AR1
[V200R003C00]
#
snmp-agent local-engineid 800007DB03000000000000
snmp-agent
#
clock timezone China-Standard-Time minus 08:00:00
#
portal local-server load portalpage.zip
#
drop illegal-mac alarm
#
set cpu-usage threshold 80 restore 75
#
aaa
authentication-scheme default
authorization-scheme default
accounting-scheme default
domain default
domain default_admin
local-user admin password cipher %$%$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$
local-user admin service-type http
#
firewall zone Local
priority 15
#
interface GigabitEthernet0/0/0
ip address 10.0.0.1 255.255.255.0
#
interface GigabitEthernet0/0/1
ip address 192.168.1.1 255.255.255.0
#
interface GigabitEthernet0/0/2
ip address 192.168.2.1 255.255.255.0
#
interface NULL0
#
interface LoopBack0 虚拟接口
ip address 1.1.1.1 255.255.255.0 虚拟IP地址
#
ospf 1 router-id 1.1.1.1 配置路由的id
area 0.0.0.0 进入这个区域
network 1.1.1.0 0.0.0.255 将网段宣告进去
network 10.0.0.0 0.0.0.255
network 192.168.1.0 0.0.0.255
network 192.168.2.0 0.0.0.255
#
user-interface con 0
authentication-mode password
user-interface vty 0 4
user-interface vty 16 20
#
wlan ac
#
return
AR2
[V200R003C00]
#
snmp-agent local-engineid 800007DB03000000000000
snmp-agent
#
clock timezone China-Standard-Time minus 08:00:00
#
portal local-server load portalpage.zip
#
drop illegal-mac alarm
#
set cpu-usage threshold 80 restore 75
#
aaa
authentication-scheme default
authorization-scheme default
accounting-scheme default
domain default
domain default_admin
local-user admin password cipher %$%$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$
local-user admin service-type http
#
firewall zone Local
priority 15
#
interface GigabitEthernet0/0/0
ip address 192.168.1.2 255.255.255.0
#
interface GigabitEthernet0/0/1
ip address 192.168.3.1 255.255.255.0
#
interface GigabitEthernet0/0/2
#
interface NULL0
#
interface LoopBack1 虚拟接口
ip address 2.2.2.2 255.255.255.0 配置的虚拟IP地址
#
ospf 1 router-id 2.2.2.2 配置路由的id
area 0.0.0.0 进入这个区域
network 2.2.2.0 0.0.0.255 将这些网段宣告进去
network 192.168.1.0 0.0.0.255
network 192.168.3.0 0.0.0.255
#
user-interface con 0
authentication-mode password
user-interface vty 0 4
user-interface vty 16 20
#
wlan ac
#
return
AR3
[V200R003C00]
#
snmp-agent local-engineid 800007DB03000000000000
snmp-agent
#
clock timezone China-Standard-Time minus 08:00:00
#
portal local-server load portalpage.zip
#
drop illegal-mac alarm
#
set cpu-usage threshold 80 restore 75
#
aaa
authentication-scheme default
authorization-scheme default
accounting-scheme default
domain default
domain default_admin
local-user admin password cipher %$%$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$
local-user admin service-type http
#
firewall zone Local
priority 15
#
interface GigabitEthernet0/0/0
#
interface GigabitEthernet0/0/1
ip address 192.168.4.1 255.255.255.0
#
interface GigabitEthernet0/0/2
ip address 192.168.2.2 255.255.255.0
#
interface NULL0
#
interface LoopBack2 虚拟接口
ip address 3.3.3.3 255.255.255.0 虚拟IP地址
#
ospf 1 router-id 3.3.3.3 配置路由的id
area 0.0.0.0
network 3.3.3.0 0.0.0.255
network 192.168.2.0 0.0.0.255
network 192.168.4.0 0.0.0.255
#
user-interface con 0
authentication-mode password
user-interface vty 0 4
user-interface vty 16 20
#
wlan ac
#
return
AR4
[V200R003C00]
#
snmp-agent local-engineid 800007DB03000000000000
snmp-agent
#
clock timezone China-Standard-Time minus 08:00:00
#
portal local-server load portalpage.zip
#
drop illegal-mac alarm
#
set cpu-usage threshold 80 restore 75
#
aaa
authentication-scheme default
authorization-scheme default
accounting-scheme default
domain default
domain default_admin
local-user admin password cipher %$%$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$
local-user admin service-type http
#
firewall zone Local
priority 15
#
interface GigabitEthernet0/0/0
ip address 192.168.3.2 255.255.255.0
#
interface GigabitEthernet0/0/1
ip address 192.168.4.2 255.255.255.0
#
interface GigabitEthernet0/0/2
ip address 192.168.5.1 255.255.255.0
#
interface NULL0
#
interface LoopBack0 虚拟接口
ip address 4.4.4.4 255.255.255.0
#
ospf 1 router-id 4.4.4.4 配置路由的id
area 0.0.0.0
network 4.4.4.0 0.0.0.255 将网段宣告进去
network 192.168.4.0 0.0.0.255
network 192.168.5.0 0.0.0.255
#
user-interface con 0
authentication-mode password
user-interface vty 0 4
user-interface vty 16 20
#
wlan ac
#
return
PC的配置如下:
最后的ping通测试如下:
最后内部网关OSPF协议拓朴图也就完成啦!!!
觉得不错的点个赞(。・∀・)ノ゙