Laboratoriya ishining amaliy qismi
8-sonli laboratoriya ishi loyihasini ochamiz.
82
9.1- Rasm. – Korporativ tarmoq loyihasi.
Oldingi laboratoriya ishlari asosida loyihalashtiriladigan korporativ
tarmoq turli shaharlarda joylashgan 2 ta kichik tarmoq, bitta tashkilotni
oʻz ichiga oladi. Birinchi kichik tarmoqni 1-filialga ajratamiz, ikkinchi
tarmoqni 2-tarmoqqa ajratamiz.
Bu safar biz yo‘riqnoma o‘zidan DHCP serveri sifatida
foydalanamiz, buning uchun biz DHCP serverini olib tashlashimiz va
ikkala routerni sozlashimiz kerak. Lekin avval siz kalitda VLAN-ni
sozlashingiz kerak, keyin yo‘riqnomada inkapsulyatsiyani sozlashingiz
kerak (laboratoriyada №5.
9.2- Rasm. – Routerda sozlangan tarmoqosti 2.
83
Keyinchalik, DHCP-ni 2-routerda sozlang (9.3- Rasm), har xil
VLAN:
Router(config)#ip dhcp pool vlan_1
//
Manzil vlan nomlari
Router(dhcp-config)#network 192.170.0.0 255.255.255.0
//
IP manzillarni tarqatish uchun tarmoqosti, maska bilan
Router(dhcp-config)#default-router 192.170.0.1
//
Routerning IP manzili portga tayinlangan
Router(dhcp-config)#dns-server 192.170.0.1
//
DNS serveriga IP-manzil tayinlash
Router(dhcp-config)#exit
Xuddi shu buyruqlar 2 va 3 VLAN uchun ro‘yxatga olinishi kerak.
9.3 – Rasm.Routerda DHCP ni sozlash 2.
Biz 1-marshrutizatorda mos keladigan IP-manzillar bilan bir xil
sozlamalarni ro‘yxatdan o‘tkazamiz (192.168....)
Agar siz 192.168.1.254 manzilini va 192.168.1.1 dan 192.168.1.9 gacha
bo‘lgan manzillarni tarqatishdan chiqarib tashlashingiz kerak bo‘lsa.
Keyin biz quyidagi buyruqlardan foydalanamiz:
84
Router(config)# ip dhcp excluded-address 192.168.1.254
//
Muayyan IP-manzilni tarqatishdan chiqarib tashlash
Router(config)#
ip
dhcp
excluded-address
192.168.1.1
192.168.1.9
//
istisno tariqasida bir nechta IP manzillarni tarqatish
Keyinchalik, VLAN 2 va 3 o‘rtasida kirishni cheklashingiz kerak,
lekin barcha VLANlar VLAN 1 ga kirish huquqiga ega bo‘lishi kerak.
Birinchi holda, biz 192.168.3.0/8 va 192.170.3.0/8 IP manzillari bo‘lgan
shaxsiy kompyuterga kirishni rad etamiz, lekin biz boshqa IP
manzillarga kirishga ruxsat berganimizda. Ikkinchi holda, biz
192.168.2.0/8 va 192.170.2.0/8 IP manzilli shaxsiy kompyuterga
kirishni rad etamiz va yana boshqa IP manzillarga kirishga ruxsat
beramiz (9.4- Rasm).
Router(config)#access-list 20 deny 192.0.3.0 0.255.0.255
Router(config)#access-list 20 permit any
Router(config)#access-list 30 deny 192.0.2.0 0.255.0.255
Router(config)#access-list 30 permit any
// ACL ni sozlash
Router(config)#int gig0/0.2
Router(config-subif)#ip access-group 20 in
Router(config-subif)#ip access-group 20 out
Router(config-subif)#exit
//
gig0/0.2 portiga ACL belgilash
Router(config)#int gig0/0.3
Router(config-subif)#ip access-group 30 in
Router(config-subif)#ip access-group 30 out
Router(config-subif)#exit
// gig0/0.3 portiga ACL belgilash
Router(config)#exit
85
9.4- Rasm. – VLAN 2 va 3 o‘rtasida kirishni cheklash uchun ACLni
sozlash
Biz VLAN 1 ning barcha tarmoq segmentlariga kirishini
ta’minlash va VLAN 2 va 3 o‘rtasida kirishni cheklash uchun mos
keladigan IP manzillari bilan 1-routerda bir xil sozlamalarni ro‘yxatdan
o‘tkazamiz.
192.170.2.2 manzilli PC2.0 va 192.170.3.2 manzilli PC2.3 dan
"Ping" buyrug‘i yordamida sozlamalarni tekshiramiz. 9.5- Rasm.da
kirish yo‘qligi ko‘rsatilgan, lekin ikkala shaxsiy kompyuterdan VLAN-
ga kirish saqlanib qolgan (9.5- Rasm).
9.5- Rasm. – "Ping" yordamida kirishni tekshirish
86
Ma’lumotlar almashinuvi uchun yangi tarmoqostilar uchun statik
marshrutlash protokolini o‘rnatish.
Router 1:
KompSetiR(config)#ip route 192.170.0.0 255.255.0.0
221.10.0.2
Router 2:
Router(config)# ip route 192.168.0.0 255.255.0.0
221.10.0.1
Router 2 ning yangi VLAN-lari uchun statik marshrutlash sozlamalarini
tekshirish (9.6- Rasm)
9.6 –rasm. Ping orqali tekshirish
87
9.7- Rasm. - 9-sonli laboratoriya ishini bajarish bo‘yicha loyihaning
natijasi
Do'stlaringiz bilan baham: |