Summary of Network Protocol configuration instructions used in the project

Source: Internet
Author: User


Summary of the project's network protocol configuration instructions is over. You can learn a lot through the project ~ In addition to coding algorithm skills, you can also learn to use the GNS3 simulator to build a network environment. The protocols used in the entire process are summarized as follows (for your future use, you can leave the audience to bypass ~~ Ps: Cisco device ): no ip domain-lookup [no DNS resolution] line console 0 [enable console Password] logg s [configure the vro so that the screen message sent by the vro will not be added to the command] line con 0 [Yes enter the consol port configuration] logg sync
[This command can achieve one effect, that is, when you enter a command, some prompt information of the router will interrupt your input command. When you enter the command after using this command, the prompt message does not interrupt the command you entered to achieve the synchronization effect.] www.2cto.com exec-t 0 0 [the vro will automatically exit the configuration when you have not configured it for a while, and you need to re-enter it, after entering this command, when you configure a vro, the link will never time out.] loopback [the interface uses it to simulate a network segment on the device. Just like connecting to a pc, you can use a simulator to do experiments to save resources. The device has opened more cards. in addition, loopback is used as the router-id in ospf.] no au: automatic summary is performed on the border network by default. For example: 172.16.1.0/24--R1 ----- 10.0.0.0/24 ----- R2--2.2.2.0/24 if I didn't add "no au" then in R2 show ip route 2.0.0.0/32 is subnetted, 1 subnetsC 2.2.2.2 is directly connected, Loopback0D 172.16.0.0/16 [90/156160] via 10.0.0.2, 00:00:04, FastEthernet0/0 10.0.0.0/24 is subnetted, 1 subnetsC 10.0.0.0 is directly connected, fastEthernet0/0C 192.168.1.0/24 is directly connected, Tunnel0S * 0.0.0.0/0 [1/0] via 10.0.0.2 Www.2cto.com we can see 172. 16. The summary is classified. After "no au" is added, 2.0.0.0/32 is subnetted, 1 subnetsC 2.2.2.2 is directly connected, Loopback0 172.16.0.0/24 is subnetted, 1 subnetsD 172.16.1.0 [90/156160] via 10.0.0.2, 00:00:25, fastEthernet0/0 10.0.0.0/24 is subnetted, 1 subnetsC 10.0.0.0 is directly connected, FastEthernet0/0C 192.168.1.0/24 is directly connected, tunnel0S * 0.0.0.0/0 [1/0] via 10.0.0.0.2 show ip mroute show vro multicast table (explained on the Internet) Use the sho W ip mroute command to display information about mroute entries in the mroute table. theCisco IOS software populates the multicast routing table by creating (S, G) entries from (*, G) entries. the asterisk (*) refers to all source addresses, the "S" refers to a single source address, and the "G" is www.2cto.com the destination multicast group address. in creating (S, G) entries, the software uses t He best path to thatdestination group found in the unicast routing table (that is, through Reverse Path Forwarding [RPF]). ospf configuration: router ospf 1 network 0.0.0.0 255.255.255.255 area 0 ospf network announcement problem: router ospf 100 network 0.0.0.0.0 0.0.0.0 area 1: enable ospf on all interfaces of this vro1 in area 1. For example, if vroa A belongs to Region 1 and has two interfaces: 1.1.1.1 and 2.2.2.2, And the mask is 255.255.255.0, network 0.0.0.0 0.0.0.0 area 1 is equivalent: network 1.1.1.0 0.0.0.255 area 1 network 2.2.2 .. 0 0.0.0.255 area 1. If more interfaces exist, the same applies. From the Internet: Specify the OSPF protocol: router ospf process-id (1); specify the network connected to the router: network address wildcard-mask area-id (2 ); assign the CIDR block to the specified region www.2cto.com and specify the Node address adjacent to the vro: neighbor ip-address Note: (1). the OSPF route process-id must be in the range of 1-65535, multiple OSPF processes can be configured on the same vro, but this is not recommended. Multiple OSPF processes require copies of multiple OSPF databases and must run copies of multiple Shortest Path Algorithms. Process-id only works inside the vro. The process-id of different vrouters can be different. (2) wildcard-mask is the inverse code of the subnet mask. The ID area-id of the network area is in decimal number between 0 and 4294967295, or x with an IP address format. x. x. x. When the network Region ID is 0 or 0.0.0.0, it is the main domain. Routers in different network regions learn route information through the trunk domain. Ospf area: an AREA is a group of adjacent networks and routers. vrouters in the same AREA share a public area id. An AS (self-made system) can have multiple regions, and routers in the same region have the same topology. The region is also divided into backbone areas (the default ID is 0) and non-backbone areas (conventional areas ). Note: All non-backbone areas must be connected to the backbone areas before they can communicate with each other. My summary: Related viewing commands: router # show ip protocols view the enabled routing protocol Router # show ip route view route table Router # show ip ospf interface view region number and information under the interface Router # show ip ospf neighbor view neighbor table delete ip address no ip address [ip] [mask] (in fact, to delete various configurations, you only need to add a no before the configuration command ~) View ip address and other information on a port in # mode: sh int e0/0 {port 0/0} (you can also view various unknown protocol commands, you can try sh int? It will be listed) www.2cto.com from the Internet: For many network administrators, configuring the access control list of routers is a regular task, the vro access control list is the first level to ensure network security. The access list provides a mechanism to control and filter information flows through different router interfaces in different directions. This mechanism allows users to use access tables to manage information flows and formulate policies for the company's internal network. These policies can describe security features and reflect traffic priority. For example, an organization may want to allow or deny Internet access to internal Web servers, or allow one or more workstations on the internal LAN to send data streams to the wide area network. These scenarios and other functions can be achieved through table access.
Configure acl: router (config) # access-list 2005 permit ip any 225.1.1.0 0.0.255 configure C-BSR: router (config) # ip pim bsr-candidate ethernet 0/1; configure C-RP: router (config) # ip pim rp-candidate ethernet 0/1 24 {mask length} configure the BSR boundary: router (config-if) # detailed instructions on ip pim bsr-border access-list commands refer: http://www.bkjia.com/net/201208/151303.html multicast related: view the configuration and operation of PIM on the router interface: router # sh ip pim int to view the information of the BSR election on the router: router # sh ip pim bsr-router view router P IM Protocol Multicast Route table: router #: sh ip mroute if a route does not have rp (not added to a specific multicast group ): as long as the ip igmp join-group 224.1.1.1 (group number) sh ip pim int command is displayed for each interface connected to the router, information about the Enable PIM-SM interface is displayed by default, when this series of Ethernet switches act as the RP or receiver-side DR, the device initiates the SPT switch immediately after receiving the first multicast packet, you can disable the switch from RPT to SPT through the following configuration (note that both the rp bsr and the DR router must be configured ). Www.2cto.com spt-switch-threshold infinity [group-policy acl-number [order-value] by default, after the Cisco device receives the first multicast packet, it immediately switches the ip to SPT pim spt infinity to display rp-group information sh ip pim rp displays detailed information on running ospf interfaces: including costsh ip ospf int brief
 

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.