当前位置: 首页 > news >正文

MGER实验

一、实验拓扑

二、实验需求

1、R5为ISP,只能进行IP地址配置,其所有地址均配为公有IP地址;
2、R1和R5间使用PPP的PAP认证,R5为主认证方;R2与R5之间使用ppp的CHAP认证,R5为主认证方;R3与R5之间使用HDLC封装;
3、R1、R2、R3构建一个MGRE环境,R1为中心站点,R1、R4间为点到点的GRE;                        4、R1.整个私有网络基本RIP全网可达;                                                                                            5、所有PC设置私有IP为源IP,可以访问R5环回。

三、实验思路

1、分配IP

2、创建缺省

3、R1和R5间使用PPP的PAP认证,R5为主认证方

4、R2与R5之间使用ppp的CHAP认证,R5为主认证方

5、R3与R5之间使用HDLC封装;

6、R1、R2、R3构建一个MGRE环境,R1为中心站点,R1、R4间为点到点的GRE;   

7、R1整个私有网络基本RIP全网可达; 

8、所有PC设置私有IP为源IP,可以访问R5环回

四、实验步骤

1、分配IP

R1:

[R1]INT G 0/0/0
[R1-GigabitEthernet0/0/0]IP add 192.168.1.1 24
[R1-GigabitEthernet0/0/0]
Jul 26 2025 20:04:04-08:00 R1 %%01IFNET/4/LINK_STATE(l)[0]:The line protocol IP 
on the interface GigabitEthernet0/0/0 has entered the UP state. 
[R1-GigabitEthernet0/0/0]int s 1/0/0
[R1-Serial1/0/0]ip add 15.1.1.1 24
[R1-Serial1/0/0]q
[R1]dis ip int b
*down: administratively down
^down: standby
(l): loopback
(s): spoofing
The number of interface that is UP in Physical is 3
The number of interface that is DOWN in Physical is 4
The number of interface that is UP in Protocol is 3
The number of interface that is DOWN in Protocol is 4Interface                         IP Address/Mask      Physical   Protocol  
GigabitEthernet0/0/0              192.168.1.1/24       up         up        
GigabitEthernet0/0/1              unassigned           down       down      
NULL0                             unassigned           up         up(s)     
Serial1/0/0                       15.1.1.1/24          up         up        

R2:

[R2]int g 0/0/0
[R2-GigabitEthernet0/0/0]ip add 192.168.2.1 24
Jul 26 2025 20:07:00-08:00 R2 %%01IFNET/4/LINK_STATE(l)[10]:The line protocol IPon the interface GigabitEthernet0/0/0 has entered the UP state. 
[R2-GigabitEthernet0/0/0]int s 1/0/0
[R2-Serial1/0/0]ip add 25.1.1.1 24
[R2-Serial1/0/0]q
[R2]dis ip int b
*down: administratively down
^down: standby
(l): loopback
(s): spoofing
The number of interface that is UP in Physical is 3
The number of interface that is DOWN in Physical is 4
The number of interface that is UP in Protocol is 3
The number of interface that is DOWN in Protocol is 4Interface                         IP Address/Mask      Physical   Protocol  
GigabitEthernet0/0/0              192.168.2.1/24       up         up        
GigabitEthernet0/0/1              unassigned           down       down      
NULL0                             unassigned           up         up(s)     
Serial1/0/0                       25.1.1.1/24          up         up        

R3:

[R3]int g 0/0/0
[R3-GigabitEthernet0/0/0]ip add 192.168.3.1 24
Jul 26 2025 20:10:15-08:00 R3 %%01IFNET/4/LINK_STATE(l)[0]:The line protocol IP 
on the interface GigabitEthernet0/0/0 has entered the UP state. 
[R3-GigabitEthernet0/0/0]int s 1/0/0
[R3-Serial1/0/0]ip add 35.1.1.1 24
[R3-Serial1/0/0]q
[R3]dis ip int b
*down: administratively down
^down: standby
(l): loopback
(s): spoofing
The number of interface that is UP in Physical is 3
The number of interface that is DOWN in Physical is 4
The number of interface that is UP in Protocol is 3
The number of interface that is DOWN in Protocol is 4Interface                         IP Address/Mask      Physical   Protocol  
GigabitEthernet0/0/0              192.168.3.1/24       up         up        
GigabitEthernet0/0/1              unassigned           down       down      
NULL0                             unassigned           up         up(s)     
Serial1/0/0                       35.1.1.1/24          up         up        

