《网络协议分析》实验报告_第1页
《网络协议分析》实验报告_第2页
《网络协议分析》实验报告_第3页
《网络协议分析》实验报告_第4页
《网络协议分析》实验报告_第5页
已阅读5页,还剩2页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

网络协议分析实验报告2011至2012学年第1学期姓 名系 别计算机系实验地点E1A406学 号年级、班实验时间2011年 11月 30日实验项目实验十一OSPF路由重分布及路由汇总分析实验一、实验目的实验目的:掌握OSPF的OSPF与RIP间的路由重分布的配置方法及RIP路由信息在OSPF区域中的LSA的类型与泛洪特点;掌握区域间路由汇总及外部路由汇总后LSA分发的特点。二、实验环境dynamips,windows平台,PC机三、实验内容及步骤:配置OSPF和RIP,使其能全网通信,并跟踪路由重分布的重新分发过程与特点。在如上图所示的拓朴中,先为各路由器配置接口IP,然后在各路由器上配置RIPv2路由协议,使得PC1、PC2相互之间可以连通。并在R3与R4之间的串口配置RIPv2认证。同时验证认证配置起了作用。在对R1进行配置之前,在R3的S0/0端口和R4的S0/0端口上抓包:Dynagen=capture R3 S0/0 rip1.pcap hdlcDynagen=capture R4 S0/0 rip2.pcap hdlc1、对于各串行链路,如R3,配置接口如下:R3#conf tR3(config)#int s0/0R3(config-if)#ip add 192.168.1.153 255.255.255.252R3(config-if)#clock rate R3(config-if)#no shR3(config-if)#end对于各快速以太网接口,如R1,配置接口IP地址如下:R1#conf tR1(config)#int f1/0R1(config-if)#no switchportR1(config-if)#ip add 192.168.3.112 255.255.255.224R1(config-if)#no shR1(config-if)#end 2、配置RIP路由协议:在R1上配置RIP路由协议如下:R1#conf tR1(config)#router ripR1(config)#version 2R1(config)#network 192.168.3.0R1(config)#network 192.168.2.0R1(config)#end3、在对4台路由器都配置了RIPv2协议之后,查看R1的路由表:R1#show ip route并粘贴各路由器的路由表:R1R1#show ip routeCodes: C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2 ia - IS-IS inter area, * - candidate default, U - per-user static route o - ODR, P - periodic downloaded static routeGateway of last resort is not setR 192.168.1.0/24 120/1 via 192.168.2.66, 00:00:22, FastEthernet1/1 192.168.2.0/24 is variably subnetted, 4 subnets, 2 masksR 192.168.2.96/28 120/1 via 192.168.2.67, 00:00:08, FastEthernet1/1C 192.168.2.64/28 is directly connected, FastEthernet1/1R 192.168.2.0/24 120/2 via 192.168.2.66, 00:00:22, FastEthernet1/1R 192.168.2.128/28 120/1 via 192.168.2.67, 00:00:08, FastEthernet1/1 192.168.3.0/27 is subnetted, 1 subnetsC 192.168.3.96 is directly connected, FastEthernet1/0查看R4的路由表,结果为:R4#show ip routeCodes: C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2 ia - IS-IS inter area, * - candidate default, U - per-user static route o - ODR, P - periodic downloaded static routeGateway of last resort is not set 192.168.1.0/24 is variably subnetted, 2 subnets, 2 masksR 192.168.1.176/28 120/1 via 192.168.1.153, 00:00:07, Serial0/0C 192.168.1.152/30 is directly connected, Serial0/0 192.168.2.0/24 is variably subnetted, 4 subnets, 2 masksR 192.168.2.96/28 120/1 via 192.168.2.129, 00:00:03, Serial0/1R 192.168.2.64/28 120/1 via 192.168.2.129, 00:00:03, Serial0/1R 192.168.2.0/24 120/1 via 192.168.1.153, 00:00:07, Serial0/0C 192.168.2.128/28 is directly connected, Serial0/1 192.168.3.0/27 is subnetted, 1 subnetsC 192.168.3.64 is directly connected, FastEthernet1/04、在R2的串口上配置RIPv2认证:1)配置RIPv2认证步骤如下:(1)定义一个带名字的钥匙链;(2)定义在钥匙上的钥匙;(3)在接口上启动认证并指定使用的钥匙链;(4)指定这个接口使用明文认证还是密文认证;(5)可选地配置钥匙的管理。按上述步骤,在R3。R4的串口上配置RIPv2认证如下:R3#conf tR3(config)# key chain mykeyR3(config-keychain)# key 1R3(config-keychain-key)# key-string R3(config-keychain-key)#endR3#conf tR3(config)#int s0/0R3(config-if)#ip rip authentication key-chain mykeyR3 (config-if)#ip rip authentication mode text3)分别在R3、R4上开启rip调试信息,找出二者相互通过串口发送的RIPv2路由更新:R3#debug ip ripR3通过串口送给R4的RIPv2路由更新:R3#*Mar 1 00:33:33.335: RIP: received packet with text authentication *Mar 1 00:33:33.339: RIP: received v2 update from 192.168.1.154 on Serial0/0*Mar 1 00:33:33.343: 192.168.2.0/24 via 0.0.0.0 in 1 hops*Mar 1 00:33:33.343: 192.168.3.0/24 via 0.0.0.0 in 1 hops*Mar 1 00:33:34.203: RIP: sending v2 update to 224.0.0.9 via FastEthernet1/1 (192.168.2.66)R4通过串口送给R3的RIPv2路由更新:*Mar 1 00:34:22.147: RIP: received packet with text authentication *Mar 1 00:34:22.151: RIP: received v2 update from 192.168.1.153 on Serial0/0*Mar 1 00:34:22.155: 192.168.1.176/28 via 0.0.0.0 in 1 hops*Mar 1 00:34:22.155: 192.168.2.0/24 via 0.0.0.0 in 1 hops2)再从PC1 ping PC2,结果为:VPCS 1 ping 192.168.3.90192.168.3.90 icmp_seq=1 timeout192.168.3.90 icmp_seq=2 timeout192.168.3.90 icmp_seq=3 timeout192.168.3.90 icmp_seq=4 timeout192.168.3.90 icmp_seq=5 timeout查看R1的路由表,到子网192.168.3.64在R1上是否有相应路由:没有R 192.168.1.0/24 120/1 via 192.168.2.66, 00:00:06, FastEthernet1/1 192.168.2.0/24 is variably subnetted, 4 subnets, 2 masksR 192.168.2.96/28 120/1 via 192.168.2.67, 00:00:06, FastEthernet1/1C 192.168.2.64/28 is directly connected, FastEthernet1/1R 192.168.2.0/24 120/2 via 192.168.2.66, 00:00:06, FastEthernet1/1R 192.168.2.128/28 120/1 via 192.168.2.67, 00:00:06, FastEthernet1/1 192.168.3.0/27 is subnetted, 1 subnetsC 192.168.3.96 is directly connected, FastEthernet1/03)出现无相应子网路由的原因是边界路由器的自动汇总,为开启子网更新信息的传递,需关闭自动更新功能:R1上的关闭自动更新功能配置如下:R1#conf tR1(config)#router ripR1 (config-router)#version 2R1 (config-router)#no auto-summaryR1 (config-router)#endR4上也必须关闭自动汇总功能,配置如此类似,不再重复。4)在关闭了自动汇总后,再分别在R1与R4上查看路由表,R1的路由表:R1#show ip routeR 192.168.1.0/24 120/1 via 192.168.2.66, 00:00:15, FastEthernet1/1 192.168.2.0/24 is variably subnetted, 4 subnets, 2 masksR 192.168.2.96/28 120/1 via 192.168.2.67, 00:00:07, FastEthernet1/1C 192.168.2.64/28 is directly connected, FastEthernet1/1R 192.168.2.0/24 120/3 via 192.168.2.67, 00:00:07, FastEthernet1/1R 192.168.2.128/28 120/1 via 192.168.2.67, 00:00:07, FastEthernet1/1 192.168.3.0/24 is variably subnetted, 2 subnets, 2 masksC 192.168.3.96/27 is directly connected, FastEthernet1/0R 192.168.3.0/24 120/2 via 192.168.2.67, 00:00:07, FastEthernet1/1 120/2 via 192.168.2.66, 00:00:15, FastEthernet1/1R4的路由表:R4#show ip route 192.168.1.0/24 is variably subnetted, 3 subnets, 3 masksR 192.168.1.0/24 120/2 via 192.168.2.129, 00:00:14, Serial0/1R 192.168.1.176/28 120/1 via 192.168.1.153, 00:00:00, Serial0/0C 192.168.1.152/30 is directly connected, Serial0/0 192.168.2.0/24 is variably subnetted, 4 subnets, 2 masksR 192.168.2.96/28 120/1 via 192.168.2.129, 00:00:14, Serial0/1R 192.168.2.64/28 120/1 via 192.168.2.129, 00:00:14, Serial0/1R 192.168.2.0/24 120/1 via 192.168.1.153, 00:00:00, Serial0/0C 192.168.2.128/28 is directly connected, Serial0/1 192.168.3.0/24 is variably subnetted, 2 subnets, 2 masksC 192.168.3.64/27 is directly connected, FastEthernet1/0R 192.168.3.0/24 120/2 via 192.168.2.129, 00:00:14, Serial0/1 120/2 via 192.168.1.153, 00:00:00, Serial0/05)再从PC1 ping PC2,结果为:VPCS 1 ping 192.168.3.90192.168.3.90 icmp_seq=1 timeout192.168.3.90 icmp_seq=2 time=187.000 ms192.168.3.90 icmp_seq=3 time=188.000 ms192.168.3.90 icmp_seq=4 time=187.000 ms192.168.3.90 icmp_seq=5 time=156.000 ms5、用wireshark分析抓包文件rip1.pcap,找出认证类型字段的值,以及口令:认证类型:simple password 口令:6、将R3、R4串口间的认证类型改为md5,在R3上配置如下:R3#conf tR3(config)#int s0/0R3(config-if)#ip rip authentication key-chain mykeyR3 (config-if)#no ip rip authentication mode textR3 (config-if)#ip rip authentication mode md5R3 (config-if)#end在R4上的配置如此类似,不再重复。再通过分析抓包文件rip2.pcap,找出认证类型与口令:认证类型:keyed message Digest口令: Authentication Data: b4 f9 dc 4d b0 bc a9 14 20 9c ed ba 26

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论