Experiment
Topology diagram:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/AC/wKioL1S3zxzyAn4eAAE8h5dCb5s706.jpg "style=" float: none; "title=" 1.jpg "alt=" Wkiol1s3zxzyan4eaae8h5dcb5s706.jpg "/>
Steps:
One, configure the IP address for the PC machine
Server:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/AF/wKiom1S3zk-jMoEMAAFRkj089Rc916.jpg "style=" float: none; "title=" 2.jpg "alt=" Wkiom1s3zk-jmoemaafrkj089rc916.jpg "/>
C2:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/AC/wKioL1S3zxyToF8LAAFr3r_ZYkQ520.jpg "style=" float: none; "title=" 3.jpg "alt=" Wkiol1s3zxytof8laafr3r_zykq520.jpg "/>
C1:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/AF/wKiom1S3zlCiR3akAAFGsQzJLO0914.jpg "style=" float: none; "title=" 4.jpg "alt=" Wkiom1s3zlcir3akaafgsqzjlo0914.jpg "/>
Two, SW1 and SW2 do VTP service mode, SW3 and SW4 do VTP customer mode
SW1:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/AD/wKioL1S30VjRFegFAAGzm_DachM863.jpg "title=" 49.jpg "alt=" Wkiol1s30vjrfegfaagzm_dachm863.jpg "/>
SW2:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/58/AF/wKiom1S3zlCBwbQyAAHgUzLstLc634.jpg "style=" float: none; "title=" 6.jpg "alt=" Wkiom1s3zlcbwbqyaahguzlstlc634.jpg "/>
SW3:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/AC/wKioL1S3zx3Dx-54AAD37qYND-Q081.jpg "style=" float: none; "title=" 7.jpg "alt=" Wkiol1s3zx3dx-54aad37qynd-q081.jpg "/>
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/AF/wKiom1S3zlDTmtnKAAJjfLnco8A216.jpg "style=" float: none; "title=" 8.jpg "alt=" Wkiom1s3zldtmtnkaajjflnco8a216.jpg "/>
SW4:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/AD/wKioL1S3zx3S5f6AAAGbR6YVg0s364.jpg "style=" float: none; "title=" 9.jpg "alt=" Wkiol1s3zx3s5f6aaagbr6yvg0s364.jpg "/>
third, according to the experimental requirements VLAN10 flow Sw1,vlan20 flow to go SW2, so SW1 configured as the root bridge VLAN10, SW2 configured as VLAN20 Root bridge, according to the command "tracert " Trace Route View
SW1:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/B0/wKiom1S30STwCu7DAAJzhcr6Lm4632.jpg "title=" 50.jpg "alt=" Wkiom1s30stwcu7daajzhcr6lm4632.jpg "/>
SW2:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/AF/wKiom1S3zlWBYOrfAAKNci42O0U647.jpg "style=" float: none; "title=" 11.jpg "alt=" Wkiom1s3zlwbyorfaaknci42o0u647.jpg "/>
To track VLAN10 traffic:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/AF/wKiom1S3zpHSZTqRAAIE8a85neY998.jpg "style=" float: none; "title=" 12.jpg "alt=" Wkiom1s3zphsztqraaie8a85ney998.jpg "/>
To track VLAN20 traffic:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/AD/wKioL1S3z16QXHfqAAJOwxJPAfc711.jpg "style=" float: none; "title=" 13.jpg "alt=" Wkiol1s3z16qxhfqaajowxjpafc711.jpg "/>
The above shows VLAN10 traffic is SW1 VLAN10, and upstream interface to the router F0/1 path, VLAN20 traffic is SW2 VLAN20, and upstream interface to the path of router f1/0
Four, according to the experimental requirements, the 192.168.0.0/24 converted to 12.0.0.8/8, according to the command "Debug IP Nat" View, with the dynamic ant configuration as follows
R1:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/AF/wKiom1S3zpLiWyadAAKmNIOwAOM448.jpg "style=" float: none; "title=" 14.jpg "alt=" Wkiom1s3zpliwyadaakmniowaom448.jpg "/>
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/58/AD/wKioL1S3z16jvbZiAAEKESwkRVc520.jpg "style=" float: none; "title=" 15.jpg "alt=" Wkiol1s3z16jvbziaaekeswkrvc520.jpg "/>
Conversion address for Debug C1:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/58/AF/wKiom1S3zpLwUKPVAAMSBxeECsI702.jpg "style=" float: none; "title=" 16.jpg "alt=" Wkiom1s3zplwukpvaamsbxeecsi702.jpg "/>
Conversion address for Debug C2:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/AD/wKioL1S3z1-Q49nBAAGWMNKg_kw229.jpg "style=" float: none; "title=" 17.jpg "alt=" Wkiol1s3z1-q49nbaagwmnkg_kw229.jpg "/>
Five, according to the experimental requirements, VLAN10 virtual gateway for the 192.168.1.254/24,vlan20 virtual gateway for 192.168.2.254/24, with HSRP configuration as follows:
SW1:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/58/AD/wKioL1S3z1-j1z0VAAKD9lYPkkY461.jpg "style=" float: none; "title=" 18.jpg "alt=" Wkiol1s3z1-j1z0vaakd9lypkky461.jpg "/>
SW2
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/AF/wKiom1S3zpLwlwtoAAK7AsMNZrU505.jpg "style=" float: none; "title=" 19.jpg "alt=" Wkiom1s3zplwlwtoaak7asmnzru505.jpg "/>
Six, in order to realize the whole network interoperability, configure the static route on R1,SW1 and SW2, after the successful configuration, test the whole network interworking
R1:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/AD/wKioL1S3z1-woeOIAALFi5MNNBw370.jpg "style=" float: none; "title=" 20.jpg "alt=" Wkiol1s3z1-woeoiaalfi5mnnbw370.jpg "/>
SW1:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/58/B0/wKiom1S3zpOzvoPlAAJclFz3_FA601.jpg "style=" float: none; "title=" 21.jpg "alt=" Wkiom1s3zpozvoplaajclfz3_fa601.jpg "/>
SW2:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/B0/wKiom1S3zpPBHQVLAAJys3Hq3_g053.jpg "style=" float: none; "title=" 22.jpg "alt=" Wkiom1s3zppbhqvlaajys3hq3_g053.jpg "/>
Test full network interoperability with C1 and c2,ping servers
C1:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/58/AD/wKioL1S3z2DTgcceAAFJZojyJHE605.jpg "style=" float: none; "title=" 23.jpg "alt=" Wkiol1s3z2dtgcceaafjzojyjhe605.jpg "/>
C2:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/B0/wKiom1S30vqQyfNiAAE3LidBdAY885.jpg "title=" 51.jpg "alt=" Wkiom1s30vqqyfniaae3lidbday885.jpg "/>
Seven, according to the experiment Request: C1 use username and password for remote login to R1,SW1,SW2,SW3,SW4
The specific configuration is as follows:
R1:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/58/B0/wKiom1S3zpSynKjpAAIhOH--oiU530.jpg "style=" float: none; "title=" 25.jpg "alt=" Wkiom1s3zpsynkjpaaihoh--oiu530.jpg "/>
SW1:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/AD/wKioL1S3z2Hx8RuLAAJhUnGN4jc989.jpg "style=" float: none; "title=" 26.jpg "alt=" Wkiol1s3z2hx8rulaajhungn4jc989.jpg "/>
SW2:
: 650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/B0/wKiom1S3zquROIi3AAGq5Gv7Xv4533.jpg "style=" float : none; "title=" 27.jpg "alt=" Wkiom1s3zquroii3aagq5gv7xv4533.jpg "/>
SW3:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/58/AD/wKioL1S3z3jgN7UhAAICC773ixY865.jpg "style=" float: none; "title=" 28.jpg "alt=" Wkiol1s3z3jgn7uhaaicc773ixy865.jpg "/>
SW4:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/58/B0/wKiom1S3zqziXT19AAH8UBC_lJM071.jpg "style=" float: none; "title=" 29.jpg "alt=" Wkiom1s3zqzixt19aah8ubc_ljm071.jpg "/>
Use C1 Login to view:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/B0/wKiom1S3zqyT9VOXAABiUDtsiG4623.jpg "style=" float: none; "title=" 30.jpg "alt=" Wkiom1s3zqyt9voxaabiudtsig4623.jpg "/>
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/AD/wKioL1S3z3mRP4wBAABi7I2Uwkw318.jpg "style=" float: none; "title=" 31.jpg "alt=" Wkiol1s3z3mrp4wbaabi7i2uwkw318.jpg "/>
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/B0/wKiom1S3zqzybXiwAABizPcGFGc565.jpg "style=" float: none; "title=" 32.jpg "alt=" Wkiom1s3zqzybxiwaabizpcgfgc565.jpg "/>
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/AD/wKioL1S3z3nQ7zTVAABky75Zen8670.jpg "style=" float: none; "title=" 33.jpg "alt=" Wkiol1s3z3nq7ztvaabky75zen8670.jpg "/>
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/AD/wKioL1S3z3mSi_G0AABfAZyGzOA505.jpg "style=" float: none; "title=" 34.jpg "alt=" Wkiol1s3z3msi_g0aabfazygzoa505.jpg "/>
Eight, according to the experimental requirements: C2 can only access FTP and C1 and can upload and download ftp files, C1 can only access the Web and C2, using ACL configuration implementation requirements, ACL configuration is as follows:
SW1:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/AD/wKioL1S31IGC_60qAAJUBK5SN8s377.jpg "title=" 52.jpg "alt=" Wkiol1s31igc_60qaajubk5sn8s377.jpg "/>
80 ports (Web service) configured to allow C1 access to the server allow C1 to access C2
The experimental results are as follows:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/B0/wKiom1S30_uBrQ-GAAJTU9i73OY414.jpg "title=" 53.jpg "alt=" Wkiom1s30_ubrq-gaajtu9i73oy414.jpg "/>
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/B0/wKiom1S3zq7ziaNxAAJqyJnI_pM031.jpg "style=" float: none; "title=" 36.jpg "alt=" Wkiom1s3zq7zianxaajqyjni_pm031.jpg "/>
The following configuration is C2 only access to the FTP service and C1
SW2:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/58/AD/wKioL1S3z3vBw4OqAAJZhJQ4Iso652.jpg "style=" float: none; "title=" 37.jpg "alt=" Wkiol1s3z3vbw4oqaajzhjq4iso652.jpg "/>
View the results of the experiment as follows:
Add the file test on the FTP server so that the client uses command mode to download, the following is the experimental steps:
R1:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/58/B0/wKiom1S3zq6yl8lBAAELwg-w7jI742.jpg "style=" float: none; "title=" 38.jpg "alt=" Wkiom1s3zq6yl8lbaaelwg-w7ji742.jpg "/>
After you download the command mode using the GET command, view the client folders as follows, the test file has been downloaded locally, the ftp file is created locally for the client to upload, and the following are the experimental steps
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/AD/wKioL1S3z3vgYwSqAAIOdJxK8lc282.jpg "style=" float: none; "title=" 39.jpg "alt=" Wkiol1s3z3vgywsqaaiodjxk8lc282.jpg "/>
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/B0/wKiom1S3zq6y5VbGAACuNhDXrjQ261.jpg "style=" float: none; "title=" 40.jpg "alt=" Wkiom1s3zq6y5vbgaacunhdxrjq261.jpg "/>
View server after uploading:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/B0/wKiom1S3zq7ifFIVAAFym3N3nVo146.jpg "style=" float: none; "title=" 41.jpg "alt=" Wkiom1s3zq7iffivaafym3n3nvo146.jpg "/>
To implement C1 can telnet SW1 to set an ACL, allowing all traffic to pass, configured as follows
SW1:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/AD/wKioL1S3z7mCIyOqAAKorr38otk575.jpg "style=" float: none; "title=" 42.jpg "alt=" Wkiol1s3z7mciyoqaakorr38otk575.jpg "/>
Nine, according to the experimental requirements SW1 for VLAN10 DHCP,SW2 for the VLAN20 of DHCP, the DHCP configuration on the SW1,SW2 as follows, according to DHCP automatic assignment to set the PC to automatically obtain an IP address:
C1:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/B0/wKiom1S3zuywbKWKAAFLx2azjyw065.jpg "style=" float: none; "title=" 43.jpg "alt=" Wkiom1s3zuywbkwkaaflx2azjyw065.jpg "/>
C2:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/58/AD/wKioL1S3z7nzx_PhAAE-qWU0h_o303.jpg "style=" float: none; "title=" 44.jpg "alt=" Wkiol1s3z7nzx_phaae-qwu0h_o303.jpg "/>
SW1:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/AD/wKioL1S3z7nCQGEvAAD0iJKJ4iA368.jpg "style=" float: none; "title=" 45.jpg "alt=" Wkiol1s3z7ncqgevaad0ijkj4ia368.jpg "/>
SW2:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/B0/wKiom1S3zuyBD_UIAAEOzRBIR8E455.jpg "style=" float: none; "title=" 46.jpg "alt=" Wkiom1s3zuybd_uiaaeozrbir8e455.jpg "/>
Use the Ipconfig/all command to view the IP addresses acquired by C1 and C2
C1:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/AD/wKioL1S3z7nTnRFVAAIPVh5RjPw828.jpg "style=" float: none; "title=" 47.jpg "alt=" Wkiol1s3z7ntnrfvaaipvh5rjpw828.jpg "/>
C2:
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/B0/wKiom1S3zu3iuX72AAJMop0WHOI646.jpg "style=" float: none; "title=" 48.jpg "alt=" Wkiom1s3zu3iux72aajmop0whoi646.jpg "/>
Ten, the following is the management address configuration of SW1,SW2,SW3,SW4
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/B0/wKiom1S31d2wODuqAABpskkNths647.jpg "style=" float: none; "title=" 1.jpg "alt=" Wkiom1s31d2woduqaabpskknths647.jpg "/>
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/58/AD/wKioL1S31qrzsQTTAAB5ZCUFp9A351.jpg "style=" float: none; "title=" 2.jpg "alt=" Wkiol1s31qrzsqttaab5zcufp9a351.jpg "/>
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/58/B0/wKiom1S31d3Tz8FmAABitQvT6Tw785.jpg "style=" float: none; "title=" 3.jpg "alt=" Wkiom1s31d3tz8fmaabitqvt6tw785.jpg "/>
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/AD/wKioL1S31qrha9qwAABuNglefjs130.jpg "style=" float: none; "title=" 4.jpg "alt=" Wkiol1s31qrha9qwaabunglefjs130.jpg "/>
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/B0/wKiom1S31d2BuLvUAACkxVUcseA190.jpg "style=" float: none; "title=" 5.jpg "alt=" Wkiom1s31d2bulvuaackxvucsea190.jpg "/>
The following is an interface address configuration for SW1,SW2 and R1
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/AD/wKioL1S31qqDzeo0AAJWMmF47lE661.jpg "style=" float: none; "title=" 6.jpg "alt=" Wkiol1s31qqdzeo0aajwmmf47le661.jpg "/>
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/B0/wKiom1S31d7wgcs6AAChL35Fiak640.jpg "style=" float: none; "title=" 7.jpg "alt=" Wkiom1s31d7wgcs6aachl35fiak640.jpg "/>
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/58/AD/wKioL1S31teSIBDEAACLr7ApGYQ284.jpg "title=" 8.jpg " alt= "Wkiol1s31tesibdeaaclr7apgyq284.jpg"/>
The following is the configuration that joins the interface to the VLAN
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/58/B0/wKiom1S31neS8k_OAAGaNSuK67I509.jpg "style=" float: none; "title=" 10.jpg "alt=" Wkiom1s31nes8k_oaagansuk67i509.jpg "/>
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/AD/wKioL1S310Sx66EuAABl-4QcplQ629.jpg "style=" float: none; "title=" 11.jpg "alt=" Wkiol1s310sx66euaabl-4qcplq629.jpg "/>
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/B0/wKiom1S31njTLkmOAABgt0EX6Gc700.jpg "style=" float: none; "title=" 12.jpg "alt=" Wkiom1s31njtlkmoaabgt0ex6gc700.jpg "/>
Experiment completed
VTP,STP,HSRP,ACL,DHCP, comprehensive experiment