Alcatel-Lucent Interior Routing Protocols Lab Guide: Revision 2.3 Sep 22nd, 2010
Alcatel-Lucent Interior Routing Protocols Lab Guide: Revision 2.3 Sep 22nd, 2010
List of Figures
Figure 1-1: Physical connectivity ..........................................................................5
List of Tables
Table 1-1: Lab 1 commands.................................................................................4
Syntax
The commands required for this exercise are listed in Table 1-1. Each command may have
additional possible parameters. Use the “?” character for help and to explore all command line
options.
Objective:
Verify the operation and physical connectivity of the routers, which are connected according to
Exercise
1. Together with your instructor and other class members, develop on the whiteboard a
consistent IP address plan for the lab, following the guidelines in Tables 1-3 to 1-5.
2. Connect to the routers in your pod using the addresses provided by your instructor. Fill in
the required fields for Table 1-2. The username and password for all devices is “admin”. If
you are unable to connect to any of the routers, notify your instructor.
3. Verify that the router has no configuration.
Note: If a prior configuration is on your router, you need to remove it before starting this
lab. If you are unsure how to accomplish this, ask your instructor.
Verification
1. Determine if you can connect to your routers.
2. Ensure that the router has no residual configuration on it.
Parameter Value
Pod number 1, 2, 3, or 4 (circle your pod number)
System IP address Pod IP address/32 (see Table 1-4 for addresses)
Pod 1 IP addressing range 172.16.0.0/16
Pod 2 IP addressing range 172.17.0.0/16
Pod 3 IP addressing range 172.18.0.0/16
Pod 4 IP addressing range 172.19.0.0/16
Core IP addressing range 172.31.0.0/16 (see Table 1-5 for addresses)
Loopback interfaces of core router Pod IP address/32
Loopback interfaces of edge router Pod IP address/32
Objective
Exercise
Configure the routers in your assigned pod, using the address plan developed in Exercise 1.1.
1. Name each router, if not already named with the naming convention shown in Figure 1-2.
2. Configure each pod router with a system interface and a minimum of two loopback
interfaces.
3. Configure the Ethernet connection between pod routers.
4. Configure IP addresses on all internal interfaces and the Ethernet connections between
pods.
Verification
1. Verify that all required interfaces are active and operational.
2. On the core router, ensure that you have configured the following interfaces with IP
addressing:
Three core interfaces with an IP address starting with 172.31.X.Y/30
One system IP address from your pod IP address range
Two loopback IP addresses from your pod IP address range
One Ethernet IP address that connects to your edge router
3. On the edge router, ensure that you have configured the following interfaces with IP
addressing:
Two Ethernet IP address that connect to your core and access routers
Two loopback IP addresses from your pod IP address range
One system IP address from your pod IP address range
4. On the Access router, ensure that you have configured the following interfaces with IP
addressing:
One Ethernet IP address that connects to your Edge router
Two loopback IP addresses from your pod IP address range
One system IP address from your pod IP address range
5. You should be able to ping between the core and edge routers and the access routers on
the physical interface, directly connecting the two together, and between the core routers
on the segments that interconnect them.
Bonus Step
If time permits, you may configure additional loopback interfaces on the routers in your pod.
Use the next available subnets from your defined range.
Questions
1. Which command is used to ensure all ports are active?
2. Which command can be used to determine the naming convention for the interfaces?
Syntax
The commands required for this exercise are listed in Table 2-1. See Module 2, Static Routing
and Default Routes, for more information. Each command may have additional possible
parameters. Use the “?” character for help and to explore all command line options. Other
commands may also be used, including those from previous courses.
Exercise
1. Configure default routes from the access router to the edge and core routers.
2. Configure an explicit static route from your pod’s core router to the loopback and system
interfaces of your edge and access routers, and from your pod’s edge router to the
loopback and system interfaces of the your core and access routers.
Verification
Objective
Configure static routes between the core routers to provide direct connectivity between pods.
Each core router should have a total of three static routes.
Exercise
Configure static routes between the core routers.
1. Configure static routes on your pod’s core router to the core routers of the other pods.
2. Verify that the core router has the static routes listed in its routing table.
Objective
Configure floating static routes between the core routers to provide redundant connectivity
between the pods, as listed in Table 2-2.
