TCP/IP卷一实验之------EIGRP
3 Router D is added in Figure 7-42. Add this router to the configurations written in Configuration Exercise 2.
4 Router F has been added in Figure 7-43. Configure this router to run EIGRP with the routers configured in Configuration Exercises 2 and 3.
conf t
int l 0
ip ad 172.18.10.97 255.255.255.224
description ToRouterF
ip ad 172.18.10.213 255.255.255.252
encap f
no arp f
no frame inver
frame map ip 172.18.10.214 115 b
no shut
int s2/0
encap f
no arp f
no shut
int s2/0.2 point-to-point
description ToRouterB
ip ad 172.16.3.206 255.255.255.252
frame interface-dlci 102
router eigrp 5
no au
net 172.18.10.212 0.0.0.3
net 172.18.10.0 0.0.0.63
net 172.16.3.204 0.0.0.3
end
conf t
int l 0
ip ad 172.16.3.209 255.255.255.240
int s2/0
encap f
no arp f
no shut
int s2/0.2 point-to-point
description ToRouterA
ip ad 172.16.3.205 255.255.255.252
frame interface-dlci 201
int s2/0.3 point-to-point
description ToRouterC
ip ad 172.16.3.197 255.255.255.252
frame interface-dlci 203
int s2/0.4 point-to-point
description ToRouterD
ip ad 172.16.3.201 255.255.255.252
frame interface-dlci 204
router eigrp 5
no au
net 172.16.3.208 0.0.0.15
net 172.16.3.196 0.0.0.3
net 172.16.3.200 0.0.0.3
net 172.16.3.204 0.0.0.3
end
conf t
int l 0
ip ad 172.16.3.161 255.255.255.240
int l 1
ip ad 172.16.1.1 255.255.255.0
int l 2
ip ad 172.17.1.65 255.255.255.192
int s2/0
encap f
no arp f
no shut
int s2/0.3 point-to-point
description ToRouterB
ip ad 172.16.3.198 255.255.255.252
frame interface-dlci 302
router eigrp 5
no au
net 172.16.1.0 0.0.0.255
net 172.16.3.160 0.0.0.15
net 172.17.1.64 0.0.0.63
net 172.16.3.196 0.0.0.3
end
conf t
int l 0
ip ad 172.17.1.129 255.255.255.192
int l 1
ip ad 172.16.3.145 255.255.255.240
int l 2
ip ad 172.16.2.1 255.255.255.0
int s2/0
encap f
no arp f
no shut
int s2/0.4 point-to-point
description ToRouterB
ip ad 172.16.3.202 255.255.255.252
frame interface-dlci 402
router eigrp 5
no au
net 172.16.3.200 0.0.0.3
net 172.17.1.128 0.0.0.63
net 172.16.3.144 0.0.0.15
net 172.16.2.0 0.0.0.255
end
conf t
int l 0
ip ad 172.18.10.201 255.255.255.248
int l 1
ip ad 172.16.3.65 255.255.255.224
int l 2
ip ad 172.16.3.33 255.255.255.224
int s2/1
description ToRouterA
ip ad 172.18.10.214 255.255.255.252
encap f
no arp f
no frame inver
frame map ip 172.18.10.213 511 b
no shut
router eigrp 5
no au
net 172.18.10.212 0.0.0.3
net 172.16.3.32 0.0.0.31
net 172.18.10.200 0.0.0.7
net 172.16.3.64 0.0.0.31
end
172.17.0.0/26 is subnetted, 2 subnets
D 172.17.1.128 [90/2809856] via 172.16.3.205, 00:09:45, Serial2/0.2
D 172.17.1.64 [90/2809856] via 172.16.3.205, 00:06:06, Serial2/0.2
172.16.0.0/16 is variably subnetted, 10 subnets, 4 masks
D 172.16.3.160/28 [90/2809856] via 172.16.3.205, 00:25:23, Serial2/0.2
D 172.16.3.144/28 [90/2809856] via 172.16.3.205, 00:25:05, Serial2/0.2
D 172.16.3.208/28 [90/2297856] via 172.16.3.205, 00:25:43, Serial2/0.2
D 172.16.3.200/30 [90/2681856] via 172.16.3.205, 00:25:43, Serial2/0.2
D 172.16.3.196/30 [90/2681856] via 172.16.3.205, 00:25:43, Serial2/0.2
D 172.16.3.32/27 [90/2297856] via 172.18.10.214, 00:23:03, Serial2/1
D 172.16.1.0/24 [90/2809856] via 172.16.3.205, 00:25:23, Serial2/0.2
D 172.16.2.0/24 [90/2809856] via 172.16.3.205, 00:25:05, Serial2/0.2
D 172.16.3.64/27 [90/2297856] via 172.18.10.214, 00:23:03, Serial2/1
172.18.0.0/16 is variably subnetted, 3 subnets, 3 masks
D 172.18.10.200/29 [90/2297856] via 172.18.10.214, 00:23:03, Serial2/1
172.17.0.0/26 is subnetted, 2 subnets
D 172.17.1.128 [90/2297856] via 172.16.3.202, 00:10:23, Serial2/0.4
D 172.17.1.64 [90/2297856] via 172.16.3.198, 00:06:44, Serial2/0.3
172.16.0.0/16 is variably subnetted, 10 subnets, 4 masks
