{"id":1011,"date":"2025-04-07T10:45:54","date_gmt":"2025-04-07T02:45:54","guid":{"rendered":"http:\/\/192.168.5.24\/?p=1011"},"modified":"2025-08-20T17:13:18","modified_gmt":"2025-08-20T09:13:18","slug":"%e4%bd%bf%e7%94%a8%e5%8d%8e%e4%b8%baensp%e5%ae%9e%e7%8e%b0%e4%bc%81%e4%b8%9a%e6%80%bb%e9%83%a8%e4%b8%8e%e5%88%86%e9%83%a8%e7%bd%91%e7%bb%9c%e8%ae%be%e8%ae%a1%e4%bb%bf%e7%9c%9f%e6%af%95%e8%ae%be1","status":"publish","type":"post","link":"https:\/\/bigvip.dpdns.org\/?p=1011","title":{"rendered":"\u4f7f\u7528\u534e\u4e3aENSP\u5b9e\u73b0\u4f01\u4e1a\u603b\u90e8\u4e0e\u5206\u90e8\u7f51\u7edc\u8bbe\u8ba1\u4eff\u771f(\u6bd5\u8bbe1)"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">1\u3001\u9700\u6c42\uff1a<\/h3>\n\n\n\n<p>   \u67d0\u4f01\u4e1a\u6709\u603b\u90e8\u4e0e\u5206\u90e8\u4e24\u4e2a\u529e\u516c\u5730\u70b9\uff0c\u8981\u6c42\u5b8c\u6210\u7f51\u7edc\u8bbe\u8ba1\uff0c\u4e3b\u8981\u5b9e\u73b0\u4ee5\u4e0b\u9700\u6c42\uff1a1.\u603b\u516c\u53f8\u5185\u90e8\u548c\u5206\u516c\u53f8\u5185\u90e8\u5168\u90e8\u4f7f\u7528ospf\u534f\u8bae\u901a\u4fe1\u30022.\u4e3a\u4e86\u51cf\u5c11\u7f51\u7edc\u7ba1\u7406\u5458\u5de5\u4f5c\u91cf\uff0c\u65b9\u4fbf\u7ba1\u7406\uff0c\u9664\u670d\u52a1\u5668\u5916\uff0c\u603b\u90e8\u5176\u5b83\u6240\u6709\u90e8\u95e8\u91c7\u7528\u52a8\u6001\u83b7\u53d6IP\u5730\u5740 \uff0c\u8981\u6c42\u603b\u90e8\u914d\u7f6e\u4e00\u53f0DHCP\u670d\u52a1\u5668\uff0c\u4e3a\u6240\u6709\u7f51\u6bb5\u63d0\u4f9bDHCP\u670d\u52a1\u30023.\u5404\u90e8\u95e8VLAN\u4e4b\u95f4\u7684\u901a\u4fe1\u91c7\u7528\u4e09\u5c42\u901a\u4fe1\u6280\u672f\u5b9e\u73b0\u30024.\u4e3a\u4e86\u516c\u53f8\u4e1a\u52a1\u7684\u5b89\u5168\uff0c\u8981\u6c42\u516c\u53f8\u8d22\u52a1\u90e8\u4e0d\u80fd\u8bbf\u95ee\u4e92\u8054\u7f51\u5176\u5b83\u90e8\u95e8\u53ef\u4ee5\u8bbf\u95ee\u4e92\u8054\u7f51\uff0c\u4fe1\u606f\u5b89\u5168\u7814\u53d1\u7ec4\u4e0d\u80fd\u8bbf\u95ee\u56fd\u9645\u5e02\u573a\u90e8\u30025.VPN\u5b9e\u73b0\uff1a\u603b\u90e8\u7684\u4eba\u5de5\u667a\u80fd\u7814\u53d1\u7ec4\u53ef\u4ee5\u4e0e\u5206\u516c\u53f8\u4eba\u5de5\u667a\u80fd\u7814\u53d1\u7ec4\u901a\u4fe1\uff0c\u603b\u90e8\u56fd\u5185\u5e02\u573a\u90e8\u53ef\u4ee5\u4e0e\u5206\u516c\u53f8\u56fd\u5185\u5e02\u573a\u90e8\u901a\u4fe1\u30026.\u5206\u516c\u53f8\u7684\u5458\u5de5\u9700\u8981\u901a\u8fc7VPN\u8bbf\u95ee\u4fe1\u606f\u4e2d\u5fc3\u7684\u670d\u52a1\u5668\u3002\uff08\u6d89\u53ca\u77e5\u8bc6\u70b9\uff1avlan\u3001vlanif\u4e09\u5c42\u901a\u4fe1\u3001DHCP\u3001NAT\u3001ACL\u3001IPsec VPN\u3001OSPF\u7b49\uff09<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2\u3001\u7f51\u7edc\u62d3\u6251\u56fe\u5982\u4e0b\uff1a<\/h3>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"480\" src=\"http:\/\/192.168.5.24\/wp-content\/uploads\/2025\/04\/image-1-1024x480.png\" alt=\"\" class=\"wp-image-1016\" srcset=\"https:\/\/bigvip.dpdns.org\/wp-content\/uploads\/2025\/04\/image-1-1024x480.png 1024w, https:\/\/bigvip.dpdns.org\/wp-content\/uploads\/2025\/04\/image-1-300x140.png 300w, https:\/\/bigvip.dpdns.org\/wp-content\/uploads\/2025\/04\/image-1-768x360.png 768w, https:\/\/bigvip.dpdns.org\/wp-content\/uploads\/2025\/04\/image-1-1536x719.png 1536w, https:\/\/bigvip.dpdns.org\/wp-content\/uploads\/2025\/04\/image-1-816x382.png 816w, https:\/\/bigvip.dpdns.org\/wp-content\/uploads\/2025\/04\/image-1.png 1561w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">3\u3001\u5404\u8bbe\u5907\u7684\u914d\u7f6e\u5982\u4e0b\uff1a<\/h3>\n\n\n\n<p>\u603b\u90e8\u63a5\u5165\u5c42\u4ea4\u6362\u673a\uff1a<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>&lt;cwb&gt;dis current-configuration \n#\nsysname cwb\n#\nvlan batch 11 to 13\n#\n\ninterface Ethernet0\/0\/1\n port link-type trunk\n port trunk allow-pass vlan 2 to 4094\n#\ninterface Ethernet0\/0\/2\n port link-type access\n port default vlan 11\n#\ninterface Ethernet0\/0\/3\n port link-type access\n port default vlan 12\n#\ninterface Ethernet0\/0\/4\n port link-type access\n port default vlan 13\n#\nreturn\n&lt;cwb&gt; <\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>&#91;yf1]dis current-configuration \n#\nsysname yf1\n#\nvlan batch 21 to 23\n#\ninterface Ethernet0\/0\/1\n port link-type trunk\n port trunk allow-pass vlan 2 to 4094\n#\ninterface Ethernet0\/0\/2\n port link-type access\n port default vlan 21\n#\ninterface Ethernet0\/0\/3\n port link-type access\n port default vlan 22\n#\nreturn\n&#91;yf1] <\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>&#91;yf2]dis current-configuration \n#\nsysname yf2\n#\nvlan batch 23\n#\ninterface Ethernet0\/0\/1\n port link-type trunk\n port trunk allow-pass vlan 2 to 4094\n#\ninterface Ethernet0\/0\/2\n port link-type access\n port default vlan 23\n#\nreturn\n&#91;yf2] <\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>&#91;scb]dis current-configuration \n#\nsysname scb\n#\nvlan batch 30 to 32\n#\ninterface Ethernet0\/0\/1\n port link-type trunk\n port trunk allow-pass vlan 2 to 4094\n#\ninterface Ethernet0\/0\/2\n port link-type access\n port default vlan 31\n#\ninterface Ethernet0\/0\/3\n port link-type access\n port default vlan 32\n#\nreturn\n&#91;scb]<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>&#91;rl]DIS current-configuration \n#\nsysname rl\n#\nvlan batch 41 to 43\n#\ninterface Ethernet0\/0\/1\n port link-type trunk\n port trunk allow-pass vlan 2 to 4094\n#\ninterface Ethernet0\/0\/2\n port link-type access\n port default vlan 41\n#\ninterface Ethernet0\/0\/3\n port link-type access\n port default vlan 42\n#\ninterface Ethernet0\/0\/4\n port link-type access\n port default vlan 43\n#\nreturn\n&#91;rl]  <\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>&#91;xxzx]dis current-configuration \n#\nsysname xxzx\n#\nvlan batch 50 to 51\n#\ninterface Vlanif50\n ip address 192.168.50.254 255.255.255.0\n#\ninterface Vlanif51\n ip address 192.168.100.2 255.255.255.252\n#\ninterface Ethernet0\/0\/1\n port link-type access\n port default vlan 51\n#\ninterface Ethernet0\/0\/2\n port link-type access\n port default vlan 50\n#\ninterface Ethernet0\/0\/3\n port link-type access\n port default vlan 50\n#\ninterface Ethernet0\/0\/4\n port link-type access\n port default vlan 50\n#\nospf 1\n area 0.0.0.0\n  network 192.168.100.0 0.0.0.3\n  network 192.168.50.0 0.0.0.255\n#\nreturn\n&#91;xxzx]<\/code><\/pre>\n\n\n\n<p>\u6c47\u805a\u4ea4\u6362\u673a\u7684\u914d\u7f6e\u5982\u4e0b\uff1a<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>&lt;cwzb&gt;dis current-configuration \n#\nsysname cwzb\n#\nvlan batch 10 to 13\n#\ndhcp enable\n#\ninterface Vlanif10\n ip address 192.168.100.6 255.255.255.252\n#\ninterface Vlanif11\n ip address 192.168.11.254 255.255.255.0\n dhcp select relay\n dhcp relay server-ip 192.168.50.67\n#\ninterface Vlanif12\n ip address 192.168.12.254 255.255.255.0\n dhcp select relay\n dhcp relay server-ip 192.168.50.67\n#\ninterface Vlanif13\n ip address 192.168.13.254 255.255.255.0\n dhcp select relay\n dhcp relay server-ip 192.168.50.67\n#\ninterface MEth0\/0\/1\n#\ninterface GigabitEthernet0\/0\/1\n port link-type trunk\n port trunk allow-pass vlan 2 to 4094\n#\ninterface GigabitEthernet0\/0\/2\n port link-type access\n port default vlan 10\n#\nospf 1\n area 0.0.0.0\n  network 192.168.100.4 0.0.0.3\n  network 192.168.11.0 0.0.0.255\n  network 192.168.12.0 0.0.0.255\n  network 192.168.13.0 0.0.0.255\n#\nreturn\n&lt;cwzb&gt; <\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>&lt;yfzb&gt;dis current-configuration \n#\nsysname yfzb\n#\nvlan batch 20 to 23\n#\ndhcp enable\n#\ninterface Vlanif20\n ip address 192.168.100.10 255.255.255.252\n#\ninterface Vlanif21\n ip address 192.168.21.254 255.255.255.0\n dhcp select relay\n dhcp relay server-ip 192.168.50.67\n#\ninterface Vlanif22\n ip address 192.168.22.254 255.255.255.0\n dhcp select relay\n dhcp relay server-ip 192.168.50.67\n#\ninterface Vlanif23\n ip address 192.168.23.254 255.255.255.0\n dhcp select relay\n dhcp relay server-ip 192.168.50.67\n#\ninterface GigabitEthernet0\/0\/1\n port link-type trunk\n port trunk allow-pass vlan 2 to 4094\n#\ninterface GigabitEthernet0\/0\/2\n port link-type trunk\n port trunk allow-pass vlan 2 to 4094\n#\ninterface GigabitEthernet0\/0\/3\n port link-type access\n port default vlan 20\n#\nospf 1\n area 0.0.0.0\n  network 192.168.100.8 0.0.0.3\n  network 192.168.21.0 0.0.0.255\n  network 192.168.22.0 0.0.0.255\n  network 192.168.23.0 0.0.0.255\n#\nreturn\n&lt;yfzb&gt;<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>&lt;scrlzb&gt;dis current-configuration \n#\nsysname scrlzb\n#\nvlan batch 30 to 32 41 to 43\n#\ndhcp enable\n#\ninterface Vlanif30\n ip address 192.168.100.14 255.255.255.252\n#\ninterface Vlanif31\n ip address 192.168.31.254 255.255.255.0\n dhcp select relay\n dhcp relay server-ip 192.168.50.67\n#\ninterface Vlanif32\n ip address 192.168.32.254 255.255.255.0\n dhcp select relay\n dhcp relay server-ip 192.168.50.67\n#\ninterface Vlanif41\n ip address 192.168.41.254 255.255.255.0\n dhcp select relay\n dhcp relay server-ip 192.168.50.67\n#\ninterface Vlanif42\n ip address 192.168.42.254 255.255.255.0\n dhcp select relay\n dhcp relay server-ip 192.168.50.67\n#\ninterface Vlanif43\n ip address 192.168.43.254 255.255.255.0\n dhcp select relay\n dhcp relay server-ip 192.168.50.67\n#\ninterface GigabitEthernet0\/0\/1\n port link-type trunk\n port trunk allow-pass vlan 2 to 4094\n#\ninterface GigabitEthernet0\/0\/2\n port link-type trunk\n port trunk allow-pass vlan 2 to 4094\n#\ninterface GigabitEthernet0\/0\/3\n port link-type access\n port default vlan 30\n#\nospf 1\n area 0.0.0.0\n  network 