2021-09-13 MGRE实验

                         MGRE实验
                         ![在这里插入图片描述](https://img-blog.csdnimg.cn/3376e6b9e31d460f98fe7abad4071985.png?x-oss-process=image/watermark,type_ZHJvaWRzYW5zZmFsbGJhY2s,shadow_50,text_Q1NETiBA5Lic5Z2h54yr,size_20,color_FFFFFF,t_70,g_se,x_16#pic_center)

1.实验拓扑图如下所示
在这里插入图片描述
各段地址的详细划分在图上已经标明。
2.R1到R5路由器上面的详细配置情况

R1路由器
dis current-configuration
[V200R003C00]

sysname R1

board add 0/2 2SA

snmp-agent local-engineid 800007DB03000000000000
snmp-agent

clock timezone China-Standard-Time minus 08:00:00

portal local-server load flash:/portalpage.zip

drop illegal-mac alarm

wlan ac-global carrier id other ac id 0

set cpu-usage threshold 80 restore 75

aaa
authentication-scheme default
authorization-scheme default
accounting-scheme default
domain default
domain default_admin
local-user admin password cipher % % K8m.Nt84DZ}e#<0`8bmE3Uw}% %
local-user admin service-type http

firewall zone Local
priority 15

interface Ethernet0/0/0

interface Ethernet0/0/1

interface Ethernet0/0/2

interface Ethernet0/0/3

interface Ethernet0/0/4

interface Ethernet0/0/5

interface Ethernet0/0/6

interface Ethernet0/0/7

interface Serial2/0/0
link-protocol ppp
ppp pap local-user haha password cipher % % >`(s*~-c"C8yo#2dh64!,./q% %
ip address 15.1.1.2 255.255.255.252

interface Serial2/0/1
link-protocol ppp

interface GigabitEthernet0/0/0

interface GigabitEthernet0/0/1

interface NULL0

interface LoopBack0
ip address 10.1.1.1 255.255.255.0

interface Tunnel0/0/0
ip address 1.1.1.1 255.255.255.0
tunnel-protocol gre
source 15.1.1.2
destination 45.1.1.2

rip 1
undo summary
version 2
network 15.0.0.0
network 10.0.0.0

user-interface con 0
authentication-mode password
user-interface vty 0 4
user-interface vty 16 20

wlan ac

R2路由器
dis current-configuration
[V200R003C00]

sysname R2

board add 0/2 2SA

snmp-agent local-engineid 800007DB03000000000000
snmp-agent

clock timezone China-Standard-Time minus 08:00:00

portal local-server load flash:/portalpage.zip

drop illegal-mac alarm

wlan ac-global carrier id other ac id 0

set cpu-usage threshold 80 restore 75

aaa
authentication-scheme default
authorization-scheme default
accounting-scheme default
domain default
domain default_admin
local-user admin password cipher % % K8m.Nt84DZ}e#<0`8bmE3Uw}% %
local-user admin service-type http

firewall zone Local
priority 15

interface Ethernet0/0/0

interface Ethernet0/0/1

interface Ethernet0/0/2

interface Ethernet0/0/3

interface Ethernet0/0/4

interface Ethernet0/0/5

interface Ethernet0/0/6

interface Ethernet0/0/7

interface Serial2/0/0
link-protocol ppp
ppp chap user haha
ppp chap password cipher % % dkVx"*N,L03g!j@H2V}Q,"EW% %
ip address 25.1.1.2 255.255.255.252

interface Serial2/0/1
link-protocol ppp

interface GigabitEthernet0/0/0

interface GigabitEthernet0/0/1

interface NULL0

interface LoopBack0
ip address 20.1.1.1 255.255.255.0

interface Tunnel0/0/0
ip address 1.1.1.2 255.255.255.0
tunnel-protocol gre p2mp
source Serial2/0/0
nhrp network-id 100
nhrp entry 1.1.1.1 15.1.1.2 register

rip 1
undo summary
version 2
network 25.0.0.0
network 20.0.0.0

user-interface con 0
authentication-mode password
user-interface vty 0 4
user-interface vty 16 20

wlan ac

return

R3路由器
dis current-configuration
[V200R003C00]

sysname R3

board add 0/2 2SA

snmp-agent local-engineid 800007DB03000000000000
snmp-agent

clock timezone China-Standard-Time minus 08:00:00

portal local-server load flash:/portalpage.zip

drop illegal-mac alarm

wlan ac-global carrier id other ac id 0

set cpu-usage threshold 80 restore 75

aaa
authentication-scheme default
authorization-scheme default
accounting-scheme default
domain default
domain default_admin
local-user admin password cipher % % K8m.Nt84DZ}e#<0`8bmE3Uw}% %
local-user admin service-type http

