Lab Practice - Configuring Basic Single-Area OSPFv2

Topology Cable the network as shown in the topology IP Address Table Device Interface IP/Network Address Subnet Mask Default Gateway R1 L0 209.165.10.1 255.255.255.0 N/A G0/0 172.16.0.1 255.255.255.0 N/A S0/0/0 192.168.10.2 255.255.255.252 N/A S0/0/1 192.168.10.6 255.255.255.252 N/A R2 L5 200.100.11.1 255.255.255.192 N/A L6 200.100.11.65 255.255.255.192 N/A L7 200.100.11.129 255.255.255.224 N/A G0/0.10 172.16.1.1 255.255.255.128 N/A G0/0.20 172.16.1.129 255.255.255.192 N/A S0/0/0 192.168.10.1 255.255.255.252 N/A S0/0/1 192.168.10.9 255.255.255.252 N/A R3 L8 200.100.12.1 255.255.255.128 N/A L9 200.100.12.129 255.255.255.192 N/A L10 200.100.12.193 255.255.255.224 N/A G0/0.30 172.16.2.1 255.255.255.192 N/A G0/0.40 172.16.2.65 255.255.255.224 N/A S0/0/0 192.168.10.10 255.255.255.252 N/A S0/0/1 192.168.10.5 255.255.255.252 N/A S1 Int vlan 1 172.16.0.2 255.255.255.0 N/A S2 Int vlan 1 172.16.1.194 255.255.255.224 N/A S3 Int vlan 1 172.16.2.129 255.255.255.240 N/A PC1 NIC 172.16.1.3 255.255.255.128 172.16.1.1 PC2 NIC 172.16.1.131 255.255.255.192 172.16.1.129 PC3 NIC 172.16.2.3 255.255.255.192 172.16.2.1 PC4 NIC 172.16.2.67 255.255.255.224 172.16.2.65 PC5 NIC 172.16.0.4 255.255.255.0 172.16.0.1 Device Configs R1 Configs hostname R1 no ip domain-lookup enable secret class line console 0 password cisco logging synchronous login line vty 0 4 password cisco login banner motd ^ Unauthorized access is prohibited. ^ interface Loopback0 ip address 209.165.10.1 255.255.255.0 interface GigabitEthernet0/0 ip address 172.16.0.1 255.255.255.0 duplex auto speed auto ! interface Serial0/0/0 ip address 192.168.10.2 255.255.255.252 ! interface Serial0/0/1 ip address 192.168.10.6 255.255.255.252 clock rate 2000000 router ospf 1 router-id 1.1.1.1 log-adjacency-changes redistribute static subnets passive-interface GigabitEthernet0/0 network 192.168.10.0 0.0.0.3 area 0 network 192.168.10.4 0.0.0.3 area 0 network 172.16.0.0 0.0.0.255 area 0 default-information originate ! ip route 0.0.0.0 0.0.0.0 Loopback0 R2 Configs hostname R2 no ip domain-lookup enable secret class line console 0 password cisco logging synchronous login line vty 0 4 password cisco login banner motd ^ Unauthorized access is prohibited. ^ interface Loopback5 ip address 200.100.11.1 255.255.255.192 ! interface Loopback6 ip address 200.100.11.65 255.255.255.192 ! interface Loopback7 ip address 200.100.11.129 255.255.255.224 ! interface GigabitEthernet0/0 no ip address duplex auto speed auto ! interface GigabitEthernet0/0.10 encapsulation dot1Q 10 ip address 172.16.1.1 255.255.255.128 ! interface GigabitEthernet0/0.20 encapsulation dot1Q 20 ip address 172.16.1.129 255.255.255.192 interface Serial0/0/0 ip address 192.168.10.1 255.255.255.252 clock rate 2000000 ! interface Serial0/0/1 ip address 192.168.10.9 255.255.255.252 router ospf 1 router-id 2.2.2.2 log-adjacency-changes passive-interface GigabitEthernet0/0 passive-interface GigabitEthernet0/0.1 passive-interface GigabitEthernet0/0.10 passive-interface GigabitEthernet0/0.20 network 192.168.10.0 0.0.0.3 area 0 network 192.168.10.8 0.0.0.3 area 0 network 200.100.11.0 0.0.0.63 area 0 network 200.100.11.64 0.0.0.63 area 0 network 200.100.11.128 0.0.0.31 area 0 network 172.16.1.0 0.0.0.127 area 0 network 172.16.1.128 0.0.0.63 area 0 network 172.16.1.192 0.0.0.31 area R3 Configs hostname R3 no ip domain-lookup enable secret class line console 0 password cisco logging synchronous login line vty 0 4 password cisco login banner motd ^ Unauthorized access is prohibited. ^ ! interface Loopback8 ip address 200.100.12.1 255.255.255.128 ! interface Loopback9 ip address 200.100.12.129 255.255.255.192 ! interface Loopback10 ip address 200.100.12.193 255.255.255.224 ! interface GigabitEthernet0/0.30 encapsulation dot1Q 30 ip address 172.16.2.1 255.255.255.192 ! interface GigabitEthernet0/0.40 encapsulation dot1Q 40 ip address 172.16.2.65 255.255.255.224 interface Serial0/0/0 ip address 192.168.10.10 255.255.255.252 clock rate 2000000 ! interface Serial0/0/1 ip address 192.168.10.5 255.255.255.252 router ospf 1 router-id 3.3.3.3 log-adjacency-changes passive-interface GigabitEthernet0/0 passive-interface GigabitEthernet0/0.1 passive-interface GigabitEthernet0/0.30 passive-interface GigabitEthernet0/0.40 network 192.168.10.4 0.0.0.3 area 0 network 192.168.10.8 0.0.0.3 area 0 network 200.100.12.0 0.0.0.127 area 0 network 200.100.12.128 0.0.0.63 area 0 network 200.100.12.192 0.0.0.31 area 0 network 172.16.2.0 0.0.0.63 area 0 network 172.16.2.64 0.0.0.31 area 0 network 172.16.2.128 0.0.0.15 area 0 S1 Configs hostname S1 no ip domain-lookup interface Vlan1 ip address 172.16.0.2 255.255.255.0 S2 Configs hostname S2 no ip domain-lookup interface FastEthernet0/5 switchport access vlan 10 switchport mode access ! interface FastEthernet0/10 switchport access vlan 20 switchport mode access ! interface GigabitEthernet0/1 switchport mode trunk interface Vlan1 ip address 172.16.1.194 255.255.255.224 ! S3 Configs hostname S3 no ip domain-lookup ! interface FastEthernet0/5 switchport access vlan 30 switchport mode access ! interface FastEthernet0/10 switchport access vlan 40 switchport mode access ! interface GigabitEthernet0/1 switchport mode trunk interface Vlan1 ip address 172.16.2.129 255.255.255.240

