实验要求:左边画圈的区域为双栈区域,V4用RIP协议,V6用RIPNG协议,中间部分为V4区域,相当于ISP,右边画圈区域用IPV6,启用OSPF协议,要求可以访问R3的环回,R3上除了IP不做任何配置,两边的区域可以通过6to4互相访问;
思路:
先配置ISP区域,并且在R2和R4上写一条静态缺省指向R3的环回;
然后对左边区域进行配置:v4地址为192.168.1.0/24 192.168.2.0/24(R1的环回) 192.168.3.0/24(R2的环回)
V6地址由:2002:1701:0101::/64 2002:1701:0101:1::/64(R1环回) 2002:1701:0101:2::/64(R2环回),地址配置完成后,在R1的g0/0/0口上将V4和V6的环回地址进行汇总,然后在R2上的RIP和RIPNG上发布一条缺省;
之后配置右边区域:
右边区域的V6地址:AS1:2002:2201:0102::/49 AS2: 2002:2201:0102:8000::/49,
地址配置完成后,启用OSPFV3 协议,然后进行BGP邻居的配置,BGP配置完成后,将AS2内的路由汇总,然后发布到宣告到BGP 中;
最后是R2和R4上的6to4tunnel的配置,完成后,在分别在R2和R4上写一条指向2002::/16的静态,下一跳为tunnel,然后将其宣告或者重发布到对应的协议中;
配置命令:
R1:
<R1>dis current-configuration
[V200R003C00]
#
sysname R1
#
snmp-agent local-engineid 800007DB03000000000000
snmp-agent
#
clock timezone China-Standard-Time minus 08:00:00
#
portal local-server load portalpage.zip
#
drop illegal-mac alarm
#
ipv6
#
set cpu-usage threshold 80 restore 75
#
aaa
authentication-scheme default
authorization-scheme default
accounting-scheme default
domain default
domain default_admin
local-user admin password cipher %$%$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$
local-user admin service-type http
#
firewall zone Local
priority 15
#
interface GigabitEthernet0/0/0
ipv6 enable
ip address 192.168.1.1 255.255.255.0
rip summary-address 192.168.0.0 255.255.252.0
ipv6 address 2002:1701:101::1/64
ripng 1 enable
ripng summary-address 2002:1701:101:1:: 64
#
interface GigabitEthernet0/0/1
#
interface GigabitEthernet0/0/2
#
interface NULL0
#
interface LoopBack1
ipv6 enable
ip address 192.168.2.1 255.255.255.128
ipv6 address 2002:1701:101:1::1/65
ripng 1 enable
#
interface LoopBack2
ipv6 enable
ip address 192.168.2.129 255.255.255.128
ipv6 address 2002:1701:101:1:8000::1/65
ripng 1 enable
#
rip 1
version 2
network 192.168.1.0
network 192.168.2.0
#
ripng 1
#
user-interface con 0
authentication-mode password
user-interface vty 0 4
user-interface vty 16 20
#
wlan ac
#
return
<R1>
R2:
<R2>dis current-configuration
[V200R003C00]
#
sysname R2
#
snmp-agent local-engineid