当前位置:网站首页>Hcip --- BGP comprehensive experiment
Hcip --- BGP comprehensive experiment
2022-07-24 02:55:00 【It guy Ma】
1、 Build topology

2、 The experimental requirements

One 、 According to the requirements , To the whole AS2 Of IP Address for subnet Division
take 172.16.0.0/16 The network segment is divided into 172.16.0.0/24 Multiple network segments , Because in the actual project ,24 The network segment is more in line with the user network segment , Therefore, the network segment is divided into 172.16.0.0 /24 The subnet mask of is 24 The network segment , then 172.16.0.0/24 Multiple network segments are divided , take 172.16.0.0/24 The network segment of is used for P2P In the Internet , take 172.16.1.0/24 The network segment of is used for MA In the Internet , The loopback interface of each router uses a subnet mask of 24 The network segment .


Two 、 Configure all routers IP Address


Show only R1
3、 ... and 、 stay AS 2 Enable ospf agreement ( Show only r2 and r3)


Four 、 Enable... For all devices BGP agreement , And establish peers
( Show only r2)


Routing information
Declare :
[r1]bgp 1
[r1-bgp]ne
[r1-bgp]network 10.0.0.0 24
[r1-bgp]
Modify the next jump :
[r2-bgp]peer 172.16.3.1 next-hop-local
[r2-bgp]peer 172.16.5.1 next-hop-local
[r7-bgp]peer 172.16.4.1 next-hop-local
[r7-bgp]peer 172.16.6.1 next-hop-local
6、 ... and 、 Get rid of IBGP Horizontal segmentation between , Configure the routing reflector

7、 ... and 、 Short interface 、 Summarize and announce
8、 ... and 、 establish GRE Tunnel , To realize the communication of two loops


边栏推荐
- 相关性(correlation)
- Wonderful! The description of meituan Octo distributed service management system is too clear
- Numberoptional: a tool for converting strings to numbers
- Unity message push
- Ugui source code analysis - stencilmaterial
- 508. The subtree element with the most occurrences and the pure C implementation of hash table method
- JVM初始
- 动态规划-01背包问题
- SSM family financial management personal financial management system accounting system
- NumberOptional:一个字符串转数字的工具
猜你喜欢

ssm的求职招聘系统兼职应聘求职

TCP connection principle
![[leetcode] sword finger offer 61. shunzi in playing cards](/img/ca/1756f1c33cf9b18d0c88d46bac636e.png)
[leetcode] sword finger offer 61. shunzi in playing cards

String.split()最详细源码解读及注意事项

The process of solving a bug at work

Data Lake (XV): spark and iceberg integrate write operations

Some properties of differential array operation

508. 出现次数最多的子树元素和-哈希表法纯c实现

AcWing 4498. 指针 (DFS)

Summernote rich text editor
随机推荐
go IO操作-文件写
Is it safe to open an account for Xiaobai stock? Can I apply online?
Liveqing live broadcast on demand streaming media OBS streaming live broadcast how to obtain interface verification token video verification streamtoken and configure token validity
Lumberyard game engine of o3de
Soft test --- fundamentals of programming language (Part 1)
To forge ahead on a new journey, the city chain science and technology carnival was grandly held in Xiamen
String.split()最详细源码解读及注意事项
Nodejs builds cloud native microservice applications based on dapr, a quick start guide from 0 to 1
Analyze the overall planning of steam and maker education classroom
(6) Decorator extension [email protected] Principle of use
Leetcode stack and queue questions
kettle
PMP first-hand data and information acquisition
攻防世界WEB练习区(backup、cookie、disabled_button)
Zone d'entraînement Web d'attaque et de défense (View source, get Post, robots)
go IO操作-文件读
c语言小练习
js传参时传入 string有数据;传入 number时没有数据;2[0]是对的!number类型数据可以取下标
(六)装饰器扩展之[email protected]使用原理
22 -- range and of binary search tree