May 27, 2024 · 3 min · 630 words · Haziq Rohaizan

How to Install Transmission and How to Use Torrents

Torrents have become a popular way to share and download large files over the internet. To engage in torrenting, you’ll need a torrent client, and Transmission is one of the most user-friendly options available. In this guide, we’ll walk you through the process of installing Transmission and using it to download torrents. What is a Torrent? A torrent is a file-sharing protocol used to distribute data across the internet. Instead of relying on a single server, torrents utilize a network of users (peers) to share and download files. Here’s how it works: ...

October 29, 2023 · 3 min · 542 words · Haziq Rohaizan

Setting Up GPG to Verify Commits on Windows

Git is a powerful version control system that allows developers to track changes in their codebase. When collaborating on projects, it’s essential to verify the authenticity of commits to ensure the integrity of the code. One way to achieve this is by using GPG (GNU Privacy Guard) to sign and verify commits. In this guide, we’ll walk you through the process of setting up GPG to verify commits on a Windows machine. ...

October 10, 2023 · 3 min · 524 words · Haziq Rohaizan

Connecting to Github With SSH on Windows

Secure Shell (SSH) is a cryptographic network protocol used for secure communication over unsecured networks. It’s commonly used for securely accessing remote servers and services like GitHub. By setting up SSH on your Windows machine and linking it to your GitHub account, you can interact with your repositories using secure, encrypted connections. In this guide, we’ll walk you through the steps to set up SSH on GitHub and Windows. Prerequisites Before we begin, make sure you have the following: ...

September 30, 2023 · 3 min · 570 words · Haziq Rohaizan
Google Bard Logo

Google Bard: A Large Language Model for Everyone

Google Bard is a large language model (LLM) that can generate text, translate languages, write different kinds of creative content, and answer your questions in an informative way. It is still under development, but it has learned to perform many kinds of tasks, including: Following instructions and completing requests thoughtfully. Answering questions in a comprehensive and informative way, even if they are open ended, challenging, or strange. Generating different creative text formats of text content, like poems, code, scripts, musical pieces, email, letters, etc. Bard is available in more than 40 languages and over 230 countries and territories. You can use it to: ...

September 3, 2023 · 2 min · 311 words · Haziq Rohaizan

BNM Imposes a Fine of RM600,000 on TNG Digital

Bank Negara Malaysia today announced that they have imposed a fine of RM600,000 on TNG Digital Sdn Bhd, for breaching two Financial Services Act 2013. TNGD was found to have failed to screen customers’ names, thereby causing two individuals who were punished under the AMLA (Anti-Money Laundering, Anti-Terrorist Financing and Proceeds of Unlawful Activities Act 2014) to use services under TNGD. TNGD is also said not to confirm and investigate further involving the customer. ...

September 3, 2023 · 1 min · 90 words · Aman
new icon

Introduce New Logo

September 2, 2023 · Haziq Rohaizan

GUIDELINES ELECTRICAL WIRING DOMESTIC INSTALLATION

You can download the guideline below. Suruhanjaya Tenaga Guidelines

February 2, 2023 · 1 min · Haziq Rohaizan

Run Command in Background on Linux

Tested on : Ubuntu Server 20.04 LTS Today, I want to show you how to run linux command in background even the terminal close. I will use rclone as example application to run in background. It’s not difficult to run command in background. You just need to add & symbol and type disown command after the first command run in the background. Example : rclone sync -P /mnt/disk4/pictures /mnt/disks/external/pictures > ./rclone-log.txt & then run : ...

May 20, 2022 · 1 min · Haziq Rohaizan

Ubuntu Server - Laptop Lid Ignore

Use Your Laptop As A Server Tested on : Ubuntu 20.04 LTS To disable entering the sleep mode I had to edit the /etc/systemd/logind.conf file and modify the line: Just uncomment the line by removing # from this : #HandleLidSwitch=suspend #LidSwitchIgnoreInhibited=no #HandleLidSwitchDocked=ignore to this : HandleLidSwitch=ignore LidSwitchIgnoreInhibited=no HandleLidSwitchDocked=ignore Then restart the OS via: sudo service systemd-logind restart Then you can close the laptop lid .

May 12, 2022 · 1 min · Haziq Rohaizan