Exercise
Configure floating static routes between the core routers.
1. Configure a floating static route from your pod’s core router to access a remote pod, as
listed in Table 2-2. Each pod should have a single floating static route.
2. Examine your configuration to ensure that the floating static route is configured.
Verification
1. From your core router, ping the system interfaces of the remote pod’s routers that your
floating static route has been configured for.
2. On your core router, type the show router static-route command and examine the
current static route entries.
3. From your core router, shut down the port to the remote pod that the floating static route
has been configured for.
4. On your core router, retype the show router static-route command and note the
differences in the static route entries.
5. Check your routing table to ensure that the floating static route has replaced the original
static route that you configured to the remote pod.
6. From your core router, ping the system interfaces of the remote pod’s routers that your
floating static route has been configured for.
7. Using the trace command, trace the path being taken to the remote pod. Map and verify
the path being taken.
8. Upon completion, reactivate the port that you shut down in step 3.
Questions
1. Which command was used to configure a static route to your remote peer?
Objective
Configure a black hole static route on the core routers and examine the routing table.
Exercise
Configure a black hole static route on the core routers.
1. Configure a black hole static route from your pod’s core router to drop packets that are
destined for your pod address range. Each pod should have a single black hole static route.
It should show the previous floating static route and the black-hole static route.
2. Examine your configuration to ensure that the black hole route is configured.
3. Are you able to test the functionality of black hole? Why?
Verification
1. From your core router, ping the system interfaces of the edge routers that your black hole
static route has been configured.
2. On your core router, type the show router static-route command and examine the
current static route entries.
Questions
1. Which command was used to configure a black hole static route to your edge router?
2. Did the ping and traceroute commands to the system interface of the edge router work?
Notes
Syntax
The commands required for Lab 4 are listed in Table 4-1. Each command may have additional
possible parameters. Use the “?” character for help and to explore all command line options.
Other commands may also be used, including those in previous exercises.
Objective
Exercise
1. Configure OSPF on the core and edge routers in area 0.0.0.0.
area 0.0.0.0
interface "system"
exit
interface "C_E1"
exit
interface "loopback1"
exit
interface "loopback2"
exit
interface "C1_C2"
exit
interface "C1_C3"
exit
interface "C1_C4"
exit
exit
Verification
1. Verify your routing configuration by examining the OSPF tables on all routers.
Questions
1. What is another term for area 0.0.0.0?
Objective
Exercise
4. Enable debug-trace to look at OSPF packets on the edge router. To enable debug-trace:
5. Shut down OSPF on the edge router and start it again. Approximately how many packets
are exchanged to establish the adjacency?
6. With debug-trace running, turn on authentication on the edge router and watch the
packets that are exchanged. Use the password Alcatel. Note which packets are being
exchanged when authentication fails.
7. Note the state that the edge and the core router are stuck in. Enable authentication on the
core router to the edge and verify that the adjacency is formed. Enable authentication on
your other interfaces.
8. Verify the routes in the routing table. Verify that you can ping the edge routers in the
other pods.
9. Change the link from the edge to the core back to broadcast mode while running debug-
trace. Watch to see which router is selected as the DR.
Verification
10. Verify that all the expected adjacencies are formed with authentication.
11. Verify that the expected routes are in the routing table.
12. Using ping, verify connectivity to the other edge routers from your edge router.
Questions
13. Approximately how many packets are required to establish the adjacency?
14. Which packets are being exchanged when authentication fails?
Objective
Exercise
1. In this exercise, students will work in two groups, one group will configure a VPLS on the
upper pods, and the second group will do the same on the lower pods. The VPLS will be
configured on the edge routers. The three routers participating in the service will be a
core, access, and the opposite pod edge router. Use the same VPLS ID for all SAPs. Notice
the change to the interface IP addresses on the access, core and opposite pod edge routers
towards the VPLS on the edge router to be /29 from /30. Use the following commands to
create the VPLS connection between the routers.
-----------------------------------------------------------
Service Access & Destination Points
-----------------------------------------------------------
Identifier Type AdmMTU OprMTU Adm Opr
-----------------------------------------------------------
sap:1/1/1 null 1514 1514 Up Up
sap:1/1/2 null 1514 1514 Up Up
sap:1/1/3 null 1514 1514 Up Up
3. Determine which is the DR and which the BDR in your pod. Note this information.
4. Check your routing table to verify that you have routes to all networks.
5. From the access router, ping the system interfaces of the other core routers to verify
connectivity.
