{"id":1596,"date":"2017-07-19T11:36:55","date_gmt":"2017-07-19T10:36:55","guid":{"rendered":"http:\/\/www.safekom.pl\/blog\/?p=1596"},"modified":"2017-07-19T11:36:55","modified_gmt":"2017-07-19T10:36:55","slug":"lab-huwaei-vrf-vpn-instance","status":"publish","type":"post","link":"https:\/\/www.safekom.pl\/blog\/huawei\/lab-huwaei-vrf-vpn-instance\/","title":{"rendered":"LAB &#8211; Huwaei VRF (vpn-instance)"},"content":{"rendered":"<p>Dawno temu napisa\u0142em o tworzeniu VRF&#8217;\u00f3w na platformie <a href=\"http:\/\/www.safekom.pl\/blog\/cisco\/lab-vrf-cisco\/\">Cisco<\/a>. We wcze\u015bniejszym artykule umie\u015bci\u0142em opis co to jest VRF oraz do czego mo\u017ce s\u0142u\u017cy\u0107. \u00a0Dzi\u015b wracam do tematu ale na urz\u0105dzeniach firmy Huawei, do tego wykorzystam oprogramowanie eNSP kt\u00f3re udost\u0119pnia ten Vendor.<\/p>\n<p>Na wst\u0119pie trzeba powiedzie\u0107 \u017ce na platformie Huwaei VRF nazywamy vpn-instance. Ale dla przejrzysto\u015bci wpisu b\u0119d\u0119 pos\u0142ugiwa\u0142 si\u0119 nadal nazw\u0105 VRF<\/p>\n<h6>Ma\u0142a Uwaga<\/h6>\n<blockquote><p>Jedn\u0105 z r\u00f3\u017cnic jak\u0105 znalaz\u0142em pomi\u0119dzy Cisco a Huawei to, \u017ce nie mo\u017cemy robi\u0107 exportu i importu tzw. routing leaking z i do globalnej tablicy routingu. \u00a0Z jednej strony jest to zabezpieczenie dla g\u0142\u00f3wnej tablicy routingu, kt\u00f3ra s\u0142u\u017cy do zestawienia sieci MPLS &#8211; przy projektowaniu sieci trzeba o tym pami\u0119ta\u0107.<\/p><\/blockquote>\n<h6>Rysunek pogl\u0105dowy:<\/h6>\n<p><a href=\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/07\/Huawei_vrf.png\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1896\" data-permalink=\"https:\/\/www.safekom.pl\/blog\/huawei\/lab-huwaei-vrf-vpn-instance\/attachment\/huawei_vrf\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/07\/Huawei_vrf.png?fit=662%2C613&amp;ssl=1\" data-orig-size=\"662,613\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Huawei_vrf\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/07\/Huawei_vrf.png?fit=300%2C278&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/07\/Huawei_vrf.png?fit=662%2C613&amp;ssl=1\" class=\"alignnone wp-image-1896\" src=\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/07\/Huawei_vrf.png?resize=387%2C358\" alt=\"\" width=\"387\" height=\"358\" srcset=\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/07\/Huawei_vrf.png?w=662&amp;ssl=1 662w, https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/07\/Huawei_vrf.png?resize=300%2C278&amp;ssl=1 300w\" sizes=\"auto, (max-width: 387px) 100vw, 387px\" \/><\/a><\/p>\n<h4>Praca w eNSP<\/h4>\n<p>Uruchamiamy nasze eNSP w kt\u00f3rym tworzymy now\u0105 topologi\u0119 gdzie w niej umieszczamy na chwil\u0119 obecn\u0105 jeden router AR2240 kt\u00f3re uruchamiamy i przechodzimy do konfiguracji.<\/p>\n<p><a href=\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/07\/ensp03.png\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1897\" data-permalink=\"https:\/\/www.safekom.pl\/blog\/huawei\/lab-huwaei-vrf-vpn-instance\/attachment\/ensp03\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/07\/ensp03.png?fit=692%2C600&amp;ssl=1\" data-orig-size=\"692,600\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"ensp03\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/07\/ensp03.png?fit=300%2C260&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/07\/ensp03.png?fit=692%2C600&amp;ssl=1\" class=\"alignnone size-full wp-image-1897\" src=\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/07\/ensp03.png?resize=692%2C600\" alt=\"\" width=\"692\" height=\"600\" srcset=\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/07\/ensp03.png?w=692&amp;ssl=1 692w, https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/07\/ensp03.png?resize=300%2C260&amp;ssl=1 300w\" sizes=\"auto, (max-width: 692px) 100vw, 692px\" \/><\/a><\/p>\n<p>gdzie konfigurujemy:<\/p>\n<ol>\n<li>nowy hostname<\/li>\n<li>pierwszy vrf Internet\n<ul>\n<li>nadajemy route-distingusisher<\/li>\n<li>nadajemy import i export dla tego VRF&#8217;u<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p>Krok 2 powtarzamy dla 2 pozosta\u0142ych vrf\u00f3w<\/p>\n<pre class=\"lang:sh decode:true \">[Huawei]sysname vrf-test\r\n[vrf-test]\r\n[vrf-test]\r\n[vrf-test]\r\n[vrf-test]ip vpn-instance Internet\r\n[vrf-test-vpn-instance-Internet]rou\t\r\n[vrf-test-vpn-instance-Internet]route-distinguisher 65000:100\r\n[vrf-test-vpn-instance-Internet-af-ipv4]ip\t\r\n[vrf-test-vpn-instance-Internet-af-ipv4]vp\t\r\n[vrf-test-vpn-instance-Internet-af-ipv4]vpn\r\n[vrf-test-vpn-instance-Internet-af-ipv4]vpn-target 65000:100\r\n IVT Assignment result: \r\nInfo: VPN-Target assignment is successful.