VTP,STP,HSRP,ACL,DHCP, comprehensive experiment

Source: Internet
Author: User
Tags ftp file



Experiment







Topology diagram:

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/AC/wKioL1S3zxzyAn4eAAE8h5dCb5s706.jpg "style=" float: none; "title=" 1.jpg "alt=" Wkiol1s3zxzyan4eaae8h5dcb5s706.jpg "/>




Steps:

One, configure the IP address for the PC machine

Server:

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/AF/wKiom1S3zk-jMoEMAAFRkj089Rc916.jpg "style=" float: none; "title=" 2.jpg "alt=" Wkiom1s3zk-jmoemaafrkj089rc916.jpg "/>

C2:

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/AC/wKioL1S3zxyToF8LAAFr3r_ZYkQ520.jpg "style=" float: none; "title=" 3.jpg "alt=" Wkiol1s3zxytof8laafr3r_zykq520.jpg "/>

C1:

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/AF/wKiom1S3zlCiR3akAAFGsQzJLO0914.jpg "style=" float: none; "title=" 4.jpg "alt=" Wkiom1s3zlcir3akaafgsqzjlo0914.jpg "/>




Two, SW1 and SW2 do VTP service mode, SW3 and SW4 do VTP customer mode

SW1:

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/AD/wKioL1S30VjRFegFAAGzm_DachM863.jpg "title=" 49.jpg "alt=" Wkiol1s30vjrfegfaagzm_dachm863.jpg "/>

SW2:

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/58/AF/wKiom1S3zlCBwbQyAAHgUzLstLc634.jpg "style=" float: none; "title=" 6.jpg "alt=" Wkiom1s3zlcbwbqyaahguzlstlc634.jpg "/>

SW3:

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/AC/wKioL1S3zx3Dx-54AAD37qYND-Q081.jpg "style=" float: none; "title=" 7.jpg "alt=" Wkiol1s3zx3dx-54aad37qynd-q081.jpg "/>

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/AF/wKiom1S3zlDTmtnKAAJjfLnco8A216.jpg "style=" float: none; "title=" 8.jpg "alt=" Wkiom1s3zldtmtnkaajjflnco8a216.jpg "/>

SW4:

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/AD/wKioL1S3zx3S5f6AAAGbR6YVg0s364.jpg "style=" float: none; "title=" 9.jpg "alt=" Wkiol1s3zx3s5f6aaagbr6yvg0s364.jpg "/>




third, according to the experimental requirements VLAN10 flow Sw1,vlan20 flow to go SW2, so SW1 configured as the root bridge VLAN10, SW2 configured as VLAN20 Root bridge, according to the command "tracert " Trace Route View

SW1:

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/B0/wKiom1S30STwCu7DAAJzhcr6Lm4632.jpg "title=" 50.jpg "alt=" Wkiom1s30stwcu7daajzhcr6lm4632.jpg "/>

SW2:

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/AF/wKiom1S3zlWBYOrfAAKNci42O0U647.jpg "style=" float: none; "title=" 11.jpg "alt=" Wkiom1s3zlwbyorfaaknci42o0u647.jpg "/>

To track VLAN10 traffic:

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/AF/wKiom1S3zpHSZTqRAAIE8a85neY998.jpg "style=" float: none; "title=" 12.jpg "alt=" Wkiom1s3zphsztqraaie8a85ney998.jpg "/>

To track VLAN20 traffic:


650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/AD/wKioL1S3z16QXHfqAAJOwxJPAfc711.jpg "style=" float: none; "title=" 13.jpg "alt=" Wkiol1s3z16qxhfqaajowxjpafc711.jpg "/>

The above shows VLAN10 traffic is SW1 VLAN10, and upstream interface to the router F0/1 path, VLAN20 traffic is SW2 VLAN20, and upstream interface to the path of router f1/0

Four, according to the experimental requirements, the 192.168.0.0/24 converted to 12.0.0.8/8, according to the command "Debug IP Nat" View, with the dynamic ant configuration as follows

R1:

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/AF/wKiom1S3zpLiWyadAAKmNIOwAOM448.jpg "style=" float: none; "title=" 14.jpg "alt=" Wkiom1s3zpliwyadaakmniowaom448.jpg "/>

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/58/AD/wKioL1S3z16jvbZiAAEKESwkRVc520.jpg "style=" float: none; "title=" 15.jpg "alt=" Wkiol1s3z16jvbziaaekeswkrvc520.jpg "/>

Conversion address for Debug C1:

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/58/AF/wKiom1S3zpLwUKPVAAMSBxeECsI702.jpg "style=" float: none; "title=" 16.jpg "alt=" Wkiom1s3zplwukpvaamsbxeecsi702.jpg "/>

Conversion address for Debug C2:

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/AD/wKioL1S3z1-Q49nBAAGWMNKg_kw229.jpg "style=" float: none; "title=" 17.jpg "alt=" Wkiol1s3z1-q49nbaagwmnkg_kw229.jpg "/>

Five, according to the experimental requirements, VLAN10 virtual gateway for the 192.168.1.254/24,vlan20 virtual gateway for 192.168.2.254/24, with HSRP configuration as follows:

SW1:

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/58/AD/wKioL1S3z1-j1z0VAAKD9lYPkkY461.jpg "style=" float: none; "title=" 18.jpg "alt=" Wkiol1s3z1-j1z0vaakd9lypkky461.jpg "/>

SW2

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/AF/wKiom1S3zpLwlwtoAAK7AsMNZrU505.jpg "style=" float: none; "title=" 19.jpg "alt=" Wkiom1s3zplwlwtoaak7asmnzru505.jpg "/>



Six, in order to realize the whole network interoperability, configure the static route on R1,SW1 and SW2, after the successful configuration, test the whole network interworking

R1:

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/AD/wKioL1S3z1-woeOIAALFi5MNNBw370.jpg "style=" float: none; "title=" 20.jpg "alt=" Wkiol1s3z1-woeoiaalfi5mnnbw370.jpg "/>

SW1:

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/58/B0/wKiom1S3zpOzvoPlAAJclFz3_FA601.jpg "style=" float: none; "title=" 21.jpg "alt=" Wkiom1s3zpozvoplaajclfz3_fa601.jpg "/>

SW2:

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/B0/wKiom1S3zpPBHQVLAAJys3Hq3_g053.jpg "style=" float: none; "title=" 22.jpg "alt=" Wkiom1s3zppbhqvlaajys3hq3_g053.jpg "/>

Test full network interoperability with C1 and c2,ping servers

C1:

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/58/AD/wKioL1S3z2DTgcceAAFJZojyJHE605.jpg "style=" float: none; "title=" 23.jpg "alt=" Wkiol1s3z2dtgcceaafjzojyjhe605.jpg "/>

C2:

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/B0/wKiom1S30vqQyfNiAAE3LidBdAY885.jpg "title=" 51.jpg "alt=" Wkiom1s30vqqyfniaae3lidbday885.jpg "/>




Seven, according to the experiment Request: C1 use username and password for remote login to R1,SW1,SW2,SW3,SW4

The specific configuration is as follows:

R1:

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/58/B0/wKiom1S3zpSynKjpAAIhOH--oiU530.jpg "style=" float: none; "title=" 25.jpg "alt=" Wkiom1s3zpsynkjpaaihoh--oiu530.jpg "/>

SW1:

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/AD/wKioL1S3z2Hx8RuLAAJhUnGN4jc989.jpg "style=" float: none; "title=" 26.jpg "alt=" Wkiol1s3z2hx8rulaajhungn4jc989.jpg "/>

SW2:

: 650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/B0/wKiom1S3zquROIi3AAGq5Gv7Xv4533.jpg "style=" float : none; "title=" 27.jpg "alt=" Wkiom1s3zquroii3aagq5gv7xv4533.jpg "/>

SW3:

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/58/AD/wKioL1S3z3jgN7UhAAICC773ixY865.jpg "style=" float: none; "title=" 28.jpg "alt=" Wkiol1s3z3jgn7uhaaicc773ixy865.jpg "/>

SW4:

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/58/B0/wKiom1S3zqziXT19AAH8UBC_lJM071.jpg "style=" float: none; "title=" 29.jpg "alt=" Wkiom1s3zqzixt19aah8ubc_ljm071.jpg "/>

Use C1 Login to view:

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/B0/wKiom1S3zqyT9VOXAABiUDtsiG4623.jpg "style=" float: none; "title=" 30.jpg "alt=" Wkiom1s3zqyt9voxaabiudtsig4623.jpg "/>

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/AD/wKioL1S3z3mRP4wBAABi7I2Uwkw318.jpg "style=" float: none; "title=" 31.jpg "alt=" Wkiol1s3z3mrp4wbaabi7i2uwkw318.jpg "/>

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/B0/wKiom1S3zqzybXiwAABizPcGFGc565.jpg "style=" float: none; "title=" 32.jpg "alt=" Wkiom1s3zqzybxiwaabizpcgfgc565.jpg "/>

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/AD/wKioL1S3z3nQ7zTVAABky75Zen8670.jpg "style=" float: none; "title=" 33.jpg "alt=" Wkiol1s3z3nq7ztvaabky75zen8670.jpg "/>

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/AD/wKioL1S3z3mSi_G0AABfAZyGzOA505.jpg "style=" float: none; "title=" 34.jpg "alt=" Wkiol1s3z3msi_g0aabfazygzoa505.jpg "/>




Eight, according to the experimental requirements: C2 can only access FTP and C1 and can upload and download ftp files, C1 can only access the Web and C2, using ACL configuration implementation requirements, ACL configuration is as follows:

SW1:

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/AD/wKioL1S31IGC_60qAAJUBK5SN8s377.jpg "title=" 52.jpg "alt=" Wkiol1s31igc_60qaajubk5sn8s377.jpg "/>

80 ports (Web service) configured to allow C1 access to the server allow C1 to access C2

The experimental results are as follows:

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/B0/wKiom1S30_uBrQ-GAAJTU9i73OY414.jpg "title=" 53.jpg "alt=" Wkiom1s30_ubrq-gaajtu9i73oy414.jpg "/>

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/B0/wKiom1S3zq7ziaNxAAJqyJnI_pM031.jpg "style=" float: none; "title=" 36.jpg "alt=" Wkiom1s3zq7zianxaajqyjni_pm031.jpg "/>



The following configuration is C2 only access to the FTP service and C1

SW2:

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/58/AD/wKioL1S3z3vBw4OqAAJZhJQ4Iso652.jpg "style=" float: none; "title=" 37.jpg "alt=" Wkiol1s3z3vbw4oqaajzhjq4iso652.jpg "/>



View the results of the experiment as follows:

Add the file test on the FTP server so that the client uses command mode to download, the following is the experimental steps:

R1:


650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/58/B0/wKiom1S3zq6yl8lBAAELwg-w7jI742.jpg "style=" float: none; "title=" 38.jpg "alt=" Wkiom1s3zq6yl8lbaaelwg-w7ji742.jpg "/>



After you download the command mode using the GET command, view the client folders as follows, the test file has been downloaded locally, the ftp file is created locally for the client to upload, and the following are the experimental steps



650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/AD/wKioL1S3z3vgYwSqAAIOdJxK8lc282.jpg "style=" float: none; "title=" 39.jpg "alt=" Wkiol1s3z3vgywsqaaiodjxk8lc282.jpg "/>

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/B0/wKiom1S3zq6y5VbGAACuNhDXrjQ261.jpg "style=" float: none; "title=" 40.jpg "alt=" Wkiom1s3zq6y5vbgaacunhdxrjq261.jpg "/>



View server after uploading:



650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/B0/wKiom1S3zq7ifFIVAAFym3N3nVo146.jpg "style=" float: none; "title=" 41.jpg "alt=" Wkiom1s3zq7iffivaafym3n3nvo146.jpg "/>



To implement C1 can telnet SW1 to set an ACL, allowing all traffic to pass, configured as follows

SW1:

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/AD/wKioL1S3z7mCIyOqAAKorr38otk575.jpg "style=" float: none; "title=" 42.jpg "alt=" Wkiol1s3z7mciyoqaakorr38otk575.jpg "/>




Nine, according to the experimental requirements SW1 for VLAN10 DHCP,SW2 for the VLAN20 of DHCP, the DHCP configuration on the SW1,SW2 as follows, according to DHCP automatic assignment to set the PC to automatically obtain an IP address:

C1:

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/B0/wKiom1S3zuywbKWKAAFLx2azjyw065.jpg "style=" float: none; "title=" 43.jpg "alt=" Wkiom1s3zuywbkwkaaflx2azjyw065.jpg "/>

C2:

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/58/AD/wKioL1S3z7nzx_PhAAE-qWU0h_o303.jpg "style=" float: none; "title=" 44.jpg "alt=" Wkiol1s3z7nzx_phaae-qwu0h_o303.jpg "/>

SW1:

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/AD/wKioL1S3z7nCQGEvAAD0iJKJ4iA368.jpg "style=" float: none; "title=" 45.jpg "alt=" Wkiol1s3z7ncqgevaad0ijkj4ia368.jpg "/>

SW2:

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/B0/wKiom1S3zuyBD_UIAAEOzRBIR8E455.jpg "style=" float: none; "title=" 46.jpg "alt=" Wkiom1s3zuybd_uiaaeozrbir8e455.jpg "/>


Use the Ipconfig/all command to view the IP addresses acquired by C1 and C2

C1:


650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/AD/wKioL1S3z7nTnRFVAAIPVh5RjPw828.jpg "style=" float: none; "title=" 47.jpg "alt=" Wkiol1s3z7ntnrfvaaipvh5rjpw828.jpg "/>

C2:

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/B0/wKiom1S3zu3iuX72AAJMop0WHOI646.jpg "style=" float: none; "title=" 48.jpg "alt=" Wkiom1s3zu3iux72aajmop0whoi646.jpg "/>


Ten, the following is the management address configuration of SW1,SW2,SW3,SW4


650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/B0/wKiom1S31d2wODuqAABpskkNths647.jpg "style=" float: none; "title=" 1.jpg "alt=" Wkiom1s31d2woduqaabpskknths647.jpg "/>

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/58/AD/wKioL1S31qrzsQTTAAB5ZCUFp9A351.jpg "style=" float: none; "title=" 2.jpg "alt=" Wkiol1s31qrzsqttaab5zcufp9a351.jpg "/>

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/58/B0/wKiom1S31d3Tz8FmAABitQvT6Tw785.jpg "style=" float: none; "title=" 3.jpg "alt=" Wkiom1s31d3tz8fmaabitqvt6tw785.jpg "/>

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/AD/wKioL1S31qrha9qwAABuNglefjs130.jpg "style=" float: none; "title=" 4.jpg "alt=" Wkiol1s31qrha9qwaabunglefjs130.jpg "/>

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/B0/wKiom1S31d2BuLvUAACkxVUcseA190.jpg "style=" float: none; "title=" 5.jpg "alt=" Wkiom1s31d2bulvuaackxvucsea190.jpg "/>

The following is an interface address configuration for SW1,SW2 and R1

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/AD/wKioL1S31qqDzeo0AAJWMmF47lE661.jpg "style=" float: none; "title=" 6.jpg "alt=" Wkiol1s31qqdzeo0aajwmmf47le661.jpg "/>

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/B0/wKiom1S31d7wgcs6AAChL35Fiak640.jpg "style=" float: none; "title=" 7.jpg "alt=" Wkiom1s31d7wgcs6aachl35fiak640.jpg "/>


650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/58/AD/wKioL1S31teSIBDEAACLr7ApGYQ284.jpg "title=" 8.jpg " alt= "Wkiol1s31tesibdeaaclr7apgyq284.jpg"/>



The following is the configuration that joins the interface to the VLAN

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/58/B0/wKiom1S31neS8k_OAAGaNSuK67I509.jpg "style=" float: none; "title=" 10.jpg "alt=" Wkiom1s31nes8k_oaagansuk67i509.jpg "/>

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/AD/wKioL1S310Sx66EuAABl-4QcplQ629.jpg "style=" float: none; "title=" 11.jpg "alt=" Wkiol1s310sx66euaabl-4qcplq629.jpg "/>

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/B0/wKiom1S31njTLkmOAABgt0EX6Gc700.jpg "style=" float: none; "title=" 12.jpg "alt=" Wkiom1s31njtlkmoaabgt0ex6gc700.jpg "/>


Experiment completed

VTP,STP,HSRP,ACL,DHCP, comprehensive experiment

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.