R4:

[R4]int g 0/0/1
[R4-GigabitEthernet0/0/1]ip add 192.168.4.1 24
Jul 26 2025 20:12:54-08:00 R4 %%01IFNET/4/LINK_STATE(l)[0]:The line protocol IP 
on the interface GigabitEthernet0/0/1 has entered the UP state. 
[R4-GigabitEthernet0/0/1]int g 0/0/0
[R4-GigabitEthernet0/0/0]ip add 45.1.1.1 24
Jul 26 2025 20:13:43-08:00 R4 %%01IFNET/4/LINK_STATE(l)[1]:The line protocol IP 
on the interface GigabitEthernet0/0/0 has entered the UP state. 
[R4-GigabitEthernet0/0/0]q
[R4]dis ip int b
*down: administratively down
^down: standby
(l): loopback
(s): spoofing
The number of interface that is UP in Physical is 3
The number of interface that is DOWN in Physical is 4
The number of interface that is UP in Protocol is 3
The number of interface that is DOWN in Protocol is 4Interface                         IP Address/Mask      Physical   Protocol  
GigabitEthernet0/0/0              45.1.1.1/24          up         up        
GigabitEthernet0/0/1              192.168.4.1/24       up         up        
NULL0                             unassigned           up         up(s)     

R5:

[R5]int s 1/0/1
[R5-Serial1/0/1]ip add 15.1.1.2 24
[R5-Serial1/0/1]
Jul 26 2025 20:16:33-08:00 R5 %%01IFNET/4/LINK_STATE(l)[0]:The line protocol PPPIPCP on the interface Serial1/0/1 has entered the UP state. 
[R5-Serial1/0/1]int g 0/0/0
[R5-GigabitEthernet0/0/0]ip add 45.1.1.2 24
Jul 26 2025 20:17:16-08:00 R5 %%01IFNET/4/LINK_STATE(l)[1]:The line protocol IP 
on the interface GigabitEthernet0/0/0 has entered the UP state. 
[R5-GigabitEthernet0/0/0]int s 2/0/1
[R5-Serial2/0/1]ip add 25.1.1.2 24
[R5-Serial2/0/1]
Jul 26 2025 20:18:05-08:00 R5 %%01IFNET/4/LINK_STATE(l)[2]:The line protocol PPPIPCP on the interface Serial2/0/1 has entered the UP state. 
[R5-Serial2/0/1]int s 1/0/0
[R5-Serial1/0/0]ip add 35.1.1.2 24
[R5-Serial1/0/0]
Jul 26 2025 20:19:17-08:00 R5 %%01IFNET/4/LINK_STATE(l)[3]:The line protocol PPPIPCP on the interface Serial1/0/0 has entered the UP state. 
[R5-Serial1/0/0]q   
[R5]int l 0
[R5-LoopBack0]ip add 5.5.5.5 24
[R5-LoopBack0]q
[R5]dis ip int b
*down: administratively down
^down: standby
(l): loopback
(s): spoofing
The number of interface that is UP in Physical is 6
The number of interface that is DOWN in Physical is 2
The number of interface that is UP in Protocol is 6
The number of interface that is DOWN in Protocol is 2Interface                         IP Address/Mask      Physical   Protocol  
GigabitEthernet0/0/0              45.1.1.2/24          up         up        
GigabitEthernet0/0/1              unassigned           down       down      
LoopBack0                         5.5.5.5/24           up         up(s)     
NULL0                             unassigned           up         up(s)     
Serial1/0/0                       35.1.1.2/24          up         up        
Serial1/0/1                       15.1.1.2/24          up         up        
Serial2/0/0                       unassigned           down       down      
Serial2/0/1                       25.1.1.2/24          up         up        
2、创建缺省

R1:

[R1]ip route-static 0.0.0.0 0 15.1.1.2

R2:

[R2]ip route-static 0.0.0.0 0 25.1.1.2

R3:

[R3]ip route-static 0.0.0.0 0 35.1.1.2

R4:

[R4]ip route-static 0.0.0.0 0 45.1.1.2
3、R1和R5间使用PPP的PAP认证,R5为主认证方

R5:

[R5]aaa
[R5-aaa]local-user nzz password cipher 123456
[R5-aaa]local-user nzz service-type ppp
[R5-aaa]q
[R5]int s 1/0/1
[R5-Serial1/0/1]ppp authentication-mode pap
[R5-Serial1/0/1]shutdown 
[R5-Serial1/0/1]undo shutdown 

R1:

[R1]int s 1/0/0
[R1-Serial1/0/0]ppp pap local-user nzz password cipher 123456

测试:

[R1-Serial1/0/0]ping 15.1.1.2PING 15.1.1.2: 56  data bytes, press CTRL_C to breakReply from 15.1.1.2: bytes=56 Sequence=1 ttl=255 time=30 msReply from 15.1.1.2: bytes=56 Sequence=2 ttl=255 time=20 msReply from 15.1.1.2: bytes=56 Sequence=3 ttl=255 time=20 msReply from 15.1.1.2: bytes=56 Sequence=4 ttl=255 time=20 msReply from 15.1.1.2: bytes=56 Sequence=5 ttl=255 time=20 ms--- 15.1.1.2 ping statistics ---5 packet(s) transmitted5 packet(s) received0.00% packet lossround-trip min/avg/max = 20/22/30 ms[R5-Serial1/0/1]ping 15.1.1.1PING 15.1.1.1: 56  data bytes, press CTRL_C to breakReply from 15.1.1.1: bytes=56 Sequence=1 ttl=255 time=50 msReply from 15.1.1.1: bytes=56 Sequence=2 ttl=255 time=30 msReply from 15.1.1.1: bytes=56 Sequence=3 ttl=255 time=20 msReply from 15.1.1.1: bytes=56 Sequence=4 ttl=255 time=20 msReply from 15.1.1.1: bytes=56 Sequence=5 ttl=255 time=20 ms--- 15.1.1.1 ping statistics ---5 packet(s) transmitted5 packet(s) received0.00% packet lossround-trip min/avg/max = 20/28/50 ms
4、R2与R5之间使用ppp的CHAP认证,R5为主认证方

R5:

[R5]int s 2/0/1
[R5-Serial2/0/1]ppp authentication-mode chap
[R5-Serial2/0/1]shutdown 
[R5-Serial2/0/1]undo shutdown 

R2:

[R2]int s 1/0/0
[R2-Serial1/0/0]ppp chap user nzz
[R2-Serial1/0/0]ppp chap password cipher 123456

测试:

[R2-Serial1/0/0]ping 25.1.1.2PING 25.1.1.2: 56  data bytes, press CTRL_C to breakReply from 25.1.1.2: bytes=56 Sequence=1 ttl=255 time=30 msReply from 25.1.1.2: bytes=56 Sequence=2 ttl=255 time=20 msReply from 25.1.1.2: bytes=56 Sequence=3 ttl=255 time=30 msReply from 25.1.1.2: bytes=56 Sequence=4 ttl=255 time=20 msReply from 25.1.1.2: bytes=56 Sequence=5 ttl=255 time=20 ms--- 25.1.1.2 ping statistics ---5 packet(s) transmitted5 packet(s) received0.00% packet lossround-trip min/avg/max = 20/24/30 ms[R5-Serial2/0/1]ping 25.1.1.1PING 25.1.1.1: 56  data bytes, press CTRL_C to breakReply from 25.1.1.1: bytes=56 Sequence=1 ttl=255 time=40 msReply from 25.1.1.1: bytes=56 Sequence=2 ttl=255 time=20 msReply from 25.1.1.1: bytes=56 Sequence=3 ttl=255 time=20 msReply from 25.1.1.1: bytes=56 Sequence=4 ttl=255 time=20 msReply from 25.1.1.1: bytes=56 Sequence=5 ttl=255 time=20 ms--- 25.1.1.1 ping statistics ---5 packet(s) transmitted5 packet(s) received0.00% packet lossround-trip min/avg/max = 20/24/40 ms
5、R3与R5之间使用HDLC封装;

R3:

[R3]int s 1/0/0
[R3-Serial1/0/0]link-protocol hdlc
Warning: The encapsulation protocol of the link will be changed. Continue? [Y/N]
:Y
Jul 26 2025 20:52:59-08:00 R3 %%01IFNET/4/CHANGE_ENCAP(l)[0]:The user performed 
the configuration that will change the encapsulation protocol of the link and th
en selected Y. 

