当前位置:网站首页>(open shortest path first, OSPF) expansion configuration
(open shortest path first, OSPF) expansion configuration
2022-07-21 15:24:00 【kaituozhizzz】
Default RIP and OSPF If the agreement is reissued at two points , Because of their different priorities , So the first one ASBR After the re release of the device , Will affect other ASBR Routing table of the device . So that the route may be returned to the source protocol , Routing feedback occurs ———A Reroute protocol to B After the agreement , It was republished back A agreement . Routing feedback may lead to poor routing and even the emergence of routing loops .
Huawei equipment in order to eliminate the phenomenon of routing feedback , He will be OSPF The priority of internally generated routes is defined as 10, The default priority of routes imported outside the domain is defined as 150.(150 The priority of is higher than that of all Huawei systems IGP Default priority of the protocol ). In this way, route feedback is eliminated .
Due to the seed metric problem of republishing Technology , Will inevitably lead to poor route selection ; We can only rely on the routing strategy to consider interference in routing .
Control layer flow : The routing protocol transmits the traffic generated by the routing information
Data layer traffic : When the device accesses the target network segment , Data traffic generated
Routing strategy : In the process of controlling the flow of the layer , Intercept flow , Then modify the traffic and forward it or not ; The final implementation affects the generation of router routing table , The effect of interference in route selection .
1, Grab traffic
1.ACL list ——— because ACL The list itself is designed to capture data layer traffic , therefore , Because of the existence of wildcards, it can flexibly match digital features , however , There is no way to match the mask characteristics in the routing information . therefore , He is not good at capturing the traffic of the control layer .
2,IP-prefix--- The prefix list
[r1Jip ip-prefix aa( Name of the custom prefix list )permit( Allow and
OSPF Extended configuration
1, Manual certification ——— Certification is in OSPF In all packets interacting with neighbors , Carry password . Password is the same. , Then the identity is legal .
OSPF The authentication methods of are divided into 3 Kind of :
1, Interface authentication —— Configure on the interface of neighbor communication
[r5-GigabitEthernet0/0/0]ospf authentication-mode md5 1 cipher 123456
Be careful : Configured on both sides keyid It has to be the same , Otherwise, the neighbor relationship authentication will fail .
2, Regional certification ——— Its essence is interface authentication , It is equivalent to configuring interface authentication for all interfaces activated in a certain area at one time .
[r3-ospf-1-area-0.0.0.0]authentication-mode md5 1 cipher 123456
3, Virtual link authentication ——— Add authentication in the virtual link establishment stage . Its essence is also interface authentication .
[r4-ospf-1-area-0.0.0.1]vlink-peer 3.3.3.3 md5 1 cipher 123456 2, Speed up convergence ——— Reduce timer time
modify hello Time
[r5-GigabitEthernet0/0/0]ospf timer hello 5
Be careful :Hello Time modification , The time of death will automatically follow 4 Match the multiple relationship and modify the time of death
[r1-GigabitEthernet0/0/0Jospf timer dead 20
Be careful :dead Time modification ,Hello Time does not change automatically
Waiting time--- Waiting for the timer ---DR and BDR Election time at election , Equal to the time of death , Once the time of death is modified , The waiting time will be synchronized
AR2 and AR4 The periodic data between them must pass through the middle area 1, Leading to the middle area
Waste of resources .
The disadvantage of using virtual links to solve irregular areas :
1, Because of the existence of virtual links ,AR4 and AR2 We need to establish a neighbor relationship , As a result AR2 and AR4 The periodic data between them must pass through the middle area 1, This leads to a waste of resources in the middle area .
2. Only one area can be crossed
边栏推荐
- 广发期货网上开户安全吗?有没有开户指引?
- Intel assembly language programming learning - Chapter 5 process - Part 1
- Press the delete key in the gridcontrol of devaxpress to delete the selected line item
- leetcode:689. Maximum sum of three non overlapping subarrays
- WinForm版本更新(简易版)
- 架构实战营模块 7 作业
- C interface with SAP
- Web3 traffic aggregation platform starfish OS gives players a new paradigm experience of metauniverse
- offer - 52. 两个链表的第一个公共节点
- 第二章 第八节:列表的增删改查
猜你喜欢
openGauss内核分析:查询重写
Section 3 of Chapter 2: general operation of string
Section 8 of Chapter II: addition, deletion, modification and query of the list
Arithmetic operator 2 (Gretel software - Jiuye practical training)
DAMA-总结(数据管理的总结)
Section 10 of Chapter 2: supplementary knowledge points of the list
Section 15 of Chapter 2: basic operation of dictionary
Design details related to sap e-commerce cloud Spartacus UI store
项目总结:文件管理系统
[daily question] 1260 2D mesh migration
随机推荐
DAM-第十三章(数据质量管理)
第二章第七节:列表的概念
Starfish OS:以现实为纽带,打造元宇宙新范式
Networkx visualization graph how to get a graph based on time series
Web3流量聚合平台Starfish OS,诠释真正商业的“P2E”生态
DevExpress TreeList 实现父节点列值选中,其下子节点也全部选中
【每日一题】1260. 二维网格迁移
Section 14 of Chapter 2: the concept of dictionary
Internship: several steps to get familiar with the project code
Nacos cluster construction
Implementation details of SAP e-commerce cloud Spartacus UI sitecontexturlparams
DevExpress XtraReport报表开发相关知识点
带你认识一下数仓的分区自动管理
第二章第十节:列表的补充知识点
token与refresh_token
第二章第十三节:set集合的交.并.叉集
offer - 52. 两个链表的第一个公共节点
Web3 traffic aggregation platform starfish OS gives players a new paradigm experience of metauniverse
银行数据管理办法
Great Wall Securities mobile software online stock trading account securities company commission is low? Is it safe to open an account?