1. Configure the loopback and S1/1 interface IP addresses for r1
R1 (config) # int lo0R1 (config-If) # IP add 1.1.1.1 255.255.255.0R1 (config-If) # int S1/1R1 (config-If) # IP add 12.1.1.1 255.255.255.0R1 (config-If) # No Shutdown
2. The link is
Port borrow IP Address
The main purpose of the IP address borrow function is to save valuable IP Address resources. If an interface does not have an IP address, it cannot generate a route and forward packets. The essence of the so-called "borrow IP
Information location: http://www.china-ccie.com/ccie/lilun/igp/igp.htmlThrough the analysis can be learned that the reason for the suboptimal path is: (OSPF ad value is less than RIP) (in fact, the use of two-way redistribution, resulting in a more
1. Draw a topology on the packet tracer and configure the module and the frame relay dlci.
First, let's look at the configured topology:
Configuration process:
1. Add 3 routers, I use 2811, add the s port module for the router, I use the NM-4A/S
Lab question: R2 is connected to R3 R5 as a fast Ethernet cable, and the others are strings. Frame relay is a full-connection mesh structure by default, that is, the PVC between all connected routes has been connected, and all
Disable the reverse
1. Security Configuration of vro Access Control1. strictly control the administrator who can access the vro. Record Filing is required for any maintenance.2. do not access the vro remotely. Even if you need to access the vro remotely, we recommend
LSA1 (Router Link States)
R1 # show ip ospf database router view detailed information of Class 1 LSA in LSDB
1. Intra-Domain Routing, transmitted only in this region, does not pass through the ABR.
2. Each vro is generated.
3. including the direct
1. Security Configuration of vro Access Control1. strictly control the administrator who can access the vro. Record Filing is required for any maintenance.2. do not access the vro remotely. Even if you need to access the vro remotely, we recommend
1. Security Configuration of vro Access Control
1. strictly control the administrator who can access the vro. Record Filing is required for any maintenance.
2. do not access the vro remotely. Even if you need to access the vro remotely, we recommend
TopologyObjective:
Configure RIPv2
Verify Connectivity
BackgroundAlthough RIP is rarely used in modern networks, it's useful as a foundation for understanding basic network routing. In this activity, you'll configure a default
1. First, disable the ARP-Proxy enabled by default, which may cause confusion in the route table.
Router (Config) # no ip proxy-arp orRouter (Config-if) # no ip proxy-arp
2. Enable OSPF route protocol authentication. The default OSPF
CCNA Experiment 24 Security of routing updatesEnvironment: Windows XP , GNS3.0.7.2Objective:Learn how to pass MD5 authentication and passive port protection routing updates, Note that both methods are in EIGRP ,OSPF, RIP, IGRP can be used in all
With the development of the routing industry, both the router technology and the routing protocol are constantly improved, making the routing technology more standardized, the previous lecture on VPN routing and forwarding focuses on configuring and
I. the role of management distanceadministrative distance is a measure that determines the validity or trustworthiness of a routing protocol. In various routing protocols, sorting is done from the most believable to the most untrusted. Used to
Objective:Share with me today a Cisco integrated small experiment, difficulty CCNA level. It mainly involves the following knowledge points: VLAN, DHCP, STP (spanning-tree) +HRSP (standby), OSPF, NAT, ACL. The GNS3 simulator is used in the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.