Verification
1. Verify your routing configuration by examining the OSPF tables on all routers.
2. Ensure that all networks propagate to peers just as they did in the previous lab.
3. Verify connectivity by issuing the traceroute and ping commands.
4. Use the OSPF show commands to examine the databases for accuracy.
5. How many routes are in your routing table?
To configure the ports in network mode, shut down the ports and then use the command
Questions
2. Which state are the routers in if the link type does not match?
3. How are the type 1 and type 2 LSAs labeled in the database?
4. Which state are the routers in if the authentication password does not match?
Notes
Syntax
The commands required for Lab 5 are listed in Table 5-1. Each command may have additional
possible parameters. Use the “?” character for help and to explore all command line options.
Other commands may also be used, including those in previous exercises.
Objective
router-id 172.19.1.1
area 0.0.0.0
interface "system"
exit
interface "C4_C2"
exit
interface "C4_C1"
exit
interface "C4_C3"
exit
interface "loopback1"
exit
interface "loopback2"
exit
exit
area 0.0.0.4
interface "C4_E6"
exit
exit
Verification:
1. Verify your routing policies by examining the OSPF tables on all routers.
2. Ensure that summary networks propagate to peer core routers, by having a Telnet session
with a remote peer and checking its routing table.
3. Verify connectivity by issuing the traceroute and ping commands.
4. Use the OSPF show commands to examine the databases for accuracy.
5. How many routes are in your routing table?
Questions
1. Which type of router connects more than one area together?
2. Which types of LSAs exist in a multi-area network that are not in a single area OSPF
network?
Objective
Exercise
1. Examine the LSDB to see what types of LSAs it contains.
2. Remove the loopback interfaces on the edge router from OSPF.
3. Configure the edge router as an ASBR, and create and apply an export policy to export the
loopback networks to OSPF. To create an export policy, use the following commands. For
more details, you can refer to the scalable IP network lab guide.
To create a Routing Policy
config>router# policy-options
To enter the edit mode for creating a policy option
config>router>policy-options# begin
To name the routing policy
config>router>policy-options# policy-statement "EXPOL"
To edit routing policy entries
config>router>policy-options>policy-statement# entry 10
To define the routing protocol being advertised
config>router>policy-options>policy-statement>entry# from protocol
direct
To define the action to be taken by the policy
action {accept | next-entry | next-policy | reject}
Example: config>router>policy-options>policy-statement>entry# action
accept
To save the configured policy-option
config>router>policy-options# commit
4. On the core router, verify that the routing table contains routes to your loopback
networks.
5. Check the LSDB and note the types of LSAs it contains.
6. Verify the operation of OSPF.
Verification
1. Verify your route policies by examining the OSPF tables on all routers.
2. Verify connectivity by issuing the traceroute and ping commands.
3. Use the OSPF show commands to examine the databases for accuracy.
4. How many routes are in your routing table?
Questions
1. Which type of router connects to non-OSPF routing domains?
2. Which types of LSAs exist in an OSPF network connected to other routing domains that are
not in an OSPF-only network?
Objective
Together with your instructor, choose two areas and convert them to an OSPF stub areas, and
then examine the differences in the routing table.
Exercise
1. Examine the LSDB to see what types of LSAs it contains, and verify the routes in the routing
table.
2. Remove the export policy from your edge router so it is no longer flooding Type 5 LSAs.
Convert your area to a stub area.
Verification
1. Verify connectivity by issuing the traceroute and ping commands.
2. Use the OSPF show commands to examine the databases for accuracy.
3. How many routes are in your routing table?
Questions
1. What changes occur when the network is converted to a stub area?
Objective
Together with your instructor, choose two areas and convert them to OSPF totally stubby
areas, and then examine the differences in the routing table.
Exercise
1. Examine the LSDB to see what types of LSAs it contains, and verify the routes in the routing
table.
