SlideShare a Scribd company logo
1 of 47
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Chapter 5: Adjust and
Troubleshoot Single-
Area OSPF
Scaling Networks
Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 5
5.0 Introduction
5.1 Advanced Single-Area OSPF Implementations
5.2 Troubleshooting Single-Area OSPF Implementations
5.3 Summary
Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 5: Objectives
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4
5.1 Advanced Single-Area
OSPF Configurations
Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Routing in the Distribution and Core Layers
Routing versus Switching
 Switches, link aggregation, LAN redundancy and wireless LANs are
all technologies that provide or enhance user access to network
resources.
 Scalable networks also require optimal reachability between sites.
Remote network reachability is provided by routers and Layer 3
switches which operate in the distribution and core layers.
Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Routing in the Distribution and Core Layers
Static Routing
Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Routing in the Distribution and Core Layers
Dynamic Routing Protocols
Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Routing in the Distribution and Core Layers
Configuring Single-Area OSPF
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Routing in the Distribution and Core Layers
Verifying Single-Area OSPF
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Routing in the Distribution and Core Layers
Verifying Single-Area OSPF (cont.)
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Routing in the Distribution and Core Layers
Verifying Single-Area OSPF (cont.)
Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Routing in the Distribution and Core Layers
Configuring Single-Area OSPFv3
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Routing in the Distribution and Core Layers
Verifying Single-Area OSPFv3
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Routing in the Distribution and Core Layers
Verifying Single-Area OSPFv3 (cont.)
Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF in Multiaccess Networks
OSPF Network Types
 Point-to-point – Two routers interconnected over a common link.
Often the configuration in WAN links.
 Broadcast Multiaccess – Multiple routers interconnected over an
Ethernet network.
 Non-broadcast Multiaccess (NBMA) – Multiple routers
interconnected in a network that does not allow broadcasts, such
as Frame Relay.
 Point-to-multipoint – Multiple routers interconnected in a hub-
and-spoke topology over an NBMA network.
 Virtual links – Special OSPF network used to interconnect distant
OSPF areas to the backbone area.
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF in Multiaccess Networks
Challenges in Multiaccess Networks
Multiaccess networks can create two challenges for OSPF:
 Creation of multiple adjacencies – creating adjacencies with
multiple routers would lead to an excessive number of LSAs
being exchanged.
 Extensive flooding of LSAs – Link-state routers flood the
network when OSPF is initialized or when there is a change.
• Formula used to calculate
the number of required
adjacencies n(n-1)/2
• A topology of 4 routers would
result in 4(4-1)/2 = 6
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF in Multiaccess Networks
OSPF Designated Router
 The designated router (DR) is the solution to managing adjacencies
and flooding of LSAs on a multiaccess network.
 The backup designated router (BDR) is elected in case the DR
fails.
 All other non-DR and non-BDR routers become DROTHERs.
DROTHERs only form adjacencies with the DR and BDR.
 DROTHERs only send their LSAs to the DR and BDR using the
multicast address 224.0.0.6.
 DR uses the multicast address 224.0.0.5 to send LSAs to all other
routers. DR only router flooding LSAs.
 DR/BDR Elections only necessary on multiaccess networks.
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF in Multiaccess Networks
OSPF Designated Router (cont.)
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF in Multiaccess Networks
Verifying DR/BDR Roles
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF in Multiaccess Networks
Verifying DR/BDR Adjacencies
State of neighbors in multiaccess networks can be:
 FULL/DROTHER – This is a DR or BDR router that is fully
adjacent with a non-DR or BDR router.
 FULL/DR – The router is fully adjacent with the indicated DR
neighbor.
 FULL/BDR – The router is fully adjacent with the indicated
BDR neighbor.
 2-WAY/DROTHER – The non-DR or BDR router has a
neighbor adjacency with another non-DR or BDR router.
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF in Multiaccess Networks
Default DR/BDR Election Process
 The router with the highest interface priority is elected as the DR.
 The router with the second highest interface priority is elected as
the BDR.
 Priority can be configured between 0-255. (Priority of 0 - router
cannot become the DR. 0
 If interface priorities are equal, then the router with highest router ID
is elected DR and second highest the BDR
 Three ways to determine router ID:
• Router ID can be manually configured.
• If not configured, the ID determined by the highest loopback IP
address.
• If no loopbacks, the ID is determined by the highest active IPv4
address.
 In an IPv6 network, the router ID must be configured manually.
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF in Multiaccess Networks
DR/BDR Election Process
DR remains the DR until one of the following occurs:
 The DR fails.
 The OSPF process on the DR fails or is stopped.
 The multiaccess interface on the DR fails or is shutdown.
If the DR fails, the BDR is automatically promoted to DR.
 There is then a new BDR election and the DROTHER with the
higher priority or router ID is elected as the new BDR.
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF in Multiaccess Networks
The OSPF Priority
 Instead of setting the router ID on all routers, it is better to control
the election by setting interface priorities.
• To change the priority, use one of the following commands:
ip ospf priority value (OSPFv2 interface command)
ipv6 ospf priority value (OSPFv3 interface command)
 To begin another OSPF election, use one of the following methods:
• Shutdown the router interfaces and then re-enable them
starting with the DR, then the BDR, and then all other routers.
• Reset the OSPF process using the clear ip ospf
process privileged EXEC mode command on all routers.
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Default Route Propagation
Propagating a Default Static Route in OSPFv2
The router connected to the Internet that is used to propagate a
default route is often called the edge, entrance or gateway router.
In an OSPF network, it may also be call the autonomous system
boundary router (ASBR).
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Default Route Propagation