192.168.100.12 0.0.0.3\n  network 192.168.0.0 0.0.255.255\n#\nreturn\n&lt;scrlzb&gt;<\/code><\/pre>\n\n\n\n<p>\u603b\u90e8\u8def\u7531\u5668\u8bbe\u7f6e<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>&lt;zgs-R&gt;dis current-configuration \n&#91;V200R003C00]\n#\n sysname zgs-R\n#\n board add 0\/4 4GET \n#\n acl number 3000  \n rule 10 permit ip source 192.168.21.0 0.0.0.255 destination 123.0.0.0 0.255.255\n.255 \n rule 15 permit ip source 192.168.22.0 0.0.0.255 destination 123.0.0.0 0.255.255\n.255 \n rule 20 permit ip source 192.168.23.0 0.0.0.255 destination 123.0.0.0 0.255.255\n.255 \n rule 25 permit ip source 192.168.31.0 0.0.0.255 destination 123.0.0.0 0.255.255\n.255 \n rule 30 permit ip source 192.168.32.0 0.0.0.255 destination 123.0.0.0 0.255.255\n.255 \n rule 35 permit ip source 192.168.41.0 0.0.0.255 destination 123.0.0.0 0.255.255\n.255 \n rule 40 permit ip source 192.168.42.0 0.0.0.255 destination 123.0.0.0 0.255.255\n.255 \n rule 45 permit ip source 192.168.43.0 0.0.0.255 destination 123.0.0.0 0.255.255\n.255 \n rule 50 permit ip source 192.168.50.0 0.0.0.255 destination 123.0.0.0 0.255.255\n.255 \nacl number 3001  \n rule 5 deny ip source 192.168.22.0 0.0.0.255 destination 192.168.32.0 0.0.0.255\n \nacl number 3002  \n rule 5 permit ip source 192.168.23.0 0.0.0.255 destination 192.168.60.0 0.0.0.2\n55 \n rule 10 permit ip source 192.168.31.0 0.0.0.255 destination 192.168.70.0 0.0.0.\n255 \n rule 15 permit ip source 192.168.50.0 0.0.0.255 destination 192.168.60.0 0.0.0.\n255 \n rule 20 permit ip source 192.168.50.0 0.0.0.255 destination 192.168.70.0 0.0.0.\n255 \n#\nipsec proposal ipsp\n esp encryption-algorithm 3des\n#\nike proposal 1\n encryption-algorithm 3des-cbc\n authentication-algorithm md5\n#\nike peer fb v2\n pre-shared-key simple huawei\n ike-proposal 1\n remote-address 200.200.200.2\n#\nipsec policy ipspo 1 isakmp\n security acl 3002\n ike-peer fb\n proposal ipsp\n#\ninterface GigabitEthernet0\/0\/0\n ip address 192.168.100.5 255.255.255.252 \n#\ninterface GigabitEthernet0\/0\/1\n ip address 192.168.100.9 255.255.255.252 \n traffic-filter inbound acl 3001\n#\ninterface GigabitEthernet0\/0\/2\n ip address 192.168.100.13 255.255.255.252 \n#\ninterface GigabitEthernet4\/0\/0\n ip address 192.168.100.1 255.255.255.252 \n#\ninterface GigabitEthernet4\/0\/1\n ip address 100.100.100.2 255.255.255.252 \n ipsec policy ipspo\n nat outbound 3000\n#\nospf 1 \n default-route-advertise\n area 0.0.0.0 \n  network 192.168.100.0 0.0.0.3 \n  network 192.168.100.4 0.0.0.3 \n  network 192.168.100.8 0.0.0.3 \n  network 192.168.100.12 0.0.0.3 \n#\nip route-static 0.0.0.0 0.0.0.0 100.100.100.1\n#\nreturn\n&lt;zgs-R&gt;<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>&lt;dhcp-server&gt;dis current-configuration \n&#91;V200R003C00]\n#\n sysname dhcp-server\n#\ndhcp enable\n#\nip pool v11\n gateway-list 192.168.11.254 \n network 192.168.11.0 mask 255.255.255.0 \n dns-list 192.168.50.53 \n#\nip pool v21\n gateway-list 192.168.21.254 \n network 192.168.21.0 mask 255.255.255.0 \n dns-list 192.168.50.53 \n#\nip pool v22\n gateway-list 192.168.22.254 \n network 192.168.22.0 mask 255.255.255.0 \n dns-list 192.168.50.53 \n#\nip pool v23\n gateway-list 192.168.23.254 \n network 192.168.23.0 mask 255.255.255.0 \n dns-list 192.168.50.53 \n#\nip pool v31\n gateway-list 192.168.31.254 \n network 192.168.31.0 mask 255.255.255.0 \n#\nip pool v32\n gateway-list 192.168.32.254 \n network 192.168.32.0 mask 255.255.255.0 \n#\nip pool v41\n gateway-list 192.168.41.254 \n network 192.168.41.0 mask 255.255.255.0 \n#\nip pool v42\n gateway-list 192.168.42.254 \n network 192.168.42.0 mask 255.255.255.0 \n#\nip pool v43\n gateway-list 192.168.43.254 \n network 192.168.43.0 mask 255.255.255.0 \n#\nip pool v12\n gateway-list 192.168.12.254 \n network 192.168.12.0 mask 255.255.255.0 \n#\nip pool v13\n gateway-list 192.168.13.254 \n network 192.168.13.0 mask 255.255.255.0 \n#\ninterface GigabitEthernet0\/0\/0\n ip address 192.168.50.67 255.255.255.0 \n dhcp select global\n#\nip route-static 0.0.0.0 0.0.0.0 192.168.50.254\n#\nreturn\n&lt;dhcp-server&gt;<\/code><\/pre>\n\n\n\n<p>\u5206\u90e8\u7684\u8bbe\u7f6e\uff1a<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>&lt;yffb&gt;dis current-configuration \n#\nsysname yffb\n#\nvlan batch 60 to 61\n#\ndhcp enable\n#\ninterface Vlanif60\n ip address 192.168.60.254 255.255.255.252\n dhcp select relay\n dhcp relay server-ip 192.168.100.17\n#\ninterface Vlanif61\n ip address 192.168.100.18 255.255.255.252\n#\ninterface MEth0\/0\/1\n#\ninterface Ethernet0\/0\/1\n port link-type access\n port default vlan 61\n#\ninterface Ethernet0\/0\/2\n port link-type access\n port default vlan 60\n#\ninterface Ethernet0\/0\/3\n port link-type access\n port default vlan 60\n#\nospf 1\n area 0.0.0.0\n  network 192.168.100.16 0.0.0.3\n  network 192.168.60.0 0.0.0.255\n#\nreturn\n&lt;yffb&gt;<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>&lt;scfb&gt;dis current-configuration \n#\nsysname scfb\n#\nvlan batch 70 to 71\n#\ndhcp enable\n#\ninterface Vlanif70\n ip address 192.168.70.254 255.255.255.0\n dhcp select relay\n dhcp relay server-ip 192.168.100.21\n#\ninterface Vlanif71\n ip address 192.168.100.22 255.255.255.252\n#\ninterface MEth0\/0\/1\n#\ninterface Ethernet0\/0\/1\n port link-type access\n port default vlan 71\n#\ninterface Ethernet0\/0\/2\n port link-type access\n port default vlan 70\n#\nospf 1\n area 0.0.0.0\n  network 192.168.100.20 0.0.0.3\n  network 192.168.70.0 0.0.0.255\n#\nreturn\n&lt;scfb&gt; <\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>&lt;fgs-R&gt;dis current-configuration \n&#91;V200R003C00]\n#\n sysname fgs-R\n#\ndhcp enable\n#\nacl number 3000  \n rule 5 permit ip source 192.168.60.0 0.0.0.255 destination 123.0.0.0 0.255.255.\n255 \n rule 10 permit ip source 192.168.70.0 0.0.0.255 destination 123.0.0.0 0.255.255\n.255 \nacl number 3002  \n rule 5 permit ip source 192.168.60.0 0.0.0.255 destination 192.168.50.0 0.0.0.2\n55 \n rule 10 permit ip source 192.168.70.0 0.0.0.255 destination 192.168.50.0 0.0.0.\n255 \n rule 20 permit ip source 192.168.70.0 0.0.0.255 destination 192.168.31.0 0.0.0.\n255 \n rule 25 permit ip source 192.168.60.0 0.0.0.255 destination 192.168.23.0 0.0.0.