firewall zone Local
priority 15

interface Ethernet0/0/0

interface Ethernet0/0/1

interface Ethernet0/0/2

interface Ethernet0/0/3

interface Ethernet0/0/4

interface Ethernet0/0/5

interface Ethernet0/0/6

interface Ethernet0/0/7

interface Serial2/0/0
link-protocol hdlc
ip address 35.1.1.2 255.255.255.252

interface Serial2/0/1
link-protocol ppp

interface GigabitEthernet0/0/0

interface GigabitEthernet0/0/1

interface NULL0

interface LoopBack0
ip address 30.1.1.1 255.255.255.0

interface Tunnel0/0/0
ip address 1.1.1.3 255.255.255.0
tunnel-protocol gre p2mp
source Serial2/0/0
nhrp network-id 100
nhrp entry 1.1.1.1 15.1.1.2 register

rip 1
undo summary
version 2
network 35.0.0.0
network 30.0.0.0

user-interface con 0
authentication-mode password
user-interface vty 0 4
user-interface vty 16 20

wlan ac

return

R4路由器

dis current-configuration
[V200R003C00]

sysname R4

snmp-agent local-engineid 800007DB03000000000000
snmp-agent

clock timezone China-Standard-Time minus 08:00:00

portal local-server load flash:/portalpage.zip

drop illegal-mac alarm

wlan ac-global carrier id other ac id 0

set cpu-usage threshold 80 restore 75

aaa
authentication-scheme default
authorization-scheme default
accounting-scheme default
domain default
domain default_admin
local-user admin password cipher % % K8m.Nt84DZ}e#<0`8bmE3Uw}% %
local-user admin service-type http

firewall zone Local
priority 15

interface Ethernet0/0/0

interface Ethernet0/0/1

interface Ethernet0/0/2

interface Ethernet0/0/3

interface Ethernet0/0/4

interface Ethernet0/0/5

interface Ethernet0/0/6

interface Ethernet0/0/7

interface GigabitEthernet0/0/0
ip address 45.1.1.2 255.255.255.252

interface GigabitEthernet0/0/1

interface NULL0

interface LoopBack0
ip address 40.1.1.1 255.255.255.0

interface Tunnel0/0/0
ip address 1.1.1.1 255.255.255.0
tunnel-protocol gre
source 45.1.1.2
destination 15.1.1.2

rip 1
undo summary
version 2
network 45.0.0.0
network 40.0.0.0

user-interface con 0
authentication-mode password
user-interface vty 0 4
user-interface vty 16 20

wlan ac

return

R5路由器

dis current-configuration
[V200R003C00]

sysname R5

board add 0/1 2SA
board add 0/2 2SA

snmp-agent local-engineid 800007DB03000000000000
snmp-agent

clock timezone China-Standard-Time minus 08:00:00

portal local-server load flash:/portalpage.zip

drop illegal-mac alarm

wlan ac-global carrier id other ac id 0

set cpu-usage threshold 80 restore 75

aaa
authentication-scheme default
authorization-scheme default
accounting-scheme default
domain default
domain default_admin
local-user haha password cipher % % [l:sYKB}8@xToQQ>D:/&B6Gb% %
local-user haha service-type ppp
local-user admin password cipher % % K8m.Nt84DZ}e#<0`8bmE3Uw}% %
local-user admin service-type http
local-user huaiwei password cipher % % xUl^.TK{m55L@(Ht7XS2B/7*% %

firewall zone Local
priority 15

interface Ethernet0/0/0

interface Ethernet0/0/1

interface Ethernet0/0/2

interface Ethernet0/0/3

interface Ethernet0/0/4

interface Ethernet0/0/5

interface Ethernet0/0/6

interface Ethernet0/0/7

interface Serial1/0/0
link-protocol ppp
ppp authentication-mode pap
ip address 15.1.1.1 255.255.255.252

interface Serial1/0/1
link-protocol ppp
ppp authentication-mode chap
ip address 25.1.1.1 255.255.255.252

interface Serial2/0/0
link-protocol hdlc
ip address 35.1.1.1 255.255.255.252

interface Serial2/0/1
link-protocol ppp

interface GigabitEthernet0/0/0
ip address 45.1.1.1 255.255.255.252

interface GigabitEthernet0/0/1

interface NULL0

interface LoopBack0
ip address 50.1.1.1 255.255.255.0

rip 1
undo summary
version 2
network 15.0.0.0
network 25.0.0.0
network 35.0.0.0
network 45.0.0.0
network 50.0.0.0

user-interface con 0
authentication-mode password
user-interface vty 0 4
user-interface vty 16 20

wlan ac

return
3.测试
通过在模拟器上进行配置本实验的5条要求均已达成,下面就联通性方面进行测试。
(1)在R1上的串口pingR2上的串口
在这里插入图片描述

(2)R2上的串口pingR3上的串口
在这里插入图片描述
(3)在R4上pingR1

在这里插入图片描述
(4)R2环回pingR5环回
在这里插入图片描述
4总结
本次实验规模比较小,主要目的在于练习对指令的熟悉度,应该多尝试几次,脱离文档进行实验配置。

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值