Verifying the Propagated Default Route
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Default Route Propagation
Propagating a Default Static Route in OSPFv3
Verifying the propagated IPv6 default Route
Enabling OSPFv3 on the R1 Interfaces
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fine-tuning OSPF Interfaces
OSPF Hello and Dead Intervals
OSPF Hello and Dead intervals must match, or a neighbor
adjacency will not occur.
Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fine-tuning OSPF Interfaces
Modifying OSPF Intervals
 Modifying OSPFv2 Intervals
 Modifying OSPFv3 Intervals
 Verifying the OSPFv3 interface intervals
Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Secure OSPF
Secure Routing Updates
 When neighbor authentication has been configured on a router,
the router authenticates the source of each routing update
packet that it receives.
 An authenticating key that is known to both the sending and the
receiving route is exchanged.
 OSPF supports three types of authentication:
• Null – no authentication.
• Simple password authentication – the password in the
update is sent in plaintext over the network (outdated
method).
• MD5 authentication – Most secure and recommended
method of authentication. Password is calculated using the
MD5 algorithm.
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Secure OSPF
MD5 Authentication
Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Secure OSPF
Configuring OSPF MD5 Authentication
 MD5 authentication can be enabled globally for all interfaces or
on a per-interface basis.
 To enable OSPF MD5 authentication globally, configure:
• ip ospf message-digest-key key
md5 password (interface configuration command)
• area area-id authentication message-digest (router
configuration command)
 To enable MD5 authentication on a per-interface basis,
configure:
• ip ospf message-digest-key key
md5 password (interface configuration command)
• ip ospf authentication message-digest (interface
configuration command)
Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Secure OSPF
OSPF MD5 Authentication Example
continued
Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Secure OSPF
OSPF MD5 Authentication Example (cont.)
Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Secure OSPF
Verifying OSPF MD5 Authentication
Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Secure OSPF
Verifying OSPF MD5 Authentication (cont.)
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 36
5.2 Troubleshooting
Single-Area OSPF
Implementations
Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of Troubleshooting Single-Area OSPF
Forming OSPF Adjacencies
Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of Troubleshooting Single-Area OSPF
Transitioning via OSPF States
The router should not
remain in any states
other than FULL or
2Way for extended
periods of time.
Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of Troubleshooting Single-Area OSPF
OSPF Troubleshooting Commands
 show ip protocols – Verifies vital OSPF configuration
information.
 show ip ospf neighbor – Verifies that the router has
formed an adjacency with its neighboring routers.
 show ip ospf interface – Displays the OSPF parameters
configured on an interface, such as the OSPF process ID.
 show ip ospf – Examines the OSPF process ID and router
ID.
 show ip route ospf – Displays only the OSPF learned
routes in the routing table.
 clear ip ospf [process-id] process – Resets the
OSPFv2 neighbor adjacencies.
Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of Troubleshooting Single-Area OSPF
Components of Troubleshooting OSPF
Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshoot Single-Area OSPFv2 Routing Issues
Troubleshooting Neighbor Issues
 Verify active OSPF interfaces using the show ip ospf interface
command.
 Verify the OSPF settings using the show ip
protocols command.
 Disable the interface as passive using the no passive-interface
command.
 Verify routes using the show ip route command.
Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshoot Single-Area OSPFv2 Routing Issues
Troubleshooting OSPF Routing Table Issues
 The show ip protocols command verifies networks that are
advertised in OSPF.
 For an interface to be enabled for OSPF, a matching network
command must be configured under the OSPF routing process.
 Use the show ip route command to verify routes in a routing table.
 Use the show ip protocols command to verify that a route is
being advertised.
Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshoot Single-Area OSPFv3 Routing Issues
OSPFv3 Troubleshooting Commands
 show ipv6 protocols – Verifies vital OSPFv3 configuration
information.
 show ipv6 ospf neighbor – Verifies that the router has formed
an adjacency with its neighboring routers.
 show ipv6 ospf interface – Displays the OSPFv3
parameters configured on an interface.
 show ipv6 ospf – Examines the OSPFv3 process ID and router
ID.
 show ipv6 route ospf – Displays only the OSPFv3 learned
routes in the routing table.
 clear ipv6 ospf [process-id] process – Resets the
OSPFv3 neighbor adjacencies.
Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 5: Summary
 OSPF defines five network types: point-to-point, broadcast
multiaccess, NBMA, point-to-multipoint, and virtual links.
 The DR and BDR are elected to overcome challenges of flooding in
an OSPF network.
 The routers in the network elect the router with the highest interface
priority as DR. The router with the second highest interface priority is
elected as the BDR.
 If all priorities are equal, the router with the highest ID is elected DR
and the second highest ID becomes the BDR.
 To propagate a default route in OSPF, the ASBR must be
configured with a default static route and the default-information
originate command.
 Verify routes with the show ip route or show ipv6
route command.
Presentation_ID 45© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 5: Summary (cont.)
 For OSPF to make a correct path determination, it may be
necessary to adjust the default interface bandwidth.
 To adjust the reference bandwidth, use the auto-cost reference-
bandwidth Mbps router configuration mode command.
 To adjust the interface bandwidth, use the bandwidth kilobits
interface configuration mode command.
 The OSPF Hello and Dead intervals must match or a neighbor
adjacency does not occur.
 OSPF supports three types of authentication: null, simple password
authentication, and MD5 authentication.
 When troubleshooting OSPF neighbors, be aware that the FULL or
2WAY states are normal.
Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 5: Summary (cont.)
 Troubleshooting commands: show ip protocols, show ip
ospf neighbor, show ip ospf interface, show ip
ospf
 Troubleshooting OSPFv3 commands: show ipv6
protocols, show ipv6 ospf neighbor, show ipv6
ospf interface, show ipv6 ospf, show ipv6 route
ospf, and clear ipv6 ospf [process-id] process
Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

More Related Content

What's hot (20)

CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
 
Session initiation-protocol
Session initiation-protocolSession initiation-protocol
Session initiation-protocol
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnetting
 
Chapter 10 - DHCP
Chapter 10 - DHCPChapter 10 - DHCP
Chapter 10 - DHCP
 
IP Multicasting
IP MulticastingIP Multicasting
IP Multicasting
 
Layer 2 switching fundamentals(networking)
Layer 2 switching fundamentals(networking)Layer 2 switching fundamentals(networking)
Layer 2 switching fundamentals(networking)
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communications
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
 
IMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentationIMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentation
 
CCNA Exploration 2 - Chapter 5
CCNA Exploration 2 - Chapter 5CCNA Exploration 2 - Chapter 5
CCNA Exploration 2 - Chapter 5
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
IPV6 ADDRESS
IPV6 ADDRESSIPV6 ADDRESS
IPV6 ADDRESS
 
Mpls basic
Mpls basicMpls basic
Mpls basic
 
Quality of service
Quality of serviceQuality of service
Quality of service
 
Network layer u3
Network  layer u3Network  layer u3
Network layer u3
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
 
Ip address
Ip addressIp address
Ip address
 
Eigrp.ppt
Eigrp.pptEigrp.ppt
Eigrp.ppt
 
CCNA ppt
CCNA pptCCNA ppt
CCNA ppt
 
Troubleshooting BGP Juniper Examples
Troubleshooting BGP Juniper ExamplesTroubleshooting BGP Juniper Examples
Troubleshooting BGP Juniper Examples
 

Viewers also liked

CCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPFCCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPFVuz Dở Hơi
 
CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansVuz Dở Hơi
 
CCNAv5 - S3: Chapter3 Link Aggregation
CCNAv5 - S3: Chapter3 Link AggregationCCNAv5 - S3: Chapter3 Link Aggregation
CCNAv5 - S3: Chapter3 Link AggregationVuz Dở Hơi
 
CCNAv5 - S3: Chapter 7 EIGRP
CCNAv5 - S3: Chapter 7 EIGRPCCNAv5 - S3: Chapter 7 EIGRP
CCNAv5 - S3: Chapter 7 EIGRPVuz Dở Hơi
 
CCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and LicensingCCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and LicensingVuz Dở Hơi
 
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and TroubleshootingCCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and TroubleshootingVuz Dở Hơi
 
CCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan RedundancyCCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan RedundancyVuz Dở Hơi
 
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksCCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksVuz Dở Hơi
 
Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.Vuz Dở Hơi
 
Chapter 3 link aggregation
Chapter 3   link aggregationChapter 3   link aggregation
Chapter 3 link aggregationJosue Wuezo
 
Chapter 1 introduction to scaling networks
Chapter 1   introduction to scaling networksChapter 1   introduction to scaling networks
Chapter 1 introduction to scaling networksJosue Wuezo
 
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4Vuz Dở Hơi
 
CCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame RelayCCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame RelayVuz Dở Hơi
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityVuz Dở Hơi
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsVuz Dở Hơi
 
Chapter 2 LAN redundancy
Chapter 2   LAN  redundancyChapter 2   LAN  redundancy
Chapter 2 LAN redundancyJosue Wuezo
 
CCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The WanCCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The WanVuz Dở Hơi
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignVuz Dở Hơi
 
CCNA Exploration 3 - Chapter 5
CCNA Exploration 3 - Chapter 5CCNA Exploration 3 - Chapter 5
CCNA Exploration 3 - Chapter 5Irsandi Hasan
 
CCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband SolutionsCCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband SolutionsVuz Dở Hơi
 

Viewers also liked (20)

CCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPFCCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPF
 
CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless Lans
 
CCNAv5 - S3: Chapter3 Link Aggregation
CCNAv5 - S3: Chapter3 Link AggregationCCNAv5 - S3: Chapter3 Link Aggregation
CCNAv5 - S3: Chapter3 Link Aggregation
 
CCNAv5 - S3: Chapter 7 EIGRP
CCNAv5 - S3: Chapter 7 EIGRPCCNAv5 - S3: Chapter 7 EIGRP
CCNAv5 - S3: Chapter 7 EIGRP
 
CCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and LicensingCCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and Licensing
 
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and TroubleshootingCCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
 
CCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan RedundancyCCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan Redundancy
 
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksCCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
 
Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.
 
Chapter 3 link aggregation
Chapter 3   link aggregationChapter 3   link aggregation
Chapter 3 link aggregation
 
Chapter 1 introduction to scaling networks
Chapter 1   introduction to scaling networksChapter 1   introduction to scaling networks
Chapter 1 introduction to scaling networks
 
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
 
CCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame RelayCCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame Relay
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point Connections
 
Chapter 2 LAN redundancy
Chapter 2   LAN  redundancyChapter 2   LAN  redundancy
Chapter 2 LAN redundancy
 
CCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The WanCCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The Wan
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
 
CCNA Exploration 3 - Chapter 5
CCNA Exploration 3 - Chapter 5CCNA Exploration 3 - Chapter 5
CCNA Exploration 3 - Chapter 5
 
CCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband SolutionsCCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband Solutions
 

Similar to Chapter5 adjust and troubleshoot single area ospf

CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8Nil Menon
 
CCNAv5 - S2: Chapter 8 single area ospf
CCNAv5 - S2: Chapter 8 single area ospfCCNAv5 - S2: Chapter 8 single area ospf
CCNAv5 - S2: Chapter 8 single area ospfVuz Dở Hơi
 
Chapter 08 - Single-Area OSPF
Chapter 08 - Single-Area OSPFChapter 08 - Single-Area OSPF
Chapter 08 - Single-Area OSPFYaser Rahmati
 
Chapter 19 : single-area ospf
Chapter 19 : single-area ospfChapter 19 : single-area ospf
Chapter 19 : single-area ospfteknetir
 
RS_InstructorPPT_Chapter8.pptx
RS_InstructorPPT_Chapter8.pptxRS_InstructorPPT_Chapter8.pptx
RS_InstructorPPT_Chapter8.pptxjagali
 
ENSA_Module_2.pptx
ENSA_Module_2.pptxENSA_Module_2.pptx
ENSA_Module_2.pptxserieux1
 
CCNA3 Verson6 Chapter8
CCNA3 Verson6 Chapter8CCNA3 Verson6 Chapter8
CCNA3 Verson6 Chapter8Chaing Ravuth
 
ENSA_Module_2 Packet Tracer - Single-Area OSPFv2 Configuration
ENSA_Module_2 Packet Tracer - Single-Area OSPFv2 ConfigurationENSA_Module_2 Packet Tracer - Single-Area OSPFv2 Configuration
ENSA_Module_2 Packet Tracer - Single-Area OSPFv2 Configurationkecatem465
 
CCNA Discovery 3 - Chapter 6
CCNA Discovery 3 - Chapter 6CCNA Discovery 3 - Chapter 6
CCNA Discovery 3 - Chapter 6Irsandi Hasan
 
CCNAS :Multi Area OSPF
CCNAS :Multi Area OSPFCCNAS :Multi Area OSPF
CCNAS :Multi Area OSPFrooree29
 
CCNA3 Verson6 Chapter10
CCNA3 Verson6 Chapter10CCNA3 Verson6 Chapter10
CCNA3 Verson6 Chapter10Chaing Ravuth
 
Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11Sachii Dosti
 
Configurasi ospf
Configurasi ospfConfigurasi ospf
Configurasi ospfamri am
 
Exploration routing chapter_11
Exploration routing chapter_11Exploration routing chapter_11
Exploration routing chapter_11Joshua Torres
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 8
CCNA (R & S) Module 04 - Scaling Networks - Chapter 8CCNA (R & S) Module 04 - Scaling Networks - Chapter 8
CCNA (R & S) Module 04 - Scaling Networks - Chapter 8Waqas Ahmed Nawaz
 

Similar to Chapter5 adjust and troubleshoot single area ospf (20)

Ospf
OspfOspf
Ospf
 
CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8
 
CCNAv5 - S2: Chapter 8 single area ospf
CCNAv5 - S2: Chapter 8 single area ospfCCNAv5 - S2: Chapter 8 single area ospf
CCNAv5 - S2: Chapter 8 single area ospf
 
Chapter 08 - Single-Area OSPF
Chapter 08 - Single-Area OSPFChapter 08 - Single-Area OSPF
Chapter 08 - Single-Area OSPF
 
Chapter 19 : single-area ospf
Chapter 19 : single-area ospfChapter 19 : single-area ospf
Chapter 19 : single-area ospf
 
RS_InstructorPPT_Chapter8.pptx
RS_InstructorPPT_Chapter8.pptxRS_InstructorPPT_Chapter8.pptx
RS_InstructorPPT_Chapter8.pptx
 
ENSA_Module_2.pptx
ENSA_Module_2.pptxENSA_Module_2.pptx
ENSA_Module_2.pptx
 
ENSA_Module_2.pptx
ENSA_Module_2.pptxENSA_Module_2.pptx
ENSA_Module_2.pptx
 
CCNA3 Verson6 Chapter8
CCNA3 Verson6 Chapter8CCNA3 Verson6 Chapter8
CCNA3 Verson6 Chapter8
 
ENSA_Module_2 Packet Tracer - Single-Area OSPFv2 Configuration
ENSA_Module_2 Packet Tracer - Single-Area OSPFv2 ConfigurationENSA_Module_2 Packet Tracer - Single-Area OSPFv2 Configuration
ENSA_Module_2 Packet Tracer - Single-Area OSPFv2 Configuration
 
CCNA Discovery 3 - Chapter 6
CCNA Discovery 3 - Chapter 6CCNA Discovery 3 - Chapter 6
CCNA Discovery 3 - Chapter 6
 
CCNAS :Multi Area OSPF
CCNAS :Multi Area OSPFCCNAS :Multi Area OSPF
CCNAS :Multi Area OSPF
 
CCNA3 Verson6 Chapter10
CCNA3 Verson6 Chapter10CCNA3 Verson6 Chapter10
CCNA3 Verson6 Chapter10
 
OSPF v3
OSPF v3OSPF v3
OSPF v3
 
Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11
 
Day 12.2 enablingospf
Day 12.2 enablingospfDay 12.2 enablingospf
Day 12.2 enablingospf
 
Configurasi ospf
Configurasi ospfConfigurasi ospf
Configurasi ospf
 
Exploration routing chapter_11
Exploration routing chapter_11Exploration routing chapter_11
Exploration routing chapter_11
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 8
CCNA (R & S) Module 04 - Scaling Networks - Chapter 8CCNA (R & S) Module 04 - Scaling Networks - Chapter 8
CCNA (R & S) Module 04 - Scaling Networks - Chapter 8
 
CCNP ROUTE V7 CH3
CCNP ROUTE V7 CH3CCNP ROUTE V7 CH3
CCNP ROUTE V7 CH3
 

More from Vuz Dở Hơi

Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.Vuz Dở Hơi
 
Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.Vuz Dở Hơi
 
Cehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL InjectionCehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL InjectionVuz Dở Hơi
 
Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.Vuz Dở Hơi
 
Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.Vuz Dở Hơi
 
Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.Vuz Dở Hơi
 
Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.Vuz Dở Hơi
 
Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.Vuz Dở Hơi
 
Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.Vuz Dở Hơi
 
Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.Vuz Dở Hơi
 
Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.Vuz Dở Hơi
 
Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.Vuz Dở Hơi
 
Cehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: EnumerationCehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: EnumerationVuz Dở Hơi
 
Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.Vuz Dở Hơi
 
Cehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and ReconnaissanceCehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and ReconnaissanceVuz Dở Hơi
 
Cehv8 - Labs Module 00
Cehv8 - Labs Module 00Cehv8 - Labs Module 00
Cehv8 - Labs Module 00Vuz Dở Hơi
 
Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.Vuz Dở Hơi
 
Cehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testingCehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testingVuz Dở Hơi
 
Cehv8 - Module 19: Cryptography
Cehv8 - Module 19: CryptographyCehv8 - Module 19: Cryptography
Cehv8 - Module 19: CryptographyVuz Dở Hơi
 

More from Vuz Dở Hơi (20)

Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
 
Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.
 
Cehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL InjectionCehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL Injection
 
Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.
 
Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.
 
Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.
 
Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.
 
Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.
 
Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.
 
Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.
 
Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.
 
Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.
 
Cehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: EnumerationCehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: Enumeration
 
Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.
 
Cehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and ReconnaissanceCehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and Reconnaissance
 
Cehv8 - Labs Module 00
Cehv8 - Labs Module 00Cehv8 - Labs Module 00
Cehv8 - Labs Module 00
 
Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.
 
Cehv8 - references
Cehv8 - referencesCehv8 - references
Cehv8 - references
 
Cehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testingCehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testing
 
Cehv8 - Module 19: Cryptography
Cehv8 - Module 19: CryptographyCehv8 - Module 19: Cryptography
Cehv8 - Module 19: Cryptography
 

Recently uploaded

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 

Recently uploaded (20)

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 

Chapter5 adjust and troubleshoot single area ospf

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 5: Adjust and Troubleshoot Single- Area OSPF Scaling Networks
  • 2. Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 5 5.0 Introduction 5.1 Advanced Single-Area OSPF Implementations 5.2 Troubleshooting Single-Area OSPF Implementations 5.3 Summary
  • 3. Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 5: Objectives
  • 4. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4 5.1 Advanced Single-Area OSPF Configurations
  • 5. Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Routing in the Distribution and Core Layers Routing versus Switching  Switches, link aggregation, LAN redundancy and wireless LANs are all technologies that provide or enhance user access to network resources.  Scalable networks also require optimal reachability between sites. Remote network reachability is provided by routers and Layer 3 switches which operate in the distribution and core layers.
  • 6. Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Routing in the Distribution and Core Layers Static Routing
  • 7. Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Routing in the Distribution and Core Layers Dynamic Routing Protocols
  • 8. Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Routing in the Distribution and Core Layers Configuring Single-Area OSPF
  • 9. Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Routing in the Distribution and Core Layers Verifying Single-Area OSPF
  • 10. Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Routing in the Distribution and Core Layers Verifying Single-Area OSPF (cont.)
  • 11. Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Routing in the Distribution and Core Layers Verifying Single-Area OSPF (cont.)
  • 12. Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Routing in the Distribution and Core Layers Configuring Single-Area OSPFv3
  • 13. Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Routing in the Distribution and Core Layers Verifying Single-Area OSPFv3
  • 14. Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Routing in the Distribution and Core Layers Verifying Single-Area OSPFv3 (cont.)
  • 15. Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF in Multiaccess Networks OSPF Network Types  Point-to-point – Two routers interconnected over a common link. Often the configuration in WAN links.  Broadcast Multiaccess – Multiple routers interconnected over an Ethernet network.  Non-broadcast Multiaccess (NBMA) – Multiple routers interconnected in a network that does not allow broadcasts, such as Frame Relay.  Point-to-multipoint – Multiple routers interconnected in a hub- and-spoke topology over an NBMA network.  Virtual links – Special OSPF network used to interconnect distant OSPF areas to the backbone area.
  • 16. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF in Multiaccess Networks Challenges in Multiaccess Networks Multiaccess networks can create two challenges for OSPF:  Creation of multiple adjacencies – creating adjacencies with multiple routers would lead to an excessive number of LSAs being exchanged.  Extensive flooding of LSAs – Link-state routers flood the network when OSPF is initialized or when there is a change. • Formula used to calculate the number of required adjacencies n(n-1)/2 • A topology of 4 routers would result in 4(4-1)/2 = 6
  • 17. Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF in Multiaccess Networks OSPF Designated Router  The designated router (DR) is the solution to managing adjacencies and flooding of LSAs on a multiaccess network.  The backup designated router (BDR) is elected in case the DR fails.  All other non-DR and non-BDR routers become DROTHERs. DROTHERs only form adjacencies with the DR and BDR.  DROTHERs only send their LSAs to the DR and BDR using the multicast address 224.0.0.6.  DR uses the multicast address 224.0.0.5 to send LSAs to all other routers. DR only router flooding LSAs.  DR/BDR Elections only necessary on multiaccess networks.
  • 18. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF in Multiaccess Networks OSPF Designated Router (cont.)
  • 19. Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF in Multiaccess Networks Verifying DR/BDR Roles
  • 20. Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF in Multiaccess Networks Verifying DR/BDR Adjacencies State of neighbors in multiaccess networks can be:  FULL/DROTHER – This is a DR or BDR router that is fully adjacent with a non-DR or BDR router.  FULL/DR – The router is fully adjacent with the indicated DR neighbor.  FULL/BDR – The router is fully adjacent with the indicated BDR neighbor.  2-WAY/DROTHER – The non-DR or BDR router has a neighbor adjacency with another non-DR or BDR router.
  • 21. Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF in Multiaccess Networks Default DR/BDR Election Process  The router with the highest interface priority is elected as the DR.  The router with the second highest interface priority is elected as the BDR.  Priority can be configured between 0-255. (Priority of 0 - router cannot become the DR. 0  If interface priorities are equal, then the router with highest router ID is elected DR and second highest the BDR  Three ways to determine router ID: • Router ID can be manually configured. • If not configured, the ID determined by the highest loopback IP address. • If no loopbacks, the ID is determined by the highest active IPv4 address.  In an IPv6 network, the router ID must be configured manually.
  • 22. Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF in Multiaccess Networks DR/BDR Election Process DR remains the DR until one of the following occurs:  The DR fails.  The OSPF process on the DR fails or is stopped.  The multiaccess interface on the DR fails or is shutdown. If the DR fails, the BDR is automatically promoted to DR.  There is then a new BDR election and the DROTHER with the higher priority or router ID is elected as the new BDR.
  • 23. Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF in Multiaccess Networks The OSPF Priority  Instead of setting the router ID on all routers, it is better to control the election by setting interface priorities. • To change the priority, use one of the following commands: ip ospf priority value (OSPFv2 interface command) ipv6 ospf priority value (OSPFv3 interface command)  To begin another OSPF election, use one of the following methods: • Shutdown the router interfaces and then re-enable them starting with the DR, then the BDR, and then all other routers. • Reset the OSPF process using the clear ip ospf process privileged EXEC mode command on all routers.
  • 24. Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Default Route Propagation Propagating a Default Static Route in OSPFv2 The router connected to the Internet that is used to propagate a default route is often called the edge, entrance or gateway router. In an OSPF network, it may also be call the autonomous system boundary router (ASBR).
  • 25. Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Default Route Propagation Verifying the Propagated Default Route
  • 26. Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Default Route Propagation Propagating a Default Static Route in OSPFv3 Verifying the propagated IPv6 default Route Enabling OSPFv3 on the R1 Interfaces
  • 27. Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fine-tuning OSPF Interfaces OSPF Hello and Dead Intervals OSPF Hello and Dead intervals must match, or a neighbor adjacency will not occur.
  • 28. Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fine-tuning OSPF Interfaces Modifying OSPF Intervals  Modifying OSPFv2 Intervals  Modifying OSPFv3 Intervals  Verifying the OSPFv3 interface intervals
  • 29. Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Secure OSPF Secure Routing Updates  When neighbor authentication has been configured on a router, the router authenticates the source of each routing update packet that it receives.  An authenticating key that is known to both the sending and the receiving route is exchanged.  OSPF supports three types of authentication: • Null – no authentication. • Simple password authentication – the password in the update is sent in plaintext over the network (outdated method). • MD5 authentication – Most secure and recommended method of authentication. Password is calculated using the MD5 algorithm.
  • 30. Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Secure OSPF MD5 Authentication
  • 31. Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Secure OSPF Configuring OSPF MD5 Authentication  MD5 authentication can be enabled globally for all interfaces or on a per-interface basis.  To enable OSPF MD5 authentication globally, configure: • ip ospf message-digest-key key md5 password (interface configuration command) • area area-id authentication message-digest (router configuration command)  To enable MD5 authentication on a per-interface basis, configure: • ip ospf message-digest-key key md5 password (interface configuration command) • ip ospf authentication message-digest (interface configuration command)
  • 32. Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Secure OSPF OSPF MD5 Authentication Example continued
  • 33. Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Secure OSPF OSPF MD5 Authentication Example (cont.)
  • 34. Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Secure OSPF Verifying OSPF MD5 Authentication
  • 35. Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Secure OSPF Verifying OSPF MD5 Authentication (cont.)
  • 36. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 36 5.2 Troubleshooting Single-Area OSPF Implementations
  • 37. Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Components of Troubleshooting Single-Area OSPF Forming OSPF Adjacencies
  • 38. Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Components of Troubleshooting Single-Area OSPF Transitioning via OSPF States The router should not remain in any states other than FULL or 2Way for extended periods of time.
  • 39. Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Components of Troubleshooting Single-Area OSPF OSPF Troubleshooting Commands  show ip protocols – Verifies vital OSPF configuration information.  show ip ospf neighbor – Verifies that the router has formed an adjacency with its neighboring routers.  show ip ospf interface – Displays the OSPF parameters configured on an interface, such as the OSPF process ID.  show ip ospf – Examines the OSPF process ID and router ID.  show ip route ospf – Displays only the OSPF learned routes in the routing table.  clear ip ospf [process-id] process – Resets the OSPFv2 neighbor adjacencies.
  • 40. Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Components of Troubleshooting Single-Area OSPF Components of Troubleshooting OSPF
  • 41. Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshoot Single-Area OSPFv2 Routing Issues Troubleshooting Neighbor Issues  Verify active OSPF interfaces using the show ip ospf interface command.  Verify the OSPF settings using the show ip protocols command.  Disable the interface as passive using the no passive-interface command.  Verify routes using the show ip route command.
  • 42. Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshoot Single-Area OSPFv2 Routing Issues Troubleshooting OSPF Routing Table Issues  The show ip protocols command verifies networks that are advertised in OSPF.  For an interface to be enabled for OSPF, a matching network command must be configured under the OSPF routing process.  Use the show ip route command to verify routes in a routing table.  Use the show ip protocols command to verify that a route is being advertised.
  • 43. Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshoot Single-Area OSPFv3 Routing Issues OSPFv3 Troubleshooting Commands  show ipv6 protocols – Verifies vital OSPFv3 configuration information.  show ipv6 ospf neighbor – Verifies that the router has formed an adjacency with its neighboring routers.  show ipv6 ospf interface – Displays the OSPFv3 parameters configured on an interface.  show ipv6 ospf – Examines the OSPFv3 process ID and router ID.  show ipv6 route ospf – Displays only the OSPFv3 learned routes in the routing table.  clear ipv6 ospf [process-id] process – Resets the OSPFv3 neighbor adjacencies.
  • 44. Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 5: Summary  OSPF defines five network types: point-to-point, broadcast multiaccess, NBMA, point-to-multipoint, and virtual links.  The DR and BDR are elected to overcome challenges of flooding in an OSPF network.  The routers in the network elect the router with the highest interface priority as DR. The router with the second highest interface priority is elected as the BDR.  If all priorities are equal, the router with the highest ID is elected DR and the second highest ID becomes the BDR.  To propagate a default route in OSPF, the ASBR must be configured with a default static route and the default-information originate command.  Verify routes with the show ip route or show ipv6 route command.
  • 45. Presentation_ID 45© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 5: Summary (cont.)  For OSPF to make a correct path determination, it may be necessary to adjust the default interface bandwidth.  To adjust the reference bandwidth, use the auto-cost reference- bandwidth Mbps router configuration mode command.  To adjust the interface bandwidth, use the bandwidth kilobits interface configuration mode command.  The OSPF Hello and Dead intervals must match or a neighbor adjacency does not occur.  OSPF supports three types of authentication: null, simple password authentication, and MD5 authentication.  When troubleshooting OSPF neighbors, be aware that the FULL or 2WAY states are normal.
  • 46. Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 5: Summary (cont.)  Troubleshooting commands: show ip protocols, show ip ospf neighbor, show ip ospf interface, show ip ospf  Troubleshooting OSPFv3 commands: show ipv6 protocols, show ipv6 ospf neighbor, show ipv6 ospf interface, show ipv6 ospf, show ipv6 route ospf, and clear ipv6 ospf [process-id] process
  • 47. Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential