GRE实验

 路由封装协议GRE实验

GRE(Generic Routing Encapsulation)即通用路由封装协议,是对某些网络层协议(如IP和IPX)的数据报进行封装,使这些被封装的数据报能够在另一个网络层协议(如IP)中传输

一.实验拓扑

二.设置

R1:

interfaceFastEthernet0/0

ip address61.130.130.1 255.255.255.252

interfaceFastEthernet0/1

ip address192.168.1.254 255.255.255.0

interface Tunnel10

ip address192.168.4.1 255.255.255.0

tunnel sourceFastEthernet0/0

tunnel destination61.130.132.1

ip classless

ip route 0.0.0.00.0.0.0 61.130.130.2

ip route192.168.2.0 255.255.255.0 192.168.4.2

R2:

interface FastEthernet0/0

ip address61.130.130.2 255.255.255.252

interfaceFastEthernet0/1

ip address 61.130.132.2255.255.255.252

R3:

interface FastEthernet0/0

ip address 61.130.132.1 255.255.255.252

interface FastEthernet0/1

ip address 192.168.2.254 255.255.255.0

interface Tunnel20

ip address 192.168.4.2 255.255.255.0

tunnel source FastEthernet0/0

tunnel destination 61.130.130.1

ip classless

ip route 0.0.0.0 0.0.0.0 61.130.132.2

ip route 192.168.1.0 255.255.255.0192.168.4.1

三.检查结果

R1:

1.     查看路由表:

r1#show ip route

Codes: C - connected, S - static, I - IGRP,R - RIP, M - mobile, B - BGP

Gateway of last resort is 61.130.130.2 tonetwork 0.0.0.0

61.0.0.0/30 is subnetted, 1 subnets

C      61.130.130.0 is directly connected, FastEthernet0/0

C   192.168.1.0/24 is directly connected, FastEthernet0/1

S   192.168.2.0/24 [1/0] via 192.168.4.2

C   192.168.4.0/24 is directly connected, Tunnel10

S*  0.0.0.0/0 [1/0] via 61.130.130.2

2.     查看tunnel接口

r1#show interface tunnel 10

Tunnel10 is up, line protocol is up(connected)

Hardware is Tunnel

Internet address is 192.168.4.1/24

MTU17916 bytes, BW 100 Kbit/sec, DLY 50000 usec,

reliability 255/255, txload 1/255, rxload 1/255

Encapsulation TUNNEL, loopback not set

Keepalive not set

Tunnel source 61.130.130.1 (FastEthernet0/0), destination 61.130.132.1

Tunnel protocol/transport GRE/IP

Key disabled, sequencing disabled

Checksumming of packets disabled

Tunnel TTL 255

Fast tunneling enabled

Tunnel transport MTU 1476 bytes

Tunnel transmit bandwidth 8000 (kbps)

Tunnel receive bandwidth 8000 (kbps)

Last input never, output never, output hang never

Last clearing of "show interface" counters never

Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 1

Queueing strategy: fifo

Output queue: 0/0 (size/max)

5minute input rate 0 bits/sec, 0 packets/sec

5minute output rate 0 bits/sec, 0 packets/sec

26 packets input, 3328 bytes, 0 no buffer

Received 0 broadcasts, 0 runts, 0 giants, 0 throttles

0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort

0 input packets with dribble condition detected

42 packets output, 5376 bytes, 0 underruns

0 output errors, 0 collisions, 0 interface resets

0 unknown protocol drops

0 output buffer failures, 0 output buffers swapped out

四.测试结果:

Pc1:

PC2:

