bad5


实验需求

  • 要求分支可以与总部通信,且分支之间互访需要通过总部才可以访问

实验拓扑

拓扑说明

  • 两台路由器之间的网段为10.1.XY.0/24(XY为两端设备的标号)
  • 每台路由器都有自身设备编号为环回口地址(AR1的环回口地址为1.1.1.1/32)
  • ISP内部运行ISIS协议
  • AR2、4、7作为CE设备,与私网侧设备之间运行OSPF

在这里插入图片描述

基本配置

地址规划

  • AR1
int lo 0
 ip ad 1.1.1.1 32
int g0/0/0
 ip ad 10.1.12.1 24
  • AR2
int lo 0
 ip ad 2.2.2.2 32
int g0/0/0
 ip ad 10.1.12.2 24
int g0/0/1
 ip ad 10.1.23.2 23
int g0/0/2
 ip ad 10.1.28.2 24
  • AR3
int lo 0
 ip ad 3.3.3.3 32
int g0/0/0
 ip ad 10.1.23.3 24
int g0/0/1
 ip ad 10.1.34.3 24
int g0/0/2
 ip ad 10.1.37.3 24
  • AR4
int lo 0
 ip ad 4.4.4.4 32
int g0/0/0
 ip ad 10.1.34.4 24
int g0/0/1
 ip ad 10.1.45.5 24
  • AR5
int lo 0
 ip ad 5.5.5.5 32
int g0/0/0
 ip ad 10.1.45.5 24
int g0/0/1
 ip ad 10.1.56.5 24
  • AR6
int lo 0
 ip ad 6.6.6.6 32
int g0/0/0
 ip ad 10.1.56.6 24
int g0/0/1
 ip ad 10.1.67.6 24
  • AR7
int lo 0
 ip ad 7.7.7.7 32
int g0/0/0
 ip ad 10.1.67.7 24
int g0/0/1
 ip ad 10.1.37.7 24
  • AR8
int lo 0
 ip ad 8.8.8.8 32
int g0/0/0
 ip ad 10.1.28.8 24

配置ISP内部的IGP

  • AR2
isis 100
 is-level level-2
 net 49.0000.0000.0000.0002.00
int lo 0
 isis en 100
int g0/0/1
 isis en 100
  • AR3
isis 100
 is-level level-2
 net 49.0000.0000.0000.0003.00
int lo 0
 isis en 100
int g0/0/0
 isis en 100
int g0/0/1
 isis en 100
int g0/0/2
 isis en 100
  • AR4
isis 100
 is-level level-2
 net 49.0000.0000.0000.0004.00
int lo 0
 isis en 100
int g0/0/0
 isis en 100
  • AR7
isis 100
 is-level level-2
 net 49.0000.0000.0000.0007.00
int lo 0
 isis en 100
int g0/0/1
 isis en 100

AR3上查看ISIS的邻居建立关系(dis isis peer)

在这里插入图片描述

配置BGP

  • AR2、AR4、AR7相同配置
bgp 100
 peer 3.3.3.3 as-number 100
 peer 3.3.3.3 connect-interface lo 0
 ipv4-family unicast
  undo peer 3.3.3.3 enable
 ipv4-family vpnv4
  peer 3.3.3.3 enable
  • AR3
bgp 100
 peer 2.2.2.2 as-number 100
 peer 2.2.2.2 connect-interface lo 0
 peer 4.4.4.4 as-number 100
 peer 4.4.4.4 connect-interface lo 0
 peer 7.7.7.7 as-number 100
 peer 7.7.7.7 connect-interface lo 0
 ipv4-family unicast
  undo peer 2.2.2.2 enable
  undo peer 4.4.4.4 enable
  undo peer 7.7.7.7 enable
  • AR3为反射器,指定客户端
 ipv4-family vpnv4
  peer 2.2.2.2 enable
  peer 2.2.2.2 reflect-client
  peer 4.4.4.4 enable
  peer 4.4.4.4 reflect-client
  peer 7.7.7.7 enable
  peer 7.7.7.7 reflect-client
  undo policy vpn-target  //关闭RT检查

必须关闭RT检查,否则路由无法继续传递

接口下使能MPLS LDP

  • 使能ISIS的接口下都使能MPLS LDP
# AR2
mpls lsr-id 2.2.2.2
mpls
mpls ldp
int lo 0
 mpls
 mpls ldp
int g0/0/1
 mpls
 mpls ldp
# AR3
mpls lsr-id 3.3.3.3
mpls
mpls ldp
int lo 0
 mpls
 mpls ldp
int g0/0/0
 mpls
 mpls ldp
int g0/0/1
 mpls
 mpls ldp
int g0/0/2
 mpls
 mpls ldp
# AR4
mpls lsr-id 4.4.4.4
mpls
mpls ldp
int lo 0
 mpls
 mpls ldp
int g0/0/0
 mpls
 mpls ldp
# AR7
mpls lsr-id 7.7.7.7
mpls
mpls ldp
int lo 0
 mpls
 mpls ldp
int g0/0/1
 mpls
 mpls ldp

在AR3上查看MPLS LDP会话表项(dis mpls ldp session all

在这里插入图片描述

配置多实例

分析

  • 分支A1的实例中RD为100:3,出RT为100:3,入RT为100:2

  • 分支A2的实例中RD为100:4,出RT为100:4,入RT为100:2

  • 总部AR4的实例中RD为100:1,入RT为100:3、100:4

  • 总部AR7的实例中RD为100:2,出RT为100:2

  • AR4

ip vpn-instance VPN_IN
  route-distinguisher 100:1
  vpn-target 100:3 100:4 import-extcommunity
int g0/0/1
 ip binding vpn-instance VPN_IN
 ip add 10.1.45.4 24
  • AR7
ip vpn-instance VPN_OUT
  route-distinguisher 100:2
  vpn-target 100:2 export-extcommunity
int g0/0/0
 ip binding vpn-instance VPN_OUT
 ip add 10.1.67.7 24
  • AR2
ip vpn-instance A1
 ipv4-family
  route-distinguisher 100:3
  vpn-target 100:3 export-extcommunity
  vpn-target 100:2 import-extcommunity
int g0/0/0
 ip binding vpn-instance A1
 ip add 10.1.12.2 24

ip vpn-instance A2
 ipv4-family
  route-distinguisher 100:4
  vpn-target 100:4 export-extcommunity
  vpn-target 100:2 import-extcommunity
int g0/0/2
 ip binding vpn-instance A2
 ip add 10.1.28.2 24

配置私网侧的IGP协议

  • AR1—AR2
# AR1
ospf 1 router-id 1.1.1.1 
 area 0
  net 1.1.1.1 0.0.0.0
  net 10.1.12.1 0.0.0.0
# AR2
ospf 1 router-id 2.2.2.2 vpn-instance A1
 import-route bgp
 area 0
  net 10.1.12.2 0.0.0.0
  • AR8-AR2
# AR8
ospf 2 router-id 8.8.8.8
 area 0
  net 8.8.8.8 0.0.0.0
  net 10.1.28.8 0.0.0.0
# AR2
ospf 2 router-id 2.2.2.2 vpn-instance A2
 import-route bgp  //引入BGP路由
 area 0
  net 10.1.28.2 0.0.0.0.
  • AR4、AR5、AR6、AR7之间配置OSPF
# AR4
ospf 1 router-id 4.4.4.4 vpn-instance VPN_IN
 import-route bgp
 area 0
  net 4.4.4.4 0.0.0.0
  net 10.1.45.4 0.0.0.0
# AR5
ospf 1 router-id 5.5.5.5
 area 0
  net 5.5.5.5 0.0.0.0
  net 10.1.45.5 0.0.0.0
  net 10.1.56.5 0.0.0.0
# AR6
ospf 1 router-id 6.6.6.6
 area 0
  net 6.6.6.6 0.0.0.0
  net 10.1.56.6 0.0.0.0
  net 10.1.67.6 0.0.0.0
# AR7
ospf 1 router-id 7.7.7.7 vpn-instance VPN_OUT
 area 0
  net 7.7.7.7 0.0.0.0
  net 10.1.67.7 0.0.0.0

查看OSPF的邻居关系(dis ospf peer brief),以及OSPF协议路由表(display ip routing-table protocol ospf

IGP引入到BGP

  • AR7
bgp 100
ipv4-family vpn-instance VPN_OUT 
  import-route ospf 1
  • AR2
bgp 100
ipv4-family vpn-instance A1 
  import-route ospf 1
 ipv4-family vpn-instance A2
  import-route ospf 2

关闭DN位检查

  • AR7
ospf 1
 vpn-instance-capability simple
  • 在AR1或AR8上查看路由表
  • tracert -q 1 -v -a 8.8.8.8 1.1.1.1查看路由走向

在这里插入图片描述


以上内容均属原创,如有不详或错误,敬请指出。

分类:

技术点:

相关文章: