1、R5为ISP,只能进行IP地址配置;其所有地址均配置为公有地址
IP地址规划
[R1]interface GigabitEthernet 0/0/0
[R1-GigabitEthernet0/0/0]ip add 192.168.1.2 24
[R1-GigabitEthernet0/0/0]int s 4/0/0
[R1-Serial4/0/0]ip add 1.1.0.1 24[R2]interface GigabitEthernet 0/0/0
[R2-GigabitEthernet0/0/0]ip add 192.168.2.2 24
[R2-GigabitEthernet0/0/0]int s 4/0/0
[R2-Serial4/0/0]ip add 2.2.0.1 24
[R3]int GigabitEthernet 0/0/0
[R3-GigabitEthernet0/0/0]ip add 192.168.3.2 24
[R3-GigabitEthernet0/0/0]int s 4/0/0
[R3-Serial4/0/0]ip add 3.3.0.1 24
[R4]int GigabitEthernet 0/0/0
[R4-GigabitEthernet0/0/0]ip add 192.168.4.2 24
[R4-GigabitEthernet0/0/0]int g0/0/1
[R4-GigabitEthernet0/0/1]ip add 4.4.0.1 24
[ISP]int GigabitEthernet 0/0/0
[ISP-GigabitEthernet0/0/0]ip add 4.4.0.2 24
[ISP-GigabitEthernet0/0/0]int s 3/0/0
[ISP-Serial3/0/0]ip add 1.1.0.2 24
[ISP-Serial3/0/0]int s 3/0/1
[ISP-Serial3/0/1]ip add 2.2.0.2 24
[ISP-Serial3/0/1]int s 4/0/0
[ISP-Serial4/0/0]ip add 3.3.0.2 24[ISP]interface loopback1
[ISP-LoopBack1]ip add 5.5.5.1 24配置缺省路由
[R1]ip route-static 0.0.0.0 0 1.1.0.2
[R2]ip route-static 0.0.0.0 0 2.2.0.2
[R3]ip route-static 0.0.0.0 0 3.3.0.2
[R4]ip route-static 0.0.0.0 0 4.4.0.2
2、R1、R5间使用PPP的pap认证,R5为主认证方;
R2、R5之间使用PPP的chap认证,R5为主认证方;
R3、R5 之间使用HDLC 认证;
R1、R5间使用PPP的pap认证,R5为主认证方
[ISP]aaa
[ISP-aaa]local-user admin password cipher 012345
[ISP-aaa]local-user admin service-type ppp
[ISP-aaa]int s 3/0/0
[ISP-Serial3/0/0]ppp authentication-mode pap[r1-Serial4/0/0]ppp pap local-user admin password cipher 012345
[r1-Serial4/0/0]
PPP是一次性会话,一旦建立再次配置认证将不再生效。因此,此时重新关闭接口,重启,此时仍然能ping通,则说明认证成功。
[ISP-Serial3/0/0]shutdown
[ISP-Serial3/0/0]undo shutdown
[ISP-Serial3/0/0]ping 2.2.0.2
PING 2.2.0.2: 56 data bytes, press CTRL_C to break
Reply from 2.2.0.2: bytes=56 Sequence=1 ttl=255 time=30 ms
Reply from 2.2.0.2: bytes=56 Sequence=2 ttl=255 time=1 ms
Reply from 2.2.0.2: bytes=56 Sequence=3 ttl=255 time=1 ms
Reply from 2.2.0.2: bytes=56 Sequence=4 ttl=255 time=1 ms
Reply from 2.2.0.2: bytes=56 Sequence=5 ttl=255 time=1 ms--- 2.2.0.2 ping statistics ---
5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 1/6/30 ms[ISP-Serial3/0/0]
R2、R5之间使用PPP的chap认证,R5为主认证方;
[ISP]aaa
[ISP-aaa]local-user admin password cipher 12345
[ISP-aaa]local-user admin service-type ppp
[ISP-aaa]q
[ISP]int s 3/0/1
[ISP-Serial3/0/1]ppp authentication-mode chap[r2-Serial4/0/0]ppp chap user admin
[r2-Serial4/0/0]ppp chap password cipher 12345接下来与r1操作相同即重启
R3、R5 之间使用HDLC 封装
[r3-Serial4/0/0]link-protocol hdlc
Warning: The encapsulation protocol of the link will be changed. Continue? [Y/N]
:y[ISP-Serial4/0/0]link-protocol hdlc
Warning: The encapsulation protocol of the link will be changed. Continue? [Y/N]
:y
3、R1/R2/R3构建一个MGRE环境,R1为中心站点;R1/R4之间为点到点的GRE
R1/R2/R3构建一个MGRE环境,R1为中心站点
首先创建隧道,然后设定虚拟网段192.168.5.0 24
[r1]int Tunnel 0/0/0
[r1-Tunnel0/0/0]ip add 192.168.5.1 24
[r1-Tunnel0/0/0]tunnel-protocol gre p2mp
[r1-Tunnel0/0/0]source 1.1.0.1
[r1-Tunnel0/0/0]nhrp network-id 100[r2]int Tunnel 0/0/0
[r2-Tunnel0/0/0]ip add 192.168.5.2 24
[r2-Tunnel0/0/0]tunnel-protocol gre p2mp
[r2-Tunnel0/0/0]nhrp network-id 100
[r2-Tunnel0/0/0]nhrp entry 192.168.5.1 1.1.0.1 register
r3与r1 r2操作相同
R1/R4之间为点到点的GRE
[r1]int Tunnel 0/0/1
[r1-Tunnel0/0/1]ip add 192.168.6.1 24
[r1-Tunnel0/0/1]tunnel-protocol gre
[r1-Tunnel0/0/1]source 1.1.0.1
[r1-Tunnel0/0/1]description 4.4.0.1
r4与r1 操作相同
4、整个网络基于RIP全网可达
对R1、R2、R3、R4进行配置
[r1]rip
[r1-rip-1]v 2
[r1-rip-1]network 192.168.1.0
[r1-rip-1]network 192.168.5.0
[r1-rip-1]network 192.168.6.0r2 r3 r4与r1操作相同
5、所有IP设为私有IP为源IP,可以访问R5环回
对R1 、R3、R4 进行配置
[r1]acl 2000
[r1-acl-basic-2000]rule permit source 192.168.1.0 0.0.0.255
[r1-acl-basic-2000]q
[r1]int s 4/0/0
[r1-Serial4/0/0]nat outbound 2000
[r1-Serial4/0/0]r3 r4与r1操作相同