How to Set Up r12002 routing protocol for Cisco router 3620 to demonstrate how to set up r12002 routing protocol for Cisco router 3620 this time, we need to build a complex network experimental environment, this environment is also the experimental environment used later to learn about other router experiments. It is used to set the RIPv2 routing protocol and understand the principles and application methods of this Protocol. Other lab environments are similar to this one. Five routers are used in total, all of which are simulated by 3620. Router1 E0/1 <----> Router4 E0/1 Router1 E0/2 <----> Router2 E0/2 Router2 E0/1 <----> Router4 E0/2 Router2 E0/3 <----> router3 E0/2 Router3 E0/1 <----> Router4 E0/3 Router4 E0/0 <----> Router5 E0/0 2. the first experiment uses the putty link tool to connect to the vro. This time, we use the Terminal Link tool provided by Windows to connect to the vro. 3. The first step is to divide subnets. This is a complicated process. After I convert all of them into binary, it will be more intuitive, though stupid. But it is not prone to errors. I divide the class C network 192.168.49.0/24 into three CIDR blocks that can accommodate 25 users and three CIDR blocks that can accommodate 2 users. The division result is: the allocated CIDR block starts from the IP address subnet. The IP address broadcast number 192.168.49.0/24 192.168.49.1 expires then/24 then 192.168.49.63 then/24 192.168.49.65 then 192.168.49.96/30 192.168.49.97 192.168.49.98 192.168.49.99 192.168.49.100/30 192.168.49.101 192.168.49.102 192.168.49.103 192.168.49.104/30 192.168.49.105 192.168.49.106 192.168.49. 107 use the Super Terminal of Windowns to link to the five routers, set their IP addresses based on the table and IP addresses, and then ping the test. Configure the route learning protocol for r1_2 for the five devices. So that they can learn the network address of the other party and find that the routes in the vro include undivided and divided network segments. Complex and complex. Make a route summary for the e0/0 interface of R4, so that the subnet information such as 192.168.49.1/27 cannot be seen on R5, and only one summary of the total network information can be seen, this saves R5 route entries. Note that you need to delete the original routing entries of R5 to make the generation faster. According to the test results of www.2cto.com OK, there are only three route entries on R5, two of which are directly connected, and one is the IP address of the route summary, but R5 can successfully ping 192.168.49.1 of R1. The next experiment is to create a default route pointing to R4 on R5, and then send the default route to the rip network so that other routers can learn the route. Establish an authentication mechanism between R4 and R5, first establish authentication on R5, and then delete the R5 route entries to see if he can learn other rip routes. Then set up the authentication mechanism of R4 to delete the route entry of R4 to see if he can learn the R5 route. Check whether he can learn the entries R1, R2, and R3. The result shows that R5 cannot learn anything if R5 is authenticated. If you authenticate R4, because it is for the e0/0 interface of R4, all R4 can still learn the routes of R1, R2, and R3, and can also learn the routes of R5. R5 can learn all the routes through R4 communication. Of course, it learns a summary route. This article is from the fat shark network.