祖瑞科技 全国计算机 网络IT运维社区!

 找回密码
 立即注册

QQ登录

只需一步,快速开始

搜索
热搜: 活动 交友 discuz
查看: 8705|回复: 0

华为基于区域和接口的OSPF的认证方式

[复制链接]

205

主题

218

帖子

1286

积分

管理员

Rank: 9Rank: 9Rank: 9

积分
1286
发表于 2021-2-5 23:15:16 | 显示全部楼层 |阅读模式
华为基于区域和接口的OSPF的认证方式

一、基本OSPF 区域的认证配置方法
R1
<Huawei>system-view
[Huawei]sysnamer1
[r1]routerid 1.1.1.1
[r1]interfaceloopback 0
[r1-LoopBack0]ipaddress 1.1.1.1 32
[r1-LoopBack0]quit
[r1]interface GigabitEthernet 0/0/0
[r1-GigabitEthernet0/0/0]ipaddress 192.168.12.1 24
[r1-GigabitEthernet0/0/0]quit
[r1]ospf1
[r1-ospf-1]area0
[r1-ospf-1-area-0.0.0.0]network 1.1.1.1 0.0.0.0
[r1-ospf-1-area-0.0.0.0]network192.168.12.0 0.0.0.255
[r1-ospf-1-area-0.0.0.0]authentication-modemd5 1 cipher admin1234  //
基于区域的认证,认证模式为md5加密,KEY ID密钥编号一般写1,密码为admin1234;习惯性先宣告网络,再配置认证;
[r1-ospf-1-area-0.0.0.0]return

R2
<Huawei>system-view
[Huawei]sysnamer2
[r2]routerid 2.2.2.2
[r2]interfaceloopback 0
[r2-LoopBack0]ipaddress 2.2.2.2 32
[r2-LoopBack0]quit
[r2]interface GigabitEthernet 0/0/0
[r2-GigabitEthernet0/0/0]ipaddress 192.168.12.2 24
[r2-GigabitEthernet0/0/0]quit
[r2]ospf1
[r2-ospf-1]area0
[r2-ospf-1-area-0.0.0.0]network2.2.2.2 0.0.0.0
[r2-ospf-1-area-0.0.0.0]network192.168.12.0 0.0.0.255
[r2-ospf-1-area-0.0.0.0]authentication-modemd5 1 cipher admin1234
[r2-ospf-1-area-0.0.0.0]return
<r2>system-view
[r2]interface GigabitEthernet 0/0/1
[r2-GigabitEthernet0/0/1]ip address 192.168.23.2 24
[r2]ospf1
[r2-ospf-1]area1
[r2-ospf-1-area-0.0.0.1]network192.168.23.0 0.0.0.255
[r2-ospf-1-area-0.0.0.1]authentication-modemd5 1 cipher admin2345
[r2-ospf-1-area-0.0.0.1]return

R3
<Huawei>system-view
[Huawei]sysnamer3
[r3]routerid 3.3.3.3
[r3]interfaceloopback 0
[r3-LoopBack0]ipaddress 3.3.3.3 32
[r3-LoopBack0]quit
[r3]interfaceGigabitEthernet 0/0/0
[r3-GigabitEthernet0/0/0]ipaddress 192.168.23.3 24
[r3-GigabitEthernet0/0/0]quit
[r3]ospf1
[r3-ospf-1]area1
[r3-ospf-1-area-0.0.0.1]network3.3.3.3 0.0.0.0
[r3-ospf-1-area-0.0.0.1]network192.168.23.0 0.0.0.255
[r3-ospf-1-area-0.0.0.1]authentication-modemd5 1 cipher admin2345
[r3-ospf-1-area-0.0.0.1]return
<r3>system-view
[r3]interfaceGigabitEthernet 0/0/1
[r3-GigabitEthernet0/0/1]ipaddress 192.168.34.3 24
[r3-GigabitEthernet0/0/1]quit
[r3]ospf1
[r3-ospf-1]area2
[r3-ospf-1-area-0.0.0.2]network192.168.34.0 0.0.0.255
[r3-ospf-1-area-0.0.0.2]authentication-modemd5 1 cipher admin3456
[r3-ospf-1-area-0.0.0.2]return

