动态路由OSPF实验配置

查看接口配置display ip interface brief

<AR1>display ip interface brief

*down: administratively down

^down: standby

(l): loopback

(s): spoofing

The number of interface that is UP in Physical is 4

The number of interface that is DOWN in Physical is 0

The number of interface that is UP in Protocol is 4

The number of interface that is DOWN in Protocol is 0

Interface                         IP Address/Mask      Physical   Protocol  

GigabitEthernet0/0/0              192.168.10.1/24      up         up        

GigabitEthernet0/0/1              10.1.10.254/24       up         up        

GigabitEthernet0/0/2              192.168.30.1/24      up         up        

NULL0                             unassigned           up         up(s)     

<AR2>display ip interface brief

*down: administratively down

^down: standby

(l): loopback

(s): spoofing

The number of interface that is UP in Physical is 4

The number of interface that is DOWN in Physical is 0

The number of interface that is UP in Protocol is 4

The number of interface that is DOWN in Protocol is 0

Interface                         IP Address/Mask      Physical   Protocol  

GigabitEthernet0/0/0              192.168.10.2/24      up         up        

GigabitEthernet0/0/1              192.168.20.2/24      up         up        

GigabitEthernet0/0/2              60.222.227.130/24    up         up        

NULL0                             unassigned           up         up(s)

<AR3>display ip interface brief

*down: administratively down

^down: standby

(l): loopback

(s): spoofing

The number of interface that is UP in Physical is 4

The number of interface that is DOWN in Physical is 0

The number of interface that is UP in Protocol is 4

The number of interface that is DOWN in Protocol is 0

Interface                         IP Address/Mask      Physical   Protocol  

GigabitEthernet0/0/0              192.168.20.3/24      up         up        

GigabitEthernet0/0/1              10.1.20.254/24       up         up        

GigabitEthernet0/0/2              192.168.40.3/24      up         up        

NULL0                             unassigned           up         up(s)

<AR4>display ip interface brief

*down: administratively down

^down: standby

(l): loopback

(s): spoofing

The number of interface that is UP in Physical is 2

The number of interface that is DOWN in Physical is 2

The number of interface that is UP in Protocol is 2

The number of interface that is DOWN in Protocol is 2

Interface                         IP Address/Mask      Physical   Protocol  

GigabitEthernet0/0/0              60.222.227.1/24      up         up        

GigabitEthernet0/0/1              unassigned           down       down      

GigabitEthernet0/0/2              unassigned           down       down      

NULL0                             unassigned           up         up(s)     

<AR5>display ip interface brief

*down: administratively down

^down: standby

(l): loopback

(s): spoofing

The number of interface that is UP in Physical is 3

The number of interface that is DOWN in Physical is 1

The number of interface that is UP in Protocol is 3

The number of interface that is DOWN in Protocol is 1

Interface                         IP Address/Mask      Physical   Protocol  

GigabitEthernet0/0/0              192.168.30.5/24      up         up        

GigabitEthernet0/0/1              192.168.40.5/24      up         up        

GigabitEthernet0/0/2              unassigned           down       down      

NULL0                             unassigned           up         up(s)   

