一、实验拓扑
二、实验需求
1.R5为ISP,只能进行IP地址配置,其所有地址均配为共有IP地址
2.R1和R5间使用ppp的pap认证,R5为主认证方
3.R2与R5之间使用ppp的chap认证,R5为主认证方
4.R3与R5之间使用HDLC封装
5.R1、R2、R3构建一个MGRE环境,R1为中心站点,R1、R4间为点到点的GRE
6.整个私有网络基本RIP全网可达
7.所有PC设置私有IP为源IP,可以访问R5环回,达到全网通
三、实验思路
1.配置相应的IP地址
2.R1和R5进行ppp的pap认证,R5为主认证方,R1为被认证方
3.R2与R5之间使用ppp的chap认证,R5为主认证方,R2为被认证方
4.R3与R5进入接口下修改封装模式为HDLC
5.公网配置缺省路由,实现公网互通,并测试,然后创建MGRE和GRE
6.配置RIP协议完成后,进到MGRE隧道中开启伪广播功能,并查看路由表和NHRP协议,然后测试
7.在所有内外网出口做NAT,使用EASY IP,并测试全网通
四、实验步骤
1.配置IP地址
R1:
R2:
R3:
R4:
R5:
2.R1和R5进行ppp的pap认证,并测试
R5为主认证方:
[R5]aaa
[R5-aaa]local-user xiaoyu password cipher xy12345
[R5-aaa]local-user wangdaye service-type ppp
[R5]int Serial 4/0/1
[R5-Serial4/0/1]ppp authentication-mode pap
R1为被认证方:
[R1]interface Serial 4/0/0
[R1-Serial4/0/0]ppp pap local-user xiaoyu password cipher xy12345
[R1-Serial4/0/0]shutdown
[R1-Serial4/0/0]undo shutdown
测试:
3.R2与R5之间使用ppp的chap认证
R5为认证方:
[R5]int s3/0/1
[R5-Serial3/0/1]ppp authentication-mode chap
R2为被认证方:
[R2]int s4/0/0
[R2-Serial4/0/0]ppp chap user xiaoyu
[R2-Serial4/0/0]ppp chap password cipher xy12345
[R2-Serial4/0/0]shutdown
[R2-Serial4/0/0]undo shutdown
测试:
4.R3与R5进入接口下修改封装模式为HDLC,并测试
[R3]int s4/0/0
[R3-Serial4/0/0]link-protocol hdlc
[R5]int s4/0/0
[R5-Serial4/0/0]link-protocol hdlc
5.公网配置缺省路由,实现公网互通,并测试,然后创建MGRE和GRE
[R1]ip route-static 0.0.0.0 0 15.1.1.5
[R2]ip route-static 0.0.0.0 0 25.1.1.5
[R3]ip route-static 0.0.0.0 0 35.1.1.5
[R4]ip route-static 0.0.0.0 0 45.1.1.5
测试:
MGRE:
[R1]int tunnel 0/0/0
[R1-Tunnel0/0/0]ip add 10.1.1.1 24
[R1-Tunnel0/0/0]tunnel-protocol gre p2mp
[R1-Tunnel0/0/0]source 15.1.1.1
[R1-Tunnel0/0/0]nhrp network-id 100
[R2]int tunnel 0/0/0
[R2-Tunnel0/0/0]ip add 10.1.1.2 24
[R2-Tunnel0/0/0]tunnel-protocol gre p2mp
[R2-Tunnel0/0/0]source Serial 4/0/0
[R2-Tunnel0/0/0]nhrp network-id 100
[R2-Tunnel0/0/0]nhrp entry 10.1.1.1 15.1.1.1 register
[R3]int tunnel 0/0/0
[R3-Tunnel0/0/0]ip add 10.1.1.3 24
[R3-Tunnel0/0/0]tunnel-protocol gre p2mp
[R3-Tunnel0/0/0]source Serial 4/0/0
[R3-Tunnel0/0/0]nhrp network-id 100
[R3-Tunnel0/0/0]nhrp entry 10.1.1.1 15.1.1.1 register
GRE:
[R1]int tunnel 0/0/1
[R1-Tunnel0/0/1]ip add 10.1.2.1 24
[R1-Tunnel0/0/1]tunnel-protocol gre
[R1-Tunnel0/0/1]source 15.1.1.1
[R1-Tunnel0/0/1]destination 45.1.1.4
[R4]int tunnel 0/0/1
[R4-Tunnel0/0/1]ip add 10.1.2.4 24
[R4-Tunnel0/0/1]tunnel-protocol gre
[R4-Tunnel0/0/1]source 45.1.1.4
[R4-Tunnel0/0/1]destination 15.1.1.1
6.配置RIP协议完成后,进到MGRE隧道中开启伪广播功能,并查看路由表和NHRP协议,然后测试
[R1]rip 1
[R1-rip-1]version 2
[R1-rip-1]undo summary
[R1-rip-1]network 192.168.1.0
[R1-rip-1]network 10.0.0.0
[R2]rip 1
[R2-rip-1]version 2
[R2-rip-1]undo summary
[R2-rip-1]network 192.168.2.0
[R2-rip-1]network 10.0.0.0
[R3]rip 1
[R3-rip-1]version 2
[R3-rip-1]undo summary
[R3-rip-1]network 192.168.3.0
[R3-rip-1]network 10.0.0.0
[R4]rip 1
[R4-rip-1]version 2
[R4-rip-1]undo summary
[R4-rip-1]network 192.168.4.0
[R4-rip-1]network 10.0.0.0
进入MGRE隧道:
[R1]int tunnel 0/0/0
[R1-Tunnel0/0/0]nhrp entry multicast dynamic
[R1-Tunnel0/0/0]undo rip split-horizon
[R2]int tunnel 0/0/0
[R2-Tunnel0/0/0]undo rip split-horizon
[R3]int tunnel 0/0/0
[R3-Tunnel0/0/0]undo rip split-horizon
查看:R1为例
测试:
7.在所有内外网出口做NAT,使用EASY IP,并测试全网通
[R1]acl 2000
[R1-acl-basic-2000]rule permit source 192.168.1.0 0.0.0.255
[R1-acl-basic-2000]quit
[R1]int s4/0/0
[R1-Serial4/0/0]nat outbound 2000
[R2]acl 2000
[R2-acl-basic-2000]rule permit source 192.168.2.0 0.0.0.255
[R2-acl-basic-2000]quit
[R2]int s4/0/0
[R2-Serial4/0/0]nat outbound 2000
[R3]acl 2000
[R3-acl-basic-2000]rule permit source 192.168.3.0 0.0.0.255
[R3-acl-basic-2000]quit
[R3]int s4/0/0
[R3-Serial4/0/0]nat outbound 2000
R4]acl 2000
[R4-acl-basic-2000]rule permit source 192.168.4.0 0.0.0.255
[R4-acl-basic-2000]quit
[R4]int g0/0/0
[R4-GigabitEthernet0/0/0]nat outbound 2000
测试: