[理学]OSPF路由重分布及路由汇总分析实验《协议分析》实验报告模板_第1页
[理学]OSPF路由重分布及路由汇总分析实验《协议分析》实验报告模板_第2页
[理学]OSPF路由重分布及路由汇总分析实验《协议分析》实验报告模板_第3页
[理学]OSPF路由重分布及路由汇总分析实验《协议分析》实验报告模板_第4页
[理学]OSPF路由重分布及路由汇总分析实验《协议分析》实验报告模板_第5页
已阅读5页,还剩2页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、网络协议分析实验报告2011至2012学年第学期姓名系别计算机系实验地点e1a406学号年级、班实验时间2011 年 11 月 30 h实验项目实验十一 ospf路由重分布及路由汇总分析实验一、实验目的实验目的:学握ospf的ospf与rip间的路由重分布的配置方法及rip路由信息在ospf区域中的lsa 的类型与泛洪特点;常握区域1'可路由汇总及外部路由汇总后lsa分发的特点。二、实验环境dynamips, windows 平台,pc 机三、实验内容及步骤:配置ospf和rip,使其能全网通信,并跟踪路由重分布的重新分发过程与特点。e3/0 10 1 1.1/24ppc1“10.1.

2、1.10/24pgw: 10.1.1.2“区域1"3ae3/1 10.0.50.1/24ps0/0:10.0 15.2/30-ae3/0:10.2.6.1/24/0:10.2.26.1/30e3/0 10.1 3.1/24-'so/1:172.16.24.1/30-3ripar10.1.3.10/24gw: 10.1.3.1ar5卩i10.2 6.30/24w: 10.26.1apc6v10.0.5.100/24gw: 10.0.5.1®_pc5ve3/0:10.0.5.1/2410.0.50.10/24gw: 10.0.50.1apc7p172.16433/24“

3、gw: 172.16.4.1s0/0:10.0.15.1/3o<1022.100/24gw: 1022.1 卩pc2ae3/0:10.2.2. 1/24p一80/1:10056.1/302区域 0 s0/010.0.56.20-s0/1: 10.1.13.1/30r4<-/s0/l:10226.2/30区域 2卍s0/0: 10.1.13.2/30®s0/0:172.16. 24.2/3e3/0 17246.4.1/24在如上图所示的拓朴屮,先为各路由器配置接口 ip,然后在各路由器上配置ripv2路由协议, 使得pci、pc2相互之间可以连通。并在r3与r4之间的串口配

4、置ripv2认证。同时验证认证 配置起了作用。在对r1进行配置之前,在r3的s0/0端口和r4的s0/0端口上抓包:dynagen=>capture r3 s0/0 ripl.pcap hdlcdynagen=>capture r4 s0/0 ripl.pcap hdlc1、对于各串行链路,如r3,配置接口如下:r3#conftr3(config)#int s0/0r3(config-if)#ip add 192.16& 1.153 255.255.255.252r3(config-if)#clock rate 252000r3(config-if)#no shr3(con

5、fig-if)#end对于各快速以太网接口,如r1,配置接口 ip地址如下:rl#conftrl(config)#int fl/0rl(config-if)#no switchportr1 (config-if)#ip add 19268.3.112 255.255.255.224r1 (config-if)#no shr1 (config-if)#end2、配置rip路由协议:在r1上配置rip路由协议如下:rl#conftr1 (config)#router ripr1 (config)#version 2r1 (con fig)#net work 192.168.3.0r1 (confi

6、g)#network 192.168.2.0r1 (config)#end3、在对4台路由器都配置了 ripv2协议z后,查看r1的路由表: r1#show ip route并粘贴各路由器的路由表:r1r l#show ip routecodes: c connected, s - static, r rip, m mobile, b bgpd - eigrp, ex - eigrp external, o - ospf, ia - ospf inter area n1 - ospf nssa external type 1, n2 - ospf nssa external type 2 el

7、 ospf external type 1, e2 - ospf external type 2i is-is, su is-is summary, l1 is-is level-1, l2 is-is level-2 ia is-is inter area, * candidate default, u per-user static route o - odr, p - periodic downloaded static routegateway of last resort is not setr192.168.1.0/24 120/1 via 192.168.2.66, 00:00:

8、22, fastethernetl/1192.168.2.0/24 is variably subnetted, 4 subnets, 2 masksr192.168.2.96/28 120/1 via 192.168.2.67, 00:00:08, fastethernetl/1c192.16&2.64/28 is directly connected, fastethernetl/1r192.168.2.0/24 120/2j via 192.168.2.66, 00:00:22, fastethernetl/1r192.168.2.128/28 120/1 via 192.168

9、.2.67, 00:00:0& fastethernetl/1192.168.3.0/27 is subnetted, 1 subnetsc192.168.3.96 is directly connected, fastethernetl/o查看r4的路由表,结果为:r4#show ip routecodes: c connected, s - static, r rip, m mobile, b bgpd - eigrp, ex - eigrp external, o - ospf, ia - ospf inter area n1 - ospf nssa external type

10、1, n2 - ospf nssa external type 2 el ospf external type 1, e2 - ospf external type 2i is-is, su is-is summary, l1 is-is level-1, l2 is-is level-2 ia is-is inter area, * candidate default, u per-user static route o - odr, p - periodic downloaded static routegateway of last resort is not set19268.1.0/

11、24 is variably subnetted, 2 subnets, 2 masksr192.16& 1.176/28 120/1 via 192.16& 1.153, 00:00:07, serial0/0c192.168.152/30 is directly connected, serial0/0192.168.2.0/24 is variably subnetted, 4 subnets, 2 masksr19268.2.96/28 120/1 via 192.168.2.129, 00:00:03, serialo/1r19268.2.64/28 120/11 v

12、ia 192.168.2.129, 00:00:03, serialo/1r192.168.2.0/24 120/1 via 192.168.1.153, 00:00:07, serial0/0c1926&2.128/28 is directly connected, serialo/119268.3.0/27 is subnetted, 1 subnetsc19268.3.64 is directly connected, fastethernetl/o4、在r2的串口上配置ripv2认证:1)趾置ripv2认证步骤如下:(1)定义一个带名字的钥匙链;(2)定义在钥匙上的钥匙;(3)

13、 在接口上启动认证并指定使用的钥匙链;(4)指定这个接口使用明文认证还是密文认证;(5)可 选地配置钥匙的管理。按上述步骤,在r3。r4的串口上配置ripv2认证如下:r3#conftr3(config)# key chain mykeyr3(config-keychain) # key 1r3(config-keychain-key)# key-string 123456r3(config-keychain-key) #endr3#conftr3(config)#int s0/0r3(config-if)#ip rip authentication key-chain mykeyr3 (co

14、nfig-if)#ip rip authentication mode text3)分别在r3、r4上开启rip调试信息,找出二者相互通过串口发送的ripv2路由更新: r3#debug ip ripr3通过串口送给r4的ripv2路由更新:r3#*mar 1 00:33:33.335: rip: received packet with text authentication 123456*mar 1 00:33:33.339: rip: received v2 update from 192.168.1.154 on serial0/0*mar 1 00:33:33.343:192.168

15、.2.0/24 via 0.0.0.0 in 1 hops*mar 1 00:33:33.343:19268.3.0/24 via 0.0.0.0 in 1 hops*mar 1 00:33:34.203: rip: sending v2 update to 224.0.0.9 via fastethernetl/1 (192.168.2.66)r4通过串口送给r3的ripv2路由更新:*mar 1 00:34:22.147: rip: received packet with text authentication 123456*mar 1 00:34:22.151: rip: receiv

16、ed v2 update from 192.168.1.153 on serial0/0*mar 1 00:34:22.155:192.168.176/28 via 0.0.0.0 in 1 hops*mar 1 00:34:22.155:192.168.2.0/24 via 0.0.0.0 in 1 hops2)再从pci ping pc2,结果为:vpcs 1 >ping 192.168.3.90192.168.3.90 icmp_seq=l timeout192.168.3.90 icmp_seq=2 timeout192.168.3.90 icmp_seq=3 timeout19

