實現階段3的DMVPN,需要匯總路由
實驗拓撲圖如下:
實驗拓撲圖
1. 實現公網路由相互通信
(1)R1、R2與R3的基本配置
R1#show run int e0/0
ip address 61.128.1.100 255.255.255.0
R1#show run | s ip route
ip route 0.0.0.0 0.0.0.0 61.128.1.254 //配置指向網關的靜態默認路由
R2#show run int e0/0
interface Ethernet0/0
ip address 202.100.1.1 255.255.255.0
R2#show run | s ip route
ip route 0.0.0.0 0.0.0.0 202.100.1.254
R3#show run int e0/0
ip address 202.100.1.2 255.255.255.0
R3#show run | s ip route
ip route 0.0.0.0 0.0.0.0 202.100.1.254
(2)SW的基本配置
SW1#show run int e0/1
interface Ethernet0/1
switchport access vlan 20 //將SW的e0/1接口劃入VLAN 20
SW1#show run int e0/2
interface Ethernet0/2
switchport access vlan 10 //將SW的e0/1接口劃入VLAN 10
SW1#show run int e0/3
interface Ethernet0/3
switchport access vlan 10 //將SW的e0/1接口劃入VLAN 10
SW1#show run int vlan 10
interface Vlan10
ip address 202.100.1.254 255.255.255.0 //配置SVI接口的IP位址
SW1#show run int vlan 20
interface Vlan20
ip address 61.128.1.254 255.255.255.0
2. 以EIGRP的動態路由方式來實現階段3的DMVPN,需要匯總路由
(1)建立MGRE隧道(以R1為例,R2、R3地址以拓撲圖配置即可,其他配置相同)
R1#show run int tunnel 0
interface Tunnel0
ip address 172.16.1.100 255.255.255.0
tunnel source Ethernet0/0 //指定隧道的原地址為接口E0/0
tunnel mode gre multipoint //設置隧道的模式為多點GRE模式
(2)實施NHRP
R1(HUB)的NHRP配置如下
R1#show run int tunnel 0 | s nhrp
ip nhrp authentication cisco //設置NHRP的認證密碼是cisco
ip nhrp map multicast dynamic //設置動態接受組播映射
ip nhrp network-id 123 //設置NHRP的ID為123
ip nhrp redirect //設置NHRP的重定向
R2的NHRP配置如下(R3相同的配置)
R2#show run int tunnel 0 | s nhrp
ip nhrp authentication cisco
ip nhrp map 172.16.1.100 61.128.1.100 //靜態映射隧道虛擬地址到公網地址
ip nhrp map multicast 61.128.1.100 //手動映射動態組播的虛擬地址到公網地址
ip nhrp network-id 123
ip nhrp nhs 172.16.1.100 //設置NHRP的伺服器為HUB的隧道虛擬地址
ip nhrp shortcut //開啟NHRP的快捷方式
(3)實施EIGRP,並實現匯總
R1的EIGRP的配置(R2、R3的配置就是簡單的將業務接口與隧道接口通告進EIGRP 90的進程下)
R1#show run | s eigrp
no ip split-horizon eigrp 90 //由於防環機制水平分割,導致兩支路不能相互得到彼此的EIGRP路由,所以要去除水平分割。
router eigrp 90
network 172.16.1.0 0.0.0.255
network 192.168.100.0 //將業務接口與隧道接口通告進EIGRP 90的進程下
R1#show run int tunnel 0 | s ip summary
ip summary-address eigrp 90 192.168.0.0 255.255.0.0 //在tunnel 0的接口下實施eigrp 90進程下的匯總路由為192.168.0.0/16的匯總路由
(4)實施IPSEC(以R1為例,其他配置一致即可)
第一步:實施isakmp sa
R1#show run | s cry
crypto isakmp policy 123 //創建crypto isakmp的策略號為123
encr 3des //設置加密方式為3des方式
authentication pre-share //設置認證方式為預共享
crypto isakmp key cisco address 0.0.0.0 //設置crypto isakmp與目的為所有的路由的密碼是cisco
第二步:實施ipsec sa
crypto ipsec transform-set SADB esp-3des esp-md5-hmac //創建crypto ipsec的轉換集為SADB並設置封裝為ESP的加密方式為3DES,認證的算法為md5-hmac
mode tunnel //默認為隧道模式
crypto ipsec profile DMVPN //創建加密IPSEC的配置文件名為DMVPN
set transform-set SADB //設置在加密文件DMVPN中的轉換集為SADB
第二步:在隧道接口下調用IPSEC的加密設置
R1(config)#int tunnel 0
R1(config-if)#tunnel protection ipsec profile DMVPN //在隧道接口下調用ipsec的防護文件DMVPN
(5)驗證
R2#show ip route eigrp | b Gate
Gateway of last resort is 202.100.1.254 to network 0.0.0.0
D 192.168.0.0/16 [90/27008000] via 172.16.1.100, 00:04:06, Tunnel0 //R2得到了EIGRP的匯總的16位路由
R3#traceroute 192.168.1.1 source l0 numeric //查看R3到R2的路徑信息
Type escape sequence to abort.
Tracing the route to 192.168.1.1
VRF info: (vrf in name/id, vrf out name/id)
1 172.16.1.100 10 msec 5 msec 6 msec
2 172.16.1.1 7 msec * 6 msec //第一次traceroute時發現路徑為R3>R1>R2,此時轉發要經過HUB才能到達支路,不是最優路徑
R3#traceroute 192.168.1.1 source l0 numeric
Type escape sequence to abort.
Tracing the route to 192.168.1.1
VRF info: (vrf in name/id, vrf out name/id)
1 172.16.1.1 6 msec * 7 msec 第二次traceroute時路徑就優化了,R3就直接到達了R2