437
[Spoke2] ospf 1
[Spoke2-ospf-1] area 0
[Spoke2-ospf-1-area-0.0.0.0] network 192.168.0.0 0.0.0.255
[Spoke2-ospf-1-area-0.0.0.0] quit
[Spoke2-ospf-1] quit
# Configure a default route.
[Hub1] ip route-static 0.0.0.0 0 10.0.0.1
4. Configure UDP-mode IPv4 ADVPN tunnel interface tunnel1. Configure its DR priority as 0 so
Spoke 2 will not participate in DR/BDR election.
[Spoke2] interface tunnel1 mode advpn udp
[Spoke2-Tunnel1] ip address 192.168.0.4 255.255.255.0
[Spoke2-Tunnel1] vam client Spoke2
[Spoke2-Tunnel1] ospf network-type broadcast
[Spoke2-Tunnel1] ospf dr-priority 0
[Spoke2-Tunnel1] source gigabitethernet 2/0/1
[Spoke2-Tunnel1] quit
Configuring NAT 1
1. Configure IP addresses for the interfaces. (Details not shown.)
2. Configure NAT internal servers:
# Configure ACL 2000 to permit packets sourced from 10.0.0.0/24.
<NAT1> system-view
[NAT1] acl basic 2000
[NAT1-acl-basic-2000] rule permit source 10.0.0.0 0.0.0.255
[NAT1-acl-basic-2000] quit
# Configure NAT internal servers on GigabitEthernet 2/0/1:
{ Allow external ADVPN nodes to access Hub 1 and Hub 2 by using the public address
1.0.0.1.
{ Specify the source UDP port number as 18001 for both Hub 1 and Hub 2.
{ Specify the UDP port number after NAT as 4001 for Hub 1, and as 4002 for Hub 2.
[NAT1] interface gigabitethernet 2/0/1
[NAT1-GigabitEthernet2/0/1] nat server protocol udp global current-interface 4001
inside 10.0.0.2 18001
[NAT1-GigabitEthernet2/0/1] nat server protocol udp global current-interface 4002
inside 10.0.0.3 18001
[NAT1-GigabitEthernet2/0/1] nat outbound 2000
[NAT1-GigabitEthernet2/0/1] quit
# Enable NAT hairpin on GigabitEthernet 2/0/2.
[NAT1] interface gigabitethernet 2/0/2
[NAT1-GigabitEthernet2/0/2] nat hairpin enable
[NAT1-GigabitEthernet2/0/2] quit
Configuring NAT 2
1. Configure IP addresses for the interfaces. (Details not shown.)
2. Configure NAT internal servers:
# Configure ACL 2000 to permit packets sourced from 10.0.0.0/24.
<NAT2> system-view
[NAT2] acl basic 2000
[NAT2-acl-basic-2000] rule permit source 10.0.0.0 0.0.0.255