防环检测配置

[AR1]interface LoopBack 0

[AR1-LoopBack0]ip address 1.1.1.1 32

[AR1-LoopBack0]quit

[AR1]quit

<AR1>save

[AR2]interface LoopBack 0

[AR2-LoopBack0]ip address 2.2.2.2 32

[AR2-LoopBack0]quit

[AR2]quit

<AR2>save

[AR3]interface LoopBack 0

[AR3-LoopBack0]ip address 3.3.3.3 32

[AR3-LoopBack0]quit

[AR3]quit

<AR3>save

[AR4]interface LoopBack 0

[AR4-LoopBack0]ip address 4.4.4.4 32

[AR4-LoopBack0]quit

[AR4]quit

<AR4>save

[AR5]interface LoopBack 0

[AR5-LoopBack0]ip address 5.5.5.5 32

[AR5-LoopBack0]quit

[AR5]quit

<AR5>save

配置ospf

[AR1]ospf 1 router-id 1.1.1.1

[AR1-ospf-1-area-0.0.0.0]network 192.168.10.0 0.0.0.255

[AR1-ospf-1-area-0.0.0.0]network 192.168.30.0 0.0.0.255

[AR1-ospf-1-area-0.0.0.0]network 10.1.10.0 0.0.0.255

[AR1-ospf-1-area-0.0.0.0]network 1.1.1.1 0.0.0.0

[AR1-ospf-1-area-0.0.0.0]quit

[AR1-ospf-1]quit

[AR1]quit

<AR1>save

[AR2]ospf 1 router-id 2.2.2.2

[AR2-ospf-1-area-0.0.0.0]network 192.168.10.0 0.0.0.255

[AR2-ospf-1-area-0.0.0.0]network 192.168.20.0 0.0.0.255

[AR2-ospf-1-area-0.0.0.0]network 2.2.2.2 0.0.0.0

[AR2-ospf-1-area-0.0.0.0]quit

[AR2-ospf-1]quit

[AR2]quit

<AR2>save

[AR3]ospf 1 router-id 3.3.3.3

[AR3-ospf-1]area 0

[AR3-ospf-1-area-0.0.0.0]network 192.168.10.0 0.0.0.255

[AR3-ospf-1-area-0.0.0.0]network 192.168.40.0 0.0.0.255

[AR3-ospf-1-area-0.0.0.0]network 10.1.20.0 0.0.0.255

[AR3-ospf-1-area-0.0.0.0]network 3.3.3.3 0.0.0.0

[AR3-ospf-1-area-0.0.0.0]quit

[AR3-ospf-1]quit

[AR3]quit

<AR3>save

[AR5]ospf 1 router-id 5.5.5.5

[AR5-ospf-1]area 0

[AR5-ospf-1-area-0.0.0.0]network 192.168.30.0 0.0.0.255

[AR5-ospf-1-area-0.0.0.0]network 192.168.40.0 0.0.0.255

[AR5-ospf-1-area-0.0.0.0]network 5.5.5.5 0.0.0.0

[AR5-ospf-1-area-0.0.0.0]quit

[AR5-ospf-1]quit

[AR5]quit

<AR5>save

通信测试

display ip routing-table protocol ospf查看ospf路由表

tracert 查看路由节点

dis cur查看全局配置

<AR1>dis cur

[V200R003C00]

#

 sysname AR1

#

 snmp-agent local-engineid 800007DB03000000000000

 snmp-agent

#

 clock timezone China-Standard-Time minus 08:00:00

#

portal local-server load portalpage.zip

#

 drop illegal-mac alarm

#

 undo info-center enable

#

 set cpu-usage threshold 80 restore 75

#

aaa

 authentication-scheme default

 authorization-scheme default

 accounting-scheme default

 domain default

 domain default_admin

 local-user admin password cipher %$%$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$

 local-user admin service-type http

#

firewall zone Local

 priority 15

#

interface GigabitEthernet0/0/0

 ip address 192.168.10.1 255.255.255.0

#

interface GigabitEthernet0/0/1

 ip address 10.1.10.254 255.255.255.0

#

interface GigabitEthernet0/0/2

 ip address 192.168.30.1 255.255.255.0

#

interface NULL0

#

interface LoopBack0

 ip address 1.1.1.1 255.255.255.255

#

ospf 1 router-id 1.1.1.1

 area 0.0.0.0

  network 1.1.1.1 0.0.0.0

  network 10.1.10.0 0.0.0.255

  network 192.168.10.0 0.0.0.255

  network 192.168.30.0 0.0.0.255

#

user-interface con 0

 authentication-mode password

user-interface vty 0 4

user-interface vty 16 20

#

wlan ac

#

return

<AR1>

<AR2>dis cur

[V200R003C00]

#

 sysname AR2

#

 snmp-agent local-engineid 800007DB03000000000000

 snmp-agent

#

 clock timezone China-Standard-Time minus 08:00:00

#

portal local-server load portalpage.zip

#

 drop illegal-mac alarm

#

 undo info-center enable

#

 set cpu-usage threshold 80 restore 75

#

aaa

 authentication-scheme default

 authorization-scheme default

 accounting-scheme default

 domain default

 domain default_admin

 local-user admin password cipher %$%$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$

 local-user admin service-type http

#

firewall zone Local

 priority 15

#

interface GigabitEthernet0/0/0

 ip address 192.168.10.2 255.255.255.0

#

interface GigabitEthernet0/0/1

 ip address 192.168.20.2 255.255.255.0

#

interface GigabitEthernet0/0/2

 ip address 60.222.227.130 255.255.255.0

#

interface NULL0

#

interface LoopBack0

 ip address 2.2.2.2 255.255.255.255

#

ospf 1 router-id 2.2.2.2

 area 0.0.0.0

  network 2.2.2.2 0.0.0.0

  network 192.168.10.0 0.0.0.255

  network 192.168.20.0 0.0.0.255

#

user-interface con 0

 authentication-mode password

user-interface vty 0 4

user-interface vty 16 20

#

wlan ac

#

return

<AR3>dis cur

[V200R003C00]

