HCIP----MGRE实验

发布时间:2024年01月22日

实验要求:

第一步,基本的IP地址配置

R1:

[R1]int g0/0/1
[R1-GigabitEthernet0/0/1]ip add 192.168.1.1 24      #配置PC的网关
[R1]int Serial 4/0/0
[R1-Serial4/0/0]link-protocol hdlc                  #R1和R2之间采用hdlc封装
[R1-Serial4/0/0]ip add 12.1.1.1 24

R2:

[ISP]int Serial 4/0/1	
[ISP-Serial4/0/1]link-protocol hdlc      R1和R2之间采用hdlc
[ISP-Serial4/0/1]ip add 12.1.1.2 24

[ISP]int Serial 3/0/0
[ISP-Serial3/0/0]ip add 23.1.1.1 24       #这里R2和R3、R4之间采用PPP,由于这接口本来就是PPP,所以不用设置
[ISP]int Serial 3/0/1
[ISP-Serial3/0/1]ip add 24.1.1.1 24
[ISP]int lo 0                             #创建环回
[ISP-LoopBack0]ip  add 2.2.2.2 24

R3:

[R3]int g0/0/1
[R3-GigabitEthernet0/0/1]ip  add 192.168.2.1 24
[R3]int Serial 4/0/1
[R3-Serial4/0/1]ip add 23.1.1.2 24

R4:

[R4]int g0/0/1
[R4-GigabitEthernet0/0/1]ip add 192.168.3.1 24
[R4]int Serial 4/0/1
[R4-Serial4/0/1]ip add 24.1.1.2 24

第二步,写上对应的认证:

R2

[ISP]aaa
[ISP-aaa]local-user tmg password cipher 123      #创建认证用户
Info: Add a new user.
[ISP-aaa]local-user tmg service-type ppp          #设置服务类型为PPP
[ISP-aaa]q
[ISP]int Serial 3/0/0
[ISP-Serial3/0/0]ppp authentication-mode pap      #R2和R3之间用PAP
[ISP-Serial3/0/0]q
[ISP]int Serial 3/0/1
[ISP-Serial3/0/1]ppp  authentication-mode chap     #R2和R4之间使用CHAP

R3

[R3]int Serial 4/0/1
[R3-Serial4/0/1]ppp pap local-user tmg password cipher 123

R4

[R4]int Serial 4/0/1
[R4-Serial4/0/1]ppp chap user tmg
[R4-Serial4/0/1]ppp chap password cipher 123

第三步,所有PC都可以访问R2的环回

R1

[R1]ip route-static 0.0.0.0 0 12.1.1.2
[R1]acl 2000
[R1-acl-basic-2000]rule permit source any     #这时的PC相当于私网,通过NAT技术访问R2
[R1-acl-basic-2000]q	
[R1]int Serial 4/0/0
[R1-Serial4/0/0]nat outbound 2000             #NAT接口调用

R3

[R3]ip route-static 0.0.0.0 0 23.1.1.1
[R3]acl 2000
[R3-acl-basic-2000]rule permit source any 
[R3-acl-basic-2000]q	
[R3]int Serial 4/0/1
[R3-Serial4/0/1]nat outbound 2000

R4

[R4]ip route-static 0.0.0.0 0 24.1.1.1
[R4]acl 2000	
[R4-acl-basic-2000]rule permit source any 
[R4-acl-basic-2000]q
[R4]int Serial 4/0/1
[R4-Serial4/0/1]nat outbound 2000

这时PC就可以访问2.2.2.2R2的环回。

第四步,建立MGRE

R1

[R1]int Tunnel 0/0/0
[R1-Tunnel0/0/0]ip add 10.1.1.1 24	
[R1-Tunnel0/0/0]tunnel-protocol gre p2mp 
[R1-Tunnel0/0/0]source 12.1.1.1
Jan 22 2024 21:36:00-08:00 R1 %%01IFNET/4/LINK_STATE(l)[0]:The line protocol IP 
on the interface Tunnel0/0/0 has entered the UP state. 

[R1-Tunnel0/0/0]nhrp entry multicast dynamic 
[R1-Tunnel0/0/0]nhrp network-id 100

R3

[R3]int Tunnel 0/0/0
[R3-Tunnel0/0/0]ip add 10.1.1.2 24
[R3-Tunnel0/0/0]tunnel-protocol gre p2mp 	
[R3-Tunnel0/0/0]source Serial 4/0/1
Jan 22 2024 21:38:20-08:00 R3 %%01IFNET/4/LINK_STATE(l)[0]:The line protocol IP 
on the interface Tunnel0/0/0 has entered the UP state. 

[R3-Tunnel0/0/0]nhrp entry 10.1.1.1 12.1.1.1 register 
[R3-Tunnel0/0/0]nhrp network-id 100

R4

[R4]int Tunnel 0/0/0
[R4-Tunnel0/0/0]ip add 10.1.1.3 24	
[R4-Tunnel0/0/0]tunnel-protocol gre p2mp 	
[R4-Tunnel0/0/0]source Serial 4/0/1
Jan 22 2024 21:40:26-08:00 R4 %%01IFNET/4/LINK_STATE(l)[0]:The line protocol IP 
on the interface Tunnel0/0/0 has entered the UP state. 

[R4-Tunnel0/0/0]nhrp entry 10.1.1.1 12.1.1.1 register 
[R4-Tunnel0/0/0]nhrp network-id 100

在R1上查看连个节点都注册成功

第五步,通过RIP达到私网的互通

R1

[R1]rip 1
[R1-rip-1]version 2
[R1-rip-1]net 192.168.1.0
[R1-rip-1]net 10.0.0.0

R3

[R3]rip 1
[R3-rip-1]version 2
[R3-rip-1]net 192.168.2.0
[R3-rip-1]net 10.0.0.0

R4

[R4]rip 1
[R4-rip-1]version 2
[R4-rip-1]net 192.168.3.0
[R4-rip-1]net 10.0.0.0

关闭中心接口上的水平分割机制R1

[R1]int Tunnel 0/0/0
[R1-Tunnel0/0/0]undo rip split-horizon 

实验完成

文章来源:https://blog.csdn.net/Tmg3202915143/article/details/135758180
本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。