D 172.16.3.160/28 [90/2297856] via 172.16.3.198, 00:26:01, Serial2/0.3
D 172.16.3.144/28 [90/2297856] via 172.16.3.202, 00:25:44, Serial2/0.4
D 172.16.3.32/27 [90/2809856] via 172.16.3.206, 00:23:42, Serial2/0.2
D 172.16.1.0/24 [90/2297856] via 172.16.3.198, 00:26:02, Serial2/0.3
D 172.16.2.0/24 [90/2297856] via 172.16.3.202, 00:25:44, Serial2/0.4
D 172.16.3.64/27 [90/2809856] via 172.16.3.206, 00:23:42, Serial2/0.2
172.18.0.0/16 is variably subnetted, 3 subnets, 3 masks
D 172.18.10.212/30 [90/2681856] via 172.16.3.206, 00:26:22, Serial2/0.2
D 172.18.10.200/29 [90/2809856] via 172.16.3.206, 00:23:42, Serial2/0.2
D 172.18.10.96/27 [90/2297856] via 172.16.3.206, 00:02:23, Serial2/0.2
172.17.0.0/26 is subnetted, 2 subnets
D 172.17.1.128 [90/2809856] via 172.16.3.197, 00:10:45, Serial2/0.3
172.16.0.0/16 is variably subnetted, 10 subnets, 4 masks
D 172.16.3.144/28 [90/2809856] via 172.16.3.197, 00:26:06, Serial2/0.3
D 172.16.3.208/28 [90/2297856] via 172.16.3.197, 00:26:25, Serial2/0.3
D 172.16.3.204/30 [90/2681856] via 172.16.3.197, 00:26:25, Serial2/0.3
D 172.16.3.200/30 [90/2681856] via 172.16.3.197, 00:26:25, Serial2/0.3
D 172.16.3.32/27 [90/3321856] via 172.16.3.197, 00:24:04, Serial2/0.3
D 172.16.2.0/24 [90/2809856] via 172.16.3.197, 00:26:06, Serial2/0.3
D 172.16.3.64/27 [90/3321856] via 172.16.3.197, 00:24:04, Serial2/0.3
172.18.0.0/16 is variably subnetted, 3 subnets, 3 masks
D 172.18.10.212/30 [90/3193856] via 172.16.3.197, 00:26:25, Serial2/0.3
D 172.18.10.200/29 [90/3321856] via 172.16.3.197, 00:24:04, Serial2/0.3
D 172.18.10.96/27 [90/2809856] via 172.16.3.197, 00:02:45, Serial2/0.3
172.17.0.0/26 is subnetted, 2 subnets
D 172.17.1.64 [90/2809856] via 172.16.3.201, 00:07:21, Serial2/0.4
172.16.0.0/16 is variably subnetted, 10 subnets, 4 masks
D 172.16.3.160/28 [90/2809856] via 172.16.3.201, 00:26:24, Serial2/0.4
D 172.16.3.208/28 [90/2297856] via 172.16.3.201, 00:26:24, Serial2/0.4
D 172.16.3.204/30 [90/2681856] via 172.16.3.201, 00:26:24, Serial2/0.4
D 172.16.3.196/30 [90/2681856] via 172.16.3.201, 00:26:24, Serial2/0.4
D 172.16.3.32/27 [90/3321856] via 172.16.3.201, 00:24:18, Serial2/0.4
D 172.16.1.0/24 [90/2809856] via 172.16.3.201, 00:26:24, Serial2/0.4
D 172.16.3.64/27 [90/3321856] via 172.16.3.201, 00:24:18, Serial2/0.4
172.18.0.0/16 is variably subnetted, 3 subnets, 3 masks
D 172.18.10.212/30 [90/3193856] via 172.16.3.201, 00:26:24, Serial2/0.4
D 172.18.10.200/29 [90/3321856] via 172.16.3.201, 00:24:18, Serial2/0.4
D 172.18.10.96/27 [90/2809856] via 172.16.3.201, 00:03:00, Serial2/0.4
R4#
172.17.0.0/26 is subnetted, 2 subnets
D 172.17.1.128 [90/3321856] via 172.18.10.213, 00:11:12, Serial2/1
D 172.17.1.64 [90/3321856] via 172.18.10.213, 00:07:33, Serial2/1
172.16.0.0/16 is variably subnetted, 10 subnets, 4 masks
D 172.16.3.160/28 [90/3321856] via 172.18.10.213, 00:24:32, Serial2/1
D 172.16.3.144/28 [90/3321856] via 172.18.10.213, 00:24:32, Serial2/1
D 172.16.3.208/28 [90/2809856] via 172.18.10.213, 00:24:32, Serial2/1
D 172.16.3.204/30 [90/2681856] via 172.18.10.213, 00:24:32, Serial2/1
D 172.16.3.200/30 [90/3193856] via 172.18.10.213, 00:24:32, Serial2/1
D 172.16.3.196/30 [90/3193856] via 172.18.10.213, 00:24:32, Serial2/1
D 172.16.1.0/24 [90/3321856] via 172.18.10.213, 00:24:32, Serial2/1
D 172.16.2.0/24 [90/3321856] via 172.18.10.213, 00:24:32, Serial2/1
172.18.0.0/16 is variably subnetted, 3 subnets, 3 masks
D 172.18.10.96/27 [90/2297856] via 172.18.10.213, 00:03:12, Serial2/1
转载于:https://blog.51cto.com/matthewyin/23560
TCP/IP卷一实验之------EIGRP相关推荐
- TCP/IP卷一:26---Internet协议之(IPv4、IPv6数据报,Internet校验和)
一.IP简介以及一些特性 IP是TCP/IP协议族中的核心协议.所有TCP. UDP. ICMP和IGMP数据都通过IP数 据报传输 IP的可靠性 IP提供了一种尽力而为.无连接的数据报交付服务.&q ...
- 软件安全实验——lab10(二、TCP/IP攻击实验)
目录标题 1.实验室概况 2.实验室环境 2.1环撞设置 2.2教师须知 3.实验室的任务 3.1 Task (1): ARP缓存中毒 (1)80号工具攻击: (2)33号工具攻击: 3.2任务(2) ...
- TCP/IP攻击实验(ARP,ICMP,SYN,RST,TCP会话劫持)
一.实验背景 由于TCP/IP协议是Internet的基础协议,从开始设计的时候并没有考虑到现在网络上如此多的威胁,由此导致了许多形形色色的攻击方法,一般如果是针对协议原理的攻击,尤其DDOS,我们将 ...
- TCP/IP卷一:20---链路层之(环回地址)
一.概念 尽管可能看起来很奇怪,但在很多情况下,客户机可能希望使用Internet协议(例如 TCP/IP)与同一计算机上的服务器通信 为了实现这个目标,大多数实现支持一种工作在网 络层的环回(或称& ...
- 《TCP/IP 卷一》笔记、ping和traceroute 的实现思路
一.TCP协议相关笔记 Normally TCP does not send an ACK the instant it receives data. Instead, it delays the A ...
- tcp/ip卷一学习-乱记之概述
一.tcpip协议簇作用:很多不同的厂家生产各种型号的计算机,它们运行完全不同的操作系统,但TCP/IP协议族允许它们互相进行通信. 二.分层 网络协议通常分不同层次进行开发,每一层分别负责不同的通信 ...
- TCP/IP卷一:49---ICMP之(与ICMP相关的攻击)
涉及ICMP的攻击主要分为3类: 泛洪:泛洪将会生成大量流量,导致针对一台或者多台计算机的有效的Dos攻击 炸弹:炸弹类型(有时也称为核弹(nuke)类型)指的是发送经过特殊构造的报文,能够导致IP或 ...
- TCP/IP卷一:63---TCP基础之(ARQ和重传、分组窗口和滑动窗口、流量控制和拥塞控制、设置重传超时)
一.前言 到目前为止,我们一直在讨论那些自身不包含可靠传递数据机制的协议 它们可能会使用一种像校验和或CRC这样的数学函数来检测接收到的有差错的数据,但是它们不尝试去纠正差错 对于IP和UDP,根本没 ...
- TCP/IP卷一:80---TCP数据流与窗口管理之(延时确认(延迟ACK)、Nagle算法)
一.延迟确认(延迟ACK) 在许多情况下,TCP并不对每个到来的数据包都返回ACK,利用TCP的累积ACK字段(参见TCP报文格式https://blog.csdn.net/qq_41453285/a ...
最新文章
- mysql执行计划extra为null_MySQL执行计划extra解析
- SQL Server 2012中的Contained Database尝试
- IIS 6.0 401 错误
- php滚动公告源码,好用的滚动公告HTML代码
- shell关闭指定进程
- 最短路径——Floyd算法及优化(蓝桥杯试题集)
- 严阵以待的意思是什么,怎么用严阵以待造句?
- vue html属性绑定,2、Vue元素属性的绑定以及HTML的绑定
- HDFS完全分布式集群搭建
- php常用数组,php常用数组函数
- 二级c语言分数,C语言二级考试分数构成与攻略,高分必备
- ModuleNotFoundError: No module named ‘keras.api‘解决
- 水木周平戏说中国网络黑幽默!
- 自动化做任务、收能量工具Hamibot,我愿称它为神器
- sql中向下取整怎么取_Sql Server 里的向上取整、向下取整、四舍五入取整的实例!...
- 织梦网站搬家流程揭秘
- 查分吧(chafenba)通用成绩查询系统免费下载
- 白苹果了怎么办_苹果手机数据恢复真的能行吗?
- php 导出excel删除空行,将Excel数据写入Word模板并删除多余的空行
- 收集的C#Directx资料