2. Implement summarization on your ABR to advertise your area as a single network entry to
the other pods.
config>router>ospf>area>stub# no summaries
Verification
1. Verify connectivity by issuing the traceroute and ping commands.
2. Use the OSPF show commands to examine the databases for accuracy.
3. How many routes are in your routing table?
Questions
1. What is the effect on the rest of the network of implementing summarization on your ABR?
2. What changes occur when the stub area is configured with no summaries?
Objective
Together with your instructor, choose two areas and convert them to OSPF NSSA areas, and
then examine the differences in the routing table.
Exercise
1. Examine the LSDB to see what types of LSAs it contains, and verify the routes in the routing
table.
2. Convert your area to an NSSA. Add a policy on your edge router to export your loopback
networks and apply it to export these networks into OSPF.
export "EXP_Loop"
exit
area 0.0.0.4
nssa
exit
interface "C4_E6"
exit
exit
Verification
1. Verify connectivity by issuing the traceroute and ping commands.
2. Use the OSPF show commands to examine the databases for accuracy.
3. How many routes are in your routing table?
Questions
1. What changes occur when the network is converted to an NSSA?
Exercise
1. Configure your loopback interfaces on the edge router to be in area 1.1.1.X, where X is
your pod number.
2. Remove the NSSA configuration.
3. Configure area 0.0.0.0 on the edge router so that the virtual link can operate correctly.
4. Identify the RID of each router (core and edge) by using the show router ospf neighbor
command.
Verification
1. Verify your virtual link implementation by examining the OSPF tables on all routers.
2. Ensure that the core and edge routers maintain OSPF convergence.
3. Verify connectivity by issuing the traceroute and ping commands.
4. Use the OSPF show commands to examine the databases for accuracy.
Questions
1. Why are there so many more LSAs in the router databases after the virtual link is
implemented?
Notes
Syntax
The commands required for Lab 6 are listed in Table 6-1. Each command may have additional
possible parameters. Use the “?” character for help and to explore all command line options.
Other commands may also be used, including those in previous exercises.
Exercise
1. Configure IS-IS on the core, edge and access routers in area 49.0051.
2. Ensure all interfaces are participating in the IS-IS instance.
3. When you have confirmed that IS-IS is active and converged, shut down OSPF on the router.
Verification
1. Verify your route policies by examining the IS-IS tables on all routers.
2. Ensure that all networks propagate to peers just as they did prior to this lab.
3. Verify connectivity by issuing the traceroute and ping commands.
4. Use the IS-IS show commands to examine the databases for accuracy.
5. How many routes are in your routing table?
Questions
1. IS-IS is what type of routing protocol?
Objective
Exercise
1. Enable debug-trace to look at IS-IS packets on the edge router.
2. Shut down IS-IS on the edge router and start it again. Note the packets exchanged to
establish the adjacency.
3. With debug-trace running, turn on authentication on the edge router and watch the
packets that are exchanged. Use the password Alcatel. Note which packets are being
exchanged when authentication fails.
4. Note the state that the edge and the core router are stuck in. Enable authentication on the
core router to the edge and verify that the adjacency is formed. Enable authentication on
your other interfaces.
*A:Core_Pod1>config>router>isis# info
----------------------------------------------
area-id 49.0051
authentication-key "B8KjnQ7FUVsaiZJg8TjroibV7dti5iHF" hash2
authentication-type password
interface "system"
exit
interface "C_E1"
exit
interface "C1_C2"
exit
interface "C1_C3"
exit
interface "C1_C4"
exit
----------------------------------------------
5. Verify the routes in the routing table. Verify that you can ping the edge routers in the
other pods.
6. Change your link from the edge to the core to point-to-point mode while running debug-
trace. Note which packets are being exchanged when the adjacency fails to form. See what
state the edge and core routers are stuck in.
*A:Edge_Pod1>config>router>isis# info
----------------------------------------------
level-capability level-1
area-id 49.0051
interface "system"
exit
interface "E_C1"
interface-type point-to-point
exit
interface "E_A1"
exit
-----------------------------------------------------------
*A:Core_Pod1>config>router>isis# info
Verification
1. Verify that all the expected adjacencies are formed with authentication.
2. Verify that the expected routes are in the routing table.
3. Using ping, verify connectivity to the other edge routers from your edge router.
Questions
1. Approximately how many packets are required to establish the adjacency?
4. Which state are the routers stuck in if the authentication password does not match?
5. Which packets are being exchanged when the adjacency fails because the link types do not
match?
