尝试5 全区域中经由过程桢中继实现RIPv2路由和谈 + 密钥验证 ' Z: x! Q. Y, ?' E- ^) Q: a
为什么非冲要手密钥验证部门,因为现实中它根基上是必需的 4 Y: ~' h* a+ H% O8 V
[P1&P2&BBR]通用部门
& s) B( L1 ? F1 M+ b' A
5 [0 `* A0 ~$ Z' V! \8 |
, J0 {# K% s* y! l$ d' rrouter rip
2 I H! h j# E" F3 ]/ ?: Jver 29 S3 d' e' h/ q; f; \- \4 Z
net x.x.x.x
! Q4 Z0 d/ ]% C# `. l8 U( `key chain cisco
X7 ~$ j$ }' G$ E' I" Hkey 1
+ _# }/ o5 Y9 {' D7 K ekey-string mypass' c4 b+ `6 n/ U" [& J" O r
int x/x.x
2 V. i1 I) k3 k) L6 v9 p& J3 I6 b2 e& Bip rip auth key cisco1 X' m- C/ D! q! q
ip rip auth mod md5: F# ^- q) I& m& c4 j6 Z
[P1R1] S; ^% R! [& e( b% h
int s1/0
$ ~# J9 E1 j9 q1 yip add 10.0.0.2 255.0.0.0
( L( l7 h& g- y' R1 U6 Yno shut" f0 J2 C9 G2 L- E! o$ A
ip rip auth key cisco* n5 C$ J1 n# g6 f) W! Y
ip rip auth mod md51 E8 L. u- P3 q
encpa fr; ?8 A% M/ I* E4 o
fr map ip 10.0.0.1 103 br
6 _/ [% j5 E% B8 \) T5 i9 B4 S: b/ k6 Y4 z7 A+ K
[P1R2|P2R1|P2R2]设置装备摆设都是这样,不再阐述 ! r$ x" @# h" @4 r: |+ R
; P. J# W1 }" a! J8 b9 s( y' Q
[BBR1]
9 J! l, v2 R/ W, A% pint s1/0
" e$ U: s3 Y2 @ M( Z& h( ]no ip add
$ Q$ \8 F8 F, _' q$ Dno shut" J* S; j( J7 w& E }3 K2 m
int s1/0.1 mu/ I% B. l% f+ |- D9 P8 i v* }
ip add 10.0.0.19 [. g$ ?4 A; P7 q8 S% J2 ^
fr map ip 10.0.0.2 301 br3 W6 E' B1 \; Z) j' ^) S/ C
fr map ip 10.0.0.3 302 br; F) S: O' I( [- P* S+ A- z3 N. N
ip rip auth key cisco
/ m# h) r3 O6 A% U- G! ^! Jip rip auth mod md5
1 R1 x. O3 l) y. }0 C. h+ _[BBR2]) D' Q+ B) t% ^9 r, W
int s1/0
8 [1 S P* W9 Nno ip add
6 {7 O# d0 ]$ n. W! \: z$ p q( dno shut0 ~0 L( y" a0 H( \; Y; r! [2 u9 w
int s1/0.1 mu
" V; p( n/ [/ @: y- B& a6 sip add 11.0.0.1
0 ]% |; G, c2 z( N* p& i& N, xfr map ip 11.0.0.2 604 br% K; s1 V( V3 }; X. r1 L3 h* S- h1 z
fr map ip 11.0.0.3 605 br
/ [! A& D+ S* y' Z7 X" dip rip auth key cisco( c' e# H9 s! ~1 ]* F3 x% n
ip rip auth mod md5
2 p2 S$ @ L d- n- |1 E; r% z2 w9 M: H- o
验证结不美观:
$ Y+ ~" r) d$ l( B- h( h3 H O# I# h: w, B
9 O0 O `& h5 x2 j2 Q1 e2 _# d) b
1 @$ t) T8 I% n3 ?[Copy to clipboard]
! X/ M% L6 R4 F8 C+ x5 pCODE:! G0 k0 K9 Q3 f4 e2 S0 L
sh ip route
/ W2 m' K d& W7 [9 o: ^R 200.200.200.0/24 [120/2] via 219.146.241.2, 00:00:02, FastEthernet0/0: s) b5 m, t7 \( X* V b
R 100.0.0.0/8 [120/1] via 11.0.0.2, 00:00:01, Serial1/0.1& }# b1 t1 K/ o
R 172.17.0.0/16 [120/3] via 11.0.0.3, 00:00:00, Serial1/0.1
4 D) I n% ]1 @: Q9 j/ ` r; AR 172.16.0.0/16 [120/1] via 11.0.0.3, 00:00:00, Serial1/0.1
- W0 |$ `. b- ^) B6 O. Q+ tR 172.19.0.0/16 [120/1] via 11.0.0.3, 00:00:00, Serial1/0.1/ Q. l9 v9 y! ]) F8 x( t
R 172.18.0.0/16 [120/2] via 11.0.0.3, 00:00:00, Serial1/0.1" J. x, i5 p# d- Y# [
C 219.146.241.0/24 is directly connected, FastEthernet0/0
7 E' I* |; x* OR 192.168.4.0/24 [120/3] via 219.146.241.2, 00:00:02, FastEthernet0/0, L6 l3 _! q; M0 l# Y6 M
R 10.0.0.0/8 [120/1] via 219.146.241.2, 00:00:02, FastEthernet0/0
1 S9 h/ A6 O3 p2 B2 E }" lC 11.0.0.0/8 is directly connected, Serial1/0.1' F8 j7 T$ V4 x/ ?7 d, _6 Y! `% B
R 192.168.1.0/24 [120/2] via 219.146.241.2, 00:00:02, FastEthernet0/03 j) Z/ h t5 \7 a! ?6 V
R 192.168.2.0/24 [120/2] via 219.146.241.2, 00:00:02, FastEthernet0/0% h8 z0 Y3 ~$ F' r3 _5 c( e, ~* m
R 192.168.3.0/24 [120/3] via 219.146.241.2, 00:00:02, FastEthernet0/03 m0 L# K2 W1 V! f9 l9 }$ _6 r
BBR膳缦沔sh fr map
- T2 Z0 k+ y f[Copy to clipboard] D4 S; @4 H" k
CODE:
1 z1 D: V3 l( ?# ?& y3 c& sBBR2#sh fr map# J3 H2 p6 k4 S% k# ]* R
key chain cisco+ f! ?/ z! O: Z& X4 G" R
key 1
* c9 E1 E2 @5 [* {1 }. p+ tkey-string mypass5 B& q: L, E! |, m& V% Z$ a5 U
int x/x.x
; K5 x$ x a! @+ e4 G' Nip rip auth key cisco
" T6 P9 k) p! E! sip rip auth mod md5' B: N" {7 z& B. Y6 q
[P1R1]1 f' E' w" t Q$ j
int s1/0
* s" t0 F2 }! Xip add 10.0.0.2 255.0.0.02 b7 b, S" |, O. y1 z3 {0 G. [% X
no shut
2 x& T B5 {+ N1 K8 [ Iip rip auth key cisco2 i+ a; _* N7 o; Q- S& n4 M1 p- r4 J
ip rip auth mod md5
; d8 v" N( C2 L" ]0 N" Iencpa fr
- N6 ^/ J9 g; G7 b; H; `* _4 yfr map ip 10.0.0.1 103 br |