ospf路由协议配置实验
实验拓扑图:

实验需求:
1.所以路由器起loopback0接口(环回接口),且配置规划的ip地址
2.所有的路由器开启ospf协议,设置router-id 为loopback 0的地址
3.根据规划,R0、R1属于osps的骨干区域Area 0,R属于Area 100,R3属于Area200,宣告路由器的直接连网段进ospf域
4.将R2,R3上连接的端口设置为被动接口(passive-interface)防止路由器将ospf报文发送给pc
5.pc之间可以相互ping通
配置代码:
Router0:
[V200R003C00]
#
sysname Router0
#
snmp-agent local-engineid 800007DB03000000000000
snmp-agent
#
clock timezone China-Standard-Time minus 08:00:00
#
portal local-server load portalpage.zip
#
drop illegal-mac alarm
#
set cpu-usage threshold 80 restore 75
#
aaa
authentication-scheme default
authorization-scheme default
accounting-scheme default
domain default
domain default_admin
local-user admin password cipher %$%$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$
local-user admin service-type http
#
firewall zone Local
priority 15
#
interface GigabitEthernet0/0/0
ip address 2.2.2.1 255.255.255.252
#
interface GigabitEthernet0/0/1
ip address 1.1.1.2 255.255.255.252
#
interface GigabitEthernet0/0/2
#
interface NULL0
#
interface LoopBack0
ip address 11.11.11.10 255.255.255.255
#
ospf 1 router-id 11.11.11.10
area 0.0.0.0
network 2.2.2.0 0.0.0.3
area 0.0.0.100
network 1.1.1.0 0.0.0.3
#
user-interface con 0
authentication-mode password
user-interface vty 0 4
user-interface vty 16 20
#
wlan ac
#
return
int lo 0
area 0
area 100
reset ospf process //重启ospf进程




Router1:
[V200R003C00]
#
sysname Router1
#
snmp-agent local-engineid 800007DB03000000000000
snmp-agent
#
clock timezone China-Standard-Time minus 08:00:00
#
portal local-server load portalpage.zip
#
drop illegal-mac alarm
#
set cpu-usage threshold 80 restore 75
#
aaa
authentication-scheme default
authorization-scheme default
accounting-scheme default
domain default
domain default_admin
local-user admin password cipher %$%$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$
local-user admin service-type http
#
firewall zone Local
priority 15
#
interface GigabitEthernet0/0/0
ip address 2.2.2.2 255.255.255.252
#
interface GigabitEthernet0/0/1
ip address 3.3.3.1 255.255.255.252
#
interface GigabitEthernet0/0/2
#
interface NULL0
#
interface LoopBack0
ip address 11.11.11.11 255.255.255.255
#
ospf 1 router-id 11.11.11.11
area 0.0.0.0
network 2.2.2.0 0.0.0.3
area 0.0.0.200
network 3.3.3.0 0.0.0.3
#
user-interface con 0
authentication-mode password
user-interface vty 0 4
user-interface vty 16 20
#
wlan ac
#
return



Router2:
[V200R003C00]
#
sysname Router2
#
snmp-agent local-engineid 800007DB03000000000000
snmp-agent
#
clock timezone China-Standard-Time minus 08:00:00
#
portal local-server load portalpage.zip
#
drop illegal-mac alarm
#
set cpu-usage threshold 80 restore 75
#
aaa
authentication-scheme default
authorization-scheme default
accounting-scheme default
domain default
domain default_admin
local-user admin password cipher %$%$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$
local-user admin service-type http
#
firewall zone Local
priority 15
#
interface GigabitEthernet0/0/0
ip address 1.1.1.1 255.255.255.252
#
interface GigabitEthernet0/0/1
ip address 192.168.1.1 255.255.255.0
#
interface GigabitEthernet0/0/2
ip address 192.168.2.1 255.255.255.0
#
interface NULL0
#
interface LoopBack0
ip address 11.11.11.12 255.255.255.255
#
ospf 1 router-id 11.11.11.12
silent-interface GigabitEthernet0/0/1
silent-interface GigabitEthernet0/0/2
area 0.0.0.100
network 1.1.1.0 0.0.0.3
network 192.168.1.0 0.0.0.255
network 192.168.2.0 0.0.0.255
#
user-interface con 0
authentication-mode password
user-interface vty 0 4
user-interface vty 16 20
#
wlan ac
#
return



router3:
[V200R003C00]
#
sysname Router3
#
snmp-agent local-engineid 800007DB03000000000000
snmp-agent
#
clock timezone China-Standard-Time minus 08:00:00
#
portal local-server load portalpage.zip
#
drop illegal-mac alarm
#
set cpu-usage threshold 80 restore 75
#
aaa
authentication-scheme default
authorization-scheme default
accounting-scheme default
domain default
domain default_admin
local-user admin password cipher %$%$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$
local-user admin service-type http
#
firewall zone Local
priority 15
#
interface GigabitEthernet0/0/0
ip address 3.3.3.2 255.255.255.252
#
interface GigabitEthernet0/0/1
ip address 172.16.1.1 255.255.255.0
#
interface GigabitEthernet0/0/2
ip address 172.16.2.1 255.255.255.0
#
interface NULL0
#
interface LoopBack0
ip address 11.11.11.13 255.255.255.255
#
ospf 1 router-id 11.11.11.13
silent-interface GigabitEthernet0/0/1
silent-interface GigabitEthernet0/0/2
area 0.0.0.200
network 3.3.3.0 0.0.0.3
network 172.16.1.0 0.0.0.255
network 172.16.2.0 0.0.0.255
#
user-interface con 0
authentication-mode password
user-interface vty 0 4
user-interface vty 16 20
#
wlan ac
#
return



实验效果:
部分:


