OSPF综合实验(下)
验证R1到R4的开销:
R3:
![0](https://img2020.cnblogs.com/blog/1356910/202107/1356910-20210719213413629-1859173300.jpg)
R4:修改R4回环口开销52,则从1到4开销为:1+48+52=101
![0](https://img2020.cnblogs.com/blog/1356910/202107/1356910-20210719213413573-148367242.jpg)
R1:查看开销是不是101
![0](https://img2020.cnblogs.com/blog/1356910/202107/1356910-20210719213413784-1488750820.jpg)
配制运营商R8:
![0](https://img2020.cnblogs.com/blog/1356910/202107/1356910-20210719213413669-858497228.jpg)
查看R8路由:
![0](https://img2020.cnblogs.com/blog/1356910/202107/1356910-20210719213413799-493166808.jpg)
配置R8到area 0缺省路由
![0](https://img2020.cnblogs.com/blog/1356910/202107/1356910-20210719213413788-1896774170.jpg)
area 0访问运营商R8:
方法一:R4引入48路由---直连(ASBR)
![0](https://img2020.cnblogs.com/blog/1356910/202107/1356910-20210719213413604-315035529.jpg)
成功后area 0里的R1可访问R8
![0](https://img2020.cnblogs.com/blog/1356910/202107/1356910-20210719213413788-1942343630.jpg)
方法二:R4给大家发缺省路由
![0](https://img2020.cnblogs.com/blog/1356910/202107/1356910-20210719213413677-66309138.jpg)
验证:
![0](https://img2020.cnblogs.com/blog/1356910/202107/1356910-20210719213413787-1858723538.jpg)
![0](https://img2020.cnblogs.com/blog/1356910/202107/1356910-20210719213413734-1473168425.jpg)
MD5认证:
![0](https://img2020.cnblogs.com/blog/1356910/202107/1356910-20210719213413735-1002328906.jpg)
在R1 R2 R3 R6配置ospf认证:
![0](https://img2020.cnblogs.com/blog/1356910/202107/1356910-20210719213413639-751033579.jpg)
![0](https://img2020.cnblogs.com/blog/1356910/202107/1356910-20210719213413637-1469936601.jpg)
抓包显示认证配置成功:
![0](https://img2020.cnblogs.com/blog/1356910/202107/1356910-20210719213413767-1579882906.jpg)