#

 sysname AR3

#

 snmp-agent local-engineid 800007DB03000000000000

 snmp-agent

#

 clock timezone China-Standard-Time minus 08:00:00

#

portal local-server load portalpage.zip

#

 drop illegal-mac alarm

#

 undo info-center enable

#

 set cpu-usage threshold 80 restore 75

#

aaa

 authentication-scheme default

 authorization-scheme default

 accounting-scheme default

 domain default

 domain default_admin

 local-user admin password cipher %$%$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$

 local-user admin service-type http

#

firewall zone Local

 priority 15

#

interface GigabitEthernet0/0/0

 ip address 192.168.20.3 255.255.255.0

#

interface GigabitEthernet0/0/1

 ip address 10.1.20.254 255.255.255.0

#

interface GigabitEthernet0/0/2

 ip address 192.168.40.3 255.255.255.0

#

interface NULL0

#

interface LoopBack0

 ip address 3.3.3.3 255.255.255.255

#

ospf 1 router-id 3.3.3.3

 area 0.0.0.0

  network 3.3.3.3 0.0.0.0

  network 10.1.20.0 0.0.0.255

  network 192.168.10.0 0.0.0.255

  network 192.168.40.0 0.0.0.255

#

user-interface con 0

 authentication-mode password

user-interface vty 0 4

user-interface vty 16 20

#

wlan ac

#

return

<AR4>dis cur

[V200R003C00]

#

 sysname AR4

#

 snmp-agent local-engineid 800007DB03000000000000

 snmp-agent

#

 clock timezone China-Standard-Time minus 08:00:00

#

portal local-server load portalpage.zip

#

 drop illegal-mac alarm

#

 undo info-center enable

#

 set cpu-usage threshold 80 restore 75

#

aaa

 authentication-scheme default

 authorization-scheme default

 accounting-scheme default

 domain default

 domain default_admin

 local-user admin password cipher %$%$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$

 local-user admin service-type http

#

firewall zone Local

 priority 15

#

interface GigabitEthernet0/0/0

 ip address 60.222.227.1 255.255.255.0

#

interface GigabitEthernet0/0/1

#

interface GigabitEthernet0/0/2

#

interface NULL0

#

interface LoopBack0

 ip address 4.4.4.4 255.255.255.255

#

user-interface con 0

 authentication-mode password

user-interface vty 0 4

user-interface vty 16 20

#

wlan ac

#

return

<AR5>dis cur

[V200R003C00]

#

 sysname AR5

#

 snmp-agent local-engineid 800007DB03000000000000

 snmp-agent

#

 clock timezone China-Standard-Time minus 08:00:00

#

portal local-server load portalpage.zip

#

 drop illegal-mac alarm

#

 undo info-center enable

#

 set cpu-usage threshold 80 restore 75

#

aaa

 authentication-scheme default

 authorization-scheme default

 accounting-scheme default

 domain default

 domain default_admin

 local-user admin password cipher %$%$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$

 local-user admin service-type http

#

firewall zone Local

 priority 15

#

interface GigabitEthernet0/0/0

 ip address 192.168.30.5 255.255.255.0

#

interface GigabitEthernet0/0/1

 ip address 192.168.40.5 255.255.255.0

#

interface GigabitEthernet0/0/2

#

interface NULL0

#

interface LoopBack0

 ip address 5.5.5.5 255.255.255.255

#

ospf 1 router-id 5.5.5.5

 area 0.0.0.0

  network 5.5.5.5 0.0.0.0

  network 192.168.30.0 0.0.0.255

  network 192.168.40.0 0.0.0.255

#

user-interface con 0

 authentication-mode password

user-interface vty 0 4

user-interface vty 16 20

#

wlan ac

#

return

本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处:http://www.hqwc.cn/news/327688.html

如若内容造成侵权/违法违规/事实不符,请联系编程知识网进行投诉反馈email:809451989@qq.com,一经查实,立即删除!

