O'Reilly logo

CCIE Security Practice Labs by Fahim Hussain Yusuf Bhaiji

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Section 2.0: Routing Configuration

2.1. OSPF

  1. Configure OSPF as shown in Figure 4-3 with MD5 authentication for all areas.

  2. If you do a show ip ospf interface on R6, R7, and R8, you will see the network type is NON-BROADCAST and NBMA does not form adjacency without changing this network type. As you are not to use the ip ospf network command, configure R6 in Area 0 using the neighbor command—that is, unicast OSPF. See Example 4-6.

  3. Summarize RIP external routes on R8 for network(s) 133.72.52.x in OSPF using the summary-address command. See Example 4-7.

  4. Area 2 is not connected to OSPF backbone. Create a virtual link in Area 1 to interconnect Area 2 with MD5 authentication. See Example 4-8.

  5. Redistribute OSPF into RIP on R3 and R4.

  6. Redistribute RIP into ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required