{"id":1916,"date":"2017-08-01T14:56:11","date_gmt":"2017-08-01T13:56:11","guid":{"rendered":"http:\/\/www.safekom.pl\/blog\/?p=1916"},"modified":"2017-08-03T08:52:23","modified_gmt":"2017-08-03T07:52:23","slug":"heterogeniczna-infrastruktura-sieciowa-vol-1","status":"publish","type":"post","link":"https:\/\/www.safekom.pl\/blog\/lab\/heterogeniczna-infrastruktura-sieciowa-vol-1\/","title":{"rendered":"Heterogeniczna infrastruktura sieciowa vol. 1"},"content":{"rendered":"<p>Ostatnio pracuj\u0119 w \u015brodowisku heterogenicznej infrastruktury sieciowej. Ale co to znaczy dzi\u015b heterogeniczna infrastruktura sieciowa jest to tw\u00f3r w kt\u00f3rym mamy kliku r\u00f3\u017cnych producent\u00f3w sprz\u0119tu. Co raz cz\u0119\u015bciej w spotykam si\u0119 z sytuacj\u0105, \u017ce dany blog funkcjonalny jest realizowany przez jakiego\u015b producenta, np.<\/p>\n<ul>\n<li>sie\u0107 WAN<\/li>\n<li>Sie\u0107 LAN<\/li>\n<li>Sie\u0107 DC<\/li>\n<\/ul>\n<p>z czasem przychodzi potrzeba aby po\u0142\u0105czy\u0107 te bloki funkcjonalne np. zestawi\u0107 routing dynamiczny, czy skonfigurowa\u0107 dzi\u015b popularny EVPN &#8211; na ten temat b\u0119dzie po\u015bwi\u0119cony oddzielny wpis na blogu.<\/p>\n<p>Dzi\u015b poka\u017c\u0119 jak porusza\u0107 si\u0119 jednocze\u015bnie w tej samej p\u0142aszczy\u017anie na wielu urz\u0105dzeniach takich jak:<\/p>\n<ul>\n<li>Juniper<\/li>\n<li>Cisco<\/li>\n<li>Arista<\/li>\n<li>Cumulus Networks<\/li>\n<\/ul>\n<p>Wszystko zosta\u0142o uruchomione jako wirtualne maszyny na Vmware Workstation.<\/p>\n<p>Poni\u017cej porusz\u0119 podstawowe zagadnienia takie jak:<\/p>\n<ul>\n<li>podstawowe polecenia<\/li>\n<li>konfiguracja interfejs\u00f3w<\/li>\n<li>konfiguracja routingu statycznego<\/li>\n<li>konfiguracja routingu dynamicznego w oparciu o OSPF<\/li>\n<li>weryfikacja konfiguracji<\/li>\n<li>na co zwraca\u0107 uwag\u0119<\/li>\n<\/ul>\n\n<h1>Zaczynamy<\/h1>\n<p>Poni\u017cej przedstawiam podstawy poruszania po poszczeg\u00f3lnych urz\u0105dzeniach a dok\u0142adnie w CLI na ka\u017cdym z nich. Wiedza przedstawiona pozwoli zrozumie\u0107 jak konfigurujemy dane urz\u0105dzenie oraz jak wygl\u0105da sk\u0142adnia CLI.<\/p>\n<h3>Schematy<\/h3>\n<h4>L2<\/h4>\n<p>Aby lepiej by\u0142o pracowa\u0107 poni\u017cej rysunek pogl\u0105dowy dla warstwy 2:<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1918\" data-permalink=\"https:\/\/www.safekom.pl\/blog\/lab\/heterogeniczna-infrastruktura-sieciowa-vol-1\/attachment\/heterogeniczna_infra_01-2\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/08\/heterogeniczna_infra_01-1.png?fit=554%2C405&amp;ssl=1\" data-orig-size=\"554,405\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"heterogeniczna_infra_01\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/08\/heterogeniczna_infra_01-1.png?fit=300%2C219&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/08\/heterogeniczna_infra_01-1.png?fit=554%2C405&amp;ssl=1\" class=\"alignnone size-full wp-image-1918\" src=\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/08\/heterogeniczna_infra_01-1.png?resize=554%2C405\" alt=\"\" width=\"554\" height=\"405\" srcset=\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/08\/heterogeniczna_infra_01-1.png?w=554&amp;ssl=1 554w, https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/08\/heterogeniczna_infra_01-1.png?resize=300%2C219&amp;ssl=1 300w\" sizes=\"auto, (max-width: 554px) 100vw, 554px\" \/><\/p>\n<h4>L3<\/h4>\n<p>Rysunek pogl\u0105dowy dla warstwy 3<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1919\" data-permalink=\"https:\/\/www.safekom.pl\/blog\/lab\/heterogeniczna-infrastruktura-sieciowa-vol-1\/attachment\/heterogeniczna_infra_02\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/08\/heterogeniczna_infra_02.png?fit=542%2C395&amp;ssl=1\" data-orig-size=\"542,395\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"heterogeniczna_infra_02\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/08\/heterogeniczna_infra_02.png?fit=300%2C219&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/08\/heterogeniczna_infra_02.png?fit=542%2C395&amp;ssl=1\" class=\"alignnone size-full wp-image-1919\" src=\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/08\/heterogeniczna_infra_02.png?resize=542%2C395\" alt=\"\" width=\"542\" height=\"395\" srcset=\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/08\/heterogeniczna_infra_02.png?w=542&amp;ssl=1 542w, https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/08\/heterogeniczna_infra_02.png?resize=300%2C219&amp;ssl=1 300w\" sizes=\"auto, (max-width: 542px) 100vw, 542px\" \/><\/p>\n<h2>Podstawowe polecenia<\/h2>\n<p>Klika podstawowych polece\u0144 dla ka\u017cdego producenta.<\/p>\n<table style=\"border-color: #000000;\">\n<tbody>\n<tr>\n<td colspan=\"1\" rowspan=\"1\"><strong>Polecenie<\/strong><\/td>\n<td colspan=\"1\" rowspan=\"1\"><strong>Arista<\/strong><\/td>\n<td colspan=\"1\" rowspan=\"1\"><strong>Cisco<\/strong><\/td>\n<td colspan=\"1\" rowspan=\"1\"><strong>Cumulus<\/strong><\/td>\n<td colspan=\"1\" rowspan=\"1\"><strong>Juniper<\/strong><\/td>\n<\/tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">wy\u015bwietlenie konfiguracji aktywnej<\/td>\n<td colspan=\"1\" rowspan=\"1\">show running-config<\/td>\n<td colspan=\"1\" rowspan=\"1\">show running-config<\/td>\n<td colspan=\"1\" rowspan=\"1\">\u00a0net show configuration<\/td>\n<td colspan=\"1\" rowspan=\"1\">\u00a0show configuration<\/p>\n<p>w setach<\/p>\n<p>show configuration | display set<\/td>\n<\/tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">zapisanie konfiguracji<\/td>\n<td colspan=\"1\" rowspan=\"1\">copy running-config startup-config<\/td>\n<td colspan=\"1\" rowspan=\"1\">write memory<\/td>\n<td colspan=\"1\" rowspan=\"1\">\u00a0brak<\/td>\n<td colspan=\"1\" rowspan=\"1\">\u00a0brak<\/td>\n<\/tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">przej\u015bcie w tryb konfiguracji<\/td>\n<td colspan=\"1\" rowspan=\"1\">configure<\/td>\n<td colspan=\"1\" rowspan=\"1\">configure terminal<\/td>\n<td colspan=\"1\" rowspan=\"1\">\u00a0brak<\/td>\n<td colspan=\"1\" rowspan=\"1\">configure<\/td>\n<\/tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">wy\u015bwietlenie ip interfejs\u00f3w<\/td>\n<td colspan=\"1\" rowspan=\"1\">show ip interface brief<\/td>\n<td colspan=\"1\" rowspan=\"1\">show ip interface brief<\/td>\n<td colspan=\"1\" rowspan=\"1\">\u00a0net show interface<\/td>\n<td colspan=\"1\" rowspan=\"1\">\u00a0show interfaces terse<\/td>\n<\/tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">wy\u015bwietlenie tablicy routingu<\/td>\n<td colspan=\"1\" rowspan=\"1\">show ip route<\/td>\n<td colspan=\"1\" rowspan=\"1\">show ip route<\/td>\n<td colspan=\"1\" rowspan=\"1\">\u00a0net show route<\/td>\n<td colspan=\"1\" rowspan=\"1\">\u00a0show route<\/td>\n<\/tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">wy\u015bwietlenie wersji oprogramowania<\/td>\n<td colspan=\"1\" rowspan=\"1\">show version<\/td>\n<td colspan=\"1\" rowspan=\"1\">show version<\/td>\n<td colspan=\"1\" rowspan=\"1\">net show version<\/td>\n<td colspan=\"1\" rowspan=\"1\">\u00a0show version<\/td>\n<\/tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">wy\u015bwietlenie konfiguracji hardware<\/td>\n<td colspan=\"1\" rowspan=\"1\">\u00a0show environment all<\/td>\n<td colspan=\"1\" rowspan=\"1\">\u00a0show inventory<\/td>\n<td colspan=\"1\" rowspan=\"1\">\u00a0brak<\/td>\n<td colspan=\"1\" rowspan=\"1\">\u00a0show chassis hardware<\/td>\n<\/tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">wygenerowanie show tech<\/td>\n<td colspan=\"1\" rowspan=\"1\">\u00a0show tech-support<\/td>\n<td colspan=\"1\" rowspan=\"1\">\u00a0show tech-support<\/td>\n<td colspan=\"1\" rowspan=\"1\"><\/td>\n<td colspan=\"1\" rowspan=\"1\">request support information brief<\/td>\n<\/tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">wy\u015bwietlenie czasu<\/td>\n<td colspan=\"1\" rowspan=\"1\">\u00a0show clock<\/td>\n<td colspan=\"1\" rowspan=\"1\">\u00a0show clock<\/td>\n<td colspan=\"1\" rowspan=\"1\">\u00a0net show time<\/td>\n<td colspan=\"1\" rowspan=\"1\">\u00a0show system uptime<\/td>\n<\/tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">wy\u015bwietlenie log\u00f3w<\/td>\n<td colspan=\"1\" rowspan=\"1\">\u00a0show logging<\/td>\n<td colspan=\"1\" rowspan=\"1\">show logging<\/td>\n<td colspan=\"1\" rowspan=\"1\"><\/td>\n<td colspan=\"1\" rowspan=\"1\">\u00a0show log messages<\/td>\n<\/tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">\u00a0wy\u015bwietlenie kont u\u017cytkownik\u00f3w<\/td>\n<td colspan=\"1\" rowspan=\"1\">show user-account<\/td>\n<td colspan=\"1\" rowspan=\"1\">\u00a0show running-config | section username<\/td>\n<td colspan=\"1\" rowspan=\"1\">\u00a0users<\/td>\n<td colspan=\"1\" rowspan=\"1\">\u00a0show configuration system login | match user<\/td>\n<\/tr>\n<tr>\n<td>kto jest zalogowany<\/td>\n<td>show users<\/td>\n<td>show users<\/td>\n<td>who<\/td>\n<td>show system users<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Linki do dokumentacji<\/h3>\n<h6><a href=\"https:\/\/www.arista.com\/en\/um-eos\">Arista<\/a><\/h6>\n<h6><a href=\"http:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/ios\/fundamentals\/command\/reference\/cf_book.pdf\">Cisco<\/a><\/h6>\n<h6><a href=\"https:\/\/docs.cumulusnetworks.com\/display\/DOCS\/Network+Command+Line+Utility\">Cumulus<\/a><\/h6>\n<h6><a href=\"https:\/\/www.juniper.net\/documentation\/en_US\/junos12.3\/information-products\/pathway-pages\/junos-cli\/junos-cli.pdf\">Juniper<\/a><\/h6>\n<p>&nbsp;<\/p>\n<h2>Konfiguracja<\/h2>\n<h3>Hostname<\/h3>\n<p>W tym miejscu poka\u017ce jak zmieni\u0107 hostname na poszczeg\u00f3lnym urz\u0105dzeniu.<\/p>\n<h6>Arista<\/h6>\n<pre class=\"lang:sh decode:true\">Arista#configure \r\nArista(config)#hostname Arista01\r\nArista01(config)#<\/pre>\n<h6>Cisco<\/h6>\n<pre class=\"lang:sh decode:true\">Cisco#conf\r\nCisco#configure t\r\nEnter configuration commands, one per line.  End with CNTL\/Z.\r\nCisco(config)#hostname Cisco01\r\nCisco01(config)#<\/pre>\n<h6>Juniper<\/h6>\n<pre class=\"lang:sh decode:true\">root@vMX02% cli\r\nroot@vMX&gt; configure \r\nEntering configuration mode\r\n\r\n[edit]\r\nroot@vMX# set system host-name vMX01 \r\n\r\n[edit]\r\nroot@vMX# commit \r\ncommit complete\r\n\r\n[edit]\r\nroot@vMX01#<\/pre>\n<h6>Cumulus<\/h6>\n<pre class=\"lang:sh decode:true\">cumulus@cumulus:~$ net add hostname Cumulus01\r\n\r\ncumulus@cumulus:~$ comm\r\ncomm     command  \r\ncumulus@cumulus:~$ net commit \r\n--- \/etc\/hosts  2017-06-21 03:30:04.415697558 +0000\r\n+++ \/var\/run\/nclu\/netmisc\/etc_hosts     2017-08-01 09:43:25.572201909 +0000\r\n@@ -1,6 +1,6 @@\r\n 127.0.0.1      localhost\r\n ::1            localhost ip6-localhost ip6-loopback\r\n ff02::1                ip6-allnodes\r\n ff02::2                ip6-allrouters\r\n \r\n-127.0.1.1      cumulus\r\n+127.0.1.1      Cumulus01\r\n--- \/etc\/hostname       2017-06-21 03:30:04.415697558 +0000\r\n+++ \/var\/run\/nclu\/netmisc\/etc_hostname  2017-08-01 09:43:25.565201562 +0000\r\n@@ -1 +1 @@\r\n-cumulus\r\n+Cumulus01\r\n\r\n\r\n\r\nnet add\/del commands since the last 'net commit'\r\n================================================\r\n\r\n\r\nUser     Timestamp                   Command\r\n-------  --------------------------  --------------------------\r\ncumulus  2017-08-01 09:43:25.573340  net add hostname Cumulus01\r\ncumulus  2017-08-01 09:43:32.108477  net commit\r\n\r\n\r\ncumulus@cumulus:~$<\/pre>\n<p>zmian\u0119 hostname zobaczymy po przelogowaniu.<\/p>\n<h3>Dodanie u\u017cytkownika<\/h3>\n<p>W tym miejscu poka\u017c\u0119 jak doda\u0107 u\u017cytkownika z uprawnieniami administracyjnymi<\/p>\n<h6>Arista<\/h6>\n<pre class=\"lang:sh decode:true\">Arista#configure \r\nArista01(config)#username test privilege 15 secret 0 Qwert6\r\nArista01(config)#end<\/pre>\n<h6>Cisco<\/h6>\n<pre class=\"lang:sh decode:true\">Cisco#conf\r\nCisco#configure t\r\nEnter configuration commands, one per line.  End with CNTL\/Z.\r\nCisco(config)#username test privilege 15 password 0 Qwert6\r\nCisco01(config)#<\/pre>\n<h6>Juniper<\/h6>\n<pre class=\"lang:sh decode:true\">root@vMX02% cli\r\nroot@vMX&gt; configure \r\nEntering configuration mode\r\n\r\n[edit]\r\nroot@vMX01# set system login user test class super-user authentication plain-text-password \r\nNew password:\r\nRetype new password:\r\n\r\n[edit]\r\nroot@vMX01# commit    \r\ncommit complete\r\n\r\n[edit]\r\nroot@vMX01#<\/pre>\n<h6>Cumulus<\/h6>\n<p>Jeszcze nie rozgryz\u0142em \ud83d\ude42<\/p>\n<h3>Interfejsy<\/h3>\n<p>Konfigurujemy interfejsy zgodnie z rysunkiem dla po\u0142\u0105cze\u0144 L3<\/p>\n<h6>Arista<\/h6>\n<pre class=\"lang:sh decode:true\">Arista01(config)#interface Ethernet1\r\nArista01(config-if-Et1)#description \"DO--&gt;vMX ge-0\/0\/3\"\r\nArista01(config-if-Et1)#no switchport\r\nArista01(config-if-Et1)#ip address 10.10.40.2\/30\r\nArista01(config-if-Et1)#\r\nArista01(config-if-Et1)#\r\nArista01(config-if-Et1)#interface Ethernet2\r\nArista01(config-if-Et2)#description \"DO--&gt;Cumulus swp3\"\r\nArista01(config-if-Et2)#no switchport\r\nArista01(config-if-Et2)#ip address 10.10.50.2\/30\r\nArista01(config-if-Et2)#interface Ethernet3\r\nArista01(config-if-Et3)#description DO--&gt;Cisco Gi 4\"\r\nArista01(config-if-Et3)#no switchport\r\nArista01(config-if-Et3)#ip address 10.10.60.2\/30\r\nArista01(config-if-Et3)#\r\nArista01(config-if-Et3)#end<\/pre>\n<h6>Cisco<\/h6>\n<pre class=\"lang:sh decode:true\">Cisco01(config)#interface GigabitEthernet1\r\nCisco01(config-if)#desc\r\nCisco01(config-if)#description \"Do--&gt;Cumulus swp2\"\r\nCisco01(config-if)#no sh\r\nCisco01(config-if)#ip address 10.10.20.2 255.255.255.252\r\nCisco01(config-if)#                          \r\nCisco01(config-if)#interface GigabitEthernet2\r\nCisco01(config-if)#desc\r\nCisco01(config-if)#description \"DO--&gt;vMX ge-0\/0\/2\"\r\nCisco01(config-if)#\r\nCisco01(config-if)#ip address 10.10.30.2 255.255.255.252\r\nCisco01(config-if)#\r\nCisco01(config-if)#interface GigabitEthernet4           \r\nCisco01(config-if)#desc\r\nCisco01(config-if)#description \"DO--&gt;Arista eth3\"\r\nCisco01(config-if)#no sh\r\nCisco01(config-if)#ip address 10.10.60.1 255.255.255.252\r\nCisco01(config-if)#end\r\nCisco01#<\/pre>\n<h6>Juniper<\/h6>\n<pre class=\"lang:sh decode:true\">root@vMX01# set interfaces ge-0\/0\/0.0 description \"DO--&gt;Cumulus swp1\"\r\nroot@vMX01# set interfaces ge-0\/0\/0 unit 0 family inet address 10.10.10.2\/30\r\nroot@vMX01# set interfaces ge-0\/0\/2.0 description \"DO--&gt;Cisco gi 2\"\r\nroot@vMX01# set interfaces ge-0\/0\/2 unit 0 family inet address 10.10.30.1\/30\r\nroot@vMX01# set interfaces ge-0\/0\/3.0 description \"DO--&gt;Arista eth1\"\r\n[edit]\r\nroot@vMX01# commit \r\ncommit complete\r\n\r\n[edit]\r\nroot@vMX01#<\/pre>\n<h6>Cumulus<\/h6>\n<pre class=\"lang:sh decode:true\">cumulus@cumulus01:~$ \r\ncumulus@cumulus01:~$ net add interface swp1 ip address 10.10.10.1\/30\r\ncumulus@cumulus01:~$ net add interface swp1 alias \"Do--&gt;vMX ge-0\/0\/0\"\r\ncumulus@cumulus01:~$ net add interface swp2 ip address 10.10.20.1\/30\r\ncumulus@cumulus01:~$ net add interface swp2 alias \"Do--&gt;Cisco gi 1\"\r\ncumulus@cumulus01:~$ net add interface swp3 ip address 10.10.50.1\/30\r\ncumulus@cumulus01:~$ net add interface swp2 alias \"Do--&gt;Arista eth 2\"\r\ncumulus@cumulus01:~$ net commit \r\n--- \/etc\/network\/interfaces     2017-08-01 10:23:19.579855479 +0000\r\n+++ \/var\/run\/nclu\/iface\/interfaces.tmp  2017-08-01 10:25:33.973421975 +0000\r\n@@ -4,20 +4,34 @@\r\n source \/etc\/network\/interfaces.d\/*.intf\r\n \r\n # The loopback network interface\r\n auto lo\r\n iface lo inet loopback\r\n \r\n # The primary network interface\r\n auto eth0\r\n iface eth0 inet dhcp\r\n \r\n+auto swp1\r\n+iface swp1\r\n+    address 10.10.10.1\/30\r\n+    alias Do--&gt;vMX ge-0\/0\/0\r\n+\r\n+auto swp2\r\n+iface swp2\r\n+    address 10.10.20.1\/30\r\n+    alias Do--&gt;Arista eth 2\r\n+\r\n+auto swp3\r\n+iface swp3\r\n+    address 10.10.50.1\/30\r\n+\r\n auto Test\r\n iface Test\r\n     vrf-table auto\r\n \r\n auto bridge\r\n iface bridge\r\n     bridge-pvid 100\r\n     bridge-vids 100-102\r\n     bridge-vlan-aware yes\r\n \r\n\r\n\r\n\r\nnet add\/del commands since the last 'net commit'\r\n================================================\r\n\r\n\r\nUser     Timestamp                   Command\r\n-------  --------------------------  -----------------------------------------------\r\ncumulus  2017-08-01 10:23:48.092759  net add interface swp1 ip address 10.10.10.1\/30\r\ncumulus  2017-08-01 10:24:09.979614  net add interface swp1 alias Do--&gt;vMX ge-0\/0\/0\r\ncumulus  2017-08-01 10:24:25.156209  net add interface swp2 ip address 10.10.20.1\/30\r\ncumulus  2017-08-01 10:24:46.110179  net add interface swp2 alias Do--&gt;Cisco gi 1\r\ncumulus  2017-08-01 10:25:09.087218  net add interface swp3 ip address 10.10.50.1\/30\r\ncumulus  2017-08-01 10:25:31.064293  net add interface swp2 alias Do--&gt;Arista eth 2\r\ncumulus  2017-08-01 10:25:33.973234  net commit\r\n\r\n\r\ncumulus@cumulus01:~$<\/pre>\n<h3>Interfejs Loopback<\/h3>\n<p>Skonfigurujemy interfejs loopback na ka\u017cdym z urz\u0105dzeniu p\u00f3\u017aniej pos\u0142u\u017cy nam do router id przy OSPF&#8217;ie oraz<\/p>\n<h6>Arista<\/h6>\n<pre class=\"lang:sh decode:true\">Arista01#configure \r\nArista01(config)#interface loopback 0 \r\nArista01(config-if-Lo0)#ip address 3.3.3.3\/32\r\nArista01(config-if-Lo0)#description Loopback0\r\nArista01(config-if-Lo0)#end\r\nArista01#<\/pre>\n<h6>Cisco<\/h6>\n<pre class=\"lang:sh decode:true\">Cisco01#configure t\r\nEnter configuration commands, one per line.  End with CNTL\/Z.\r\nCisco01(config)#interface loopback 0\r\nCisco01(config-if)#ip address 4.4.4.4 255.255.255.255\r\nCisco01(config-if)#description Loopback0\r\nCisco01(config-if)#end\r\nCisco01#<\/pre>\n<h6>Juniper<\/h6>\n<pre class=\"lang:sh decode:true\">root@vMX01&gt; configure \r\nEntering configuration mode\r\n\r\n[edit]\r\nroot@vMX01# set interfaces lo0.0 family inet address 2.2.2.2\/32 \r\n\r\n[edit]\r\nroot@vMX01# set interfaces lo0.0 description \"Loopback0\" \r\n\r\n[edit]\r\nroot@vMX01# commit \r\ncommit complete\r\n\r\n[edit]\r\nroot@vMX01#<\/pre>\n<h6>Cumulus<\/h6>\n<pre class=\"lang:sh decode:true\">cumulus@cumulus01:~$ \r\ncumulus@cumulus01:~$ net add loopback lo ip address 1.1.1.1\/32\r\n\r\ncumulus@cumulus01:~$ net commit \r\n--- \/etc\/network\/interfaces     2017-08-01 10:25:34.564450853 +0000\r\n+++ \/var\/run\/nclu\/iface\/interfaces.tmp  2017-08-01 12:33:17.636468688 +0000\r\n@@ -1,18 +1,19 @@\r\n # This file describes the network interfaces available on your system\r\n # and how to activate them. For more information, see interfaces(5).\r\n \r\n source \/etc\/network\/interfaces.d\/*.intf\r\n \r\n # The loopback network interface\r\n auto lo\r\n iface lo inet loopback\r\n+    address 1.1.1.1\/32\r\n \r\n # The primary network interface\r\n auto eth0\r\n iface eth0 inet dhcp\r\n \r\n auto swp1\r\n iface swp1\r\n     address 10.10.10.1\/30\r\n     alias Do--&gt;vMX ge-0\/0\/0\r\n \r\n\r\n\r\n\r\nnet add\/del commands since the last 'net commit'\r\n================================================\r\n\r\n\r\nUser     Timestamp                   Command\r\n-------  --------------------------  -----------------------------------------\r\ncumulus  2017-08-01 12:33:09.177219  net add loopback lo ip address 1.1.1.1\/32\r\ncumulus  2017-08-01 12:33:17.635660  net commit\r\n\r\n\r\ncumulus@cumulus01:~$<\/pre>\n<h3>Routing Statyczny<\/h3>\n<p>Skonfigurujemy routing statyczny tak aby urz\u0105dzenia mog\u0142y osi\u0105gn\u0105\u0107 wszystkie adresy loopabck s\u0105siada<\/p>\n<h6>Arista<\/h6>\n<pre class=\"lang:sh decode:true\">Arista#configure \r\nArista01(config)#ip route  2.2.2.2\/32 10.10.40.1\r\nArista01(config)#ip route 1.1.1.1\/32 10.10.50.1\r\nArista01(config)#ip route 4.4.4.4\/32 10.10.60.1\r\nArista01(config)#end\r\nArista01#<\/pre>\n<h6>Cisco<\/h6>\n<pre class=\"lang:sh decode:true\">Cisco01#conf t\r\nEnter configuration commands, one per line.  End with CNTL\/Z.