2021-09-13 MGRE实验

该实验涉及五台路由器(R1-R5)的配置,包括PPP、GRE隧道、RIP路由协议等,以实现网络互连。测试了R1到R2,R2到R3,R4到R1以及R2与R5环回接口的联通性,旨在提升对网络配置指令的熟悉度。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

                         MGRE实验
                         ![在这里插入图片描述](https://img-blog.csdnimg.cn/3376e6b9e31d460f98fe7abad4071985.png?x-oss-process=image/watermark,type_ZHJvaWRzYW5zZmFsbGJhY2s,shadow_50,text_Q1NETiBA5Lic5Z2h54yr,size_20,color_FFFFFF,t_70,g_se,x_16#pic_center)

1.实验拓扑图如下所示
在这里插入图片描述
各段地址的详细划分在图上已经标明。
2.R1到R5路由器上面的详细配置情况

R1路由器
dis current-configuration
[V200R003C00]

sysname R1

board add 0/2 2SA

snmp-agent local-engineid 800007DB03000000000000
snmp-agent

clock timezone China-Standard-Time minus 08:00:00

portal local-server load flash:/portalpage.zip

drop illegal-mac alarm

wlan ac-global carrier id other ac id 0

set cpu-usage threshold 80 restore 75

aaa
authentication-scheme default
authorization-scheme default
accounting-scheme default
domain default
domain default_admin
local-user admin password cipher %%K8m.Nt84DZ}e#<0`8bmE3Uw}%%
local-user admin service-type http

firewall zone Local
priority 15

interface Ethernet0/0/0

interface Ethernet0/0/1

interface Ethernet0/0/2

interface Ethernet0/0/3

interface Ethernet0/0/4

interface Ethernet0/0/5

interface Ethernet0/0/6

interface Ethernet0/0/7

interface Serial2/0/0
link-protocol ppp
ppp pap local-user haha password cipher %%>`(s*~-c"C8yo#2dh64!,./q%%
ip address 15.1.1.2 255.255.255.252

interface Serial2/0/1
link-protocol ppp

interface GigabitEthernet0/0/0

interface GigabitEthernet0/0/1

interface NULL0

interface LoopBack0
ip address 10.1.1.1 255.255.255.0

interface Tunnel0/0/0
ip address 1.1.1.1 255.255.255.0
tunnel-protocol gre
source 15.1.1.2
destination 45.1.1.2

rip 1
undo summary
version 2
network 15.0.0.0
network 10.0.0.0

user-interface con 0
authentication-mode password
user-interface vty 0 4
user-interface vty 16 20

wlan ac

R2路由器
dis current-configuration
[V200R003C00]

sysname R2

board add 0/2 2SA

snmp-agent local-engineid 800007DB03000000000000
snmp-agent

clock timezone China-Standard-Time minus 08:00:00

portal local-server load flash:/portalpage.zip

drop illegal-mac alarm

wlan ac-global carrier id other ac id 0

set cpu-usage threshold 80 restore 75

aaa
authentication-scheme default
authorization-scheme default
accounting-scheme default
domain default
domain default_admin
local-user admin password cipher %%K8m.Nt84DZ}e#<0`8bmE3Uw}%%
local-user admin service-type http

firewall zone Local
priority 15

interface Ethernet0/0/0

interface Ethernet0/0/1

interface Ethernet0/0/2

interface Ethernet0/0/3

interface Ethernet0/0/4

interface Ethernet0/0/5

interface Ethernet0/0/6

interface Ethernet0/0/7

interface Serial2/0/0
link-protocol ppp
ppp chap user haha
ppp chap password cipher %%dkVx"*N,L03g!j@H2V}Q,"EW%%
ip address 25.1.1.2 255.255.255.252

interface Serial2/0/1
link-protocol ppp

interface GigabitEthernet0/0/0

interface GigabitEthernet0/0/1

interface NULL0

interface LoopBack0
ip address 20.1.1.1 255.255.255.0

interface Tunnel0/0/0
ip address 1.1.1.2 255.255.255.0
tunnel-protocol gre p2mp
source Serial2/0/0
nhrp network-id 100
nhrp entry 1.1.1.1 15.1.1.2 register

rip 1
undo summary
version 2
network 25.0.0.0
network 20.0.0.0

user-interface con 0
authentication-mode password
user-interface vty 0 4
user-interface vty 16 20

wlan ac

return

R3路由器
dis current-configuration
[V200R003C00]

sysname R3

board add 0/2 2SA

snmp-agent local-engineid 800007DB03000000000000
snmp-agent

clock timezone China-Standard-Time minus 08:00:00

portal local-server load flash:/portalpage.zip

drop illegal-mac alarm

wlan ac-global carrier id other ac id 0

set cpu-usage threshold 80 restore 75

aaa
authentication-scheme default
authorization-scheme default
accounting-scheme default
domain default
domain default_admin
local-user admin password cipher %%K8m.Nt84DZ}e#<0`8bmE3Uw}%%
local-user admin service-type http

firewall zone Local
priority 15

interface Ethernet0/0/0

interface Ethernet0/0/1

interface Ethernet0/0/2

interface Ethernet0/0/3

interface Ethernet0/0/4

interface Ethernet0/0/5

interface Ethernet0/0/6

interface Ethernet0/0/7

interface Serial2/0/0
link-protocol hdlc
ip address 35.1.1.2 255.255.255.252

interface Serial2/0/1
link-protocol ppp

interface GigabitEthernet0/0/0

interface GigabitEthernet0/0/1

interface NULL0

interface LoopBack0
ip address 30.1.1.1 255.255.255.0

interface Tunnel0/0/0
ip address 1.1.1.3 255.255.255.0
tunnel-protocol gre p2mp
source Serial2/0/0
nhrp network-id 100
nhrp entry 1.1.1.1 15.1.1.2 register

rip 1
undo summary
version 2
network 35.0.0.0
network 30.0.0.0

user-interface con 0
authentication-mode password
user-interface vty 0 4
user-interface vty 16 20

wlan ac

return

R4路由器

dis current-configuration
[V200R003C00]

sysname R4

snmp-agent local-engineid 800007DB03000000000000
snmp-agent

clock timezone China-Standard-Time minus 08:00:00

portal local-server load flash:/portalpage.zip

drop illegal-mac alarm

wlan ac-global carrier id other ac id 0

set cpu-usage threshold 80 restore 75

aaa
authentication-scheme default
authorization-scheme default
accounting-scheme default
domain default
domain default_admin
local-user admin password cipher %%K8m.Nt84DZ}e#<0`8bmE3Uw}%%
local-user admin service-type http

firewall zone Local
priority 15

interface Ethernet0/0/0

interface Ethernet0/0/1

interface Ethernet0/0/2

interface Ethernet0/0/3

interface Ethernet0/0/4

interface Ethernet0/0/5

interface Ethernet0/0/6

interface Ethernet0/0/7

interface GigabitEthernet0/0/0
ip address 45.1.1.2 255.255.255.252

interface GigabitEthernet0/0/1

interface NULL0

interface LoopBack0
ip address 40.1.1.1 255.255.255.0

interface Tunnel0/0/0
ip address 1.1.1.1 255.255.255.0
tunnel-protocol gre
source 45.1.1.2
destination 15.1.1.2

rip 1
undo summary
version 2
network 45.0.0.0
network 40.0.0.0

user-interface con 0
authentication-mode password
user-interface vty 0 4
user-interface vty 16 20

wlan ac

return

R5路由器

dis current-configuration
[V200R003C00]

sysname R5

board add 0/1 2SA
board add 0/2 2SA

snmp-agent local-engineid 800007DB03000000000000
snmp-agent

clock timezone China-Standard-Time minus 08:00:00

portal local-server load flash:/portalpage.zip

drop illegal-mac alarm

wlan ac-global carrier id other ac id 0

set cpu-usage threshold 80 restore 75

aaa
authentication-scheme default
authorization-scheme default
accounting-scheme default
domain default
domain default_admin
local-user haha password cipher %%[l:sYKB}8@xToQQ>D:/&B6Gb%%
local-user haha service-type ppp
local-user admin password cipher %%K8m.Nt84DZ}e#<0`8bmE3Uw}%%
local-user admin service-type http
local-user huaiwei password cipher %%xUl^.TK{m55L@(Ht7XS2B/7*%%

firewall zone Local
priority 15

interface Ethernet0/0/0

interface Ethernet0/0/1

interface Ethernet0/0/2

interface Ethernet0/0/3

interface Ethernet0/0/4

interface Ethernet0/0/5

interface Ethernet0/0/6

interface Ethernet0/0/7

interface Serial1/0/0
link-protocol ppp
ppp authentication-mode pap
ip address 15.1.1.1 255.255.255.252

interface Serial1/0/1
link-protocol ppp
ppp authentication-mode chap
ip address 25.1.1.1 255.255.255.252

interface Serial2/0/0
link-protocol hdlc
ip address 35.1.1.1 255.255.255.252

interface Serial2/0/1
link-protocol ppp

interface GigabitEthernet0/0/0
ip address 45.1.1.1 255.255.255.252

interface GigabitEthernet0/0/1

interface NULL0

interface LoopBack0
ip address 50.1.1.1 255.255.255.0

rip 1
undo summary
version 2
network 15.0.0.0
network 25.0.0.0
network 35.0.0.0
network 45.0.0.0
network 50.0.0.0

user-interface con 0
authentication-mode password
user-interface vty 0 4
user-interface vty 16 20

wlan ac

return
3.测试
通过在模拟器上进行配置本实验的5条要求均已达成,下面就联通性方面进行测试。
(1)在R1上的串口pingR2上的串口
在这里插入图片描述

(2)R2上的串口pingR3上的串口
在这里插入图片描述
(3)在R4上pingR1

在这里插入图片描述
(4)R2环回pingR5环回
在这里插入图片描述
4总结
本次实验规模比较小,主要目的在于练习对指令的熟悉度,应该多尝试几次,脱离文档进行实验配置。

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值