\r\n EVT Assignment result: \r\nInfo: VPN-Target assignment is successful.\r\n[vrf-test-vpn-instance-Internet-af-ipv4]\r\n<\/pre>\n<p>Konfiguracja wygl\u0105da tak dla trzech vrf\u00f3w<\/p>\n<pre class=\"lang:sh decode:true\">#\r\nip vpn-instance Internet\r\n ipv4-family\r\n  route-distinguisher 65000:100\r\n  vpn-target 65000:100 export-extcommunity\r\n  vpn-target 65000:100 import-extcommunity\r\n#\r\nip vpn-instance dc1\r\n ipv4-family\r\n  route-distinguisher 65000:101\r\n  vpn-target 65000:101 export-extcommunity\r\n  vpn-target 65000:101 import-extcommunity\r\n#\r\nip vpn-instance mgmt\r\n ipv4-family\r\n  route-distinguisher 65000:102\r\n  vpn-target 65000:102 export-extcommunity\r\n  vpn-target 65000:102 import-extcommunity\r\n#\r\n<\/pre>\n<p>Wy\u015bwietlamy jakie s\u0105 VRF&#8217;y &#8211; u\u017cywamy do tego polecenia\u00a0<strong>display ip vpn-instance<\/strong><\/p>\n<pre class=\"lang:sh decode:true\">&lt;vrf-test&gt;display ip vpn-instance \r\n Total VPN-Instances configured      : 3\r\n Total IPv4 VPN-Instances configured : 3\r\n Total IPv6 VPN-Instances configured : 0\r\n\r\n  VPN-Instance Name               RD                    Address-family\r\n  Internet                        65000:100             IPv4       \r\n  dc1                             65000:101             IPv4       \r\n  mgmt                            65000:102             IPv4<\/pre>\n<h5>Konfigurujemy interfejsy w ka\u017cdy z VRF&#8217;\u00f3w<\/h5>\n<p>przyk\u0142ad tworzymy interfejs LoopBack 100 kt\u00f3ry przypisujemy do VRF Internet i nadajemy jemu adres<\/p>\n<pre class=\"lang:sh decode:true \">[vrf-test]int LoopBack 100 \r\n[vrf-test-LoopBack100]ip bg\t\r\n[vrf-test-LoopBack100]ip b\t\r\n[vrf-test-LoopBack100]ip binding vp\t\r\n[vrf-test-LoopBack100]ip binding vpn-instance Internet\r\nInfo: All IPv4 related configurations on this interface are removed!\r\nInfo: All IPv6 related configurations on this interface are removed!\r\n[vrf-test-LoopBack100]ip ad\t\r\n[vrf-test-LoopBack100]ip address 192.168.10.1 32\r\n<\/pre>\n<p>Konfiguracja LoopBack\u00f3w dla wszystkich VRF&#8217;\u00f3w<\/p>\n<pre class=\"lang:sh decode:true\">#\r\ninterface LoopBack100\r\n ip binding vpn-instance Internet\r\n ip address 192.168.10.1 255.255.255.255 \r\n#\r\ninterface LoopBack101\r\n ip binding vpn-instance dc1\r\n ip address 10.10.10.1 255.255.255.255 \r\n#\r\ninterface LoopBack102\r\n ip binding vpn-instance mgmt\r\n ip address 10.255.255.1 255.255.255.255 \r\n#\r\n<\/pre>\n<p>sprawdzamy przypisanie interfejs\u00f3w do VRF&#8217;\u00f3w<\/p>\n<pre class=\"lang:sh decode:true \">&lt;vrf-test&gt;display ip vpn-instance interface \r\n Total VPN-Instances configured      : 3\r\n\r\n VPN-Instance Name and ID : Internet, 1\r\n  Interface Number : 1 \r\n  Interface list : LoopBack100\r\n\r\n VPN-Instance Name and ID : dc1, 2\r\n  Interface Number : 1 \r\n  Interface list : LoopBack101\r\n\r\n VPN-Instance Name and ID : mgmt, 3\r\n  Interface Number : 1 \r\n  Interface list : LoopBack102\r\n\r\n<\/pre>\n<h5>Konfigurujemy MP-BGP<\/h5>\n<p>Konfigurujemy multiprotocol bgp dla ka\u017cdego VRF&#8217;u gdzie skonfigurujemy wszystkie sieci direct b\u0119d\u0105 dystrybuowane przez MP-BGP. Ta konfiguracja pos\u0142u\u017cy nam to po\u0142\u0105czenia pomi\u0119dzy VRF&#8217;ami &#8211; wykonamy\u00a0leaking.<\/p>\n<pre class=\"lang:sh decode:true\">&lt;vrf-test&gt;system-view \r\nEnter system view, return user view with Ctrl+Z.\r\n[vrf-test]bgp 65000\r\n[vrf-test-bgp]ipv4-family vpn-instance Internet\r\n[vrf-test-bgp-Internet]import-route direct \r\n<\/pre>\n<p>konfiguracja ca\u0142o\u015bci:<\/p>\n<pre class=\"lang:sh decode:true\">#\r\nbgp 65000\r\n #\r\n ipv4-family unicast\r\n  undo synchronization\r\n #\r\n ipv4-family vpn-instance Internet \r\n  import-route direct\r\n #\r\n ipv4-family vpn-instance dc1 \r\n  import-route direct\r\n #\r\n ipv4-family vpn-instance mgmt \r\n  import-route direct\r\n#\r\n<\/pre>\n<p>Konfigurujemy odpowiednio leaking pomi\u0119dzy VRF&#8217;ami<\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>VRF<\/strong><\/td>\n<td><strong>Internet<\/strong><\/td>\n<td><strong>DC1<\/strong><\/td>\n<td><strong>MGMT<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>Internet<\/strong><\/td>\n<td>I\/E<\/td>\n<td>I<\/td>\n<td>I<\/td>\n<\/tr>\n<tr>\n<td><strong>DC1<\/strong><\/td>\n<td>brak<\/td>\n<td>I\/E<\/td>\n<td>I<\/td>\n<\/tr>\n<tr>\n<td><strong>MGMT<\/strong><\/td>\n<td>Brak<\/td>\n<td>I<\/td>\n<td>I\/E<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<pre class=\"lang:sh decode:true \">[vrf-test]ip vpn-instance mgmt \r\n[vrf-test-vpn-instance-mgmt]vpn-target 65000:101 import-extcommunity \r\n IVT Assignment result: \r\nInfo: VPN-Target assignment is successful.\r\n[vrf-test-vpn-instance-mgmt]<\/pre>\n<p>ca\u0142a konfiguracja<\/p>\n<pre class=\"lang:sh decode:true \">#\r\nip vpn-instance Internet\r\n ipv4-family\r\n  route-distinguisher 65000:100\r\n  vpn-target 65000:100 export-extcommunity\r\n  vpn-target 65000:100 65000:101 65000:102 import-extcommunity\r\n#\r\nip vpn-instance dc1\r\n ipv4-family\r\n  route-distinguisher 65000:101\r\n  vpn-target 65000:101 export-extcommunity\r\n  vpn-target 65000:101 65000:102 import-extcommunity\r\n#\r\nip vpn-instance mgmt\r\n ipv4-family\r\n  route-distinguisher 65000:102\r\n  vpn-target 65000:102 export-extcommunity\r\n  vpn-target 65000:102 65000:101 import-extcommunity\r\n#\r\n<\/pre>\n<h6>weryfikacja MP-BGP<\/h6>\n<pre class=\"lang:sh decode:true \">&lt;vrf-test&gt;display bgp vpnv4 all brief \r\n\r\nVPNv4:\r\n  RD Num              Peer Num            Route Num \r\n    3                   0                   3                   \r\n\r\nVPN-Instance(IPv4-family):\r\n  VPN-Instance Name   Peer Num            Route Num\r\n    Internet            0                   3                   \r\n    dc1                 0                   2                   \r\n    mgmt                0                   2                   \r\n<\/pre>\n<p>weryfikacja tablic routingu zgodnie tabelk\u0105 wy\u017cej<\/p>\n<pre class=\"lang:sh decode:true \">&lt;vrf-test&gt;display ip routing-table vpn-instance Internet\r\nRoute Flags: R - relay, D - download to fib\r\n------------------------------------------------------------------------------\r\nRouting Tables: Internet\r\n         Destinations : 4        Routes : 4        \r\n\r\nDestination\/Mask    Proto   Pre  Cost      Flags NextHop         Interface\r\n\r\n     10.10.10.1\/32  BGP     255  0           D   127.0.0.1       InLoopBack0\r\n   10.255.255.1\/32  BGP     255  0           D   127.0.0.1       InLoopBack0\r\n   192.168.10.1\/32  Direct  0    0           D   127.0.0.1       LoopBack100\r\n255.255.255.255\/32  Direct  0    0           D   127.0.0.1       InLoopBack0\r\n\r\n&lt;vrf-test&gt;display ip routing-table vpn-instance DC1     \r\nInfo: The specified VPN instance does not exist.\r\n&lt;vrf-test&gt;display ip routing-table vpn-instance dc1\r\nRoute Flags: R - relay, D - download to fib\r\n------------------------------------------------------------------------------\r\nRouting Tables: dc1\r\n         Destinations : 3        Routes : 3        \r\n\r\nDestination\/Mask    Proto   Pre  Cost      Flags NextHop         Interface\r\n\r\n     10.10.10.1\/32  Direct  0    0           D   127.0.0.1       LoopBack101\r\n   10.255.255.1\/32  BGP     255  0           D   127.0.0.1       InLoopBack0\r\n255.255.255.255\/32  Direct  0    0           D   127.0.0.1       InLoopBack0\r\n\r\n&lt;vrf-test&gt;display ip routing-table vpn-instance mgmt\r\nRoute Flags: R - relay, D - download to fib\r\n------------------------------------------------------------------------------\r\nRouting Tables: mgmt\r\n         Destinations : 3        Routes : 3        \r\n\r\nDestination\/Mask    Proto   Pre  Cost      Flags NextHop         Interface\r\n\r\n     10.10.10.1\/32  BGP     255  0           D   127.0.0.1       InLoopBack0\r\n   10.255.255.1\/32  Direct  0    0           D   127.0.0.1       LoopBack102\r\n255.255.255.255\/32  Direct  0    0           D   127.0.0.1       InLoopBack0\r\n\r\n&lt;vrf-test&gt;<\/pre>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dawno temu napisa\u0142em o tworzeniu VRF&#8217;\u00f3w na platformie Cisco. We wcze\u015bniejszym artykule umie\u015bci\u0142em opis co to jest VRF oraz do czego mo\u017ce s\u0142u\u017cy\u0107. \u00a0Dzi\u015b wracam do tematu ale na urz\u0105dzeniach firmy Huawei, do tego wykorzystam oprogramowanie eNSP kt\u00f3re udost\u0119pnia ten Vendor. Na wst\u0119pie trzeba powiedzie\u0107 \u017ce na platformie Huwaei VRF nazywamy vpn-instance. Ale dla przejrzysto\u015bci [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1223,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"Jak skonfigurowa\u0107 VRF'y na platformie Huawei oraz jak wykona\u0107 leaking pomi\u0119dzy nimi - zapraszam do lektury.","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"enabled":false},"version":2}},"categories":[319,84],"tags":[465,467,466,461,464,469,468,290,462,463,285],"class_list":["post-1596","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-huawei","category-lab","tag-bgp-ipv4-family-vpn-instance","tag-ensp","tag-huawei-ensp","tag-huawei-vrf","tag-ip-binding-vpn-instance","tag-leaking","tag-leaking-routing","tag-mp-bgp","tag-vpn-instance","tag-vpn-target","tag-vrf"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>LAB - Huwaei VRF (vpn-instance) - SafeKom Blog<\/title>\n<meta name=\"description\" content=\"Dzi\u015b poka\u017c\u0119 jak konfiguruje si\u0119 VRF&#039;y (vpn-instance) na platformie sprz\u0119towej firmy Huawei z wykorzystaniem emulatora urz\u0105dze\u0144 eNSP. Huwaei VRF\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.safekom.pl\/blog\/huawei\/lab-huwaei-vrf-vpn-instance\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Huwaei VRF (vpn-instance)\" \/>\n<meta property=\"og:description\" content=\"Jak skonfigurowa\u0107 VRF&#039;y na platformie Huawei oraz jak wykona\u0107 leaking pomi\u0119dzy nimi - zapraszam do lektury.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.safekom.pl\/blog\/huawei\/lab-huwaei-vrf-vpn-instance\/\" \/>\n<meta property=\"og:site_name\" content=\"SafeKom Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/safekompl\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-19T10:36:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2016\/10\/Huawei-Logo-e1394619656563.png?fit=400%2C389&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"389\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Micha\u0142 Iwa\u0144czuk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Huwaei VRF (vpn-instance)\" \/>\n<meta name=\"twitter:description\" content=\"Jak skonfigurowa\u0107 VRF&#039;y na platformie @HuaweiEnt oraz jak wykona\u0107 leaking pomi\u0119dzy nimi - zapraszam do lektury.\" \/>\n<meta name=\"twitter:image\" content=\"http:\/\/www.safekom.pl\/blog\/wp-content\/uploads\/2016\/10\/Huawei-Logo-e1394619656563.png\" \/>\n<meta name=\"twitter:creator\" content=\"@MIwaczuk\" \/>\n<meta name=\"twitter:site\" content=\"@MIwaczuk\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"Micha\u0142 Iwa\u0144czuk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minuty\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/huawei\/lab-huwaei-vrf-vpn-instance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/huawei\/lab-huwaei-vrf-vpn-instance\/\"},\"author\":{\"name\":\"Micha\u0142 Iwa\u0144czuk\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/#\/schema\/person\/fd4cc931b624af4b7353d36d92ba7181\"},\"headline\":\"LAB &#8211; Huwaei VRF (vpn-instance)\",\"datePublished\":\"2017-07-19T10:36:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/huawei\/lab-huwaei-vrf-vpn-instance\/\"},\"wordCount\":340,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/huawei\/lab-huwaei-vrf-vpn-instance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2016\/10\/Huawei-Logo-e1394619656563.png?fit=400%2C389&ssl=1\",\"keywords\":[\"bgp ipv4-family vpn-instance\",\"ensp\",\"Huawei ensp\",\"huawei vrf\",\"ip binding vpn-instance\",\"leaking\",\"leaking routing\",\"mp-bgp\",\"vpn-instance\",\"vpn-target\",\"vrf\"],\"articleSection\":[\"Huawei\",\"Lab\"],\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.safekom.pl\/blog\/huawei\/lab-huwaei-vrf-vpn-instance\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/huawei\/lab-huwaei-vrf-vpn-instance\/\",\"url\":\"https:\/\/www.safekom.pl\/blog\/huawei\/lab-huwaei-vrf-vpn-instance\/\",\"name\":\"LAB - Huwaei VRF (vpn-instance) - SafeKom Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/huawei\/lab-huwaei-vrf-vpn-instance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/huawei\/lab-huwaei-vrf-vpn-instance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2016\/10\/Huawei-Logo-e1394619656563.png?fit=400%2C389&ssl=1\",\"datePublished\":\"2017-07-19T10:36:55+00:00\",\"description\":\"Dzi\u015b poka\u017c\u0119 jak konfiguruje si\u0119 VRF'y (vpn-instance) na platformie sprz\u0119towej firmy Huawei z wykorzystaniem emulatora urz\u0105dze\u0144 eNSP. Huwaei VRF\",\"breadcrumb\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/huawei\/lab-huwaei-vrf-vpn-instance\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.safekom.pl\/blog\/huawei\/lab-huwaei-vrf-vpn-instance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/huawei\/lab-huwaei-vrf-vpn-instance\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2016\/10\/Huawei-Logo-e1394619656563.png?fit=400%2C389&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2016\/10\/Huawei-Logo-e1394619656563.png?fit=400%2C389&ssl=1\",\"width\":400,\"height\":389},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/huawei\/lab-huwaei-vrf-vpn-instance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/www.safekom.pl\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LAB &#8211; Huwaei VRF (vpn-instance)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/#website\",\"url\":\"https:\/\/www.safekom.pl\/blog\/\",\"name\":\"SafeKom Blog\",\"description\":\"Notatki Architekta i in\u017cyniera zwi\u0105zanego rozwi\u0105zaniami on-prem\",\"publisher\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.safekom.pl\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/#organization\",\"name\":\"SafeKom Blog\",\"url\":\"https:\/\/www.safekom.pl\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/05\/cropped-logo.png?fit=512%2C512&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/05\/cropped-logo.png?fit=512%2C512&ssl=1\",\"width\":512,\"height\":512,\"caption\":\"SafeKom Blog\"},\"image\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/safekompl\",\"https:\/\/x.com\/MIwaczuk\",\"https:\/\/www.linkedin.com\/in\/michaliwanczuk\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/#\/schema\/person\/fd4cc931b624af4b7353d36d92ba7181\",\"name\":\"Micha\u0142 Iwa\u0144czuk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cc6dda4ee8d21d1f254147e5ee6f5e38881b88a4a12a5774ca42380597e52014?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cc6dda4ee8d21d1f254147e5ee6f5e38881b88a4a12a5774ca42380597e52014?s=96&d=mm&r=g\",\"caption\":\"Micha\u0142 Iwa\u0144czuk\"},\"description\":\"Pasjonat komputerowy od zawsze oraz maniak w zakresie sieci, wirtualizacji oraz bezpiecze\u0144stwa IT. Kompetentny in\u017cynier z du\u017cym do\u015bwiadczeniem w realizacji projekt\u00f3w informatycznych i telekomunikacyjnych. Wieloletni administrator IT, kt\u00f3ry utrzymuje systemy informatyczne dostosowuj\u0105c je do wymog\u00f3w biznesowych z zapewnieniem dost\u0119pno\u015bci 24\/7\/365.\",\"url\":\"https:\/\/www.safekom.pl\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LAB - Huwaei VRF (vpn-instance) - SafeKom Blog","description":"Dzi\u015b poka\u017c\u0119 jak konfiguruje si\u0119 VRF'y (vpn-instance) na platformie sprz\u0119towej firmy Huawei z wykorzystaniem emulatora urz\u0105dze\u0144 eNSP. Huwaei VRF","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.safekom.pl\/blog\/huawei\/lab-huwaei-vrf-vpn-instance\/","og_locale":"pl_PL","og_type":"article","og_title":"Huwaei VRF (vpn-instance)","og_description":"Jak skonfigurowa\u0107 VRF'y na platformie Huawei oraz jak wykona\u0107 leaking pomi\u0119dzy nimi - zapraszam do lektury.","og_url":"https:\/\/www.safekom.pl\/blog\/huawei\/lab-huwaei-vrf-vpn-instance\/","og_site_name":"SafeKom Blog","article_publisher":"https:\/\/www.facebook.com\/safekompl","article_published_time":"2017-07-19T10:36:55+00:00","og_image":[{"width":400,"height":389,"url":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2016\/10\/Huawei-Logo-e1394619656563.png?fit=400%2C389&ssl=1","type":"image\/png"}],"author":"Micha\u0142 