相关文章

【Docker】配置阿里云镜像加速器

默认情况下&#xff0c;将来从docker hub &#xff08;https://hub.docker.com )上下载镜像太慢&#xff0c;所以一般配置镜像加速器。 没有账号的注册一个账号并登录 登录之后点击控制台 查看 cat /etc/docker/daemon.json

7-35 有理数均值 分数 20

每日一言 我们把世界看错&#xff0c;反说它欺骗了我们。 --飞鸟集 题目 本题要求编写程序&#xff0c;计算N个有理数的平均值。 输入格式&#xff1a; 输入第一行给出正整数N&#xff08;≤100&#xff09;&#xff1b;第二行中按照a1/b1 a2/b2 …的格式给出N个分数形式的…

【STM32】STM32学习笔记-TIM输出比较(15)

00. 目录 文章目录 00. 目录01. 输出比较简介02. PWM简介03. 输出比较通道(高级)04. 输出比较通道(通用)05. 输出比较模式06. PWM基本结构07. PWM参数计算08. 舵机简介09. 舵机硬件电路10. 直流电机及驱动简介11. 直流电机硬件电路12. 附录 01. 输出比较简介 OC&#xff08;Ou…

【STM32】STM32学习笔记-ADC单通道 ADC多通道(22)

00. 目录 文章目录 00. 目录01. ADC简介02. ADC相关API2.1 RCC_ADCCLKConfig2.2 ADC_RegularChannelConfig2.3 ADC_Init2.4 ADC_InitTypeDef2.5 ADC_Cmd2.6 ADC_ResetCalibration2.7 ADC_GetResetCalibrationStatus2.8 ADC_StartCalibration2.9 ADC_GetCalibrationStatus2.10 A…

蓝桥杯备赛系列 高精度 acwing版

前言 hello&#xff0c;好久不见。元旦玩过后该收心了&#xff0c;我也倒计时一下蓝桥杯考试时间&#xff0c;大家一起复习&#xff0c;一起登顶。今天讲解高精度算法。 这个算法其实是给学c同学讲的&#xff0c;因为python自带高精度所以不需要&#xff0c;且我讲到所有内容…

Wrk压测发送Post请求的正确姿势

一、Wrk简介 wrk 是一个能够在单个多核 CPU 上产生显著负载的现代 HTTP 基准测试工具。它采用了多线程设计&#xff0c;并使用了像 epoll 和 kqueue 这样的可扩展事件通知机制。此外&#xff0c;用户可以指定 LuaJIT 脚本来完成 HTTP 请求生成、响应处理和自定义报告等功能。 …

频率域滤波图像复原之逆滤波的python实现——数字图像处理

逆滤波原理 逆滤波是一种在频率域进行的图像复原技术&#xff0c;常用于修复由运动模糊等因素引起的图像退化。具体步骤如下&#xff1a; **频率域表示&#xff1a;**首先&#xff0c;将退化的图像通过傅里叶变换从空间域转换到频率域。这使得图像的频率成分变得明显&#xf…

直流稳压电源电路

一、稳压电源的技术指标及对稳压电源的要求 稳压电源的技术指标可以分为两大类&#xff1a;一类是特性指标&#xff0c;如输出电压、输出电滤及电压调节范围;另一类是质量指标&#xff0c;反映一个稳压电源的优劣&#xff0c;包括稳定度、等效内阻&#xff08;输出电阻&#x…

dyld: Library not loaded: /usr/lib/swift/libswiftCoreGraphics.dylib

更新Xcode14后低版本iPhone调试报错 dyld: Library not loaded: /usr/lib/swift/libswiftCoreGraphics.dylib Referenced from: /var/containers/Bundle/Application/…/….app/… Reason: image not found 这是缺少libswiftCoreGraphics库 直接导入libswiftCoreGraphics库即…

软件测试作业‖pytest+po+csv+html报告+cookie+selenium

软件测试作业‖pytestpocsvhtml报告cookieselenium 先用本地部署的系统试了下 或者UFT自动化测试里诺图书管理系统软件测试 # &#xff0c;#测试报告# #性能测试#&#xff0c;#测试用例#&#xff0c; #自动化测试# Selenium 的 Web自动化测试基本要求和注意事项 1.请使用ch…

软件测试之单元测试、系统测试、集成测试知识总结

一、单元测试的概念 单元测试是对软件基本组成单元进行的测试&#xff0c;如函数或一个类的方法。当然这里的基本单元不仅仅指的是一个函数或者方法&#xff0c;有可能对应多个程序文件中的一组函数。 单元也具有一些基本的属性。比如&#xff1a;明确的功能、规格定义&#…

phpstudy面板Table ‘mysql.proc‘ doesn‘t exist解决办法

原因分析&#xff1a;误删了mysql数据库 解决办法如下&#xff1a; 1、停止服务 2、先把mysql文件夹下的data文件夹备份&#xff0c;因为data文件里存有数据库文件。然后再删除data文件。 3、cmd管理员命令进入到mysql中的bin目录下 &#xff0c;执行mysqld --initialize-…