OSPF configuration and protocol analysis

1. Purpose of the experiment:

        Through this experiment, you can learn the OSPFv2 protocol and be able to use the GNS3 simulation environment and use wireshark to capture packets and analyze the message format of the OSPFv2 protocol.

2. Preliminary knowledge:

        OSPF (Open Shortest Path First) is a link state routing protocol widely supported by various network developers. Link state routing protocols collect topology information of the entire network and determine the shortest path to each network based on this topology information.

3. Experimental process:

        I am very disappointed. Although the ip configuration and loopback ip configuration are both fine, the package cannot be captured. I can only analyze it with the help of the package it provides.

part1: Let’s review here, how to connect GNS3 with wireshark:

1. First modify the Tools path in the packet capure window and apply

2. Then switch to secure CRT in the general console window settings, modify the Tools path, and apply

part2: Then set up the following environment. For specific methods, please refer to my RIP protocol experiment.

Part3: Follow the experimental instructions to set up the ospf protocol:

 

 

 

Part4: Analyze the data packets captured in wireshark:

1. First is the hello packet

 

The contents of the OSPF protocol include:

Version number v2, type hello Packet, length 44 bytes

Source IP address 192.168.1.1, area 0.0.0.0, subnet mask 24 bits

2. Then there is the DBD (DataBase Description) data package

 

The contents include: Forget it, there is no key point, so I won’t analyze it here. I’ll come back to it later after I understand it.

 

 

 

 

 

Guess you like

Origin blog.csdn.net/xiao_ZHEDA/article/details/132492813