当前位置:网站首页>Comprehensive experiment Li
Comprehensive experiment Li
2022-07-01 08:14:00 【middlecorn】

Topology :
The experimental requirements :
R3 For operators
R1 You need to have ipv4 and ipv6 Two protocols , And the use of ripng
R4,R5,R6,R7,R8 All use ipv6 agreement , And run bgp
R4 stay AS1 in .R5,R6,R7,R8 stay AS2, also AS2 There are two small federations
R5,R6,R7 In the little Federation 64512 in
R8 stay 64513 in
And will ipv4 The address is converted into ipv6 Address :
23.1.1.1
2002:1701:0101::/48
2002:1701:0101:0000::/64--2002:1701:0101:FFFF::/64
2002:1701:0101:0000::/64
2002:1701:0101:0000::/65
2002:1701:0101:0000::/65
2002:1701:101:0:8000::
34.1.1.2
2002:2201:0102::/48
2002:2201:0102::/49 AS1
2002:2201:0102::/64 -- 2002:2201:0102:7fff::/64
2002:2201:0102:8000::/49 AS2
2002:2201:0102:8000::/64 -- 2002:2201:0102:FFFF::/64
First configure the left R1,R2,R3 Of IP Address :
Then run to the left ripng:

R4,R5,R6,R7,R8 To configure ipv6 Address :
R5,R6,R7,R8 run OSPFv3:


And then there was R4,R5,R6,R7,R8 rise BGP,4, stay AS1.5,6,7,8 stay AS2
5,6,7 In a small Federation ,8 In a single small Federation :

R6 Not good , Make it better :
R6 Need to adjust a reflector , Give Way R5 Treat as a server ,R6 As a customer , such R7,R8 To learn :

R4 And two-way communication :
then R7 Also become better :

Finally, verify the experimental results :
R1 Access to the Internet , Sure ping Through the following route

边栏推荐
- Using settoolkit to forge sites to steal user information
- Differential: definition of total differential, partial derivative, gradient
- seaborn clustermap矩阵添加颜色块
- XX attack - reflective XSS attack hijacking user browser
- 【入门】输入整型数组和排序标识,对其元素按照升序或降序进行排序
- [staff] high and low octave mark (the notes in the high octave mark | mark range are increased by one octave as a whole | low octave mark | mark range are decreased by one octave as a whole)
- Leetcode T40: 组合总和II
- CPU设计实战-第四章实践任务一简单CPU参考设计调试
- slice扩容机制分析
- empirical study and case study
猜你喜欢

The Windows C disk is full

How to troubleshoot SharePoint online map network drive failure?

Soft keyboard height error

postgresql源码学习(26)—— Windows vscode远程调试Linux上的postgresql

Embedded-c language-10-enumeration / (function) pointer (function) / multi-level pointer /malloc dynamic allocation / file operation

seaborn clustermap矩阵添加颜色块

window c盘满了

【无标题】

PostgreSQL source code learning (26) -- windows vscode remote debugging PostgreSQL on Linux

Office365 - how to use stream app to watch offline files at any time
随机推荐
Rumtime 1200 upgrade: London upgrade support, pledge function update and more
Stack implementation calculator
Latex table
window c盘满了
Latex formula code
XX attack - reflective XSS attack hijacking user browser
shardingSphere
Day5: scanner object, next() and nextline(), sequential structure, selection structure, circular structure
[staff] key number (key number identification position | key number marking list | a major key identification principle | F, C, G position marking ascending | F major key identification principle | B
Airsim雷达相机融合生成彩色点云
Leetcode T40: 组合总和II
0 basic introduction to single chip microcomputer: how to use digital multimeter and precautions
Anddroid 文本合成语音TTS实现
web254
01 NumPy介绍
Two expressions of string
Programmer's regimen
Analysis of slice capacity expansion mechanism
Li Kou daily question - day 31 -1790 Can a string exchange be performed only once to make two strings equal
Deep learning systematic learning