6. Which state are the routers stuck in when the link types do not match?
Objective
Exercise
8. In this exercise, students will work in two groups, one group will configure a VPLS on the
upper pods, and the second group will do the same on the lower pods. The VPLS will be
configured on the edge routers. The three routers participating in the service will be a
core, access, and the opposite pod edge router. Use the same VPLS ID for all SAPs. Notice
the change to the interface IP addresses on the access, core and opposite pod edge routers
towards the VPLS on the edge router to be /29 from /30. Use the following commands to
create the VPLS connection between the routers.
-----------------------------------------------------------
Service Access & Destination Points
-----------------------------------------------------------
Identifier Type AdmMTU OprMTU Adm Opr
-----------------------------------------------------------
sap:1/1/1 null 1514 1514 Up Up
sap:1/1/2 null 1514 1514 Up Up
sap:1/1/3 null 1514 1514 Up Up
11. Check your routing table to verify that you have routes to all networks.
12. From the access router, ping the system interfaces of the other core routers to verify
connectivity.
Verification
13. Verify your routing configuration by examining the ISIS tables on all routers.
14. Ensure that all networks propagate to peers just as they did in the previous lab.
15. Verify connectivity by issuing the traceroute and ping commands.
16. Use the ISIS show commands to examine the databases for accuracy.
17. How many routes are in your routing table?
Objective
Exercise
1. Verify IS-IS operation in a single area.
2. Remove the current implementation of IS-IS.
3. Activate IS-IS in the correct area, as shown in Figure 6-5. Implement only the required level
of IS-IS, based on the type of router you are configuring (L1, L2, or L1/L2).
4. Ensure that each interface is only running the level of IS-IS required, and not both L1 and
L2 unless it is specifically required to.
Verification
1. Verify your routing policies by examining the IS-IS tables on all routers.
2. Ensure that all networks propagate to peers just as they did prior to this lab.
3. Verify connectivity by issuing the traceroute and ping commands.
4. Use the show router isis and show router route commands to verify the operation of
IS-IS on your routers.
5. How many routes are in your routing table?
Objective
Exercise
1. Using the summary-address command, implement summarization on your core routers.
2. Ensure that this summary is only advertised using L2 updates, not L1 updates.
*A:Core_Pod3>config>router>isis# info
----------------------------------------------
area-id 49.0002
summary-address 172.18.0.0/16 level-2
interface "system"
exit
interface "C3_C1"
level-capability level-2
exit
interface "C3_C2"
exit
interface "C3_C4"
level-capability level-1
exit
-----------------------------------------------------------
Verification
1. Verify your routing policies by examining the IS-IS tables on all routers.
2. Ensure that the summary networks propagate to the peer core routers.
3. Verify connectivity by issuing the traceroute and ping commands.
4. Use the IS-IS show commands to examine the databases for accuracy.
5. How many routes are in your core and edge routers? Why?
Questions
1. What is the default level that is set on a router?
2. Which level should a router that connects multiple areas be set to?
3. A router that connects to only those routers in its area should be set to which level? (L1,
L2, or L1/L2)
Exercise
As shown in Figure 7-1, you will create a separate OSPF area for each edge and access routers
and a portion of the core router (ASBR). The core routers will be interconnected using IS-IS
area ID 49.0000. When the core routers see both OSPF and IS-IS routes, you will create a policy
to redistribute OSPF into IS-IS and IS-IS into OSPF.
1. Remove the IS-IS routing protocol from the edge and access routers.
3. Remove the current IS-IS area from the core router and enter the new IS-IS area (49.0000).
4. Configure OSPF on the core router, using the same area number as the edge and access
routers.
5. Remove the interface that connects the core to the edge from the IS-IS routing protocol
and enter it into the OSPF routing protocol.
6. Ensure that the IS-IS routing process on the core router has an L1/L2 capability. To
redistribute routes from another routing protocol, IS-IS must have an L2 capability.
7. On the core router, enter into the OSPF routing process and configure the core as an ASBR.
As previously discussed, the ASBR is the only OSPF router that can connect to another
routing protocol.
8. Examine the routing table of the core router and ensure that it has learned both OSPF and
IS-IS routes.
9. Examine the status of the OSPF portion of the core router and ensure that it has been
configured as an ASBR.
11. Apply the policy under the routing protocols to make it effective.
configure router ospf export <policy-name>
configure router isis export <policy-name>
12. Examine the routing table of the edge or access router and you should see all the networks.
Verification
1. On the core router, verify that there are routes from IS-IS and OSPF in the routing table.
2. On the edge router, verify that all routes are in the routing table.
3. From the edge router, ping the other edge routers to verify connectivity across the
network.
Notes
Exercise 2.3
Questions
1. Which command was used to configure a static route to your remote peer?
The configure router static-route command accomplishes this task.
2. How can a floating static route become active?
When the path of lower preference is removed from the routing table, the floating static
route takes precedence.
3. What is the default preference value for a static route?
The default preference value for static routes is 5.
Exercise 4.1
Questions
1. What is another term for area 0.0.0.0?
The backbone area
2. Which command is used to confirm that OSPF is working correctly?
The show router ospf command provides enough information to validate if OSPF is
working on the router.
3. How is cost calculated on an interface by default?
The default reference bandwidth is 100,000,000 kb/s divided by the bandwidth of the
interface.
Exercise 4.2
Questions
1. Which of the two routers in your pod is the DR?
2. Which state are the routers in if the link type does not match?
The router would be in the initializing state
3. How are the type 1 and type 2 LSAs labeled in the database?
Router and network
Questions
1. Which packets are being exchanged when authentication fails?
2. Which state are the routers in if the authentication password does not match?
Initializing state
Exercise 5.1
Questions
1. What type of router connects more than one area together?
An ABR connects more than one area together.
2. Which types of LSAs exist in a multi-area network that are not in a single area OSPF
network?
Type 3,4, 5 and 7
Exercise 5.2
Questions
1. Which type of router connects to non-OSPF routing domains?
ASBR
2. Which type of LSAs exist in an OSPF network connected to other routing domains that are
not in an OSPF-only network?
Type 5
Exercise 5.3
Question
1. What changes occur when the network is converted to a stub area?
A default route 0.0.0.0/0 will be added to the database, and no external routes are
allowed into the area
Exercise 5.4
Questions
1. What changes occur when the stub area is configured with no summaries?
No summary routes will be allowed to the area, instead the default route will be used
2. What is the effect on the rest of the network of implementing summarization on your ABR?
Reduces the size of network routing tables and LSA traffic
Questions
1. What changes occur when the network is converted to an NSSA?
Exercise 5.6
Question
1. Why are there so many more LSAs in the router databases after the virtual link is
implemented?
Virtual link would allow the connection of new are into the backbone area, and therefore
new LSAs will be added to the database
Exercise 6.1
Questions
1. IS-IS is what type of routing protocol?
IS-IS is a link-state routing protocol.
2. What is the default cost for each link in an IS-IS network?
The default cost for each network segment is 10.
3. What does “area 49” denote in IS-IS?
Area 49 denotes that a locally administered area addressing scheme is in use, not one
allocated by a government authority. This is the most common implementation in IS-IS.
Exercise 6.2
Questions
1. Draw a time/sequence diagram that shows the packets exchanged to establish an
adjacency.
3. Which state are the routers stick in if the authentication password does not match?
Down state
4. Which packets are being exchanged when the adjacency fails because the link types do not
match?
Hello packets, different hello packets are sent on broadcast and point to point links
5. Which state are the routers stuck in when the link types do not match?
Down state
Exercise 6.4
Command Results
Admin display-config Shows the router configuration
show router route Shows the routing table
configure router# info Provides information about the configuration of your
router
show router isis Provides information about the IS-IS process
show route ospf Provides information about the OSPF protocol attributes
show router vrrp Shows the VRRP process
show router vrrp instance interface Provides VRRP information about a specific interface
XXX
show cflowd Provides information about the cflowd operation
show filter Shows the status of the filter you created
trace Traces the path being taken
ping Sends ICMP echo packets
Exercise 2.1
Configure a default static route on the edge router:
Exercise 2.3
Configure floating static routes and test them by shutting down the primary path. When
completed, activate the primary path:
Exercise 4.1
Configure OSPF on your pod routers:
Configure OSPF
Edge-Pod1>config>router# ospf
Edge-Pod1>config>router>ospf$ area 0.0.0.0
Edge-Pod1>config>router>ospf>area$ interface E1-C1
Edge-Pod1>config>router>ospf>area>if$ exit
Edge-Pod1>config>router>ospf>area$ interface E1-A1
Edge-Pod1>config>router>ospf>area>if$ exit
Edge-Pod1>config>router>ospf>area# interface EL-1
Edge-Pod1>config>router>ospf>area>if$ exit
Edge-Pod1>config>router>ospf>area# interface EL-2
Edge-Pod1>config>router>ospf>area>if$ exit
Edge-Pod1>config>router>ospf>area# interface system
Edge-Pod1>config>router>ospf>area>if$ exit
Edge-Pod1>config>router>ospf>area#
Core-Pod1>config>router# ospf
Core-Pod1>config>router>ospf$ area 0.0.0.0
Core-Pod1>config>router>ospf>area$ interface C-E
Core-Pod1>config>router>ospf>area>if$ exit
Core-Pod1>config>router>ospf>area# interface C1-C2
Core-Pod1>config>router>ospf>area>if$ exit
Core-Pod1>config>router>ospf>area# interface C1-C3
Core-Pod1>config>router>ospf>area>if$ exit
Core-Pod1>config>router>ospf>area# interface C1-C4
Core-Pod1>config>router>ospf>area>if$ exit
Core-Pod1>config>router>ospf>area# interface CL-1
Exercise 5.3
Configure your area as a stub and then an enhanced stub configuration:
Exercise 5.4
Configure your area as a stub with no summaries and with network summarization:
Exercise 5.5
Change to an NSSA and subsequently to an enhanced NSSA configuration:
Core-Pod1>config>router# ospf
Core-Pod1>config>router>ospf# area 0.0.0.1
Core-Pod1>config>router>ospf>area# nssa
Exercise 5.6
Remove NSSA and configure a virtual link:
Core-Pod1>config>router# ospf
Core-Pod1>config>router>ospf# area 0.0.0.1
Core-Pod1>config>router>ospf>area# no nssa
Core-Pod1>config>router>ospf>area# virtual-link 172.16.8.1 transit-area 0.0.0.1
Exercise 6.1
Configure IS-IS for a single area:
Edge-Pod1>config>router# isis
Edge-Pod1>config>router>isis$ area-id 49.0051
Exercise 6.2
Implement authentication for IS-IS updates:
Exercise 6.3
Migrate to a multiple-area IS-IS configuration:
Core-Pod1>config>router# isis
Core-Pod1>config>router>isis# shutdown
Core-Pod1>config>router>isis# exit
Core-Pod1>config>router# no isis
Core-Pod1# configure router isis
Core-Pod1>config>router>isis# area-id 40.0001
Core-Pod1>config>router>isis# interface system
Core-Pod1>config>router>isis>if# exit
Core-Pod1>config>router>isis# interface CL-1
Core-Pod1>config>router>isis>if# exit
Core-Pod1>config>router>isis# interface CL-2
Core-Pod1>config>router>isis>if# exit
Core-Pod1>config>router>isis# interface C-E
Core-Pod1>config>router>isis>if# level-capability level-1
Core-Pod1>config>router>isis>if# exit
Core-Pod1>config>router>isis# interface C1-C2
Core-Pod1>config>router>isis>if# level-capability level-2
Core-Pod1>config>router>isis>if# exit
Core-Pod1>config>router>isis# interface C1-C3
Core-Pod1>config>router>isis>if# level-capability level-2
Core-Pod1>config>router>isis>if# exit
Core-Pod1>config>router>isis# interface C1-C4
Core-Pod1>config>router>isis>if# level-capability level-2
Core-Pod1>config>router>isis>if# exit
Core-Pod1>config>router>isis#
Edge-Pod1>config>router# isis
Edge-Pod1>config>router>isis# shutdown
Edge-Pod1>config>router>isis# exit
Edge-Pod1>config>router# no isis
Edge-Pod1>config>router# isis
Edge-Pod1>config>router>isis$ area-id 49.0001
Edge-Pod1>config>router>isis$ level-capability level-1
Edge-Pod1>config>router>isis$ interface E1-C1
Exercise 6.4
Configure summary advertisements on the core router for your pod area:
http: / /www.alcatel-lucent.com