Eje 2 Enrutamiento Redes

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 11
At a glance
Powered by AI
The key takeaways are that the network connects two offices using two routers, two switches, and five workstations in each office. RIP version 2 is configured on the routers to route traffic between the subnets.

The two offices are connected using two routers connected with a serial interface. Each router also connects to a switch in its office with a FastEthernet interface. The interfaces are configured with IP addresses to connect the subnets.

RIP version 2 is enabled on the routers with the 'router rip' command. Version 2 is specified, auto-summarization is disabled, and the subnets are specified in the routing updates with the 'network' command.

ENRUTAMIENTO Y CONFIGURACION DE REDES

EJE 2

FUNDACION UNIVERSITARIA DEL AREA ANDINA

INGENIERIA DE SISTEMAS

ENRUTAMIENTO Y CONFIGURACION DE REDES

2020
IMPLEMENTACIÓN DE RIP V2

Nombre de la Organización: Almacenes el buen precio

Esquema

Configuración de estaciones de trabajo


El almacén el buen precio, tiene dos oficinas y están distribuidas en el sector de
servicio al cliente y la otra de ventas.

Las 2 oficinas se comunican entre sí por medio de 2 routers, dos swiches y 5


estaciones de trabajo por cada una.

CONFIGURACION-RIP V2 EN EL ALMACEN

Configuración – Routers 1

ROUTER ENCENDIDO
Router Oficina#1 Servicio Al Cliente:

System Bootstrap, Version 12.1(3r)T2, RELEASE SOFTWARE (fc1)


Copyright (c) 2000 by cisco Systems, Inc.
cisco 2811 (MPC860) processor (revision 0x200) with 60416K/5120K bytes of memory

Readonly ROMMON initialized

program load complete, entry point: 0x8000f000, size: 0xc940


program load complete, entry point: 0x8000f000, size: 0xc940

program load complete, entry point: 0x8000f000, size: 0x3ed1338


Self decompressing the image :
######################### [OK]
Restricted Rights Legend

Use, duplication, or disclosure by the Government is


subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.

cisco Systems, Inc.


170 West Tasman Drive
San Jose, California 95134-1706
Cisco IOS Software, 2800 Software (C2800NM-ADVIPSERVICESK9-M), Version
12.4(15)T1, RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2007 by Cisco Systems, Inc.
Compiled Wed 18-Jul-07 06:21 by pt_rel_team
Image text-base: 0x400A925C, data-base: 0x4372CE20

This product contains cryptographic features and is subject to United


States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to


[email protected].
cisco 2811 (MPC860) processor (revision 0x200) with 60416K/5120K bytes of memory
Processor board ID JAD05190MTZ (4292891495)
M860 processor: part number 0, mask 49
2 FastEthernet/IEEE 802.3 interface(s)
1 Low-speed serial(sync/async) network interface(s)
239K bytes of non-volatile configuration memory.
62720K bytes of ATA CompactFlash (Read/Write)
Cisco IOS Software, 2800 Software (C2800NM-ADVIPSERVICESK9-M), Version
12.4(15)T1, RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2007 by Cisco Systems, Inc.
Compiled Wed 18-Jul-07 06:21 by pt_rel_team

Press RETURN to get started!

Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface serial 0/0/0
Router(config-if)#ip address 10.0.0.1 255.255.255.252
Router(config-if)#clock rate 128000
Router(config-if)#no shutdown

%LINK-5-CHANGED: Interface Serial0/0/0, changed state to down


Router(config-if)#interface fastethernet 0/0
Router(config-if)#ip address 192.168.10.1 255.255.255.192
Router(config-if)#no shutdown

Router(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to


up

Router(config-if)#exit
Router(config)#exit
Router#
%SYS-5-CONFIG_I: Configured from console by console

Router#copy running-config startup-config


Destination filename [startup-config]?
Building configuration...
[OK]
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#router rip
Router(config-router)#version 2
Router(config-router)#no auto-summary
Router(config-router)#network 10.0.0.0
Router(config-router)#network 192.168.10.0
Router(config-router)#exit
Router(config)#exit
Router#
%SYS-5-CONFIG_I: Configured from console by console

Router#copy running-config startup-config


Destination filename [startup-config]?
Building configuration...
[OK]

Configuración – Routers 2

ROUTER ENCENDIDO

Router Oficina#2 Ventas

System Bootstrap, Version 12.1(3r)T2, RELEASE SOFTWARE (fc1)


Copyright (c) 2000 by cisco Systems, Inc.
cisco 2811 (MPC860) processor (revision 0x200) with 60416K/5120K bytes of memory
Readonly ROMMON initialized

program load complete, entry point: 0x8000f000, size: 0xc940


program load complete, entry point: 0x8000f000, size: 0xc940

program load complete, entry point: 0x8000f000, size: 0x3ed1338


Self decompressing the image :
######################### [OK]
Restricted Rights Legend

Use, duplication, or disclosure by the Government is


subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.

cisco Systems, Inc.