时间: 2024-11-02 22:54:10

GRE实验的相关文章

VPN技术:GRE

GRE是一项由美国思科公司开发的轻量级隧道协议,它能够将各种网络层协议进行封装到IP包中,通过隧道创建一个虚拟的点到点链路,把两台路由器连接起来,实现数据传输的功能.GRE本身是不加密的,但可以使用IPSEC对GRE中的数据进行保护,即GRE Over IPSEC,我们常用的DMVPN也是GRE的一种. 封装: 抓包: GRE实验 拓扑图: 实验介绍: R1和R3模拟一家公司在不同两个地方的路由器,R2模拟运营商路由器.R1在北京,R3在上海,要想让上海的员工能够访问北京的服务器,在R1和R3之

GRE over IPSec VPN实验

GRE over IPSec VPN实验

CCNA实验三十六 GRE(通用路由封装)  

CCNA实验三十六 GRE(通用路由封装) 环境:Windows XP .Packet Tracert5.3 目的:了解GRE的使用,掌握如何配置GRE. 说明: GRE(Generic Routing Encapsulation,通用路由封装)协议是对某些网络层协议(如IP 和IPX)的数据报文进行封装,使这些被封装的数据报文能够在另一个网络层协议(如IP)中传输.GRE采用了Tunnel(隧道)技术,是VPN(Virtual Private Network)的第三层隧道协议. Tunnel

经典GRE over IPSec实验

经典GRE over IPSec实验 如图所示,该拓扑是GRE over IPSec站点到站点的VPN拓扑 实验需求; 在站点Site1(202.100.1.1)和Site2(61.128.1.1)之间建立GRE隧道tunnel0,网段172.16.1.0/24 GRE隧道上运行OSPF协议 使得Site1和Site2相互学到身后的网络路由1.1.1.1/24和3.3.3.3/24 配置IPSec VPN,对两个站点之间GRE流量加密 基本配置省略 Site1(config)#ip  route

Open vSwitch的GRE隧道实验网络

实验参考 Open vSwitch的GRE隧道实验网络 实验步骤: 1.配置VM1 (1)Open vSwitch服务验证 验证虚拟机VM1的OvS服务是否被启动好: # ps -ef|grep ovs  2. 在VM1中创建两个bridge: # ovs-vsctl add-br br0 # ovs-vsctl add-br br1  3. 配置br0: # ifconfig eth0 0 up # ifconfig br0 20.0.2.12 netmask 255.255.255.248

实验:基于GRE隧道的Site To Site VPN

拓扑如下: 描述: R1和R3模拟上海和北京办公区的边界路由,且已经启用PAT. ISP模拟公网和公网服务器.ISP已经启用Telnet(Password:123,enable Password:321)和HTTP服务: R2和R4模拟上海和北京的内网主机. 现R2可以和R3通信,但不能与R4通信:R4可以与R1通信,但不能与R2通信. 要求: 在R1和R3间创建GRE隧道,使R2和R4能够通信. R1配置脚本: conf t int tunnel 1//隧道编号为1,本地有效 ip add 1

GRE VPN 实验

拓扑: R1配置(左): Router#sh run Building configuration... Current configuration : 966 bytes ! version 12.4 no service timestamps log datetime msec no service timestamps debug datetime msec no service password-encryption ! hostname Router ! ! ! ! ! ! ! ! i

干货分享: 长达150页的openvswitch的ppt,不实验无真相

<iframe height=570 width=100% scrolling="no" src="http://share.csdn.net/frame/7766" frameborder=0 allowfullscreen></iframe> 一.概论 Software Defined Network简介 OpenFlow简介 Openvswitch简介 二.架构 Openvswitch架构 实验一:查看Openvswitch的架构 Op

Cisco路由器配置GRE over IPsec

拓扑图 实验目的: 通过CRE over IPsec的方式实现R1网段:172.16.10.0/24和R2网段:172.17.10.0/24通信加密. 由于IPsec VPN不支持组播,而GRE支持多种协议,所以一般情况下会选择GRE over IPsec. 配置思路: 通过ACL设置感兴趣流 配置IKE第一阶段 配置IKE第二阶段 新建MAP,并应用于接口 设置路由,下一跳为tunnel 0 配置: R1: 配置接口IP信息 interface Loopback0  ip address 17