17、2.168.3.90 icmp_seq=4 timeout192.168.3.90 icmp_seq=5 timeout查看r1的路由表,到子网192.168.3.64在r1上是否有相应路由:没有r192.168.1.0/24 120/1 via 192.168.2.66, 00:00:06, fastethernetl/119268.2.0/24 is variably subnetted, 4 subnets, 2 masksr19268.2.96/28 120/1 via 192.168.2.67, 00:00:06, fastelhernetl/1c19268.2.64/28 is d

18、irectly connected, fastethernetl/1r19268.2.0/24 120/2 via 192.168.2.66, 00:00:06, fastethernetl/1r192.168.2.128/28 120/1j via 192.168.2.67, 00:00:06, fastethernetl/1192.168.3.0/27 is subnetted, 1 subnetsc192.168.3.96 is directly connected, fastethernetl/03)出现无相应子网路由的原因是边界路由器的自动汇总,为开启子网更新信息的传递,需关闭自动更

19、新功能:r1上的关闭自动更新功能配置如下:rl#conftrl(config)#router ripr1 (config-router)#version 2r1 (config-router)#no auto-summaryr1 (config-router)#e ndr4上也必须关闭自动汇总功能,配置如此类似,不再重复。4)在关闭了自动汇总后,再分别在r1与r4上查看路由表,r1的路由表:r1 #show ip router 192.168.1.0/24 120/1 via 192.168.2.66, 00:00:15, fastethernetl/119268.2.0/24 is vari

20、ably subnetted, 4 subnets, 2 masksr19268.2.96/28 120/1 via 192.16&2.67, 00:00:07, fastethernetl/1c19268.2.64/28 is directly connected, fastethernetl/1r19268.2.0/24 120/3 via 192.168.2.67, 00:00:07, fastethernetl/1r192.168.2.128/28 120/1j via 192.168.2.67, 00:00:07, fastethernetl/1192.168.3.0/24

21、is variably subnetted, 2 subnets, 2 masksc19268.3.96/27 is directly connected, fastethernetl/or192.168.3.0/24 120/2 via 192.168.2.67, 00:00:07, fastethernetl/1120/2 via 192.168.2.66, 00:00:15, fastethernetl/1r4的路由表:r4#show ip route192.168.1.0/24 is variably subnetted, 3 subnets, 3 masksr192.168.1.0/

22、24 1120/2j via 192.168.2.129, 00:00:14, serialo/1r192.168.1.176/28 120/1 via 192.168.1.153, 00:00:00, serial0/0c192.168.1.152/30 is directly connected, serial()/019268.2.0/24 is variably subnetled, 4 subnets, 2 masksr192.168.2.96/28 120/1 via 192.168.2.129, 00:00:14, serial0/lr192.168.2.64/28 120/1

23、via 192.168.2.129, 00:00:14, serial0/lr19268.2.0/24 120/1j via 192.168.1.153, 00:00:00, serial0/0c192.168.2.128/28 is directly connected, serial0/l192.168.3.0/24 is variably subnetted, 2 subnets, 2 masksc19268.3.64/27 is directly connected, fastethernetl/or192.168.3.0/24 120/2 via 192.168.2.129, 00:

24、00:14, serialo/1120/2 via 192.168.1.153,00:00:00, serial0/05)再从 pci ping pc2,结果 为:vpcs 1 >ping 192.168.3.90192.168.3.90 icmp_seq=l timeout192.168.3.90 icnip_seq=2 time= 187.000 ms192.168.3.90 icmp_seq=3 time=18&000 ms192.168.3.90 icmp_seq=4 time= 187.000 ms192.168.3.90 icmp_seq=5 time= 156.00

25、0 ms5、用wireshark分析抓包文件ripl.pcap,找出认证类型字段的值,以及i i令: 认证类型:simple password口令:1234566、将r3、r4串口间的认证类型改为md5,在r3上配置如下:r3#conftr3(config)#int s0/0r3(config-if)#ip rip authentication key-chain mykeyr3 (config-if)#no ip rip authentication mode textr3 (config-if)#ip rip authentication mode md5r3 (config-if)#end在r4上的配置如此类似,不再重复。再通过分析抓包文件rip2.pcap,找岀认证类型与口令:认证类型:keyed message digest口令:authentication data:

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论