓扑结构,配置各种网络设备(如交换机、路由器、防火墙等),并进行网络运行状态的监控和管理。eNSP提供了丰富的网络设备模拟和配置功能,使得用户可以通过仿真实验来测试网络设计方案、验证网络配置、学习网络技术知识等。
2、实验拓扑
3、实战示例
一、 前置部署
1、 前置部署
链接:eNSP_V100R003C00SPC200T 安装配置
链接:eNSP桥接本地网卡
二、 交换机配置
2、CSW1(核心1)
# 创建交换机管理vlan
vlan 100
#
interface Vlanif100
ip address 192.168.100.231 255.255.255.0
# 上下行接口配置
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan all
#
interface GigabitEthernet0/0/2
port link-type trunk
port trunk allow-pass vlan all
#
interface GigabitEthernet0/0/3
port link-type access
port default vlan 100
# SNMP配置
snmp-agent
snmp-agent community read Prometheus@123
snmp-agent sys-info version v2c
snmp-agent target-host trap address udp-domain 192.168.100.24 udp-port 161 params securityname Prometheus@123
3、DSW1(汇聚1)
# 创建交换机管理vlan
vlan 100
#
interface Vlanif100
ip address 192.168.100.232 255.255.255.0
# 上下行接口配置
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan all
#
interface GigabitEthernet0/0/2
port link-type trunk
port trunk allow-pass vlan all
#
interface GigabitEthernet0/0/3
port link-type trunk
port trunk allow-pass vlan all
# SNMP配置
snmp-agent
snmp-agent community read Prometheus@123
snmp-agent sys-info version v2c
snmp-agent target-host trap address udp-domain 192.168.100.24 udp-port 161 params securityname Prometheus@123
4、DSW2(汇聚2)
# 创建交换机管理vlan
vlan 100
#
interface Vlanif100
ip address 192.168.100.233 255.255.255.0
# 上下行接口配置
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan all
#
interface GigabitEthernet0/0/2
port link-type trunk
port trunk allow-pass vlan all
#
interface GigabitEthernet0/0/3
port link-type trunk
port trunk allow-pass vlan all
# SNMP配置
snmp-agent
snmp-agent community read Prometheus@123
snmp-agent sys-info version v2c
snmp-agent target-host trap address udp-domain 192.168.100.24 udp-port 161 params securityname Prometheus@123
5、ASW1(接入1)
# 创建交换机管理vlan
vlan 100
#
interface Vlanif100
ip address 192.168.100.234 255.255.255.0
# 上下行接口配置
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan all
# SNMP配置
snmp-agent
snmp-agent community read Prometheus@123
snmp-agent sys-info version v2c
snmp-agent target-host trap address udp-domain 192.168.100.24 udp-port 161 params securityname Prometheus@123
6、ASW2(接入2)
# 创建交换机管理vlan
vlan 100
#
interface Vlanif100
ip address 192.168.100.235 255.255.255.0
# 上下行接口配置
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan all
# SNMP配置
snmp-agent
snmp-agent community read Prometheus@123
snmp-agent sys-info version v2c
snmp-agent target-host trap address udp-domain 192.168.100.24 udp-port 161 params securityname Prometheus@123
7、ASW3(接入3)
# 创建交换机管理vlan
vlan 100
#
interface Vlanif100
ip address 192.168.100.236 255.255.255.0
# 上下行接口配置
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan all
# SNMP配置
snmp-agent
snmp-agent community read Prometheus@123
snmp-agent sys-info version v2c
snmp-agent target-host trap address udp-domain 192.168.100.24 udp-port 161 params securityname Prometheus@123
8、ASW4(接入4)
# 创建交换机管理vlan
vlan 100
#
interface Vlanif100
ip address 192.168.100.237 255.255.255.0
# 上下行接口配置
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan all
# SNMP配置
snmp-agent
snmp-agent community read Prometheus@123
snmp-agent sys-info version v2c
snmp-agent target-host trap address udp-domain 192.168.100.24 udp-port 161 params securityname Prometheus@123
三、 测试验证
9、SNMP测试
[root@localhost ~]# snmpwalk -v2c -c Prometheus@123 192.168.100.231 1.3.6.1.2.1.1.1
[root@localhost ~]# snmpwalk -v2c -c Prometheus@123 192.168.100.232 1.3.6.1.2.1.1.1
[root@localhost ~]# snmpwalk -v2c -c Prometheus@123 192.168.100.233 1.3.6.1.2.1.1.1
[root@localhost ~]# snmpwalk -v2c -c Prometheus@123 192.168.100.234 1.3.6.1.2.1.1.1
[root@localhost ~]# snmpwalk -v2c -c Prometheus@123 192.168.100.235 1.3.6.1.2.1.1.1
[root@localhost ~]# snmpwalk -v2c -c Prometheus@123 192.168.100.236 1.3.6.1.2.1.1.1
[root@localhost ~]# snmpwalk -v2c -c Prometheus@123 192.168.100.237 1.3.6.1.2.1.1.1
原文始发于微信公众号(奶嘴很忙):eNSP配置小型三层网络(SNMP实验)
版权声明:本文内容由互联网用户自发贡献,该文观点仅代表作者本人。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如发现本站有涉嫌侵权/违法违规的内容, 请发送邮件至 举报,一经查实,本站将立刻删除。
文章由极客之音整理,本文链接:https://www.bmabk.com/index.php/post/303447.html