2.6.6 Packet Tracer - Verify Single-Area OSPFv2

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
hi friends welcome to world in this video we are going to solve this packet tracer activity verify single area ospf e2 before coming to this activity friends if you like to get any ccna version 7 online classes or any technical support you can contact our team using our website link you will get from the description below and if you like to get these type of technical videos in future consider subscribing and also don't forget to enable that bell icon new to the subscribe button so that you will get notification message whenever we upload a new video now back to our activity here we can see our addressing table we will go through the objectives in this lab we will use the cli commands to verify the operation of an existing ospf v2 network in part 2 we will add a new lan to the configuration and verify connectivity identify and verify the status of ospf neighbors determine how the routers are being learned in the network explain how the neighbor state is determined examine the settings for the ospf process id then add a new lan into an existing ospf network and verify connectivity this is what we are going to do in this packet tracer activity coming to the scenario you are the network administrator for a branch office of a large organization your branch is adding a new wireless network into an existing branch of his land the existing network is configured to exchange roads using ospf v2 in a single area configuration your task is to verify the operation of the existing ospf v2 network before adding in the new lan when you are sure that the current ospf v2 lan is operating correctly we will connect the new lan and verify that ospf roads are being propagated for the new lan as branch office network administrator you have full access to the ios on routers r3 and r4 you only have read access to the enterprise line routers r1 and r2 using the username branch admin and password branch 1234 now coming to our topology here we can see rotors r3 and r4 and we have full access to the ios of these routers r3 and r4 also here we can see uh routers r1 and r2 and here we have only read access to these routers coming to the instructions part one verify the existing ospf v2 network operation the following commands will help you find the information and needed to answer the questions okay we have to use all these show commands and we have to answer you know some of the questions they're given here we can use this uh show command show ip interface brief show ip root show ip root ospf show ip ospf neighbor show ip protocols show ip ospf then show ip ospf interface ok we will do it one by one step one verify ospf v2 operation wait until sdp has converged on the network you can click the packet tracer fast forward time button to speed up the process so here we can see that fast forward button here then continue only when all ling lights are green so coming to a topology all the lights are in green log into a router urban using the username branch admin and password branch1234 execute the show iproot command okay we will go to r1 cli so username is branch admin and the password is branch1234 okay once more i will try it let me copy this and here is the password okay done now we will give this show command show ip root here we can see our routing table we can see the route which is learned with the help of a dynamic protocol that is oispf here we can see one root 172 16 2.0 and here we can see one nine two one six eight one dot zero and here is one nine two one six eight ten dot eight also we can see this router land about the default route with the help of this protocol ospf and obviously it is a default route they are set to this isp using this exit interface g 0 slash 1 in this rotor r2 here coming to this topology we can see this r1 is aware of these three networks that means these are the three directly connected networks to this router r1 and this r1 is unaware of these remote networks 172 16 2.0 and here we can see 192.168.10.8 30 also we can see one nine two one six eight one dot zero slash 24 and we can see all these remote networks lend with the help of ospf so we can see those networks here we have some questions how did the rotor r1 receive the default route yeah here we have seen that in this r1 this routing table we have seen this default route which is a land with the help of this ospf and they configured this default route in this router r2 with the help of this exit interface that is g 0 slash 1 which is connecting to this isp network and they given this default information originate command to propagate uh this default route information in the ospf update hence obviously this router r1 lend about that default to root with the help of this protocol ospf next is from which a router did r1 receive the default route so coming to this topology we can see this r2 is connected to this isp network so obviously they will configure the default route in this router r2 with its exit interface uh g0 slash one also we can identify that with the help of a routing table in this r1 yeah here we can see that uh this is a default route via 172.16.3.2 and here we can see it's a exit interface serial 0. so coming to a topology here we can see that exit interface serial 0 0 0 which is going to this router r2 and that iphone 172.16.3.2 that belongs to uh this interface that is serial 0 0 in this rotor r2 so here we can verify that correct and again coming back to this routing table here we can see it's 80 that is 110 that means this router land about this default road with the help of you know ospf protocol and also we can see it's a matrix that is one next is how can you filter the output of show ip root to show only the roots land through ospf yeah we can give that i will show here oh again we have to give the username and password username is here and the password so here we will give that command show ip root when you give show ip root we will get the entire routing table correct so if you want to see only this ospf root then we can give this command show ip or root then we can give ospf so here we can see only the root which is land with the help of this protocol ospf even we can give this command let me try that show ip we can use this pipeline then we can include o okay i'm not getting that let me try with the capital letter oh yes so we have to use capital letter o and we can see we get only uh the root which is land with the help of ospf coming to the next point execute the show ip ospf neighbor command on r1 okay we will give that show ip ospf neighbor right i'll put a tab it's ospf neighbor here which routers have formed adjacencies with rotor r1 okay we can identify that uh using this show command show ipo spf neighbor either we can identify using this sniper id or address here we have to find this router id belongs to which router okay and that is a 3.3.3.3 that's set for the rotor r3 and this rotor id that's set for rotor r2 and here we can see the ip address 192 168 10.6 also we can see one seven to 16 uh 3.2 so this is the ip address of serial 0 0 0 in r2 and this is the ip address so for serial 0 0 1 in r3 we have to identify that right so we can go to r3 sorry r2 first of all we'll go to r2 then we'll go to r3 so let me get the user name and the password it's here and here i will give a show ip interface brief command so that we can see the ip address of serial 0 0 it's here 172 16.3.2 3.2 that's correct so this is r2 now we can verify this um r3 192.168 we'll go to r3 enable show ip interface brief and here we can see uh 192.168.10.6 the ip address of this interface serial 0 0 0 in this router r3 i think previously mentioned the ip address of serial 0 0 1 uh it's not 0 0 1 the ip address of serial 0 0 0 in this rotor r3 here we can verify that uh yeah it's correct even here i mentioned we can identify using its neighbor id right yeah so if you go to r2 we can give the show command like show ip ospf so that we can see its id here we can see it's id 2.2.2.2 so it's r2 then coming to this router r3 we will give that command show ip ospf we can see its id 3.3.3.3 yeah even we can get this router id using this show commander show iep protocols just we can verify that show ip protocols and here we can see router id even we can go to r3 show ip protocols here is root id next is what are the router ids and state of the routers shown in the command output okay let me check that here we can see uh rotor id 3.3.3.3 and we can see its state is a full then router id 2.2.2.2 and its state is full are all of the adjacent routers are shown in the output yes it's shown because we have only these rotors r2 and r3 as a neighbor we can see that on r1 so this is r3 and this is r2 now using the command prompt on pc1 ping the address of the isp router shown in the address table is it successful we will check that if not do a clear ospf process command on the routers and repeat the ping command here we can see the ipa transfer for isp router just will copy this from this addressing table then coming to our pc one we will go to command prompt desktop tab then go to command prompt here we will ping to the isp router here is the ip address and we are waiting for the replies it is working in step 2 verify ospf v2 operation on r2 log into rotor r2 using the username branch admin and the password branch1234 execute the show ip root command verify that roads to all the networks the topology are shown in the routing table coming to our topology here we can see our rotor r2 and we can see connected networks 172 16 2.0 172 16 3.0 then this link between this um uh r2 and the isp network then here we can see 192.168.10.8 network then this rotor r2 is unaware of these remote networks such as 172.16.1.0 then 192.168.10.4 then 192.168.1.0 also the devices inside this network maybe i mean in the internet right they have to configure the default route towards this isp network we will give this command show ip root in this router r2 show iproot and here we can see three routes land with the help of ispf here we can see one one seven two sixteen one dot zero then one nine two one six eight one dot zero one nine two one six eight ten dot four and here we can see they set this a default route to the isp how did the router r2 lend the default route to the isp obviously the administrator set this default row to the isp right otherwise how it comes they configure this default route to the isp clearly we can say the network administrator statically configured this default route uh to the isp right next is enter the show ip ospf interface g 0 0 on router r2 okay we will go to r2 and we will give that command show ip ospf interface g 0 0 we have some questions first one what type of ospf network is attached to this interface the main here are the interface a g 0 0 in this root or r2 here we can see the details internet address area process id router id and here we can see network type it's broadcast our ospf hello packets being sent out this interface explained uh to this interface the gigabit a third zero slash zero okay coming back to this r2 for this uh shock output for this show command show ip ospf interface g 0 0 and here we can see no hellos because they configure this interface as a passive interface using the command prompt on pc2 ping the serial 001 address on a router r3 is it successful we will test that first of all we will get the ip address of this interface serial 0 0 1 in this router r3 we will go to our addressing table and we can see r3 serial 0 0 what just i will copy this ip address then coming to pc2 we will go to desktop tab command prompt then ping to that interface and here we can see we get the replies now we will go to step three verify ospf v2 operation on r3 execute the show ip protocols command on router r3 okay we will give that coming to this r3 enable i will give that command show ip protocols we have a question rooter arthro is voting for which networks so we will get the answer from this uh show command show iep protocols and here we can see those networks one nine two one six eight one dot zero one nine two one six eight ten dot four one nine two one six eight dot 10.8 these are the directly connected networks in this router r3 next is execute the show ipo spf neighbor detail command on router r3 we will give that command here show ip ospf neighbor detail what is the neighbor priority shown for the ospf neighbor routers this value is the default okay coming to this output here we can see neighbor 2.2.2.2 that is r2 and here we can see it's a neighbor priority is zero then coming to this neighbor that is r1 and here also we can see neighbor priority is zero using the command prompt on pc3 ping the address of the isp router shown in the addressing table is it successful so we will get the iep address of our isp router it's here then coming to pc3 we'll go to desktop command prompt and we will ping to isp and because we get the replies okay now we will go to party two add the new branch of esa land to the ospf v2 network we will now add the pre-configured branch office land to the ospf v2 network in step one verify the ospf v2 configuration on a rotor r4 execute a show run uh begin a router ospf command on router r4 verify that the network statements are present for the networks that are configured on the rotor so we will give that command in this router r4 enable show running config pipeline begin router ospf which interface is configured to not send ospf update packets okay that we can get from this uh output here we can see passive interface a gigabit of third zero slash zero slash one coming to step two connect the branch office router r4 to the ospf v2 network using the correct ethernet cable connect the g 0 0 0 interface on rotor r4 to the g0 1 interface on switch s3 use the show ipo spf neighbor command to verify that rotor r4 is now adjacent with the rotor r3 here we are going to connect from this router r4 to this switch s3 we have to choose copper straight through because they are different devices on r4 we will connect two g zero slash zero slash zero then coming to this s3 we will connect two gigabit third zero slash one what state is it displayed for a router r3 okay we'll go to this r4 and here we can see the neighbor 3.3.3.3 loading to full loading done let me check with a show command show ip isp of neighbor and here we can see neighbor id 3.3.3.3 and we can see it's a state full dr dr means a designated router right so using the show ip ospf neighbor command on r3 determine the state of router r4 there may be a delay while ospf converts we will give this show command in this router r3 enable will give show ip ispf neighbor correct why is the state of rotor r4 different than the state of r1 and r2 so here we can see neighbor id and we can see it's a state full bdr that means a backup designated router you know because the ospf network type between r1 and r2 is a point to point there is no ospf election r4 is on the same ethernet network segment as rotor r3 so the ospf network type is broadcast and there is no spf election so just keep in mind when more than one router is located on a multi-access network segment only one router the dr sends ospf v2 updates a second router in this case that is r4 becomes the backup designated router and can take over if the dr router fails coming to the last point using the command prompt on a laptop ping the address of pc2 is it successful okay we will get the iep address of pc2 will copy its ip address then we will go to this laptop go to desktop command prompt then we will ping to that pc that is pc2 and here we can see we get the replies okay that's all in this packet tracer activity that is a verify single area ospf v2 and here we can see our completion status it shows hundred percent now dear friends if you have any doubt any suggestions regarding this packet tracer activity please comment below or you can contact our team using our website link you will get from the description below and also if you like our video give a thumb and share with all your friends stay tuned and we will meet again with the next video thank you
Info
Channel: Tech Acad
Views: 6,166
Rating: undefined out of 5
Keywords: CISCO, CISCO Certification, CCNA, OSPFv2, Packet Tracer, Single-Area OSPFv2, CCNAv7, Routing and Switching
Id: nslI_FRvNws
Channel Id: undefined
Length: 26min 49sec (1609 seconds)
Published: Thu Aug 27 2020
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.