SlideShare a Scribd company logo
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Chapter 6: Multiarea OSPF
Scaling Networks
Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 6
6.0 Introduction
6.1 Multiarea OSPF
6.2 Configuring Multiarea OSPF
6.3 Summary
Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 6: Objectives
After completing this chapter, students will be able to:
 Explain why multiarea OSPF is used.
 Explain how multiarea OSPF uses link-state advertisements in order
to maintain routing tables.
 Explain how OSPF established neighbor adjacencies in a multiarea
OSPF implementation.
 Configure multiarea OSPFv2 in a routed network.
 Configure multiarea route summarization in a routed network.
 Verify multiarea OSPFv2 operations.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4
6.1 Multiarea OSPF
Operation
Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Why Multiarea OSPF?
Single-Area OSPF
Single-area OSPF is useful in smaller networks. If an area becomes
too big, the following issues must be addressed:
 Large routing table (no summarization by default)
 Large link-state database (LSDB)
 Frequent SPF algorithm calculations
Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Why Multiarea OSPF?
Multiarea OSPF
Multiarea OSPF requires a hierarchical network design and the
main area is called the backbone area, or area 0, and all other
areas must connect to the backbone area.
Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Why Multiarea OSPF?
OSPF Two-Layer Area Hierarchy
Multiarea OSPF is implemented in a two-layer area hierarchy:
 Backbone (transit) area
 Area whose primary function is the fast and efficient movement
of IP packets.
 Interconnects with other OSPF area types.
 Called OSPF area 0, to which all other areas directly connect.
 Regular (nonbackbone) area
 Connects users and resources.
 A regular area does not allow traffic from another area to use
its links to reach other areas.
Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Why Multiarea OSPF?
Types of OSPF Routers
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Why Multiarea OSPF?
Types of OSPF Routers (cont.)
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Why Multiarea OSPF?
Types of OSPF Routers (cont.)
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Why Multiarea OSPF?
Types of OSPF Routers (cont.)
Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Multiarea OSPF LSA Operation
OSPF LSA Types
Most common and covered in this course – 1 thru 5
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Multiarea OSPF LSA Operation
OSPF LSA Type 1
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Multiarea OSPF LSA Operation
OSPF LSA Type 2
Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Multiarea OSPF LSA Operation
OSPF LSA Type 3
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Multiarea OSPF LSA Operation
OSPF LSA Type 4
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Multiarea OSPF LSA Operation
OSPF LSA Type 5
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF Routing Tables and Route Types
OSPF Routing Table Entries
 O – Router (type 1) and
network (type 2) LSAs
describe the details
within an area (the route
is intra-area).
 O IA – Summary LSAs
appear in the routing
table as IA (interarea
routes)
 O E1 or OE 2 – External
LSAs external type 1
(E1) or external type 2
(E2) routes
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF Routing Tables and Route Types
OSPF Routing Table Entries (cont.)
 O – Router (type 1) and
network (type 2) LSAs
describe the details
within an area (the route
is intra-area)
 O IA – Summary LSAs
appear in the routing
table as IA (interarea
routes)
 O E1 or OE 2 – External
LSAs external type 1
(E1) or external type 2
(E2) routes
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF Routing Tables and Route Types
OSPF Route Calculation
1. All routers calculate the
best paths to destinations
within their area (intra-
area) and add these
entries to the routing table.
2. All routers calculate the
best paths to the other
areas within the
internetwork (interarea) or
type 3 and type 4 LSAs.
3. All routers calculate the
best paths to the external
autonomous system (type
5) destinations. These are
noted with either an O E1
or an O E2 route
designator.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 21
6.2 Configuring Multiarea
OSPF
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring Multiarea OSPF
Implementing Multiarea OSPF
Implementation Plan Steps
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring Multiarea OSPF
Configuring Multiarea OSPF
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring Multiarea OSPF
Configuring Multiarea OSPFv3
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF Route Summarization
OSPF Route Summarization
 R1 forwards a
summary LSA to
the core router
C1.
 C1, in turn,
forwards the
summary LSA to
R2 and R3.
 R2 and R3 then
forward it to their
respective internal
routers.
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF Route Summarization
Interarea and External Route Summarization
Occurs on ABRs and applies to routes from within each area
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF Route Summarization
Interarea and External Route Summarization
(cont.)
Specific to external routes that are injected into OSPF via route
redistribution; ASBRs summarize external routes
Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF Route Summarization
Interarea Route Summarization
Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF Route Summarization
Interarea Route Summarization (cont.)
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF Route Summarization
Calculating the Summary Route
2
Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF Route Summarization
Configuring Interarea Route Summarization
R3
R1
Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Verifying Multiarea OSPF
Verifying Multiarea OSPF
The same verification commands are used to verify single-area
OSPF and can be used to verify multiarea OSPF:
 show ip ospf neighbor
 show ip ospf
 show ip ospf interface
Commands specific to multiarea information include:
 show ip protocols
 show ip ospf interface brief
 show ip route ospf
 show ip ospf database
Note: For OSPFv3, substitute ip with ipv6.
Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Verifying Multiarea OSPF
Verifying General Multiarea OSPF Settings
Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Verifying Multiarea OSPF
Verify the OSPF Routes
Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Verifying Multiarea OSPF
Verifying the Multiarea OSPF LSDB
Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Verifying Multiarea OSPF
Verifying Multiarea OSPFv3
Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Verifying Multiarea OSPF
Verifying Multiarea OSPFv3 (cont.)
Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Verifying Multiarea OSPF
Verifying Multiarea OSPFv3 (cont.)
Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 6: Summary
Multiarea OSPF Summary
 Better choice for larger networks than single-area.
 Solves the issues of large routing table, large LSDB, and frequent
SPF algorithm calculations.
 Main area is called the backbone area, or area 0.
 Recalculating the database is kept within an area.
 Four different types of OSPF routers:
 Internal router
 Backbone router
 ABR
 ASBR
 A router simply becomes an ABR when it has two network
statements in different areas.
Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 6: Summary
Multiarea OSPF Summary (cont.)
 Link-state advertisements (LSAs) are the building blocks of OSPF.
 Type 1 LSAs are referred to as the router link entries.
 Type 2 LSAs are referred to as the network link entries and are
flooded by a DR.
 Type 3 LSAs are referred to as the summary link entries and are
created and propagated by ABRs.
 A type 4 summary LSA is generated by an ABR only when an
ASBR exists within an area.
 Type 5 external LSAs describe routes to networks outside the
OSPF autonomous system, originated by the ASBR and are
flooded to the entire autonomous system.
 SPF tree is used to determine the best paths.
 OSPF routes in an IPv4 routing table are identified using the
following descriptors: O, O IA, O E1, or O E2.
Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 6: Summary
Multiarea OSPF Summary (cont.)
 The following example displays a multiarea OSPF configuration:
R1(config)# router ospf 10
R1(config-router)# router-id 1.1.1.1
R1(config-router)# network 10.1.1.1 0.0.0.0 area 1
R1(config-router)# network 10.1.2.1 0.0.0.0 area 1
R1(config-router)# network 192.168.10.1 0.0.0.0 area 0
 Does not perform autosummarization, but can be manually configured
using the summary-address address mask router configuration
mode command
Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 6: Summary
Multiarea OSPF Summary (cont.)
 The following commands are used to verify OSPF configurations:
 show ip ospf neighbor
 show ip ospf
 show ip ospf interface
 show ip protocols
 show ip ospf interface brief
 show ip route ospf
 show ip ospf database
Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

More Related Content

What's hot

CCNP Switching Chapter 5
CCNP Switching Chapter 5CCNP Switching Chapter 5
CCNP Switching Chapter 5
Chaing Ravuth
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6
Nil Menon
 
CCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan RoutingCCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan Routing
Vuz Dở Hơi
 
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7
Nil Menon
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
Muuluu
 
Configuracion y conceptos basicos de switch
Configuracion y conceptos basicos de switchConfiguracion y conceptos basicos de switch
Configuracion y conceptos basicos de switch
jesalvatierra
 
CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6
Nil Menon
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10
Nil Menon
 
CCNAv5 - S2: Chapter 6 Static Routing
CCNAv5 - S2: Chapter 6 Static RoutingCCNAv5 - S2: Chapter 6 Static Routing
CCNAv5 - S2: Chapter 6 Static Routing
Vuz Dở Hơi
 
Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)
Peter R. Egli
 
CCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 VlansCCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 Vlans
Vuz Dở Hơi
 
Cisco Live Milan 2015 - BGP advance
Cisco Live Milan 2015 - BGP advanceCisco Live Milan 2015 - BGP advance
Cisco Live Milan 2015 - BGP advance
Bertrand Duvivier
 
CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8
Nil Menon
 
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationCCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
Vuz Dở Hơi
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1
Chaing Ravuth
 
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2
Nil Menon
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
Irsandi Hasan
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11
Nil Menon
 
HSRP ccna
HSRP ccna HSRP ccna
HSRP ccna
MohamedJafar5
 
Cisco IPv6 Tutorial
Cisco IPv6 TutorialCisco IPv6 Tutorial
Cisco IPv6 Tutorial
kriz5
 

What's hot (20)

CCNP Switching Chapter 5
CCNP Switching Chapter 5CCNP Switching Chapter 5
CCNP Switching Chapter 5
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6
 
CCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan RoutingCCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan Routing
 
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
 
Configuracion y conceptos basicos de switch
Configuracion y conceptos basicos de switchConfiguracion y conceptos basicos de switch
Configuracion y conceptos basicos de switch
 
CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10
 
CCNAv5 - S2: Chapter 6 Static Routing
CCNAv5 - S2: Chapter 6 Static RoutingCCNAv5 - S2: Chapter 6 Static Routing
CCNAv5 - S2: Chapter 6 Static Routing
 
Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)
 
CCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 VlansCCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 Vlans
 
Cisco Live Milan 2015 - BGP advance
Cisco Live Milan 2015 - BGP advanceCisco Live Milan 2015 - BGP advance
Cisco Live Milan 2015 - BGP advance
 
CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8
 
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationCCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1
 
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11
 
HSRP ccna
HSRP ccna HSRP ccna
HSRP ccna
 
Cisco IPv6 Tutorial
Cisco IPv6 TutorialCisco IPv6 Tutorial
Cisco IPv6 Tutorial
 

Similar to CCNAv5 - S3: Chapter6 Multiarea OSPF

CCNAv5 - S2: Chapter 8 single area ospf
CCNAv5 - S2: Chapter 8 single area ospfCCNAv5 - S2: Chapter 8 single area ospf
CCNAv5 - S2: Chapter 8 single area ospf
Vuz Dở Hơi
 
Chapter 08 - Single-Area OSPF
Chapter 08 - Single-Area OSPFChapter 08 - Single-Area OSPF
Chapter 08 - Single-Area OSPF
Yaser Rahmati
 
Chapter 19 : single-area ospf
Chapter 19 : single-area ospfChapter 19 : single-area ospf
Chapter 19 : single-area ospf
teknetir
 
RS_InstructorPPT_Chapter8.pptx
RS_InstructorPPT_Chapter8.pptxRS_InstructorPPT_Chapter8.pptx
RS_InstructorPPT_Chapter8.pptx
jagali
 
Ospf
OspfOspf
Chapter5 adjust and troubleshoot single area ospf
Chapter5 adjust and troubleshoot single area ospfChapter5 adjust and troubleshoot single area ospf
Chapter5 adjust and troubleshoot single area ospf
Vuz Dở Hơi
 
Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11Sachii Dosti
 
Week9(1)
Week9(1)Week9(1)
Week9(1)
trayyoo
 
ENSA_Module_1.pptx
ENSA_Module_1.pptxENSA_Module_1.pptx
ENSA_Module_1.pptx
serieux1
 
CCNA Discovery 3 - Chapter 6
CCNA Discovery 3 - Chapter 6CCNA Discovery 3 - Chapter 6
CCNA Discovery 3 - Chapter 6Irsandi Hasan
 
CCNP ROUTE V7 CH3
CCNP ROUTE V7 CH3CCNP ROUTE V7 CH3
CCNP ROUTE V7 CH3
Chaing Ravuth
 
CCNA3 Verson6 Chapter9
CCNA3 Verson6 Chapter9CCNA3 Verson6 Chapter9
CCNA3 Verson6 Chapter9
Chaing Ravuth
 
CCNP v6 Route: Implementing IP Routing Chapter 3
CCNP v6 Route: Implementing IP Routing Chapter 3CCNP v6 Route: Implementing IP Routing Chapter 3
CCNP v6 Route: Implementing IP Routing Chapter 3
Andy Juan Sarango Veliz
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
Irsandi Hasan
 
Exploration routing chapter_11
Exploration routing chapter_11Exploration routing chapter_11
Exploration routing chapter_11Joshua Torres
 
CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11Irsandi Hasan
 
CCNA3 Verson6 Chapter8
CCNA3 Verson6 Chapter8CCNA3 Verson6 Chapter8
CCNA3 Verson6 Chapter8
Chaing Ravuth
 
KPUCC-Rs instructor ppt_chapter6_final
KPUCC-Rs instructor ppt_chapter6_finalKPUCC-Rs instructor ppt_chapter6_final
KPUCC-Rs instructor ppt_chapter6_final
Fisal Anwari
 

Similar to CCNAv5 - S3: Chapter6 Multiarea OSPF (20)

CCNAv5 - S2: Chapter 8 single area ospf
CCNAv5 - S2: Chapter 8 single area ospfCCNAv5 - S2: Chapter 8 single area ospf
CCNAv5 - S2: Chapter 8 single area ospf
 
Chapter 08 - Single-Area OSPF
Chapter 08 - Single-Area OSPFChapter 08 - Single-Area OSPF
Chapter 08 - Single-Area OSPF
 
Chapter 19 : single-area ospf
Chapter 19 : single-area ospfChapter 19 : single-area ospf
Chapter 19 : single-area ospf
 
RS_InstructorPPT_Chapter8.pptx
RS_InstructorPPT_Chapter8.pptxRS_InstructorPPT_Chapter8.pptx
RS_InstructorPPT_Chapter8.pptx
 
Ospf
OspfOspf
Ospf
 
Chapter5 adjust and troubleshoot single area ospf
Chapter5 adjust and troubleshoot single area ospfChapter5 adjust and troubleshoot single area ospf
Chapter5 adjust and troubleshoot single area ospf
 
Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11
 
Week9(1)
Week9(1)Week9(1)
Week9(1)
 
ENSA_Module_1.pptx
ENSA_Module_1.pptxENSA_Module_1.pptx
ENSA_Module_1.pptx
 
CCNA Discovery 3 - Chapter 6
CCNA Discovery 3 - Chapter 6CCNA Discovery 3 - Chapter 6
CCNA Discovery 3 - Chapter 6
 
CCNP ROUTE V7 CH3
CCNP ROUTE V7 CH3CCNP ROUTE V7 CH3
CCNP ROUTE V7 CH3
 
CCNA3 Verson6 Chapter9
CCNA3 Verson6 Chapter9CCNA3 Verson6 Chapter9
CCNA3 Verson6 Chapter9
 
CCCNP ROUTE v6_ch03
CCCNP ROUTE v6_ch03CCCNP ROUTE v6_ch03
CCCNP ROUTE v6_ch03
 
CCNP v6 Route: Implementing IP Routing Chapter 3
CCNP v6 Route: Implementing IP Routing Chapter 3CCNP v6 Route: Implementing IP Routing Chapter 3
CCNP v6 Route: Implementing IP Routing Chapter 3
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
 
Exploration routing chapter_11
Exploration routing chapter_11Exploration routing chapter_11
Exploration routing chapter_11
 
CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11
 
Ospf.ppt
Ospf.pptOspf.ppt
Ospf.ppt
 
CCNA3 Verson6 Chapter8
CCNA3 Verson6 Chapter8CCNA3 Verson6 Chapter8
CCNA3 Verson6 Chapter8
 
KPUCC-Rs instructor ppt_chapter6_final
KPUCC-Rs instructor ppt_chapter6_finalKPUCC-Rs instructor ppt_chapter6_final
KPUCC-Rs instructor ppt_chapter6_final
 

More from Vuz Dở Hơi

Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.
Vuz Dở Hơi
 
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Vuz Dở Hơi
 
Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.
Vuz Dở Hơi
 
Cehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL InjectionCehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL Injection
Vuz Dở Hơi
 
Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.
Vuz Dở Hơi
 
Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.
Vuz Dở Hơi
 
Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.
Vuz Dở Hơi
 
Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.
Vuz Dở Hơi
 
Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.
Vuz Dở Hơi
 
Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.
Vuz Dở Hơi
 
Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.
Vuz Dở Hơi
 
Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.
Vuz Dở Hơi
 
Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.
Vuz Dở Hơi
 
Cehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: EnumerationCehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: Enumeration
Vuz Dở Hơi
 
Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.
Vuz Dở Hơi
 
Cehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and ReconnaissanceCehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and Reconnaissance
Vuz Dở Hơi
 
Cehv8 - Labs Module 00
Cehv8 - Labs Module 00Cehv8 - Labs Module 00
Cehv8 - Labs Module 00
Vuz Dở Hơi
 
Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.
Vuz Dở Hơi
 
Cehv8 - references
Cehv8 - referencesCehv8 - references
Cehv8 - references
Vuz Dở Hơi
 
Cehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testingCehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testing
Vuz Dở Hơi
 

More from Vuz Dở Hơi (20)

Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.
 
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
 
Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.
 
Cehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL InjectionCehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL Injection
 
Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.
 
Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.
 
Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.
 
Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.
 
Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.
 
Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.
 
Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.
 
Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.
 
Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.
 
Cehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: EnumerationCehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: Enumeration
 
Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.
 
Cehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and ReconnaissanceCehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and Reconnaissance
 
Cehv8 - Labs Module 00
Cehv8 - Labs Module 00Cehv8 - Labs Module 00
Cehv8 - Labs Module 00
 
Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.
 
Cehv8 - references
Cehv8 - referencesCehv8 - references
Cehv8 - references
 
Cehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testingCehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testing
 

Recently uploaded

Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 

Recently uploaded (20)

Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 

CCNAv5 - S3: Chapter6 Multiarea OSPF

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 6: Multiarea OSPF Scaling Networks
  • 2. Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 6 6.0 Introduction 6.1 Multiarea OSPF 6.2 Configuring Multiarea OSPF 6.3 Summary
  • 3. Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 6: Objectives After completing this chapter, students will be able to:  Explain why multiarea OSPF is used.  Explain how multiarea OSPF uses link-state advertisements in order to maintain routing tables.  Explain how OSPF established neighbor adjacencies in a multiarea OSPF implementation.  Configure multiarea OSPFv2 in a routed network.  Configure multiarea route summarization in a routed network.  Verify multiarea OSPFv2 operations.
  • 4. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4 6.1 Multiarea OSPF Operation
  • 5. Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Why Multiarea OSPF? Single-Area OSPF Single-area OSPF is useful in smaller networks. If an area becomes too big, the following issues must be addressed:  Large routing table (no summarization by default)  Large link-state database (LSDB)  Frequent SPF algorithm calculations
  • 6. Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Why Multiarea OSPF? Multiarea OSPF Multiarea OSPF requires a hierarchical network design and the main area is called the backbone area, or area 0, and all other areas must connect to the backbone area.
  • 7. Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Why Multiarea OSPF? OSPF Two-Layer Area Hierarchy Multiarea OSPF is implemented in a two-layer area hierarchy:  Backbone (transit) area  Area whose primary function is the fast and efficient movement of IP packets.  Interconnects with other OSPF area types.  Called OSPF area 0, to which all other areas directly connect.  Regular (nonbackbone) area  Connects users and resources.  A regular area does not allow traffic from another area to use its links to reach other areas.
  • 8. Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Why Multiarea OSPF? Types of OSPF Routers
  • 9. Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Why Multiarea OSPF? Types of OSPF Routers (cont.)
  • 10. Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Why Multiarea OSPF? Types of OSPF Routers (cont.)
  • 11. Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Why Multiarea OSPF? Types of OSPF Routers (cont.)
  • 12. Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Multiarea OSPF LSA Operation OSPF LSA Types Most common and covered in this course – 1 thru 5
  • 13. Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Multiarea OSPF LSA Operation OSPF LSA Type 1
  • 14. Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Multiarea OSPF LSA Operation OSPF LSA Type 2
  • 15. Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Multiarea OSPF LSA Operation OSPF LSA Type 3
  • 16. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Multiarea OSPF LSA Operation OSPF LSA Type 4
  • 17. Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Multiarea OSPF LSA Operation OSPF LSA Type 5
  • 18. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF Routing Tables and Route Types OSPF Routing Table Entries  O – Router (type 1) and network (type 2) LSAs describe the details within an area (the route is intra-area).  O IA – Summary LSAs appear in the routing table as IA (interarea routes)  O E1 or OE 2 – External LSAs external type 1 (E1) or external type 2 (E2) routes
  • 19. Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF Routing Tables and Route Types OSPF Routing Table Entries (cont.)  O – Router (type 1) and network (type 2) LSAs describe the details within an area (the route is intra-area)  O IA – Summary LSAs appear in the routing table as IA (interarea routes)  O E1 or OE 2 – External LSAs external type 1 (E1) or external type 2 (E2) routes
  • 20. Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF Routing Tables and Route Types OSPF Route Calculation 1. All routers calculate the best paths to destinations within their area (intra- area) and add these entries to the routing table. 2. All routers calculate the best paths to the other areas within the internetwork (interarea) or type 3 and type 4 LSAs. 3. All routers calculate the best paths to the external autonomous system (type 5) destinations. These are noted with either an O E1 or an O E2 route designator.
  • 21. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 21 6.2 Configuring Multiarea OSPF
  • 22. Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring Multiarea OSPF Implementing Multiarea OSPF Implementation Plan Steps
  • 23. Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring Multiarea OSPF Configuring Multiarea OSPF
  • 24. Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring Multiarea OSPF Configuring Multiarea OSPFv3
  • 25. Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF Route Summarization OSPF Route Summarization  R1 forwards a summary LSA to the core router C1.  C1, in turn, forwards the summary LSA to R2 and R3.  R2 and R3 then forward it to their respective internal routers.
  • 26. Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF Route Summarization Interarea and External Route Summarization Occurs on ABRs and applies to routes from within each area
  • 27. Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF Route Summarization Interarea and External Route Summarization (cont.) Specific to external routes that are injected into OSPF via route redistribution; ASBRs summarize external routes
  • 28. Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF Route Summarization Interarea Route Summarization
  • 29. Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF Route Summarization Interarea Route Summarization (cont.)
  • 30. Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF Route Summarization Calculating the Summary Route 2
  • 31. Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF Route Summarization Configuring Interarea Route Summarization R3 R1
  • 32. Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Verifying Multiarea OSPF Verifying Multiarea OSPF The same verification commands are used to verify single-area OSPF and can be used to verify multiarea OSPF:  show ip ospf neighbor  show ip ospf  show ip ospf interface Commands specific to multiarea information include:  show ip protocols  show ip ospf interface brief  show ip route ospf  show ip ospf database Note: For OSPFv3, substitute ip with ipv6.
  • 33. Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Verifying Multiarea OSPF Verifying General Multiarea OSPF Settings
  • 34. Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Verifying Multiarea OSPF Verify the OSPF Routes
  • 35. Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Verifying Multiarea OSPF Verifying the Multiarea OSPF LSDB
  • 36. Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Verifying Multiarea OSPF Verifying Multiarea OSPFv3
  • 37. Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Verifying Multiarea OSPF Verifying Multiarea OSPFv3 (cont.)
  • 38. Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Verifying Multiarea OSPF Verifying Multiarea OSPFv3 (cont.)
  • 39. Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 6: Summary Multiarea OSPF Summary  Better choice for larger networks than single-area.  Solves the issues of large routing table, large LSDB, and frequent SPF algorithm calculations.  Main area is called the backbone area, or area 0.  Recalculating the database is kept within an area.  Four different types of OSPF routers:  Internal router  Backbone router  ABR  ASBR  A router simply becomes an ABR when it has two network statements in different areas.
  • 40. Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 6: Summary Multiarea OSPF Summary (cont.)  Link-state advertisements (LSAs) are the building blocks of OSPF.  Type 1 LSAs are referred to as the router link entries.  Type 2 LSAs are referred to as the network link entries and are flooded by a DR.  Type 3 LSAs are referred to as the summary link entries and are created and propagated by ABRs.  A type 4 summary LSA is generated by an ABR only when an ASBR exists within an area.  Type 5 external LSAs describe routes to networks outside the OSPF autonomous system, originated by the ASBR and are flooded to the entire autonomous system.  SPF tree is used to determine the best paths.  OSPF routes in an IPv4 routing table are identified using the following descriptors: O, O IA, O E1, or O E2.
  • 41. Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 6: Summary Multiarea OSPF Summary (cont.)  The following example displays a multiarea OSPF configuration: R1(config)# router ospf 10 R1(config-router)# router-id 1.1.1.1 R1(config-router)# network 10.1.1.1 0.0.0.0 area 1 R1(config-router)# network 10.1.2.1 0.0.0.0 area 1 R1(config-router)# network 192.168.10.1 0.0.0.0 area 0  Does not perform autosummarization, but can be manually configured using the summary-address address mask router configuration mode command
  • 42. Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 6: Summary Multiarea OSPF Summary (cont.)  The following commands are used to verify OSPF configurations:  show ip ospf neighbor  show ip ospf  show ip ospf interface  show ip protocols  show ip ospf interface brief  show ip route ospf  show ip ospf database
  • 43. Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential