OSPF实验5:OSPF认证完整总结

上传人:cn****1 文档编号:475116787 上传时间:2023-01-22 格式:DOC 页数:8 大小:97KB
返回 下载 相关 举报
OSPF实验5:OSPF认证完整总结_第1页
第1页 / 共8页
OSPF实验5:OSPF认证完整总结_第2页
第2页 / 共8页
OSPF实验5:OSPF认证完整总结_第3页
第3页 / 共8页
OSPF实验5:OSPF认证完整总结_第4页
第4页 / 共8页
OSPF实验5:OSPF认证完整总结_第5页
第5页 / 共8页
点击查看更多>>
资源描述

《OSPF实验5:OSPF认证完整总结》由会员分享,可在线阅读,更多相关《OSPF实验5:OSPF认证完整总结(8页珍藏版)》请在金锄头文库上搜索。

1、本资料由-大学生创业|创业|创业网http:/ OSPF的认证可以在链路上进行,也可以在整个区域内进行认证。另外虚链路同样也可以进行认证。实验基本配置:R1: interface Loopback0 ip address 1.1.1.1 255.255.255.0!interface FastEthernet0/0 ip address 21.1.1.1 255.255.255.0 duplex half!router ospf 10 router-id 1.1.1.1 log-adjacency-changes network 10.1.1.0 0.0.0.255 area 0 networ

2、k 21.1.1.0 0.0.0.255 area 0R2: interface Loopback0 ip address 2.2.2.2 255.255.255.0!interface FastEthernet0/0 ip address 21.1.1.2 255.255.255.0 duplex half!interface Serial1/0 ip address 10.1.1.2 255.255.255.0 serial restart-delay 0!interface Serial1/1 ip address 11.1.1.1 255.255.255.0 serial restar

3、t-delay 0!router ospf 10 router-id 2.2.2.2 log-adjacency-changes area 1 virtual-link 3.3.3.3 network 10.1.1.0 0.0.0.255 area 0 network 11.1.1.0 0.0.0.255 area 1 network 21.1.1.0 0.0.0.255 area 0R3:interface Loopback0 ip address 3.3.3.3 255.255.255.0! interface Serial1/0 ip address 11.1.1.2 255.255.2

4、55.0 serial restart-delay 0!router ospf 10 router-id 3.3.3.3 log-adjacency-changes area 1 virtual-link 2.2.2.2 network 3.3.3.0 0.0.0.255 area 2 network 11.1.1.0 0.0.0.255 area 1认证配置:1. 在R1和R2的串行链路上进行OSPF明文认证:首先先在R1上做如下配置,看在R1配置完认证,R2还没有配置认证的时候的情况:R1(config)#int s1/0R1(config-if)#ip ospf authenticati

5、on(启用认证)R1(config-if)#ip ospf authentication-key cisco(配置密码)通过debug工具我们可以看到如下信息:*Aug 15 22:51:54.275: OSPF: Rcv pkt from 10.1.1.2, Serial1/0 : Mismatch Authentication type. Input packet specified type 0, we use type 1这里的type0是指对方没有启用认证,type1是明文认证。在R2上配置认证,使得邻居关系恢复。R2(config)#int s1/0R2(config-if)#ip

6、 ospf authenticationR2(config-if)#ip ospf authentication-key cisco*Aug 15 22:54:55.815: %OSPF-5-ADJCHG: Process 10, Nbr 1.1.1.1 on Serial1/0 from LOADING to FULL, Loading Done2.在R2和R3的串行链路上进行MD5认证的:R2(config)#int s1/1R2(config-if)#ip ospf authentication message-digest(定义认证类型为MD5) R2(config-if)#ip os

7、pf message-digest-key 1 md5 cisco(定义key和密码)R3(config)#int s1/0R3(config-if)#ip ospf authentication message-digest R3(config-if)#ip ospf message-digest-key 1 md5 ciscoR3(config-if)#*Aug 15 22:59:44.175: %OSPF-5-ADJCHG: Process 10, Nbr 2.2.2.2 on Serial1/0 from LOADING to FULL, Loading DoneR3#show ip

8、ospf int s1/0 Serial1/0 is up, line protocol is up Internet Address 11.1.1.2/24, Area 1 Process ID 10, Router ID 3.3.3.3, Network Type POINT_TO_POINT, Cost: 64 Transmit Delay is 1 sec, State POINT_TO_POINT, Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5 oob-resync timeout 40 He

9、llo due in 00:00:05 Index 1/1, flood queue length 1 Next 0x648352C8(13)/0x0(0) Last flood scan length is 1, maximum is 2 Last flood scan time is 0 msec, maximum is 0 msec Flood pacing timer due in 0 msec Neighbor Count is 1, Adjacent neighbor count is 1 Adjacent with neighbor 2.2.2.2 Suppress hello

10、for 0 neighbor(s) Message digest authentication enabledYoungest key id is 13.修改R2和R3上串行链路的MD5认证的密码: 在R2原有的配置上加上下面这条命令:R2(config-if)#ip ospf message-digest-key 2 md5 gairuheR2#sho ip ospf neighbor Neighbor ID Pri State Dead Time Address Interface3.3.3.3 0 FULL/ - - 11.1.1.2 OSPF_VL01.1.1.1 1 FULL/BDR

11、 00:00:34 21.1.1.1 FastEthernet0/01.1.1.1 0 FULL/ - 00:00:37 10.1.1.1 Serial1/03.3.3.3 0 FULL/ - 00:00:31 11.1.1.2 Serial1/1我们发现邻居关系没有丢失。R2#show ip ospf interface s1/1Serial1/1 is up, line protocol is up Internet Address 11.1.1.1/24, Area 1 Process ID 10, Router ID 2.2.2.2, Network Type POINT_TO_POI

12、NT, Cost: 64 Transmit Delay is 1 sec, State POINT_TO_POINT, Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5 oob-resync timeout 40 Hello due in 00:00:01 Index 1/3, flood queue length 0 Next 0x0(0)/0x0(0) Last flood scan length is 1, maximum is 1 Last flood scan time is 4 msec, ma

13、ximum is 4 msec Neighbor Count is 1, Adjacent neighbor count is 1 Adjacent with neighbor 3.3.3.3 Suppress hello for 0 neighbor(s) Message digest authentication enabled Youngest key id is 2 Rollover in progress, 1 neighbor(s) using the old key(s): key id 1这里我们可以看到两个key都在使用。所以要修改链路的MD5认证的密码时,可以先将新的密码配

14、置到启用认证的路由器后在将原来的密码删除,这样的话可以保证在修改配置的时候邻居关系依然存在。4.在Area0上进行区域认证 R1(config)#router ospf 10R1(config-router)#area 0 authenticationR1(config-router)#*Aug 15 23:09:32.619: %OSPF-5-ADJCHG: Process 10, Nbr 2.2.2.2 on FastEthernet0/0 from FULL to DOWN, Neighbor Down: Dead timer expired发现快速以太网接口的邻居已经丢失。通过debug信息我们看到:R1#*Aug 15 23:10:32.619: OSPF: Rcv pkt from 21.1.1.2, FastEthernet0/0 :

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 幼儿/小学教育 > 小学课件

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号