Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

OSPF advanced configuration to realize network-wide interworking

2025-01-17 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >

Share

Shulou(Shulou.com)06/03 Report--

OSPF advanced configuration to achieve network-wide interworking one: three kinds of traffic of OSPF

Intra-domain traffic

​ traffic formed by the exchange of packets between routers within a single area.

Inter-domain traffic

Traffic formed by exchanging packets between routers in different areas of the ​.

External traffic

Traffic formed by the exchange of packets between a router within a ​ OSPF domain and a router outside the OSPF area or within another autonomous system.

Second: understand routing redistribution

A single IP routing protocol is the preferred scheme for managing IP routing in a network.

Cisco IOS can execute multiple routing protocols, each of which belongs to the same autonomous system as the network served by the routing protocol.

Cisco IOSS uses the route redistribution feature to exchange routing information created by different protocols.

Three: experimental operation

A computer with GNS3 software

Six routed four hosts

1. Pull out these devices in GNS3, in which the interfaces above R2 need to be added, connected by twisted pair, and marked with each address for later viewing.

2. First, complete the configuration of the six routers, first configure the interface address of each router, and then configure the router according to the structure that each router needs to configure.

R4

Configure the two interface addresses on R4, before configuring the default route

3 、 R1

Configure the interface address and declare 30 segments of the network. You also need to configure static routes for R1, and then you need to inject the two network segments under R1 (directly connected segments and static routed segments) into ospf.

4. For R2 configuration, first configure the address for each interface. Note that the two interfaces, f1amp 0 and f1cane1, need to shut down the layer 2 interface, otherwise an error will be reported. Then 40 and 50 paragraphs are announced into the area0, and the external network on R2 needs to be injected into the ospf. Finally, check the routing table to see if it is all configured.

5. Configure R3, first configure the interface address, and then configure the default route, the next hop address is 13.0.0.1. Then check the routing table to see if the configuration is complete.

6. Configure R5, configure the interface address first, and then declare the 50 network segment to the area0. Note that the f0 0 interface is in the rip route, so you need to inject the rip protocol into the ospf. The metric of rip here is 5, which is based on my own topology diagram. The same ospf protocol needs to be injected into the rip protocol.

When you first enter the rip protocol, you should first configure the network segment where the rip protocol is located. I forgot to configure it at first, and it's the same below.

7. Configure R6, configure the interface address first, and then enter the network segment where the two interfaces are configured by RIP protocol.

8. After each router is configured, it is best to check the routing table to see if it is all configured. The configuration of six routers is completed, and then the ip addresses of four hosts are configured to ping each other. The general rule of ping proves that the whole network can communicate with each other.

9. The whole experiment has been successfully configured. In the course of the experiment, it should be noted that the area of ospf should be configured correctly, and that the two interfaces f1max 0 and f1max 1 on R2 need to turn off their layer 2 function (no switchport) before they can be configured. In terms of the security of information exchange, ospf stipulates that any information between routers can be authenticated when necessary to ensure that routing information can be transmitted only between trusted routers.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Servers

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report