一、实验要求
二、实验步骤
1.新建拓扑
2.为每个节点划分IP
R1:
[R1]int g0/0/1
[R1-GigabitEthernet0/0/1]ip address 192.168.1.1 24
[R1-GigabitEthernet0/0/1]q
[R1]int s4/0/0
[R1-Serial4/0/0]ip address 12.1.1.1 24
R2:
R2]int s4/0/0
[R2-Serial4/0/0]ip address 12.1.1.2 24
[R2-Serial4/0/0]q
[R2]int s4/0/1
[R2-Serial4/0/1]ip address 12.1.2.2 24
[R2-Serial4/0/1]q
[R2]int s3/0/0
[R2-Serial3/0/0]ip address 12.1.3.2 24
[R2-Serial3/0/0]q
R3:
[R3]int g0/0/1
[R3-GigabitEthernet0/0/1]ip address 192.168.2.1 24
[R3-GigabitEthernet0/0/1]q
[R3]int s4/0/0
[R3-Serial4/0/0]ip address 12.1.2.1 24
[R3-Serial4/0/0]q
R4:
[R4]int g0/0/1
[R4-GigabitEthernet0/0/1]ip address 192.168.3.1 24
[R4-GigabitEthernet0/0/1]q
[R4]int s4/0/0
[R4-Serial4/0/0]ip address 12.1.3.1 24
[R4-Serial4/0/0]q
3.静态路由
R1
[R1]ip route-static 0.0.0.0 0 12.1.1.2
R3
[R3]ip route-static 0.0.0.0 0 12.1.2.2
R4
[R4]ip route-static 0.0.0.0 0 12.1.3.2
4.NAT
R1
[R1]acl 2000
[R1-acl-basic-2000]rule permit source 192.168.1.0 0.0.0.255
[R1-acl-basic-2000]q
[R1]int s4/0/0
[R1-Serial4/0/0]nat outbound 2000
[R1-Serial4/0/0]q
R3
[R3]acl 2000
[R3-acl-basic-2000]rule permit source 192.168.2.0 0.0.0.255
[R3-acl-basic-2000]q
[R3]int s4/0/0
[R3-Serial4/0/0]nat outbound 2000
[R3-Serial4/0/0]q
R4
[R4]acl 2000
[R4-acl-basic-2000]rule permit source 192.168.3.0 0.0.0.255
[R4-acl-basic-2000]q
[R4]int s4/0/0
[R4-Serial4/0/0]nat outbound 2000
[R4-Serial4/0/0]q
5.根据需求进行封装,认证
- R1-R2之间为HDLC封装
- R2-R3之间为PPP封装,pap认证,R2为主认证方
- R2-R4之间为PPP封装,chap认证,R2为主认证方
R1
[R1]int s4/0/0
[R1-Serial4/0/0]link-protocol hdlc
[R1-Serial4/0/0]q
R2
[R2]int s4/0/0
[R2-Serial4/0/0]link-protocol hdlc
[R2-Serial4/0/0]q
R2—主认证方
[R2]aaa
[R2-aaa]local-user jyp privilege level 15 password cipher 123456
[R2-aaa]local-user jyp service-type ppp
[r2-Serial4/0/1]ppp authentication-mode pap
R3—被认证方
[R3]int s4/0/0
[R3-Serial4/0/0]ppp pap local-user jzl password cipher 123456
3. R2-R4之间为PPP封装,chap认证,R2为主认证方
R2—主认证方
[R2]aaa
[R2-aaa]local-user qq privilege level 15 password cipher 12345
[R2-aaa]local-user qq service-type ppp
[R2-aaa]q
[R2]int s3/0/0
[R2-Serial3/0/0]ppp authentication-mode chap
R4—被认证方
[R4]int s4/0/0
[R4-Serial4/0/0]ppp chap password cipher 12345
[R4-Serial4/0/0]ppp chap user qq
[R4-Serial4/0/0]q
6. MCRE
R1—中心站点
[R1]int Tunnel 0/0/0
[R1-Tunnel0/0/0]ip add 10.1.1.1 24
[R1-Tunnel0/0/0]tunnel-protocol gre p2mp
[R1-Tunnel0/0/0]source 12.1.1.1
[R1-Tunnel0/0/0]nhrp entry multicast dynamic
[R1-Tunnel0/0/0]nhrp network-id 2
R3—分支站点
[R3]int Tunnel 0/0/0
[R3-Tunnel0/0/0]ip add 10.1.1.2 24
[R3-Tunnel0/0/0]tunnel-protocol gre p2mp
[R3-Tunnel0/0/0]source s4/0/0
[R3-Tunnel0/0/0]nhrp entry 10.1.1.1 12.1.1.1 register
[R3-Tunnel0/0/0]nhrp network-id 2
R4—分支站点
[R4]int Tunnel 0/0/0
[R4-Tunnel0/0/0]ip add 10.1.1.3 24
[R4-Tunnel0/0/0]tunnel-protocol gre p2mp
[R4-Tunnel0/0/0]source s4/0/0
[R4-Tunnel0/0/0]nhrp entry 10.1.1.1 12.1.1.1 register
[R4-Tunnel0/0/0]nhrp network-id 2
7.RIP
R1
[R1]rip 1
[R1-rip-1]ver 2
[R1-rip-1]network 192.168.1.0
[R1-rip-1]network 10.0.0.0
R3
[R3]rip 1
[R3-rip-1]ver 2
[R3-rip-1]network 192.168.2.0
[R3-rip-1]network 10.0.0.0
R4
[R4]rip 1
[R4-rip-1]ver 2
[R4-rip-1]network 192.168.3.0
[R4-rip-1]network 10.0.0.0
8.取消水平分割
[R1]int t0/0/0
[R1-Tunnel0/0/0]undo rip split-horizon
三.实验结果
pc1 ping pc2
R4 ping 12.1.1.2