Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Simple configuration based on bridging, RIP,NAT,PAT network topology

2025-03-28 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Recommended steps:

WEB_Server, PC1 use router emulation, bridge Server and client, set and route interface IP address in R1 and R2 configure RIPv2 network interconnection to enable port-based PAT on R1, map all internal traffic to R1's f0cano interface configure static NAT, publish web server to R1's f0can0 interface, modify the website default port to 8080 Client PC2 access verification configuration static NAT publishes the FTP server to the f0ap0 interface of R1 to publish port 21, client access test

The steps of the experiment:

WEB_Server, PC1 use router emulation, bridge Server and client, set and route interface IP address

Configure the IP address 192.168.100.1 when R1 enters interface 0ram 0.

R1 (config) # interface fastEthernet 0Universe 0

R1 (config-if) # ip address 192.168.100.1 255.255.255.0

R1 (config-if) # no shutdown

Configure the IP address 192.168.10.254 on R1 into interface 1max 0

R1 (config) # interface fastEthernet 1Comp0

R1 (config-if) # ip address 192.168.10.254 255.255.255.0

R1 (config-if) # no shutdown

Configure the IP address 192.168.30.254 on R1 into interface 3gam0.

R1 (config) # interface fastEthernet 3Comp0

R1 (config-if) # ip address 192.168.30.254 255.255.255.0

R1 (config-if) # no shutdown

Configure the IP address 192.168.20.254 on R1 into interface 2max 0

R1 (config) # interface fastEthernet 2Comp0

R1 (config-if) # ip address 192.168.20.254 255.255.255.0

R1 (config-if) # no shutdown

Show ip inter b checks whether IP is configured successfully.

Configure IP addresses and gateways for PC2 bridging vm8

Configure IP addresses and gateways for FTP-SERVER bridging vm1

Configure RIPv2 interconnection between R1 and R2

Start the RIP process on R1, configure RIP version 2, and announce 10.020.030.0 100.0 directly connected routes

R1 (config) # router rip

R1 (config-router) # version 2

R1 (config-router) # network 192.168.10.0

R1 (config-router) # network 192.168.20.0

R1 (config-router) # network 192.168.30.0

R1 (config-router) # network 192.168.100.0

R1 (config-router) # no auto-summary

Show ip route View routing tabl

Ping interworking across the network

Start the RIP process in R2, configure RIP version 2, and announce a 100.0 200.0 directly connected network

R2 (config) # router rip

R2 (config-router) # version 2

R2 (config-router) # network 192.168.100.0

R2 (config-router) # network 192.168.200.0

R2 (config-router) # no auto-summary

Show ip route View routing tabl

Ping interworking across the network

Using VM1ping to interwork the whole network

Ping whole network interworking in bridging VM8 virtual machine

Turn on port-based PAT on R1 and map all internal traffic to R1's f0anth0 interface

Turn on the internal interface

R1 (config) # interface fastEthernet 1Comp0

R1 (config-if) # ip nat inside

R1 (config-if) # exit

R1 (config) # interface fastEthernet 2Comp0

R1 (config-if) # ip nat inside

R1 (config-if) # exit

R1 (config) # interface fastEthernet 3Comp0

R1 (config-if) # ip nat inside

R1 (config-if) # exit

Open the external interface

R1 (config) # interface fastEthernet 0Universe 0

R1 (config-if) # ip nat outside

R1 (config-if) # exit

Create ACL crawl traffic

R1 (config) # access-list 10 permit 192.168.10.0 0.0.0.255

R1 (config) # access-list 10 permit 192.168.20.0 0.0.0.255

R1 (config) # access-list 10 permit 192.168.30.0 0.0.0.255

Map the traffic crawled by ACL to the F0can0 interface.

R1 (config) # ip nat inside source list 10 interface fastEthernet 0 overload

R1 (config) # exit

Enable PAT traffic translation monitoring

R1#debug ip nat

Configure static NAT to publish the web server to the f0Universe 0 interface of R1 to modify the default port of the website to 8080, client PC2 access verification

Publish the intranet WEB server 10.10 to 100.1, and modify the port to 8080

R1 (config) # ip nat inside source static tcp 192.168.10.10 80 192.168.100.1 8080 extendable

Access port 8080

Configure static NAT to publish the FTP server to port 21 on the f0max 0 interface of R1, and the client access test

Create a FTP directory

Default port 21

Publish the FTP service 192.168.20.10 of the internal network to the public network 192.168.100.1

R1 (config) # ip nat inside source static tcp 192.168.20.10 21 192.168.100.1 21 extendable

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report