Iwa\u0144czuk","twitter_card":"summary_large_image","twitter_title":"Huwaei VRF (vpn-instance)","twitter_description":"Jak skonfigurowa\u0107 VRF'y na platformie @HuaweiEnt oraz jak wykona\u0107 leaking pomi\u0119dzy nimi - zapraszam do lektury.","twitter_image":"http:\/\/www.safekom.pl\/blog\/wp-content\/uploads\/2016\/10\/Huawei-Logo-e1394619656563.png","twitter_creator":"@MIwaczuk","twitter_site":"@MIwaczuk","twitter_misc":{"Napisane przez":"Micha\u0142 Iwa\u0144czuk","Szacowany czas czytania":"4 minuty"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.safekom.pl\/blog\/huawei\/lab-huwaei-vrf-vpn-instance\/#article","isPartOf":{"@id":"https:\/\/www.safekom.pl\/blog\/huawei\/lab-huwaei-vrf-vpn-instance\/"},"author":{"name":"Micha\u0142 Iwa\u0144czuk","@id":"https:\/\/www.safekom.pl\/blog\/#\/schema\/person\/fd4cc931b624af4b7353d36d92ba7181"},"headline":"LAB &#8211; Huwaei VRF (vpn-instance)","datePublished":"2017-07-19T10:36:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.safekom.pl\/blog\/huawei\/lab-huwaei-vrf-vpn-instance\/"},"wordCount":340,"commentCount":0,"publisher":{"@id":"https:\/\/www.safekom.pl\/blog\/#organization"},"image":{"@id":"https:\/\/www.safekom.pl\/blog\/huawei\/lab-huwaei-vrf-vpn-instance\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2016\/10\/Huawei-Logo-e1394619656563.png?fit=400%2C389&ssl=1","keywords":["bgp ipv4-family vpn-instance","ensp","Huawei ensp","huawei vrf","ip binding vpn-instance","leaking","leaking routing","mp-bgp","vpn-instance","vpn-target","vrf"],"articleSection":["Huawei","Lab"],"inLanguage":"pl-PL","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.safekom.pl\/blog\/huawei\/lab-huwaei-vrf-vpn-instance\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.safekom.pl\/blog\/huawei\/lab-huwaei-vrf-vpn-instance\/","url":"https:\/\/www.safekom.pl\/blog\/huawei\/lab-huwaei-vrf-vpn-instance\/","name":"LAB - Huwaei VRF (vpn-instance) - SafeKom Blog","isPartOf":{"@id":"https:\/\/www.safekom.pl\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.safekom.pl\/blog\/huawei\/lab-huwaei-vrf-vpn-instance\/#primaryimage"},"image":{"@id":"https:\/\/www.safekom.pl\/blog\/huawei\/lab-huwaei-vrf-vpn-instance\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2016\/10\/Huawei-Logo-e1394619656563.png?fit=400%2C389&ssl=1","datePublished":"2017-07-19T10:36:55+00:00","description":"Dzi\u015b poka\u017c\u0119 jak konfiguruje si\u0119 VRF'y (vpn-instance) na platformie sprz\u0119towej firmy Huawei z wykorzystaniem emulatora urz\u0105dze\u0144 eNSP. Huwaei VRF","breadcrumb":{"@id":"https:\/\/www.safekom.pl\/blog\/huawei\/lab-huwaei-vrf-vpn-instance\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.safekom.pl\/blog\/huawei\/lab-huwaei-vrf-vpn-instance\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/www.safekom.pl\/blog\/huawei\/lab-huwaei-vrf-vpn-instance\/#primaryimage","url":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2016\/10\/Huawei-Logo-e1394619656563.png?fit=400%2C389&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2016\/10\/Huawei-Logo-e1394619656563.png?fit=400%2C389&ssl=1","width":400,"height":389},{"@type":"BreadcrumbList","@id":"https:\/\/www.safekom.pl\/blog\/huawei\/lab-huwaei-vrf-vpn-instance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/www.safekom.pl\/blog\/"},{"@type":"ListItem","position":2,"name":"LAB &#8211; Huwaei VRF (vpn-instance)"}]},{"@type":"WebSite","@id":"https:\/\/www.safekom.pl\/blog\/#website","url":"https:\/\/www.safekom.pl\/blog\/","name":"SafeKom Blog","description":"Notatki Architekta i in\u017cyniera zwi\u0105zanego rozwi\u0105zaniami on-prem","publisher":{"@id":"https:\/\/www.safekom.pl\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.safekom.pl\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/www.safekom.pl\/blog\/#organization","name":"SafeKom Blog","url":"https:\/\/www.safekom.pl\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/www.safekom.pl\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/05\/cropped-logo.png?fit=512%2C512&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/05\/cropped-logo.png?fit=512%2C512&ssl=1","width":512,"height":512,"caption":"SafeKom Blog"},"image":{"@id":"https:\/\/www.safekom.pl\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/safekompl","https:\/\/x.com\/MIwaczuk","https:\/\/www.linkedin.com\/in\/michaliwanczuk\/"]},{"@type":"Person","@id":"https:\/\/www.safekom.pl\/blog\/#\/schema\/person\/fd4cc931b624af4b7353d36d92ba7181","name":"Micha\u0142 Iwa\u0144czuk","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/www.safekom.pl\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cc6dda4ee8d21d1f254147e5ee6f5e38881b88a4a12a5774ca42380597e52014?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cc6dda4ee8d21d1f254147e5ee6f5e38881b88a4a12a5774ca42380597e52014?s=96&d=mm&r=g","caption":"Micha\u0142 Iwa\u0144czuk"},"description":"Pasjonat komputerowy od zawsze oraz maniak w zakresie sieci, wirtualizacji oraz bezpiecze\u0144stwa IT. Kompetentny in\u017cynier z du\u017cym do\u015bwiadczeniem w realizacji projekt\u00f3w informatycznych i telekomunikacyjnych. Wieloletni administrator IT, kt\u00f3ry utrzymuje systemy informatyczne dostosowuj\u0105c je do wymog\u00f3w biznesowych z zapewnieniem dost\u0119pno\u015bci 24\/7\/365.","url":"https:\/\/www.safekom.pl\/blog\/author\/admin\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2016\/10\/Huawei-Logo-e1394619656563.png?fit=400%2C389&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p7i9ri-pK","jetpack-related-posts":[{"id":1070,"url":"https:\/\/www.safekom.pl\/blog\/cisco\/lab-vrf-cisco\/","url_meta":{"origin":1596,"position":0},"title":"LAB &#8211; VRF Cisco","author":"Micha\u0142 Iwa\u0144czuk","date":"14.07.2016","format":false,"excerpt":"Ostatnio bardzo du\u017co s\u0142yszymy o wirtualizacji sieci.\u00a0 Warto zatem\u00a0wr\u00f3ci\u0107 do jej podstaw kiedy to ju\u017c wtedy\u00a0w pewien spos\u00f3b \"wirtualizacja\" by\u0142a stosowana\u00a0na \u00a0urz\u0105dzeniach, na kt\u00f3rych separuje si\u0119 tablice routingu. Separacja ta jest\u00a0ukryta pod nazw\u0105 VRF (Virtual Routing and Forwarding). Drugim wariatem na \"wirtualizacj\u0119\" jest tworzenie tzw. wirtualnych system\u00f3w czy router\u00f3w. Dzi\u015b,\u2026","rel":"","context":"In &quot;Cisco&quot;","block_context":{"text":"Cisco","link":"https:\/\/www.safekom.pl\/blog\/category\/cisco\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/09\/cisco-logo.png?fit=400%2C300&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":2657,"url":"https:\/\/www.safekom.pl\/blog\/vmware\/nsx\/nsx-t-evpn\/","url_meta":{"origin":1596,"position":1},"title":"NSX-T EVPN","author":"Micha\u0142 Iwa\u0144czuk","date":"28.04.2020","format":false,"excerpt":"W poprzednim wpisie pokaza\u0142em jak skonfigurowa\u0107 DVS z NSX-t, dzi\u015b przedstawi\u0119 bardzo ciekaw\u0105 now\u0105 funkcjonalno\u015b\u0107 w NSX-T 3.0 jest to EVPN. W dokumentacji VMWare na czas pisania tego wpisu nie znalaz\u0142em za du\u017co informacji o konfiguracji, kt\u00f3r\u0105 poczyni\u0142em poni\u017cej. Mam nadziej\u0119, \u017ce przyda si\u0119 Wam ta wiedza. Co to jest\u2026","rel":"","context":"In &quot;Juniper&quot;","block_context":{"text":"Juniper","link":"https:\/\/www.safekom.pl\/blog\/category\/juniper\/"},"img":{"alt_text":"nsx-t logo","src":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2020\/04\/vmware-nsx-t.jpg?fit=551%2C218&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2020\/04\/vmware-nsx-t.jpg?fit=551%2C218&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2020\/04\/vmware-nsx-t.jpg?fit=551%2C218&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":2567,"url":"https:\/\/www.safekom.pl\/blog\/vmware\/nsx\/nsx-t-ipsec-route-base\/","url_meta":{"origin":1596,"position":2},"title":"NSX-t IPSec Route base","author":"Micha\u0142 Iwa\u0144czuk","date":"26.03.2020","format":false,"excerpt":"W dzisiejszym wpisie przedstawi\u0119 konfiguracj\u0119 NSX-t IPSec Route base, jest to\u00a0 opis krok po kroku jak skonfigurowa\u0107 IPseca po stronie NSX'a oraz Vyos kt\u00f3ry b\u0119dzie uczestnikiem IPseca.\u00a0 Za\u0142o\u017cenia Poni\u017cej rysunek pogl\u0105dowy jak wygl\u0105da topologia po\u0142\u0105cze\u0144. Pomi\u0119dzy routerem T0 i chmurk\u0105 ju\u017c istnieje po\u0142\u0105czenie oraz jest zestawione s\u0105siedztwo BGP w celu\u2026","rel":"","context":"In &quot;NSX&quot;","block_context":{"text":"NSX","link":"https:\/\/www.safekom.pl\/blog\/category\/vmware\/nsx\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2018\/01\/Autobot_symbol.png?fit=1012%2C946&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2018\/01\/Autobot_symbol.png?fit=1012%2C946&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2018\/01\/Autobot_symbol.png?fit=1012%2C946&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2018\/01\/Autobot_symbol.png?fit=1012%2C946&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":2275,"url":"https:\/\/www.safekom.pl\/blog\/vmware\/nsx-t-routing\/","url_meta":{"origin":1596,"position":3},"title":"NSX-t Routing","author":"Micha\u0142 Iwa\u0144czuk","date":"05.03.2018","format":false,"excerpt":"W poprzednich wpisach pokaza\u0142em jak skonfigurowa\u0107 prawie ca\u0142ego NSX-t, dzi\u015b przyszed\u0142 czas na najciekawsze z perspektywy os\u00f3b zajmuj\u0105cych si\u0119 sieci\u0105 - b\u0119dziemy konfigurowa\u0107 NSX-t Routing. Poni\u017cej plan ca\u0142ej serii po\u015bwi\u0119cony NSX-t: Plan Dzia\u0142ania Poni\u017cej plan dzia\u0142ania oraz odno\u015bniki wcze\u015bniejszych wpis\u00f3w o NSX-T. Instalacja NSX Managera Instalacja NSX-t Controller pod\u0142\u0105czenie ich\u2026","rel":"","context":"In &quot;Lab&quot;","block_context":{"text":"Lab","link":"https:\/\/www.safekom.pl\/blog\/en\/category\/lab\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2018\/01\/nsx-t-lab03.png?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2018\/01\/nsx-t-lab03.png?resize=350%2C200 1x, https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2018\/01\/nsx-t-lab03.png?resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2018\/01\/nsx-t-lab03.png?resize=700%2C400 2x"},"classes":[]},{"id":693,"url":"https:\/\/www.safekom.pl\/blog\/cisco\/lab-vxvlan-pierwsze-podjescie\/","url_meta":{"origin":1596,"position":4},"title":"LAB &#8211; VXVLAN pierwsze podje\u015bcie","author":"Micha\u0142 Iwa\u0144czuk","date":"03.04.2016","format":false,"excerpt":"Ostatnio uczestniczy\u0142em w ciekawym webbinarium zorganizowane przy forum CCIE.pl pod tytu\u0142em\u00a0DCI \"po nowemu\" - prezentacj\u0119 prowadzi\u0142\u00a0Piotr Jab\u0142o\u0144ski. Piotr pokazywa\u0142 jak w dzisiejszych czasach mo\u017cna wykorzysta\u0107 technologi\u0119 VXVLAN do rozci\u0105gania L2 pomi\u0119dzy DataCenter lub w samym DC. Po obejrzeniu stwierdzi\u0142em \u017ce trzeba zbudowa\u0107 laba i zobaczy\u0107 z czym si\u0119 to je\u2026","rel":"","context":"In &quot;Cisco&quot;","block_context":{"text":"Cisco","link":"https:\/\/www.safekom.pl\/blog\/category\/cisco\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/09\/cisco-logo.png?fit=400%2C300&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":457,"url":"https:\/\/www.safekom.pl\/blog\/cisco\/cisco-asa-ograniczenie-dostepu-do-ssl-vpn\/","url_meta":{"origin":1596,"position":5},"title":"Cisco ASA &#8211; Ograniczenie dost\u0119pu do SSL VPN oraz IKE","author":"Micha\u0142 Iwa\u0144czuk","date":"30.12.2015","format":false,"excerpt":"Dla szukaj\u0105cych jak ograniczy\u0107 dost\u0119p do us\u0142ug uruchamianych na Cisco ASA, mam na my\u015bli SSL VPN, czy IKE na samy dole jest aktualizacja jak to zrobi\u0107 dla IKE przy podatno\u015bci\u00a0CVE-2016-1287 Poni\u017cej przedstawi\u0119 jak ograniczy\u0107 dost\u0119p do SSL VPN dla okre\u015blonych ip lub sieci. definiujemy Grup\u0119 w kt\u00f3ra b\u0119dzie zawiera\u0107 list\u0119\u2026","rel":"","context":"In &quot;Cisco&quot;","block_context":{"text":"Cisco","link":"https:\/\/www.safekom.pl\/blog\/category\/cisco\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/09\/cisco-logo.png?fit=400%2C300&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/posts\/1596","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/comments?post=1596"}],"version-history":[{"count":0,"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/posts\/1596\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/media\/1223"}],"wp:attachment":[{"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/media?parent=1596"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/categories?post=1596"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/tags?post=1596"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}