\n255 \n#\nipsec proposal ipsp\n esp encryption-algorithm 3des\n#\nike proposal 1\n encryption-algorithm 3des-cbc\n authentication-algorithm md5\n#\nike peer zb v2\n pre-shared-key simple huawei\n ike-proposal 1\n remote-address 100.100.100.2\n#\nipsec policy ipspo 1 isakmp\n security acl 3002\n ike-peer zb\n proposal ipsp\n#\nip pool v60\n gateway-list 192.168.60.254 \n network 192.168.60.0 mask 255.255.255.0 \n#\nip pool v70\n gateway-list 192.168.70.254 \n network 192.168.70.0 mask 255.255.255.0 \n#\ninterface GigabitEthernet0\/0\/0\n ip address 192.168.100.17 255.255.255.252 \n dhcp select global\n#\ninterface GigabitEthernet0\/0\/1\n ip address 192.168.100.21 255.255.255.252 \n dhcp select global\n#\ninterface GigabitEthernet0\/0\/2\n ip address 200.200.200.2 255.255.255.252 \n ipsec policy ipspo\n nat outbound 3000\n#\nospf 1 \n default-route-advertise\n area 0.0.0.0 \n  network 192.168.100.16 0.0.0.3 \n  network 192.168.100.20 0.0.0.3 \n#\nip route-static 0.0.0.0 0.0.0.0 200.200.200.1\n#\nreturn\n&lt;fgs-R&gt; <\/code><\/pre>\n\n\n\n<p>ISP\u8bbe\u7f6e\uff1a<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>&lt;ISP&gt;dis current-configuration \n&#91;V200R003C00]\n#\n sysname ISP\n#\ninterface GigabitEthernet0\/0\/0\n ip address 100.100.100.1 255.255.255.252 \n#\ninterface GigabitEthernet0\/0\/1\n ip address 200.200.200.1 255.255.255.252 \n#\ninterface LoopBack0\n ip address 123.123.123.123 255.255.255.255 \n#\nreturn\n&lt;ISP&gt; <\/code><\/pre>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>1\u3001\u9700\u6c42\uff1a \u67d0\u4f01\u4e1a\u6709\u603b\u90e8\u4e0e\u5206\u90e8\u4e24\u4e2a\u529e\u516c\u5730\u70b9\uff0c\u8981\u6c42\u5b8c\u6210\u7f51\u7edc\u8bbe\u8ba1\uff0c\u4e3b\u8981\u5b9e\u73b0\u4ee5\u4e0b\u9700\u6c42\uff1a1.\u603b\u516c\u53f8\u5185\u90e8\u548c\u5206\u516c\u53f8\u5185\u90e8\u5168\u90e8 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"aside","meta":{"footnotes":""},"categories":[28,7],"tags":[5,117,71,10,6,39],"class_list":["post-1011","post","type-post","status-publish","format-aside","hentry","category-vpn","category-7","tag-acl","tag-dhcp","tag-nat","tag-ospf","tag-vlan","tag-vpn","post_format-post-format-aside"],"_links":{"self":[{"href":"https:\/\/bigvip.dpdns.org\/index.php?rest_route=\/wp\/v2\/posts\/1011","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bigvip.dpdns.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bigvip.dpdns.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bigvip.dpdns.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bigvip.dpdns.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1011"}],"version-history":[{"count":17,"href":"https:\/\/bigvip.dpdns.org\/index.php?rest_route=\/wp\/v2\/posts\/1011\/revisions"}],"predecessor-version":[{"id":1277,"href":"https:\/\/bigvip.dpdns.org\/index.php?rest_route=\/wp\/v2\/posts\/1011\/revisions\/1277"}],"wp:attachment":[{"href":"https:\/\/bigvip.dpdns.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1011"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bigvip.dpdns.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1011"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bigvip.dpdns.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1011"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}