zoukankan      html  css  js  c++  java
  • 实验2 OSPF基本配置

    实验任务1:ospf单区域配置

    实验任务2:ospf多区域配置
    1.建立物理连接

    2.RTA,RTB,RTC运行ospf
    [RTA-ospf-1-area-0.0.0.1]network 1.1.1.1 0.0.0.0
    [RTA-ospf-1-area-0.0.0.1]network 10.0.0.0 0.0.0.255
    [RTB-ospf-1-area-0.0.0.1]network 10.0.0.0 0.0.0.255
    [RTB-ospf-1-area-0.0.0.0]network 2.2.2.2 0.0.0.0
    [RTB-ospf-1-area-0.0.0.0]network 20.0.0.0 0.0.0.255
    [RTC-ospf-1-area-0.0.0.0]network 20.0.0.0 0.0.0.255
    [RTC-ospf-1-area-0.0.0.0]network 3.3.3.3 0.0.0.0
    注:一般loopback接口宣告在骨干区域area0上
    实验任务3:router id的选举

    1. 多个loopback口存在的时候,查看router id
      [RTB]display ospf peer

        OSPF Process 1 with Router ID 2.2.2.2
              Neighbor Brief Information
      

    Area: 0.0.0.0
    Router ID Address Pri Dead-Time State Interface
    3.3.3.3 20.0.0.2 1 32 Full/DR GE0/1

    Area: 0.0.0.1
    Router ID Address Pri Dead-Time State Interface
    192.168.1.1 10.0.0.1 1 35 Full/DR GE0/0
    选举最大的ip地址做router id。
    2.取消的了RTA的loopback1接口,查看ospf邻居表
    [RTB]display ospf peer

         OSPF Process 1 with Router ID 2.2.2.2
               Neighbor Brief Information
    

    Area: 0.0.0.0
    Router ID Address Pri Dead-Time State Interface
    3.3.3.3 20.0.0.2 1 31 Full/DR GE0/1

    Area: 0.0.0.1
    Router ID Address Pri Dead-Time State Interface
    192.168.1.1 10.0.0.1 1 35 Full/DR GE0/0
    RTA的router id没有变化
    3.重启ospf进程
    reset ospf 1 process
    [RTB]display ospf peer

         OSPF Process 1 with Router ID 2.2.2.2
               Neighbor Brief Information
    

    Area: 0.0.0.0
    Router ID Address Pri Dead-Time State Interface
    3.3.3.3 20.0.0.2 1 38 Full/DR GE0/1

    Area: 0.0.0.1
    Router ID Address Pri Dead-Time State Interface
    1.1.1.1 10.0.0.1 1 33 Full/BDR GE0/0
    一旦选举了router id,只有重启ospf进程才能重新选举router id

  • 相关阅读:
    简化窗口的控制和异常处理的复杂性
    集合运算 字典排序 按值 按键
    单条insert
    Illegal mix of collations (utf8_unicode_ci,IMPLICIT) and (utf8_general_ci,IMPLICIT) for operation '=
    反黑
    curl HTTP_USER_AGENT
    location.replace
    提升600百万数据的处理速度 禁止图片下载
    https://security.stackexchange.com/questions/68405/what-is-tmunblock-cgi-and-can-it-be-exploited-by-shellshock-linux-apache-w
    逻辑分离
  • 原文地址:https://www.cnblogs.com/akiz/p/11148019.html
Copyright © 2011-2022 走看看