R4
[Huawei]sysname r4
[r4]router id 4.4.4.4
[r4]interfaceloopback 0
[r4-LoopBack0]ipaddress 4.4.4.4 32
[r4-LoopBack0]quit
[r4]interface GigabitEthernet 0/0/0
[r4-GigabitEthernet0/0/0]ip address 192.168.34.4 24
[r4-GigabitEthernet0/0/0]quit
[r4-ospf-1-area-0.0.0.2]network4.4.4.4 0.0.0.0
[r4-ospf-1-area-0.0.0.2]network192.168.34.0 0.0.0.255
[r4-ospf-1-area-0.0.0.2]authentication-modemd5 1 cipher admin3456
[r4-ospf-1-area-0.0.0.2]return

R2(配置Vlink虚连接)
[r2]ospf1
[r2-ospf-1-area-0.0.0.1]vlink-peer3.3.3.3
[r2-ospf-1-area-0.0.0.1]return

R3
[r3]ospf1
[r3-ospf-1]area1
[r3-ospf-1-area-0.0.0.1]vlink-peer2.2.2.2
[r3-ospf-1-area-0.0.0.1]return
<r3>display ospf vlink
        OSPF Process 1 with Router ID 3.3.3.3
               Virtual Links
Virtual-link Neighbor-id  -> 2.2.2.2, Neighbor-State: Down
Interface: 192.168.23.3 (GigabitEthernet0/0/0)
Cost:1  State: P-2-P  Type: Virtual
Transit Area: 0.0.0.1
Timers: Hello 10 , Dead 40 , Retransmit 5 ,Transmit Delay 1
GR State: Normal
因为骨干区域配置了认证,导致Vlink的邻居状态是Down!假设区域2与骨干区域相连,则同样在R3区域0中配配置认证;
区域2与骨干区域相连,R3路由会扮演ABR(其它区域与骨干区域相连的边界路由)的角色,那么配置认证就在R3配置的Vlink区域1中进行。
[r3]ospf1
[r3-ospf-1]area0
[r3-ospf-1-area-0.0.0.0]authentication-modemd5 1 cipher admin1234
[r3-ospf-1-area-0.0.0.0]return
再次显示vlink邻居状态
<r3>displayospf vlink
        OSPF Process 1 with Router ID 3.3.3.3
               Virtual Links
Virtual-link Neighbor-id  -> 2.2.2.2, Neighbor-State: Full
Interface: 192.168.23.3 (GigabitEthernet0/0/0)
Cost:1  State: P-2-P  Type: Virtual
Transit Area: 0.0.0.1
Timers: Hello 10 , Dead 40 , Retransmit 5 ,Transmit Delay 1
GR State: Normal
<r2>displayospf vlink
        OSPF Process 1 with Router ID 2.2.2.2
               Virtual Links
Virtual-link Neighbor-id  -> 3.3.3.3, Neighbor-State: Full
Interface: 192.168.23.2 (GigabitEthernet0/0/1)
Cost:1  State: P-2-P  Type: Virtual
Transit Area: 0.0.0.1
Timers: Hello 10 , Dead 40 , Retransmit 5 ,Transmit Delay 1
GR State: Normal
R3与R2的Vlink邻居状态为FULL!!说明邻居建立成功;再看路由表:
<r1>display ip routing-table

<r4>display ip routing-table

路由表全部学习完成;
二、基于接口OSPF认证的配置方法
R1
[r1-ospf-1]area0
[r1-ospf-1-area-0.0.0.0]undoauthentication-mode  // undo原有的区域认证
[r1-ospf-1-area-0.0.0.0]return
<r1>system-view
[r1]interfaceGigabitEthernet 0/0/0
[r1-GigabitEthernet0/0/0]ospfauthentication-mode md5 1 cipher admin1234

R2
[r2]ospf1
[r2-ospf-1]area0
[r2-ospf-1-area-0.0.0.0]undoauthentication-mode
[r2-ospf-1-area-0.0.0.0]return
<r2>system-view
[r2]interface GigabitEthernet 0/0/0
[r2-GigabitEthernet0/0/0]ospfauthentication-mode md5 1 cipher admin1234
此时看一下VLink的邻居状态
[r2]displayospf vlink
        OSPF Process 1 with Router ID 2.2.2.2
               Virtual Links
Virtual-link Neighbor-id  -> 3.3.3.3, Neighbor-State: Down
Interface: 192.168.23.2 (GigabitEthernet0/0/1)
Cost:1  State: P-2-P  Type: Virtual
Transit Area: 0.0.0.1
Timers: Hello 10 , Dead 40 , Retransmit 5 ,Transmit Delay 1
GR State: Normal
邻居又成为了Down状态;尝试关闭区域2边界路由R3的区域0认证;
[r3]ospf1
[r3-ospf-1]area0
[r3-ospf-1-area-0.0.0.0]undoauthentication-mode
区域0认证方式被取消,VLink邻居再次成为FULL状态;
[r2]displayospf vlink
        OSPF Process 1 with Router ID 2.2.2.2
               Virtual Links
Virtual-link Neighbor-id  -> 3.3.3.3, Neighbor-State: Full
Interface: 192.168.23.2 (GigabitEthernet0/0/1)
Cost:1  State: P-2-P  Type: Virtual
Transit Area: 0.0.0.1
Timers: Hello 10 , Dead 40 , Retransmit 5 ,Transmit Delay 1
GR State: Normal
[r3]displayospf vlink
        OSPF Process 1 with Router ID 3.3.3.3
               Virtual Links
Virtual-link Neighbor-id  -> 2.2.2.2, Neighbor-State: Full
Interface: 192.168.23.3 (GigabitEthernet0/0/0)
Cost:1  State: P-2-P  Type: Virtual
Transit Area: 0.0.0.1
Timers: Hello 10 , Dead 40 , Retransmit 5 ,Transmit Delay 1
GR State: Normal
其他接口认证不再赘述,方法相同。
最终测试一下互通:
<r1>ping-a 1.1.1.1 2.2.2.2
  PING 2.2.2.2: 56  data bytes, press CTRL_C to break
   Reply from 2.2.2.2: bytes=56 Sequence=1 ttl=255 time=110 ms
   Reply from 2.2.2.2: bytes=56 Sequence=2 ttl=255 time=10 ms
   Reply from 2.2.2.2: bytes=56 Sequence=3 ttl=255 time=30 ms
   Reply from 2.2.2.2: bytes=56 Sequence=4 ttl=255 time=20 ms
   Reply from 2.2.2.2: bytes=56 Sequence=5 ttl=255 time=20 ms
  ---2.2.2.2 ping statistics ---
    5packet(s) transmitted
    5packet(s) received
   0.00% packet loss
round-trip min/avg/max =10/38/110 ms
<r1>ping-a 1.1.1.1 3.3.3.3
  PING3.3.3.3: 56  data bytes, press CTRL_C tobreak
   Reply from 3.3.3.3: bytes=56 Sequence=1 ttl=254 time=100 ms
   Reply from 3.3.3.3: bytes=56 Sequence=2 ttl=254 time=30 ms
   Reply from 3.3.3.3: bytes=56 Sequence=3 ttl=254 time=20 ms
   Reply from 3.3.3.3: bytes=56 Sequence=4 ttl=254 time=30 ms
   Reply from 3.3.3.3: bytes=56 Sequence=5 ttl=254 time=30 ms
  ---3.3.3.3 ping statistics ---
    5packet(s) transmitted
    5packet(s) received
   0.00% packet loss
round-trip min/avg/max =20/42/100 ms
<r1>ping-a 1.1.1.1 4.4.4.4
  PING 4.4.4.4: 56  data bytes, press CTRL_C to break
   Reply from 4.4.4.4: bytes=56 Sequence=1 ttl=253 time=180 ms
   Reply from 4.4.4.4: bytes=56 Sequence=2 ttl=253 time=40 ms
   Reply from 4.4.4.4: bytes=56 Sequence=3 ttl=253 time=40 ms
   Reply from 4.4.4.4: bytes=56 Sequence=4 ttl=253 time=50 ms
   Reply from 4.4.4.4: bytes=56 Sequence=5 ttl=253 time=40 ms
  ---4.4.4.4 ping statistics ---
    5packet(s) transmitted
    5packet(s) received
    0.00% packet loss
   round-trip min/avg/max = 40/70/180 ms

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有账号?立即注册

x
祖瑞(上海)网络科技有限公司
我们在全国范围提供企业IT运维、网络工程、弱电安装、监控安防、计算机产品收售、办公设备耗材等服务!
期待与您的合作!
邮箱:sanne@zurkj.com
电话:021-51850021 18918292296
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

公司网站

QQ|Archiver|手机版|小黑屋|祖瑞科技 全国计算机 网络IT运维社区! ( 沪ICP备16021636号-2 )

GMT+8, 2024-11-26 03:37 , Processed in 0.037669 second(s), 19 queries .

Powered by Discuz! X3.4

Copyright © 2001-2021, Tencent Cloud.

快速回复 返回顶部 返回列表