ip网络实验6


ospf路由协议配置实验

实验拓扑图:

实验拓扑图

实验需求:

1.所以路由器起loopback0接口(环回接口),且配置规划的ip地址

2.所有的路由器开启ospf协议,设置router-id 为loopback 0的地址

3.根据规划,R0、R1属于osps的骨干区域Area 0,R属于Area 100,R3属于Area200,宣告路由器的直接连网段进ospf域

4.将R2,R3上连接的端口设置为被动接口(passive-interface)防止路由器将ospf报文发送给pc

5.pc之间可以相互ping通

配置代码:

Router0:

[V200R003C00]
#
 sysname Router0
#
 snmp-agent local-engineid 800007DB03000000000000
 snmp-agent 
#
 clock timezone China-Standard-Time minus 08:00:00
#
portal local-server load portalpage.zip
#
 drop illegal-mac alarm
#
 set cpu-usage threshold 80 restore 75
#
aaa 
 authentication-scheme default
 authorization-scheme default
 accounting-scheme default
 domain default 
 domain default_admin 
 local-user admin password cipher %$%$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$
 local-user admin service-type http
#
firewall zone Local
 priority 15
#
interface GigabitEthernet0/0/0
 ip address 2.2.2.1 255.255.255.252 
#
interface GigabitEthernet0/0/1
 ip address 1.1.1.2 255.255.255.252 
#
interface GigabitEthernet0/0/2
#
interface NULL0
#
interface LoopBack0
 ip address 11.11.11.10 255.255.255.255 
#
ospf 1 router-id 11.11.11.10 
 area 0.0.0.0 
  network 2.2.2.0 0.0.0.3 
 area 0.0.0.100 
  network 1.1.1.0 0.0.0.3 
#
user-interface con 0
 authentication-mode password
user-interface vty 0 4
user-interface vty 16 20
#
wlan ac
#
return
int lo 0
area 0
area 100
reset ospf process //重启ospf进程

peer-brief bref ip路由表 lsdb

Router1:

[V200R003C00]
#
 sysname Router1
#
 snmp-agent local-engineid 800007DB03000000000000
 snmp-agent 
#
 clock timezone China-Standard-Time minus 08:00:00
#
portal local-server load portalpage.zip
#
 drop illegal-mac alarm
#
 set cpu-usage threshold 80 restore 75
#
aaa 
 authentication-scheme default
 authorization-scheme default
 accounting-scheme default
 domain default 
 domain default_admin 
 local-user admin password cipher %$%$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$
 local-user admin service-type http
#
firewall zone Local
 priority 15
#
interface GigabitEthernet0/0/0
 ip address 2.2.2.2 255.255.255.252 
#
interface GigabitEthernet0/0/1
 ip address 3.3.3.1 255.255.255.252 
#
interface GigabitEthernet0/0/2
#
interface NULL0
#
interface LoopBack0
 ip address 11.11.11.11 255.255.255.255 
#
ospf 1 router-id 11.11.11.11 
 area 0.0.0.0 
  network 2.2.2.0 0.0.0.3 
 area 0.0.0.200 
  network 3.3.3.0 0.0.0.3 
#
user-interface con 0
 authentication-mode password
user-interface vty 0 4
user-interface vty 16 20
#
wlan ac
#
return
peer-brief bref router-table

Router2:

[V200R003C00]
#
 sysname Router2
#
 snmp-agent local-engineid 800007DB03000000000000
 snmp-agent 
#
 clock timezone China-Standard-Time minus 08:00:00
#
portal local-server load portalpage.zip
#
 drop illegal-mac alarm
#
 set cpu-usage threshold 80 restore 75
#
aaa 
 authentication-scheme default
 authorization-scheme default
 accounting-scheme default
 domain default 
 domain default_admin 
 local-user admin password cipher %$%$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$
 local-user admin service-type http
#
firewall zone Local
 priority 15
#
interface GigabitEthernet0/0/0
 ip address 1.1.1.1 255.255.255.252 
#
interface GigabitEthernet0/0/1
 ip address 192.168.1.1 255.255.255.0 
#
interface GigabitEthernet0/0/2
 ip address 192.168.2.1 255.255.255.0 
#
interface NULL0
#
interface LoopBack0
 ip address 11.11.11.12 255.255.255.255 
#
ospf 1 router-id 11.11.11.12 
 silent-interface GigabitEthernet0/0/1
 silent-interface GigabitEthernet0/0/2
 area 0.0.0.100 
  network 1.1.1.0 0.0.0.3 
  network 192.168.1.0 0.0.0.255 
  network 192.168.2.0 0.0.0.255 
#
user-interface con 0
 authentication-mode password
user-interface vty 0 4
user-interface vty 16 20
#
wlan ac
#
return
peer-brief brief router-table

router3:

[V200R003C00]
#
 sysname Router3
#
 snmp-agent local-engineid 800007DB03000000000000
 snmp-agent 
#
 clock timezone China-Standard-Time minus 08:00:00
#
portal local-server load portalpage.zip
#
 drop illegal-mac alarm
#
 set cpu-usage threshold 80 restore 75
#
aaa 
 authentication-scheme default
 authorization-scheme default
 accounting-scheme default
 domain default 
 domain default_admin 
 local-user admin password cipher %$%$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$
 local-user admin service-type http
#
firewall zone Local
 priority 15
#
interface GigabitEthernet0/0/0
 ip address 3.3.3.2 255.255.255.252 
#
interface GigabitEthernet0/0/1
 ip address 172.16.1.1 255.255.255.0 
#
interface GigabitEthernet0/0/2
 ip address 172.16.2.1 255.255.255.0 
#
interface NULL0
#
interface LoopBack0
 ip address 11.11.11.13 255.255.255.255 
#
ospf 1 router-id 11.11.11.13 
 silent-interface GigabitEthernet0/0/1
 silent-interface GigabitEthernet0/0/2
 area 0.0.0.200 
  network 3.3.3.0 0.0.0.3 
  network 172.16.1.0 0.0.0.255 
  network 172.16.2.0 0.0.0.255 
#
user-interface con 0
 authentication-mode password
user-interface vty 0 4
user-interface vty 16 20
#
wlan ac
#
return
peer-brief brief router-table

实验效果:

部分:

image-20210101213235712 image-20210101213245598 image-20210101213245598

文章作者: fejxc
版权声明: 本博客所有文章除特別声明外,均采用 CC BY 4.0 许可协议。转载请注明来源 fejxc !
评论
  目录