Saturday, December 21, 2024
Home Uncategorized OSPF LAB CHALLENGE FOR REACHABILITY

OSPF LAB CHALLENGE FOR REACHABILITY

OSPF LAB CHALLENGE FOR REACHABILITY

Download the LAB and open it in the Packet Tracer 8.0 and complete the challenge as per the details given in the video.

This kind of situation you might come across in real networks.

Once you complete the Challenge write in the comment box that you have completed.

RELATED ARTICLES

Metasploitable

Metasploitable is an intentionally vulnerable Linux virtual machine This is Metasploitable2 (Linux) Metasploitable is an intentionally...

What is a Website

A site is a collection of numerous web pages, and web pages are advanced records that are composed utilizing HTML(HyperText Markup Dialect).

List of Linux Commands

List of Linux Commands The following table is a list of linux commands found on a Redhat 9.0 server.

9 COMMENTS

  1. I have find some solution are given below:
    1. All the Router are should be in Same Area(Area 0).
    2. Solution:
    R1# config t
    R1(cofig)#router ospf 1
    R1(config-router)#network 192.168.11…14.0 255.255.255.0 area 0
    R1(config-router)#end

  2. Hello. We should configure all ospf in specific area might be area 0.
    Im a beginner in networking field so I was in search for these labs. Thank u very very much for this favour sir.

  3. In this we should configure all ospf in a specific area e.g area 0.
    Im a beginner in networking and was looking for these type of labs. Thank u very very much sir…

  4. We have to create virtual link. I have created two virtual link, between R1 to R3 and then R3 to R4. Then route from R4 will be exchanged and we have reachability from R1 to R4 network. That is what I have done in this lab and ping got success.

  5. in this we should configure all ospf in a specific area e.g in area 0. I am a beginner in networking field and was looking for these types of labs. Thank u very very much sir. Love from Pakistan..

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Metasploitable

Metasploitable is an intentionally vulnerable Linux virtual machine This is Metasploitable2 (Linux) Metasploitable is an intentionally...

What is a Website

A site is a collection of numerous web pages, and web pages are advanced records that are composed utilizing HTML(HyperText Markup Dialect).

List of Linux Commands

List of Linux Commands The following table is a list of linux commands found on a Redhat 9.0 server.

Kali 2024 Customised

Added Features Enabled root login. Username: root

Recent Comments

Nadeem akhtar shaikh on VPN CHALLENGE USING GRE
Nadeem akhtar shaikh on VPN CHALLENGE USING GRE
Nadeem akhtar shaikh on VPN CHALLENGE USING GRE
Suyash Gaikwad on VPN CHALLENGE USING GRE
Piyush Gawande on VPN CHALLENGE USING GRE