170 West Tasman Drive
San Jose, California 95134-1706

Cisco IOS Software, 2800 Software (C2800NM-ADVIPSERVICESK9-M), Version


12.4(15)T1, RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2007 by Cisco Systems, Inc.
Compiled Wed 18-Jul-07 06:21 by pt_rel_team
Image text-base: 0x400A925C, data-base: 0x4372CE20

This product contains cryptographic features and is subject to United


States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to


[email protected].
cisco 2811 (MPC860) processor (revision 0x200) with 60416K/5120K bytes of memory
Processor board ID JAD05190MTZ (4292891495)
M860 processor: part number 0, mask 49
2 FastEthernet/IEEE 802.3 interface(s)
1 Low-speed serial(sync/async) network interface(s)
239K bytes of non-volatile configuration memory.
62720K bytes of ATA CompactFlash (Read/Write)
Cisco IOS Software, 2800 Software (C2800NM-ADVIPSERVICESK9-M), Version
12.4(15)T1, RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2007 by Cisco Systems, Inc.
Compiled Wed 18-Jul-07 06:21 by pt_rel_team

Press RETURN to get started!

Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface serial 0/0/0
Router(config-if)#ip address 10.0.0.2 255.255.255.252
Router(config-if)#no shutdown

Router(config-if)#
%LINK-5-CHANGED: Interface Serial0/0/0, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0/0, changed state to up

Router(config-if)#interface fastethernet
^
% Invalid input detected at '^' marker.
Router(config-if)#interface fastethernet 0/0
Router(config-if)#ip address 172.50.1.1 255.255.240.0
Router(config-if)#no shutdown

Router(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to


up

Router(config-if)#exit
Router(config)#exit
Router#
%SYS-5-CONFIG_I: Configured from console by console

Router#copy running-config startup-config


Destination filename [startup-config]?
Building configuration...
[OK]
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#router rip
Router(config-router)#version 2
Router(config-router)#no auto-summary
Router(config-router)#network 10.0.0.0
Router(config-router)#network 172.50.0.0
Router(config-router)#exit
Router(config)#exit
Router#
%SYS-5-CONFIG_I: Configured from console by console

Router#copy running-config startup-config


Destination filename [startup-config]?
Building configuration...
[OK]

CORRECTA CONFIGURACIÓN DE RIPV2 ENVIANDO PAQUETES DE


SERVICIO AL CLIENTE A SECTOR VENTAS

CLAVE: CISCO

RESUMIR ESTO

Se reúne todos los aportes de los compañeros llegando a unificar la red como se
muestra en la foto a continuación, la cual contiene dos oficinas con sus
respectivos departamentos; los router se configuraron con contraseña, ya que en
la practica real es de suma importancia establecer una clave, pues cualquiera
podría manipular los equipos ocasionando daños.
CONCLUSIONES

RESUMIR ESTO

Diremos que este protocolo nos permite calcular la mejor ruta para enviar los
paquetes entre las distintas redes, RipV2 es Classless, por consiguiente soporta
VLSM pudiendo tener en nuestra red una máscara de subred variable y haciendo
que exista mayor flexibilidad.

RIPv2 utiliza autenticación para validar cuales son los routers vecinos, y aparte el
administrador de la red puede aplicar seguridad a nivel del protocolo de
enrutamiento utilizando autenticación vía MD5 que no es otra cosa que encriptar
la clave secreta que se le coloco a cualquier router para evitar que sea visible ante
un ataque, en otras palabras es realizar autenticación con encriptación.

Ahora bien, este protocolo utiliza el algoritmo Bellman-Ford para buscar su mejor
ruta, su distancia administrativa es 120 y usa UDP 520 como puerto de
comunicación a nivel de capa de transporte y su métrica es el Hop count que no
es otra cosa que el número de saltos, y pues diríamos que entre menos saltos
menor cantidad de routers a utilizar entre el origen y el destino y esto haría que se
ganara más eficacia dentro de la red.
BUSCAR OTRAS FUENTES

Fuentes:

ENRUTAMIENTO Y CONFIGURACIÓN DE REDES Ricardo López Bulla-Eje 2.

https://www.youtube.com/watch?v=xybwC2Q-y60  
https://www.youtube.com/watch?v=kXb8stvbnQw
https://www.youtube.com/watch?v=1N5yNP7eoZA
https://www.youtube.com/watch?v=lqhN5jjpALk

You might also like