第三章综合实验
一、实验拓扑
- 二、实验需求
1、R5为ISP,只能进行IP地址配置,其所有地址均配为公有IP地址;
2、R1和R5间使用PPP的PAP认证,R5为主认证方;
R2与R5之间使用pp的CHAP认证,R5为主认证方;
R3与R5之间使用HDLC封装;
3、R1、R2、R3构建一个MGRE环境,R1为中心站点,R1、R4间为点到点的GRE;
4、整个私有网络基本RIP全网可达;
5、所有PC设置私有IP为源IP,可以访问R5环回。
三、实验思路
1、配置IP地址
2、私网通,公网通---配置静态路由协议,测试公网通
3、配置R1-R5的ppp的pap认证,R5为主认证方
4、R2与R5之间使用ppp的CHAP认证,R5为主认证方;
5、R3与R5之间使用HDLC封装;
6、配置GRE VPN
7、配置MGRE VPN
(1)配置NHRP协议,构建公共隧道
(2)配置NHRP 协议使分支机构将自己的隧道地址和公网地址发给总部
(3)配置RIPV2,传递两端的私网路由,实现总部和分部,分部和分部之间的互通
(4)在中心站点上开启伪广播功能
(5)关闭中心和分支站点的RIP的水平分割机制
四、实验步骤
1、配置IP地址,配置静态路由协议,测试公网通
[R1-GigabitEthernet0/0/0]ip add 192.168.1.254 24
[R1-Serial4/0/0]ip add 15.1.1.1 24
[R2-GigabitEthernet0/0/0]ip add 192.168.2.254 24
[R2-Serial4/0/0]ip add 25.1.1.2 24
[R3-GigabitEthernet0/0/0]ip add 192.168.3.254 24
[R3-GigabitEthernet0/0/0]int s4/0/0
[R3-Serial4/0/0]ip add 35.1.1.3 24
[R4-GigabitEthernet0/0/1]ip add 192.168.4.254 24
[R4-GigabitEthernet0/0/1]int g0/0/0
[R4-GigabitEthernet0/0/0]ip add 45.1.1.1 24
[R5]interface Serial 4/0/0
[R5-Serial4/0/0]ip address 15.1.1.5 24 // 连接 R1
[R5]interface Serial 3/0/1
[R5-Serial3/0/1]ip address 25.1.1.5 24 // 连接 R2
[R5]interface Serial 4/0/1
[R5-Serial4/0/1]ip address 35.1.1.5 24 // 连接 R3
[R5]interface GigabitEthernet 0/0/0
[R5-GigabitEthernet0/0/0]ip address 45.1.1.5 24 // 连接 R4
[R5]interface LoopBack 0
[R5-LoopBack0]ip address 5.5.5.5 24 // R5回环,作为测试目标
私网公网连通--配静态路由
[R1]ip route-static 0.0.0.0 0 15.1.1.5
[R2]ip route-static 0.0.0.0 0 25.1.1.5
[R3]ip route-static 0.0.0.0 0 35.1.1.5
[R4]ip route-static 0.0.0.0 0 45.1.1.5
查看IP配置:
2、R1和R5间使用ppp的PAP认证,R5为主认证方;
[ISP]aaa
[ISP-aaa]local-user wangdaye password cipher wdy12345 privilege level 15
[ISP-aaa]local-user wangdaye service-type ppp//设置主验证方提供的服务类型
[ISP-Serial4/0/1]ppp authentication-mode pap
[ISP-Serial4/0/1]q
R1被认证方:
[R1-Serial4/0/0]ppp chap user wangdaye//告知被验证方,验证的方式及用户名和密码
[R1-Serial4/0/0]ppp chap password cipher wdy12345
[R1-Serial4/0/0]ppp pap local-user wangdaye password cipher wdy12345
[R1-Serial4/0/0]q
R2与R5之间使用ppp的CHAP认证,R5为主认证方;
[ISP]int s3/0/1
[ISP-Serial3/0/1]ppp authentication-mode chap//R2和R5用ppp的CHAP认证
[ISP-Serial3/0/1]q
R2被认证方:
[R2-Serial4/0/0]ppp chap user wangdaye
[R2-Serial4/0/0]ppp chap password cipher wdy12345
[R2-Serial4/0/0]ppp pap local-user wangdaye password cipher wdy12345
[R2-Serial4/0/0]q
R3与R5之间使用HDLC封装:
[ISP]int s 4/0/0
[ISP-Serial4/0/0]ppp authentication-mode chap
[ISP-Serial4/0/0]link-protocol hdlc//设置接口报文的封装模式
[R3-Serial4/0/0]ppp chap user wangdaye
[R3-Serial4/0/0]ppp chap password cipher wdy12345
[R3-Serial4/0/0]ppp pap local-user wangdaye password cipher wdy12345
R3和R5之间使用HDLC封装:
3、配置GRE VPN
总部R1
R1-Tunnel0/0/0]ip add 10.1.1.1 24
[R1-Tunnel0/0/0]tunnel-protocol
[R1-Tunnel0/0/0]source 15.1.1.1
[R1-Tunnel0/0/0]destination 45.1.1.2
分支:R4
[R4]int Tunnel 0/0/0
[R4-Tunnel0/0/0]tunnel-protocol gre
[R4-Tunnel0/0/0]source 15.1.1.2
[R4-Tunnel0/0/0]destination 15.1.1.
4配置MGRE VPN
配置NHRP协议
[R1]int Tunnel 0/0/1
[R1-Tunnel0/0/1]ip add 10.1.2.1 24
[R1-Tunnel0/0/1]tunnel-protocol gre p2mp
[R1-Tunnel0/0/1]source 15.1.1.1
[R1-Tunnel0/0/1]nhrp network-id 100
[R1-Tunnel0/0/1]nhrp entry multicast dynamic
[R2]int Tunnel 0/0/1
[R2-Tunnel0/0/1]ip add 10.1.2.2 24
[R2-Tunnel0/0/1]tunnel-protocol gre p2mp
[R2-Tunnel0/0/1]source Serial 4/0/0
[R2-Tunnel0/0/1]nhrp network-id 100
[R2-Tunnel0/0/1]nhrp entry 10.1.2.1 15.1.1.1 register
[R3]int Tunnel 0/0/1
[R3-Tunnel0/0/1]ip add 10.1.2.3 24
[R3-Tunnel0/0/1]tunnel-protocol gre p2mp
[R3-Tunnel0/0/1]source Serial 4/0/0
[R3-Tunnel0/0/1]nhrp network-id 100
[R3-Tunnel0/0/1]nhrp entry 10.1.2.1 15.1.1.1 register
RIPV2配置
[R1]rip 1
[R1-rip-1]v 2
[R1-rip-1]undo summary
[R1-rip-1]network 10.0.0.0
[R1-rip-1]network 192.168.1.0
[R2]rip 1
[R2-rip-1]v 2
[R2-rip-1]undo summary
[R2-rip-1]network 192.168.2.0
[R2-rip-1]network 10.0.0.0
[R3]rip 1
[R3-rip-1]v 2
[R3-rip-1]undo summary
[R3-rip-1]network 192.168.3.0
[R3-rip-1]network 10.0.0.0
开启伪广播功能:
[R1]int Tunnel 0/0/1\n
[R1-Tunnel0/0/1]nhrp entry multicast dynamic\n\n
关闭水平分割:
[R1-Tunnel0/0/1]undo rip split-horizon
[R2-Tunnel0/0/1]undo rip split-horizon
[R3-Tunnel0/0/1]undo rip split-horizon
5、PC访问R5隧道环回
在R1、R2、R3、R4上配置nat的easy-ip
[R1]acl 2000
[R1-acl-basic-2000]rule permit source 192.168.1.0 0.0.0.255
[R1-acl-basic-2000]q\n[R1]int s 4/0/0
[R1-Serial4/0/0]nat outbound 2000
[R2]acl 2000\n
[R2-acl-basic-2000]rule permit source 192.168.2.0 0.0.0.255
[R2-acl-basic-2000]q
[R2]int s 4/0/0
[R2-Serial4/0/0]nat outbound 2000
[R3]acl 2000
[R3-acl-basic-2000]rule permit source 192.168.3.0 0.0.0.255
[R3]int s 4/0/0
[R3-Serial4/0/0]nat outbound 2000\n\n
[R4]acl 2000
[R4-acl-basic-2000]rule permit source 192.168.4.0 0.0.0.255\n
[R4-acl-basic-2000]q\n[R4]int g 0/0/0
[R4-GigabitEthernet0/0/0]nat outbound 2000
6、ping通测试