R5:

[R5]int s 1/0/0
[R5-Serial1/0/0]link-protocol hdlc
Warning: The encapsulation protocol of the link will be changed. Continue? [Y/N]
:y
Jul 26 2025 20:57:00-08:00 R5 %%01IFNET/4/CHANGE_ENCAP(l)[5]:The user performed 
the configuration that will change the encapsulation protocol of the link and th
en selected Y. 

测试:

[R5-Serial1/0/0]ping 35.1.1.1PING 35.1.1.1: 56  data bytes, press CTRL_C to breakReply from 35.1.1.1: bytes=56 Sequence=1 ttl=255 time=40 msReply from 35.1.1.1: bytes=56 Sequence=2 ttl=255 time=20 msReply from 35.1.1.1: bytes=56 Sequence=3 ttl=255 time=20 msReply from 35.1.1.1: bytes=56 Sequence=4 ttl=255 time=10 msReply from 35.1.1.1: bytes=56 Sequence=5 ttl=255 time=30 ms--- 35.1.1.1 ping statistics ---5 packet(s) transmitted5 packet(s) received0.00% packet lossround-trip min/avg/max = 10/24/40 ms[R3-Serial1/0/0]ping 35.1.1.2PING 35.1.1.2: 56  data bytes, press CTRL_C to breakReply from 35.1.1.2: bytes=56 Sequence=1 ttl=255 time=30 msReply from 35.1.1.2: bytes=56 Sequence=2 ttl=255 time=20 msReply from 35.1.1.2: bytes=56 Sequence=3 ttl=255 time=20 msReply from 35.1.1.2: bytes=56 Sequence=4 ttl=255 time=20 msReply from 35.1.1.2: bytes=56 Sequence=5 ttl=255 time=10 ms--- 35.1.1.2 ping statistics ---5 packet(s) transmitted5 packet(s) received0.00% packet lossround-trip min/avg/max = 10/20/30 ms
6、R1、R2、R3构建一个MGRE环境,R1为中心站点,R1、R4间为点到点的GRE;     

R1:

[R1]int Tunnel 0/0/0
[R1-Tunnel0/0/0]ip add 192.168.5.1 24
[R1-Tunnel0/0/0]tunnel-protocol gre p2mp
[R1-Tunnel0/0/0]source 15.1.1.1
[R1-Tunnel0/0/0]nhrp network-id 100

R2:

[R2]int Tunnel 0/0/0
[R2-Tunnel0/0/0]ip add 192.168.5.2 24
[R2-Tunnel0/0/0]tunnel-protocol gre p2mp
[R2-Tunnel0/0/0]source Serial 1/0/0
Jul 26 2025 21:11:50-08:00 R2 %%01IFNET/4/LINK_STATE(l)[0]:The line protocol IP 
on the interface Tunnel0/0/0 has entered the UP state. 
[R2-Tunnel0/0/0]nhrp network-id 100
[R2-Tunnel0/0/0]nhrp entry 192.168.5.1 15.1.1.1 register 

R3:

[R3]int Tunnel 0/0/0
[R3-Tunnel0/0/0]ip add 192.168.5.3 24
[R3-Tunnel0/0/0]tunnel-protocol gre p2mp
[R3-Tunnel0/0/0]source Serial 1/0/0
Jul 26 2025 21:15:35-08:00 R3 %%01IFNET/4/LINK_STATE(l)[0]:The line protocol IP 
on the interface Tunnel0/0/0 has entered the UP state. 
[R3-Tunnel0/0/0]nhrp network-id 100
[R3-Tunnel0/0/0]nhrp entry 192.168.5.1 15.1.1.1 register 

查看:

[R1]dis nhrp peer all
------------------------------------------------------------------------------- 
Protocol-addr   Mask  NBMA-addr       NextHop-addr    Type         Flag         
------------------------------------------------------------------------------- 
192.168.5.2     32    25.1.1.1        192.168.5.2     dynamic      route tunnel 
------------------------------------------------------------------------------- 
Tunnel interface: Tunnel0/0/0
Created time    : 00:06:17
Expire time     : 01:53:43
------------------------------------------------------------------------------- 
Protocol-addr   Mask  NBMA-addr       NextHop-addr    Type         Flag         
------------------------------------------------------------------------------- 
192.168.5.3     32    35.1.1.1        192.168.5.3     dynamic      route tunnel 
------------------------------------------------------------------------------- 
Tunnel interface: Tunnel0/0/0
Created time    : 00:02:41
Expire time     : 01:57:19Number of nhrp peers: 2

GRE配置:

R1:

[R1]int Tunnel 0/0/1
[R1-Tunnel0/0/1]ip add 192.168.6.1 24
[R1-Tunnel0/0/1]tunnel-protocol gre
[R1-Tunnel0/0/1]source 15.1.1.1
[R1-Tunnel0/0/1]destination 45.1.1.1
Jul 26 2025 21:48:05-08:00 R1 %%01IFNET/4/LINK_STATE(l)[0]:The line protocol IP 
on the interface Tunnel0/0/1 has entered the UP state. 
[R1-Tunnel0/0/1]q
[R1]rip 1
[R1-rip-1]network 192.168.6.0

R4:

[R4]int Tunnel 0/0/1
[R4-Tunnel0/0/1]ip add 192.168.6.2 24
[R4-Tunnel0/0/1]tunnel-protocol gre
[R4-Tunnel0/0/1]source 45.1.1.1
[R4-Tunnel0/0/1]destination 15.1.1.1
Jul 26 2025 21:49:57-08:00 R4 %%01IFNET/4/LINK_STATE(l)[0]:The line protocol IP 
on the interface Tunnel0/0/1 has entered the UP state. 
[R4-Tunnel0/0/1]q
[R4]rip 1
[R4-rip-1]version 2
[R4-rip-1]network 192.168.6.0
[R4-rip-1]network 192.168.4.0

测试:

[R1]ping 192.168.6.2PING 192.168.6.2: 56  data bytes, press CTRL_C to breakReply from 192.168.6.2: bytes=56 Sequence=1 ttl=255 time=40 msReply from 192.168.6.2: bytes=56 Sequence=2 ttl=255 time=40 msReply from 192.168.6.2: bytes=56 Sequence=3 ttl=255 time=40 msReply from 192.168.6.2: bytes=56 Sequence=4 ttl=255 time=30 msReply from 192.168.6.2: bytes=56 Sequence=5 ttl=255 time=20 ms--- 192.168.6.2 ping statistics ---5 packet(s) transmitted5 packet(s) received0.00% packet lossround-trip min/avg/max = 20/34/40 ms
7、R1整个私有网络基本RIP全网可达; 

R1:

[R1]rip 1
[R1-rip-1]version 2
[R1-rip-1]network 192.168.1.0
[R1-rip-1]network 192.168.5.0[R1]interface Tunnel 0/0/0
[R1-Tunnel0/0/0]nhrp entry multicast dynamic 
[R1-Tunnel0/0/0]undo rip split-horizon 

R2:

[R2]rip 1
[R2-rip-1]version 2
[R2-rip-1]network 192.168.2.0
[R2-rip-1]network 192.168.5.0

R3:

[R3]rip 1
[R3-rip-1]version 2
[R3-rip-1]network 192.168.3.0
[R3-rip-1]network 192.168.5.0

测试:

[R1]ping 192.168.3.1PING 192.168.3.1: 56  data bytes, press CTRL_C to breakReply from 192.168.3.1: bytes=56 Sequence=1 ttl=255 time=30 msReply from 192.168.3.1: bytes=56 Sequence=2 ttl=255 time=10 msReply from 192.168.3.1: bytes=56 Sequence=3 ttl=255 time=20 msReply from 192.168.3.1: bytes=56 Sequence=4 ttl=255 time=40 msReply from 192.168.3.1: bytes=56 Sequence=5 ttl=255 time=20 ms--- 192.168.3.1 ping statistics ---5 packet(s) transmitted5 packet(s) received0.00% packet lossround-trip min/avg/max = 10/24/40 ms[R1]ping 192.168.2.1PING 192.168.2.1: 56  data bytes, press CTRL_C to breakReply from 192.168.2.1: bytes=56 Sequence=1 ttl=255 time=30 msReply from 192.168.2.1: bytes=56 Sequence=2 ttl=255 time=30 msReply from 192.168.2.1: bytes=56 Sequence=3 ttl=255 time=40 msReply from 192.168.2.1: bytes=56 Sequence=4 ttl=255 time=30 msReply from 192.168.2.1: bytes=56 Sequence=5 ttl=255 time=30 ms--- 192.168.2.1 ping statistics ---5 packet(s) transmitted5 packet(s) received0.00% packet lossround-trip min/avg/max = 30/32/40 ms
8、所有PC设置私有IP为源IP,可以访问R5环回

R1:

[R1]acl 2000
[R1-acl-basic-2000]rule permit source 192.168.1.0 0.0.0.255
[R1-acl-basic-2000]q
[R1]int s 1/0/0	
[R1-Serial1/0/0]nat outbound 2000

R2:

[R2]acl 2000
[R2-acl-basic-2000]rule permit source 192.168.2.0 0.0.0.255
[R2-acl-basic-2000]q
[R2]int s 1/0/0
[R2-Serial1/0/0]nat outbound 2000

R3:

[R3]acl 2000
[R3-acl-basic-2000]rule permit source 192.168.3.0 0.0.0.255
[R3-acl-basic-2000]q
[R3]int s 1/0/0
[R3-Serial1/0/0]nat outbound 2000

R4:

[R4]acl 2000
[R4-acl-basic-2000]rule permit source 192.168.4.0 0.0.0.255
[R4-acl-basic-2000]q
[R4]int g 0/0/0	
[R4-GigabitEthernet0/0/0]nat outbound 2000

五、测试

http://www.lryc.cn/news/601056.html

相关文章:

  • selenium自动化鼠标和键盘操作
  • 幸福网咖订座点餐小程序的设计与实现
  • Compose笔记(三十八)--CompositionLocal
  • VS Code + LaTeX 绘制电气图完全指南(含 PlantUML 样式参考)
  • 酒店智能门锁SDK新V门锁系统接口函数[2025版]Delphi 7.0——东方仙盟硬件接口库
  • 方正小标宋简3.0,可编辑
  • Python - 100天从新手到大师 - Day6
  • 【科研绘图系列】R语言绘制误差连线散点图
  • freeRTOS 静态创建任务
  • FastAPI入门:安装、Pydantic、并发和并行
  • Day04–链表–24. 两两交换链表中的节点,19. 删除链表的倒数第 N 个结点,面试题 02.07. 链表相交,142. 环形链表 II
  • TCP如何解决网络切换问题
  • Java模块化编程深度指南:从过程式到面向对象的进化之路
  • JavaSE:初识数组
  • 小架构step系列26:Spring提供的validator
  • 详细介绍MySQL的索引类型
  • Maven之依赖管理
  • 基于tk界面库的扩展类
  • 网络:基础概念
  • nacos启动报错:Unable to start embedded Tomcat。
  • 基于POD和DMD的压气机叶片瞬态流场分析与神经网络预测
  • iview: 对输入框进行Poptip 换行提示
  • 【Redis】 Redis 基础命令和原理
  • 从治理到共情——平台伦理的乡村共建之路
  • 数据空间技术在智慧水库管理平台中的赋能
  • 每日面试题15:如何解决堆溢出?
  • 2.JVM跨平台原理(字节码机制)
  • 嵌入式硬件篇---zigbee无线串口通信问题解决方法
  • 【6G新技术探索】AG-UI(Agent User Interaction Protocol) 协议介绍
  • 大语言模型 LLM 通过 Excel 知识库 增强日志分析,根因分析能力的技术方案(1):总体介绍