\r\nCisco01(config)#ip route 1.1.1.1 255.255.255.255 10.10.20.1 \r\nCisco01(config)#ip route 2.2.2.2 255.255.255.255 10.10.30.1\r\nCisco01(config)#ip route 3.3.3.3 255.255.255.255 10.10.60.2\r\nCisco01(config)#end\r\nCisco01#<\/pre>\n<h6>Juniper<\/h6>\n<pre class=\"lang:sh decode:true\">[edit]\r\nroot@vMX01# \r\n\r\n[edit]\r\nroot@vMX01# set routing-options static route 1.1.1.1\/32 next-hop 10.10.10.1 \r\n\r\n[edit]\r\nroot@vMX01# set routing-options static route 3.3.3.3\/32 next-hop 10.10.40.2                             \r\n\r\n[edit]\r\nroot@vMX01# set routing-options static route 4.4.4.4\/32 next-hop 10.10.30.2    \r\n\r\n[edit]\r\nroot@vMX01#\r\n[edit]\r\nroot@vMX01# commit \r\ncommit complete\r\n\r\n[edit]\r\nroot@vMX01#<\/pre>\n<h6>Cumulus<\/h6>\n<pre class=\"lang:sh decode:true\">cumulus@cumulus01:~$ \r\ncumulus@cumulus01:~$ net add routing route 2.2.2.2\/32 10.10.10.2\r\ncumulus@cumulus01:~$ net add routing route 4.4.4.4\/32 10.10.20.2\r\ncumulus@cumulus01:~$ net add routing route 3.3.3.3\/32 10.10.50.2\r\ncumulus@cumulus01:~$ net commit \r\n--- \/var\/run\/nclu\/quagga\/pending_baseline.conf  2017-08-01 12:41:24.704218920 +0000\r\n+++ \/var\/run\/nclu\/quagga\/pending.conf   2017-08-01 12:41:38.562671304 +0000\r\n@@ -5,10 +5,14 @@\r\n router bgp 65001\r\n  neighbor 10.10.10.2 remote-as 65000\r\n  !\r\n  address-family ipv4 unicast\r\n   network 10.100.10.0\/24\r\n  exit-address-family\r\n end\r\n line vty\r\n \r\n end\r\n+ip route 2.2.2.2\/32 10.10.10.2\r\n+end\r\n+ip route 4.4.4.4\/32 10.10.20.2\r\n+end\r\n+ip route 3.3.3.3\/32 10.10.50.2\r\n+end\r\n\r\n\r\nnet add\/del commands since the last 'net commit'\r\n================================================\r\n\r\n\r\nUser     Timestamp                   Command\r\n-------  --------------------------  -------------------------------------------\r\ncumulus  2017-08-01 12:41:24.707180  net add routing route 2.2.2.2\/32 10.10.10.2\r\ncumulus  2017-08-01 12:41:38.563843  net add routing route 4.4.4.4\/32 10.10.20.2\r\ncumulus  2017-08-01 12:41:38.593443  net add routing route 3.3.3.3\/32 10.10.50.2\r\ncumulus  2017-08-01 12:41:42.625126  net commit\r\n\r\n\r\ncumulus@cumulus01:~$<\/pre>\n<h4>weryfikacja<\/h4>\n<h5>wy\u015bwietlenie tablicy routingu<\/h5>\n<h6>Arista<\/h6>\n<pre class=\"lang:sh decode:true\">Arista01#show ip route\r\n\r\nVRF name: default\r\nCodes: C - connected, S - static, K - kernel, \r\n       O - OSPF, IA - OSPF inter area, E1 - OSPF external type 1,\r\n       E2 - OSPF external type 2, N1 - OSPF NSSA external type 1,\r\n       N2 - OSPF NSSA external type2, B I - iBGP, B E - eBGP,\r\n       R - RIP, I L1 - ISIS level 1, I L2 - ISIS level 2,\r\n       A B - BGP Aggregate, A O - OSPF Summary,\r\n       NG - Nexthop Group Static Route, V - VXLAN Control Service\r\n\r\nGateway of last resort is not set\r\n\r\n S      1.1.1.1\/32 [1\/0] via 10.10.50.1, Ethernet2\r\n S      2.2.2.2\/32 [1\/0] via 10.10.40.1, Ethernet1\r\n C      3.3.3.3\/32 is directly connected, Loopback0\r\n S      4.4.4.4\/32 [1\/0] via 10.10.60.1, Ethernet3\r\n C      10.10.40.0\/30 is directly connected, Ethernet1\r\n C      10.10.50.0\/30 is directly connected, Ethernet2\r\n C      10.10.60.0\/30 is directly connected, Ethernet3\r\n C      192.168.220.0\/24 is directly connected, Management1\r\n\r\n! IP routing not enabled<\/pre>\n<h6>Cisco<\/h6>\n<pre class=\"lang:sh decode:true\">Cisco01#show ip route \r\nCodes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP\r\n       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area \r\n       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2\r\n       E1 - OSPF external type 1, E2 - OSPF external type 2\r\n       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2\r\n       ia - IS-IS inter area, * - candidate default, U - per-user static route\r\n       o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP\r\n       a - application route\r\n       + - replicated route, % - next hop override, p - overrides from PfR\r\n\r\nGateway of last resort is not set\r\n\r\n      1.0.0.0\/32 is subnetted, 1 subnets\r\nS        1.1.1.1 [1\/0] via 10.10.20.1\r\n      2.0.0.0\/32 is subnetted, 1 subnets\r\nS        2.2.2.2 [1\/0] via 10.10.30.1\r\n      3.0.0.0\/32 is subnetted, 1 subnets\r\nS        3.3.3.3 [1\/0] via 10.10.60.2\r\n      4.0.0.0\/32 is subnetted, 1 subnets\r\nC        4.4.4.4 is directly connected, Loopback0\r\n      10.0.0.0\/8 is variably subnetted, 6 subnets, 2 masks\r\nC        10.10.20.0\/30 is directly connected, GigabitEthernet1\r\nL        10.10.20.2\/32 is directly connected, GigabitEthernet1\r\nC        10.10.30.0\/30 is directly connected, GigabitEthernet2\r\nL        10.10.30.2\/32 is directly connected, GigabitEthernet2\r\nC        10.10.60.0\/30 is directly connected, GigabitEthernet4\r\nL        10.10.60.1\/32 is directly connected, GigabitEthernet4<\/pre>\n<h6>Juniper<\/h6>\n<pre class=\"lang:sh decode:true\">root@vMX01&gt; show route \r\n\r\ninet.0: 13 destinations, 13 routes (13 active, 0 holddown, 0 hidden)\r\n+ = Active Route, - = Last Active, * = Both\r\n\r\n1.1.1.1\/32         *[Static\/5] 00:00:26\r\n                    &gt; to 10.10.10.1 via ge-0\/0\/0.0\r\n2.2.2.2\/32         *[Direct\/0] 05:24:47\r\n                    &gt; via lo0.0\r\n3.3.3.3\/32         *[Static\/5] 00:00:26\r\n                    &gt; to 10.10.40.2 via ge-0\/0\/3.0\r\n4.4.4.4\/32         *[Static\/5] 00:00:26\r\n                    &gt; to 10.10.30.2 via ge-0\/0\/2.0\r\n10.10.10.0\/30      *[Direct\/0] 00:28:13\r\n                    &gt; via ge-0\/0\/0.0\r\n10.10.10.2\/32      *[Local\/0] 00:28:14\r\n                      Local via ge-0\/0\/0.0\r\n10.10.30.0\/30      *[Direct\/0] 00:28:13\r\n                    &gt; via ge-0\/0\/2.0\r\n10.10.30.1\/32      *[Local\/0] 00:28:14\r\n                      Local via ge-0\/0\/2.0\r\n10.10.40.0\/30      *[Direct\/0] 00:28:13\r\n                    &gt; via ge-0\/0\/3.0\r\n10.10.40.1\/32      *[Local\/0] 00:28:14\r\n                      Local via ge-0\/0\/3.0\r\n192.168.220.0\/24   *[Direct\/0] 00:28:13\r\n                    &gt; via ge-0\/0\/5.0\r\n192.168.220.138\/32 *[Local\/0] 00:28:14\r\n                      Local via ge-0\/0\/5.0<\/pre>\n<h6>Cumulus<\/h6>\n<pre class=\"lang:sh decode:true\">cumulus@cumulus01:~$ net show route\r\n\r\nshow ip route\r\n=============\r\nCodes: K - kernel route, C - connected, S - static, R - RIP,\r\n       O - OSPF, I - IS-IS, B - BGP, P - PIM, T - Table, v - VNC,\r\n       V - VPN,\r\n       &gt; - selected route, * - FIB route\r\n\r\nK&gt;* 0.0.0.0\/0 via 192.168.220.2, eth0\r\nC&gt;* 1.1.1.1\/32 is directly connected, lo\r\nS&gt;* 2.2.2.2\/32 [1\/0] via 10.10.10.2, swp1\r\nS&gt;* 3.3.3.3\/32 [1\/0] via 10.10.50.2, swp3\r\nS&gt;* 4.4.4.4\/32 [1\/0] via 10.10.20.2, swp2\r\nC&gt;* 10.10.10.0\/30 is directly connected, swp1\r\nC&gt;* 10.10.20.0\/30 is directly connected, swp2\r\nC&gt;* 10.10.50.0\/30 is directly connected, swp3\r\nC&gt;* 10.100.10.0\/24 is directly connected, vlan100\r\nC&gt;* 192.168.220.0\/24 is directly connected, eth0\r\n\r\n\r\nshow ipv6 route\r\n===============\r\nCodes: K - kernel route, C - connected, S - static, R - RIPng,\r\n       O - OSPFv6, I - IS-IS, B - BGP, T - Table, v - VNC,\r\n       V - VPN,\r\n       &gt; - selected route, * - FIB route\r\n\r\nC * fe80::\/64 is directly connected, swp1\r\nC * fe80::\/64 is directly connected, swp2\r\nC * fe80::\/64 is directly connected, swp3\r\nC * fe80::\/64 is directly connected, eth0\r\nC * fe80::\/64 is directly connected, bridge\r\nC&gt;* fe80::\/64 is directly connected, vlan100<\/pre>\n<h5>Ping<\/h5>\n<h6>Arista<\/h6>\n<pre class=\"lang:sh decode:true\">Arista01#ping 1.1.1.1\r\nPING 1.1.1.1 (1.1.1.1) 72(100) bytes of data.\r\n80 bytes from 1.1.1.1: icmp_req=1 ttl=64 time=1029 ms\r\n80 bytes from 1.1.1.1: icmp_req=2 ttl=64 time=36.3 ms\r\n80 bytes from 1.1.1.1: icmp_req=3 ttl=64 time=8.09 ms\r\n80 bytes from 1.1.1.1: icmp_req=4 ttl=64 time=10.4 ms\r\n80 bytes from 1.1.1.1: icmp_req=5 ttl=64 time=20.4 ms\r\n\r\n--- 1.1.1.1 ping statistics ---\r\n5 packets transmitted, 5 received, 0% packet loss, time 3398ms\r\nrtt min\/avg\/max\/mdev = 8.091\/220.944\/1029.442\/404.371 ms, pipe 2, ipg\/ewma 849.635\/610.949 ms\r\nArista01#ping 2.2.2.2\r\nPING 2.2.2.2 (2.2.2.2) 72(100) bytes of data.\r\n80 bytes from 2.2.2.2: icmp_req=1 ttl=64 time=1387 ms\r\n80 bytes from 2.2.2.2: icmp_req=2 ttl=64 time=409 ms\r\n80 bytes from 2.2.2.2: icmp_req=3 ttl=64 time=10.4 ms\r\n80 bytes from 2.2.2.2: icmp_req=4 ttl=64 time=8.07 ms\r\n80 bytes from 2.2.2.2: icmp_req=5 ttl=64 time=11.2 ms\r\n\r\n--- 2.2.2.2 ping statistics ---\r\n5 packets transmitted, 5 received, 0% packet loss, time 4349ms\r\nrtt min\/avg\/max\/mdev = 8.072\/365.364\/1387.808\/534.102 ms, pipe 2, ipg\/ewma 1087.271\/851.068 ms\r\nArista01#ping 3.3.3.3\r\nPING 3.3.3.3 (3.3.3.3) 72(100) bytes of data.\r\n80 bytes from 3.3.3.3: icmp_req=1 ttl=64 time=0.059 ms\r\n80 bytes from 3.3.3.3: icmp_req=2 ttl=64 time=0.032 ms\r\n80 bytes from 3.3.3.3: icmp_req=3 ttl=64 time=0.055 ms\r\n80 bytes from 3.3.3.3: icmp_req=4 ttl=64 time=0.050 ms\r\n80 bytes from 3.3.3.3: icmp_req=5 ttl=64 time=0.036 ms\r\n\r\n--- 3.3.3.3 ping statistics ---\r\n5 packets transmitted, 5 received, 0% packet loss, time 2ms\r\nrtt min\/avg\/max\/mdev = 0.032\/0.046\/0.059\/0.012 ms, ipg\/ewma 0.567\/0.052 ms\r\nArista01#ping 4.4.4.4\r\nPING 4.4.4.4 (4.4.4.4) 72(100) bytes of data.\r\n80 bytes from 4.4.4.4: icmp_req=1 ttl=255 time=1113 ms\r\n80 bytes from 4.4.4.4: icmp_req=2 ttl=255 time=122 ms\r\n80 bytes from 4.4.4.4: icmp_req=3 ttl=255 time=29.9 ms\r\n80 bytes from 4.4.4.4: icmp_req=4 ttl=255 time=7.28 ms\r\n80 bytes from 4.4.4.4: icmp_req=5 ttl=255 time=10.5 ms\r\n\r\n--- 4.4.4.4 ping statistics ---\r\n5 packets transmitted, 5 received, 0% packet loss, time 3628ms\r\nrtt min\/avg\/max\/mdev = 7.286\/256.815\/1113.714\/430.504 ms, pipe 2, ipg\/ewma 907.011\/668.087 ms\r\nArista01#<\/pre>\n<h6>Cisco<\/h6>\n<pre class=\"lang:sh decode:true\">Cisco01#ping 1.1.1.1\r\nType escape sequence to abort.\r\nSending 5, 100-byte ICMP Echos to 1.1.1.1, timeout is 2 seconds:\r\n!!!!!\r\nSuccess rate is 100 percent (5\/5), round-trip min\/avg\/max = 12\/20\/39 ms\r\nCisco01#ping 2.2.2.2\r\nType escape sequence to abort.\r\nSending 5, 100-byte ICMP Echos to 2.2.2.2, timeout is 2 seconds:\r\n!!!!!\r\nSuccess rate is 100 percent (5\/5), round-trip min\/avg\/max = 16\/28\/65 ms\r\nCisco01#ping 3.3.3.3\r\nType escape sequence to abort.\r\nSending 5, 100-byte ICMP Echos to 3.3.3.3, timeout is 2 seconds:\r\n!!!!!\r\nSuccess rate is 100 percent (5\/5), round-trip min\/avg\/max = 43\/388\/1497 ms\r\nCisco01#ping 4.4.4.4\r\nType escape sequence to abort.\r\nSending 5, 100-byte ICMP Echos to 4.4.4.4, timeout is 2 seconds:\r\n!!!!!\r\nSuccess rate is 100 percent (5\/5), round-trip min\/avg\/max = 1\/1\/3 ms\r\nCisco01#<\/pre>\n<h6>Juniper<\/h6>\n<pre class=\"lang:sh decode:true\">root@vMX01&gt; ping 1.1.1.1 \r\nPING 1.1.1.1 (1.1.1.1): 56 data bytes\r\n64 bytes from 1.1.1.1: icmp_seq=0 ttl=64 time=48.283 ms\r\n64 bytes from 1.1.1.1: icmp_seq=1 ttl=64 time=5.032 ms\r\n64 bytes from 1.1.1.1: icmp_seq=2 ttl=64 time=6.277 ms\r\n64 bytes from 1.1.1.1: icmp_seq=3 ttl=64 time=2.355 ms\r\n64 bytes from 1.1.1.1: icmp_seq=4 ttl=64 time=4.177 ms\r\n64 bytes from 1.1.1.1: icmp_seq=5 ttl=64 time=1.688 ms\r\n64 bytes from 1.1.1.1: icmp_seq=6 ttl=64 time=3.172 ms\r\n64 bytes from 1.1.1.1: icmp_seq=7 ttl=64 time=5.061 ms\r\n64 bytes from 1.1.1.1: icmp_seq=8 ttl=64 time=2.275 ms\r\n64 bytes from 1.1.1.1: icmp_seq=9 ttl=64 time=2.552 ms\r\n64 bytes from 1.1.1.1: icmp_seq=10 ttl=64 time=2.511 ms\r\n^C\r\n--- 1.1.1.1 ping statistics ---\r\n11 packets transmitted, 11 packets received, 0% packet loss\r\nround-trip min\/avg\/max\/stddev = 1.688\/7.580\/48.283\/12.945 ms\r\n\r\nroot@vMX01&gt; ping 2.2.2.2 \r\nPING 2.2.2.2 (2.2.2.2): 56 data bytes\r\n64 bytes from 2.2.2.2: icmp_seq=0 ttl=64 time=0.339 ms\r\n64 bytes from 2.2.2.2: icmp_seq=1 ttl=64 time=0.073 ms\r\n64 bytes from 2.2.2.2: icmp_seq=2 ttl=64 time=0.148 ms\r\n64 bytes from 2.2.2.2: icmp_seq=3 ttl=64 time=0.146 ms\r\n64 bytes from 2.2.2.2: icmp_seq=4 ttl=64 time=0.336 ms\r\n64 bytes from 2.2.2.2: icmp_seq=5 ttl=64 time=0.066 ms\r\n64 bytes from 2.2.2.2: icmp_seq=6 ttl=64 time=0.067 ms\r\n^C\r\n--- 2.2.2.2 ping statistics ---\r\n7 packets transmitted, 7 packets received, 0% packet loss\r\nround-trip min\/avg\/max\/stddev = 0.066\/0.168\/0.339\/0.112 ms\r\n\r\nroot@vMX01&gt; ping 3.3.3.3 \r\nPING 3.3.3.3 (3.3.3.3): 56 data bytes\r\n64 bytes from 3.3.3.3: icmp_seq=0 ttl=64 time=1515.648 ms\r\n64 bytes from 3.3.3.3: icmp_seq=1 ttl=64 time=512.710 ms\r\n64 bytes from 3.3.3.3: icmp_seq=2 ttl=64 time=42.362 ms\r\n64 bytes from 3.3.3.3: icmp_seq=3 ttl=64 time=14.515 ms\r\n64 bytes from 3.3.3.3: icmp_seq=4 ttl=64 time=9.158 ms\r\n^C\r\n--- 3.3.3.3 ping statistics ---\r\n6 packets transmitted, 5 packets received, 16% packet loss\r\nround-trip min\/avg\/max\/stddev = 9.158\/418.879\/1515.648\/580.492 ms\r\n\r\nroot@vMX01&gt; ping 4.4.4.4 \r\nPING 4.4.4.4 (4.4.4.4): 56 data bytes\r\n64 bytes from 4.4.4.4: icmp_seq=0 ttl=255 time=11.342 ms\r\n64 bytes from 4.4.4.4: icmp_seq=1 ttl=255 time=50.529 ms\r\n64 bytes from 4.4.4.4: icmp_seq=2 ttl=255 time=26.060 ms\r\n64 bytes from 4.4.4.4: icmp_seq=3 ttl=255 time=13.135 ms\r\n64 bytes from 4.4.4.4: icmp_seq=4 ttl=255 time=5.393 ms\r\n^C\r\n--- 4.4.4.4 ping statistics ---\r\n5 packets transmitted, 5 packets received, 0% packet loss\r\nround-trip min\/avg\/max\/stddev = 5.393\/21.292\/50.529\/16.099 ms\r\n\r\nroot@vMX01&gt;<\/pre>\n<h6>Cumulus<\/h6>\n<pre class=\"lang:sh decode:true\">cumulus@cumulus01:~$ ping 1.1.1.1\r\nPING 1.1.1.1 (1.1.1.1) 56(84) bytes of data.\r\n64 bytes from 1.1.1.1: icmp_seq=1 ttl=64 time=0.142 ms\r\n64 bytes from 1.1.1.1: icmp_seq=2 ttl=64 time=0.101 ms\r\n64 bytes from 1.1.1.1: icmp_seq=3 ttl=64 time=0.051 ms\r\n64 bytes from 1.1.1.1: icmp_seq=4 ttl=64 time=0.060 ms\r\n64 bytes from 1.1.1.1: icmp_seq=5 ttl=64 time=0.053 ms\r\n64 bytes from 1.1.1.1: icmp_seq=6 ttl=64 time=0.059 ms\r\n64 bytes from 1.1.1.1: icmp_seq=7 ttl=64 time=0.061 ms\r\n64 bytes from 1.1.1.1: icmp_seq=8 ttl=64 time=0.060 ms\r\n\r\n--- 1.1.1.1 ping statistics ---\r\n8 packets transmitted, 8 received, 0% packet loss, time 7022ms\r\nrtt min\/avg\/max\/mdev = 0.051\/0.073\/0.142\/0.030 ms\r\ncumulus@cumulus01:~$ ping 2.2.2.2\r\nPING 2.2.2.2 (2.2.2.2) 56(84) bytes of data.\r\n64 bytes from 2.2.2.2: icmp_seq=1 ttl=64 time=2.89 ms\r\n64 bytes from 2.2.2.2: icmp_seq=2 ttl=64 time=5.97 ms\r\n64 bytes from 2.2.2.2: icmp_seq=3 ttl=64 time=3.26 ms\r\n64 bytes from 2.2.2.2: icmp_seq=4 ttl=64 time=0.626 ms\r\n64 bytes from 2.2.2.2: icmp_seq=5 ttl=64 time=1.07 ms\r\n64 bytes from 2.2.2.2: icmp_seq=6 ttl=64 time=1.04 ms\r\n64 bytes from 2.2.2.2: icmp_seq=7 ttl=64 time=0.944 ms\r\n64 bytes from 2.2.2.2: icmp_seq=8 ttl=64 time=0.570 ms\r\n^C\r\n--- 2.2.2.2 ping statistics ---\r\n8 packets transmitted, 8 received, 0% packet loss, time 7022ms\r\nrtt min\/avg\/max\/mdev = 0.570\/2.049\/5.977\/1.768 ms\r\ncumulus@cumulus01:~$ ping 3.3.3.3\r\nPING 3.3.3.3 (3.3.3.3) 56(84) bytes of data.\r\n64 bytes from 3.3.3.3: icmp_seq=1 ttl=64 time=1535 ms\r\n64 bytes from 3.3.3.3: icmp_seq=2 ttl=64 time=509 ms\r\n64 bytes from 3.3.3.3: icmp_seq=3 ttl=64 time=31.1 ms\r\n64 bytes from 3.3.3.3: icmp_seq=4 ttl=64 time=44.6 ms\r\n^C\r\n--- 3.3.3.3 ping statistics ---\r\n4 packets transmitted, 4 received, 0% packet loss, time 3042ms\r\nrtt min\/avg\/max\/mdev = 31.184\/530.307\/1535.975\/611.722 ms, pipe 2\r\ncumulus@cumulus01:~$ ping 4.4.4.4\r\nPING 4.4.4.4 (4.4.4.4) 56(84) bytes of data.\r\n64 bytes from 4.4.4.4: icmp_seq=1 ttl=255 time=5.77 ms\r\n64 bytes from 4.4.4.4: icmp_seq=2 ttl=255 time=0.320 ms\r\n64 bytes from 4.4.4.4: icmp_seq=3 ttl=255 time=0.504 ms\r\n64 bytes from 4.4.4.4: icmp_seq=4 ttl=255 time=0.406 ms\r\n64 bytes from 4.4.4.4: icmp_seq=5 ttl=255 time=0.444 ms\r\n64 bytes from 4.4.4.4: icmp_seq=6 ttl=255 time=0.559 ms\r\n64 bytes from 4.4.4.4: icmp_seq=7 ttl=255 time=0.589 ms\r\n\r\n--- 4.4.4.4 ping statistics ---\r\n7 packets transmitted, 7 received, 0% packet loss, time 6003ms\r\nrtt min\/avg\/max\/mdev = 0.320\/1.228\/5.774\/1.857 ms<\/pre>\n<h4>Kasowanie routingu statycznego<\/h4>\n<p>aby przygotowa\u0107 si\u0119 do nast\u0119pnego etapu musimy skasowa\u0107, co przygotowali\u015bmy krok wcze\u015bnij &#8211; c\u00f3\u017c takie \u017cycie czasem trzeba co\u015b zniszczy\u0107<\/p>\n<h6>Arista<\/h6>\n<pre class=\"lang:sh decode:true\">Arista#configure \r\nArista01(config)#no ip route 1.1.1.1\/32 10.10.50.1\r\nArista01(config)#no ip route 2.2.2.2\/32 10.10.40.1\r\nArista01(config)#no ip route 4.4.4.4\/32 10.10.60.1<\/pre>\n<h6>Cisco<\/h6>\n<pre class=\"lang:sh decode:true\">Cisco#conf\r\nCisco#configure t\r\nEnter configuration commands, one per line.  End with CNTL\/Z.\r\nCisco01(config)#no ip route 1.1.1.1 255.255.255.255 10.10.20.1\r\nCisco01(config)#no ip route 2.2.2.2 255.255.255.255 10.10.30.1\r\nCisco01(config)#no ip route 3.3.3.3 255.255.255.255 10.10.60.2\r\nCisco01(config)#end\r\nCisco01#<\/pre>\n<h6>Cumulus<\/h6>\n<p>kasowanie mo\u017cemy zrobi\u0107 na dwa sposoby, jedno z 2 urz\u0105dze\u0144 kt\u00f3re tutaj u\u017cywamy to potrafi.<\/p>\n<h5>Spos\u00f3b pierwszy<\/h5>\n<p>R\u0119czne kasowanie wpis\u00f3w.<\/p>\n<pre class=\"lang:sh decode:true\">cumulus@cumulus01:~$ \r\ncumulus@cumulus01:~$ net del routing route 2.2.2.2\/32 10.10.10.2\r\ncumulus@cumulus01:~$ net del routing route 4.4.4.4\/32 10.10.20.2\r\ncumulus@cumulus01:~$ net del routing route 3.3.3.3\/32 10.10.50.2\r\ncumulus@cumulus01:~$ net commit \r\n--- \/var\/run\/nclu\/quagga\/pending_baseline.conf  2017-08-01 13:11:40.196432408 +0000\r\n+++ \/var\/run\/nclu\/quagga\/pending.conf   2017-08-01 13:12:47.705599560 +0000\r\n@@ -2,16 +2,13 @@\r\n service integrated-vtysh-config\r\n log file \/var\/log\/quagga\/quagga.log\r\n log timestamp precision 6\r\n router bgp 65001\r\n  neighbor 10.10.10.2 remote-as 65000\r\n  !\r\n  address-family ipv4 unicast\r\n   network 10.100.10.0\/24\r\n  exit-address-family\r\n end\r\n-ip route 2.2.2.2\/32 10.10.10.2\r\n-ip route 3.3.3.3\/32 10.10.50.2\r\n-ip route 4.4.4.4\/32 10.10.20.2\r\n line vty\r\n \r\n end\r\n\r\n\r\n\r\nnet add\/del commands since the last 'net commit'\r\n================================================\r\n\r\n\r\nUser     Timestamp                   Command\r\n-------  --------------------------  -------------------------------------------\r\ncumulus  2017-08-01 13:11:40.199532  net del routing route 2.2.2.2\/32 10.10.10.2\r\ncumulus  2017-08-01 13:12:09.260785  net del routing route 4.4.4.4\/32 10.10.20.2\r\ncumulus  2017-08-01 13:12:39.788223  net del routing route 3.3.3.3\/32 10.10.60.2\r\ncumulus  2017-08-01 13:12:47.706729  net del routing route 3.3.3.3\/32 10.10.50.2\r\ncumulus  2017-08-01 13:12:51.819782  net commit<\/pre>\n<h5>Spos\u00f3b drugi<\/h5>\n<p>Spos\u00f3b szybszy &#8211; cofni\u0119cie si\u0119 do konfiguracji kt\u00f3ra by\u0142a wcze\u015bniej.<\/p>\n<p>szukamy konfiguracji z prze wprowadzenie zmian z routingiem statycznym<\/p>\n<pre class=\"lang:sh decode:true\">cumulus@cumulus01:~$ net show rollback 40\r\n--- \/etc\/quagga\/Quagga.conf     2017-08-01 13:16:04.382906506 +0000\r\n+++ \/.snapshots\/40\/snapshot\/etc\/quagga\/Quagga.conf      2017-08-01 12:41:24.674213609 +0000\r\n@@ -13,9 +13,5 @@\r\n   network 10.100.10.0\/24\r\n  exit-address-family\r\n !\r\n-ip route 2.2.2.2\/32 10.10.10.2\r\n-ip route 3.3.3.3\/32 10.10.50.2\r\n-ip route 4.4.4.4\/32 10.10.20.2\r\n-!\r\n line vty\r\n !<\/pre>\n<p>cofamy si\u0119 do tego momentu w kt\u00f3rym nie by\u0142o dodanych wpis\u00f3w statycznych.<\/p>\n<pre class=\"lang:sh decode:true\">cumulus@cumulus01:~$ net rollback \r\n    &lt;number&gt;     :  Any integer\r\n    description  :  Description\r\n    last         :  the most recent 'net commit' snapshot\r\n\r\ncumulus@cumulus01:~$ net rollback 40\r\n\r\ncumulus@cumulus01:~$ net commit \r\n\r\n\r\n\r\nnet add\/del commands since the last 'net commit'\r\n================================================\r\n\r\n\r\nUser     Timestamp                   Command\r\n-------  --------------------------  ----------\r\ncumulus  2017-08-01 13:21:31.687385  net commit\r\n\r\ncommit ignored...there were no pending changes\r\ncumulus@cumulus01:~$ dis\r\ndiscover             discover-config      discover-modprobe    discover-pkginstall  disown               \r\ncumulus@cumulus01:~$ net show ro\r\n    rollback   :  revert to a previous configuration state\r\n    route      :  Static routes\r\n    route-map  :  Route-map<\/pre>\n<h6>Juniper<\/h6>\n<p>Drugie urz\u0105dzenie kt\u00f3re potrafi jak Cumulus cofa\u0107 si\u0119 do konfiguracji.<\/p>\n<h5>Spos\u00f3b Pierwszy<\/h5>\n<p>Kasowanie r\u0119czne<\/p>\n<pre class=\"lang:sh decode:true \">[edit]\r\nroot@vMX01# \r\n\r\n[edit]\r\nroot@vMX01# del routing-options static route 1.1.1.1\/32 next-hop 10.10.10.1 \r\n\r\n[edit]\r\nroot@vMX01# del routing-options static route 3.3.3.3\/32 next-hop 10.10.40.2                             \r\n\r\n[edit]\r\nroot@vMX01# del routing-options static route 4.4.4.4\/32 next-hop 10.10.30.2    \r\n\r\n[edit]\r\nroot@vMX01#\r\n[edit]\r\nroot@vMX01# commit \r\ncommit complete\r\n\r\n[edit]\r\nroot@vMX01#<\/pre>\n<h5>Spos\u00f3b drugi<\/h5>\n<p>Wyszukujemy konfiguracj\u0119 przed dodaniem routingu statycznego<\/p>\n<pre class=\"lang:sh decode:true\">root@vMX02% cli\r\nroot@vMX&gt; configure \r\nEntering configuration mode\r\n\r\nroot@vMX01# show | compare rollback 1    \r\n[edit routing-options]\r\n+   static {\r\n+       route 1.1.1.1\/32 next-hop 10.10.10.1;\r\n+       route 3.3.3.3\/32 next-hop 10.10.40.2;\r\n+       route 4.4.4.4\/32 next-hop 10.10.30.2;\r\n+   }\r\n\r\n[edit]\r\nroot@vMX01#<\/pre>\n<p>Cofamy si\u0119 do tego punktu<\/p>\n<pre class=\"lang:sh decode:true \">[edit]\r\nroot@vMX01# rollback 1 \r\nload complete\r\n\r\n[edit]\r\nroot@vMX01# commit \r\ncommit complete\r\n\r\n[edit]\r\nroot@vMX01#<\/pre>\n<p>Tym sposobem mamy przygotowan\u0105 infrastruktur\u0119 do nast\u0119pnego zadania.<\/p>\n<h3>Routing dynamiczny OSPF<\/h3>\n<p>przyszed\u0142 czas na konfiguracj\u0119 routingu dynamicznego w postaci OSPF&#8217;a b\u0119dziemy rozg\u0142asza\u0107 sieci kt\u00f3re s\u0105 w trybie direct.<\/p>\n<h6>Arista<\/h6>\n<pre class=\"lang:sh decode:true\">Arista01#configure\r\nArista01(config)#ip routing \r\nArista01(config)#router ospf 1\r\nArista01(config-router-ospf)#router-id 3.3.3.3\r\nArista01(config-router-ospf)#redistribute connected\r\nArista01(config-router-ospf)#network 3.3.3.3\/32 area 0\r\nArista01(config-router-ospf)#network 10.10.40.0\/30 area 0\r\nArista01(config-router-ospf)#network 10.10.50.0\/30 area 0\r\nArista01(config-router-ospf)#network 10.10.60.0\/30 area 0\r\nArista01(config-router-ospf)#<\/pre>\n<h6>Cisco<\/h6>\n<pre class=\"lang:sh decode:true\">Cisco01#configure t\r\nEnter configuration commands, one per line.  End with CNTL\/Z.\r\nCisco01(config)#router ospf 1 \r\nCisco01(config-router)#network 4.4.4.4 0.0.0.0 area 0\r\nCisco01(config-router)#network 10.10.20.0 0.0.0.3 area 0\r\nCisco01(config-router)#network 10.10.20.0 0.0.0.3 area 0\r\nCisco01(config-router)#network 10.10.30.0 0.0.0.3 area 0\r\nCisco01(config-router)#network 10.10.60.0 0.0.0.3 area 0\r\nCisco01(config-router)#redistribute connected \r\n<\/pre>\n<h6>Juniper<\/h6>\n<p>Definiujemy polityk\u0119 kt\u00f3ra b\u0119dzie eksportowa\u0107 do OSPF sieci direct<\/p>\n<pre class=\"lang:sh decode:true \">root@vMX01# set policy-options policy-statement export_to_ospf_direct term direct from protocol direct     \r\n\r\n[edit]\r\nroot@vMX01# set policy-options policy-statement export_to_ospf_direct term direct then accept             \r\n\r\n[edit]\r\nroot@vMX01#<\/pre>\n<p>konfigurujemy ospf<\/p>\n<pre class=\"lang:sh decode:true\">root@vMX01# set routing-options router-id 2.2.2.2 \r\n\r\n[edit]\r\nroot@vMX01# \r\n[edit]\r\nroot@vMX01# set protocols ospf area 0 interface ge-0\/0\/0\r\n[edit]\r\nroot@vMX01# set protocols ospf area 0 interface ge-0\/0\/2\r\n[edit]\r\nroot@vMX01# set protocols ospf area 0 interface ge-0\/0\/3\r\n[edit]\r\nroot@vMX01# set protocols ospf area 0 interface lo0.0 \r\n[edit]\r\nroot@vMX01# set protocols ospf export export_to_ospf_direct \r\n\r\n[edit]\r\nroot@vMX01# commit \r\ncommit complete\r\n\r\n[edit]\r\nroot@vMX01#<\/pre>\n<h6>Cumulus<\/h6>\n<pre class=\"lang:sh decode:true\">cumulus@cumulus01:~$ net add ospf router-id 1.1.1.1\r\ncumulus@cumulus01:~$ net add ospf network 1.1.1.1\/32 area 0\r\ncumulus@cumulus01:~$ net add ospf network 10.10.10.0\/30 area 0\r\ncumulus@cumulus01:~$ net add ospf network 10.10.50.0\/30 area 0\r\ncumulus@cumulus01:~$ net add ospf network 10.10.20.0\/30 area 0\r\ncumulus@cumulus01:~$ net add ospf redistribute connected \r\n\r\ncumulus@cumulus01:~$ net commit \r\n--- \/var\/run\/nclu\/quagga\/baseline.daemons       2017-08-01 15:43:24.213859311 +0000\r\n+++ \/var\/run\/nclu\/quagga\/pending.daemons        2017-08-01 15:43:24.306863930 +0000\r\n@@ -1,9 +1,9 @@\r\n zebra=yes\r\n bgpd=yes\r\n-ospfd=no\r\n+ospfd=yes\r\n ospf6d=no\r\n ripd=no\r\n ripngd=no\r\n isisd=no\r\n pimd=no\r\n ldpd=no\r\n\r\n\r\n********************************************************************\r\n********************************************************************\r\nNOTE: 'net commit' will run 'systemctl restart quagga' to apply the\r\nchange to \/etc\/quagga\/daemons\r\n********************************************************************\r\n********************************************************************\r\n\r\n\r\n--- \/var\/run\/nclu\/quagga\/pending_baseline.conf  2017-08-01 15:43:24.304863831 +0000\r\n+++ \/var\/run\/nclu\/quagga\/pending.conf   2017-08-01 15:44:35.426404421 +0000\r\n@@ -5,10 +5,18 @@\r\n router bgp 65001\r\n  neighbor 10.10.10.2 remote-as 65000\r\n  !\r\n  address-family ipv4 unicast\r\n   network 10.100.10.0\/24\r\n  exit-address-family\r\n end\r\n line vty\r\n \r\n end\r\n+router ospf\r\n+ network 1.1.1.1\/32 area 0\r\n+ network 10.10.10.0\/30 area 0\r\n+ network 10.10.50.0\/30 area 0\r\n+ network 10.10.20.0\/30 area 0\r\n+ redistribute connected\r\n+ ospf router-id 1.1.1.1\r\n+end\r\n\r\n\r\n\r\nnet add\/del commands since the last 'net commit'\r\n================================================\r\n\r\n\r\nUser     Timestamp                   Command\r\n-------  --------------------------  -----------------------------------------\r\ncumulus  2017-08-01 15:43:24.308605  net add ospf network 1.1.1.1\/32 area 0\r\ncumulus  2017-08-01 15:43:47.167303  net add ospf network 10.10.10.0\/30 area 0\r\ncumulus  2017-08-01 15:43:56.003703  net add ospf network 10.10.50.0\/30 area 0\r\ncumulus  2017-08-01 15:44:05.464953  net add ospf network 10.10.20.0\/30 area 0\r\ncumulus  2017-08-01 15:44:18.065819  net add ospf redistribute connected\r\ncumulus  2017-08-01 15:44:35.427114  net add ospf router-id 1.1.1.1\r\ncumulus  2017-08-01 15:45:45.712212  net commit\r\n<\/pre>\n<h4>Weryfikacja<\/h4>\n<h5>tablica routingu<\/h5>\n<h6>Arista<\/h6>\n<pre class=\"lang:sh decode:true\">Arista01#show ip route ospf \r\n\r\nVRF name: default\r\nCodes: C - connected, S - static, K - kernel, \r\n       O - OSPF, IA - OSPF inter area, E1 - OSPF external type 1,\r\n       E2 - OSPF external type 2, N1 - OSPF NSSA external type 1,\r\n       N2 - OSPF NSSA external type2, B I - iBGP, B E - eBGP,\r\n       R - RIP, I L1 - ISIS level 1, I L2 - ISIS level 2,\r\n       A B - BGP Aggregate, A O - OSPF Summary,\r\n       NG - Nexthop Group Static Route, V - VXLAN Control Service\r\n\r\n O      1.1.1.1\/32 [110\/10] via 10.10.50.1, Ethernet2\r\n O      2.2.2.2\/32 [110\/10] via 10.10.40.1, Ethernet1\r\n O      4.4.4.4\/32 [110\/11] via 10.10.60.1, Ethernet3\r\n O      10.10.10.0\/30 [110\/11] via 10.10.40.1, Ethernet1\r\n O      10.10.20.0\/30 [110\/11] via 10.10.60.1, Ethernet3\r\n O      10.10.30.0\/30 [110\/11] via 10.10.40.1, Ethernet1\r\n                               via 10.10.60.1, Ethernet3\r\n\r\nArista01#<\/pre>\n<h6>Cisco<\/h6>\n<pre class=\"lang:sh decode:true\">Cisco01#show ip route ospf\r\nCodes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP\r\n       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area \r\n       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2\r\n       E1 - OSPF external type 1, E2 - OSPF external type 2\r\n       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2\r\n       ia - IS-IS inter area, * - candidate default, U - per-user static route\r\n       o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP\r\n       a - application route\r\n       + - replicated route, % - next hop override, p - overrides from PfR\r\n\r\nGateway of last resort is not set\r\n\r\n      1.0.0.0\/32 is subnetted, 1 subnets\r\nO        1.1.1.1 [110\/1] via 10.10.20.1, 00:51:57, GigabitEthernet1\r\n      2.0.0.0\/32 is subnetted, 1 subnets\r\nO        2.2.2.2 [110\/1] via 10.10.30.1, 01:02:02, GigabitEthernet2\r\n      3.0.0.0\/32 is subnetted, 1 subnets\r\nO        3.3.3.3 [110\/11] via 10.10.60.2, 01:09:44, GigabitEthernet4\r\n      10.0.0.0\/8 is variably subnetted, 10 subnets, 3 masks\r\nO        10.10.10.0\/30 [110\/2] via 10.10.30.1, 01:02:02, GigabitEthernet2\r\nO        10.10.40.0\/30 [110\/2] via 10.10.30.1, 01:02:02, GigabitEthernet2\r\nO        10.10.50.0\/30 [110\/11] via 10.10.60.2, 01:09:44, GigabitEthernet4\r\n                       [110\/11] via 10.10.20.1, 00:51:47, GigabitEthernet1\r\n<\/pre>\n<h6>Juniper<\/h6>\n<pre class=\"lang:sh decode:true\">root@vMX01&gt; show route protocol ospf      \r\n\r\ninet.0: 18 destinations, 19 routes (18 active, 0 holddown, 0 hidden)\r\n+ = Active Route, - = Last Active, * = Both\r\n\r\n1.1.1.1\/32         *[OSPF\/10] 00:52:54, metric 1\r\n                    &gt; to 10.10.10.1 via ge-0\/0\/0.0\r\n3.3.3.3\/32         *[OSPF\/10] 01:03:00, metric 11\r\n                    &gt; to 10.10.40.2 via ge-0\/0\/3.0\r\n4.4.4.4\/32         *[OSPF\/10] 01:03:00, metric 2\r\n                    &gt; to 10.10.30.2 via ge-0\/0\/2.0\r\n10.10.20.0\/30      *[OSPF\/10] 01:03:00, metric 2\r\n                    &gt; to 10.10.30.2 via ge-0\/0\/2.0\r\n10.10.50.0\/30      *[OSPF\/10] 00:52:54, metric 11\r\n                    &gt; to 10.10.40.2 via ge-0\/0\/3.0\r\n                      to 10.10.10.1 via ge-0\/0\/0.0\r\n10.10.60.0\/30      *[OSPF\/10] 01:03:00, metric 2\r\n                    &gt; to 10.10.30.2 via ge-0\/0\/2.0\r\n<\/pre>\n<h6>Cumulus<\/h6>\n<pre class=\"lang:sh decode:true\">cumulus@cumulus01:~$ net show route ospf \r\nRIB entry for ospf\r\n==================\r\nCodes: K - kernel route, C - connected, S - static, R - RIP,\r\n       O - OSPF, I - IS-IS, B - BGP, P - PIM, T - Table, v - VNC,\r\n       V - VPN,\r\n       &gt; - selected route, * - FIB route\r\n\r\nO   1.1.1.1\/32 [110\/0] is directly connected, lo, 00:54:00\r\nO&gt;* 2.2.2.2\/32 [110\/10] via 10.10.10.2, swp1, 00:53:55\r\nO&gt;* 3.3.3.3\/32 [110\/20] via 10.10.50.2, swp3, 00:53:51\r\nO&gt;* 4.4.4.4\/32 [110\/11] via 10.10.20.2, swp2, 00:53:55\r\nO   10.10.10.0\/30 [110\/10] is directly connected, swp1, 00:54:00\r\nO   10.10.20.0\/30 [110\/10] is directly connected, swp2, 00:54:00\r\nO&gt;* 10.10.30.0\/30 [110\/11] via 10.10.10.2, swp1, 00:53:55\r\n  *                        via 10.10.20.2, swp2, 00:53:55\r\nO&gt;* 10.10.40.0\/30 [110\/11] via 10.10.10.2, swp1, 00:53:55\r\nO   10.10.50.0\/30 [110\/10] is directly connected, swp3, 00:53:51\r\nO&gt;* 10.10.60.0\/30 [110\/11] via 10.10.20.2, swp2, 00:53:55<\/pre>\n<h5>s\u0105siedztwo ospf<\/h5>\n<h6>Arista<\/h6>\n<pre class=\"lang:sh decode:true\">Arista01#show ip ospf neighbor \r\nNeighbor ID     VRF      Pri State                  Dead Time   Address         Interface\r\n2.2.2.2         default  128 FULL\/BDR               00:00:31    10.10.40.1      Ethernet1\r\n1.1.1.1         default  1   FULL\/BDR               00:00:31    10.10.50.1      Ethernet2\r\n4.4.4.4         default  1   FULL\/DR                00:00:35    10.10.60.1      Ethernet3<\/pre>\n<h6>Cisco<\/h6>\n<pre class=\"lang:sh decode:true\">Cisco01#show ip ospf neighbor \r\n\r\nNeighbor ID     Pri   State           Dead Time   Address         Interface\r\n3.3.3.3           1   FULL\/BDR        00:00:30    10.10.60.2      GigabitEthernet4\r\n2.2.2.2         128   FULL\/BDR        00:00:38    10.10.30.1      GigabitEthernet2\r\n1.1.1.1           1   FULL\/BDR        00:00:32    10.10.20.1      GigabitEthernet1<\/pre>\n<h6>Juniper<\/h6>\n<pre class=\"lang:sh decode:true\">root@vMX01&gt; show ospf neighbor \r\nAddress          Interface              State     ID               Pri  Dead\r\n10.10.10.1       ge-0\/0\/0.0             Full      1.1.1.1            1    34\r\n10.10.30.2       ge-0\/0\/2.0             Full      4.4.4.4            1    38\r\n10.10.40.2       ge-0\/0\/3.0             Full      3.3.3.3            1    30<\/pre>\n<h6>Cumulus<\/h6>\n<pre class=\"lang:sh decode:true\">cumulus@cumulus01:~$ net show ospf neighbor \r\n\r\nNeighbor ID     Pri State           Dead Time Address         Interface            RXmtL RqstL DBsmL\r\n2.2.2.2         128 Full\/DR           36.926s 10.10.10.2      swp1:10.10.10.1          0     0     0\r\n3.3.3.3           1 Full\/DR           38.225s 10.10.50.2      swp3:10.10.50.1          0     0     0\r\n4.4.4.4           1 Full\/DR           34.672s 10.10.20.2      swp2:10.10.20.1          0     0     0<\/pre>\n<p>zmian\u0119 hostname zobaczymy po przelogowaniu.<\/p>\n<h5>weryfikacyjny ping<\/h5>\n<h6>Arista<\/h6>\n<pre class=\"lang:sh decode:true\">Arista01#ping 1.1.1.1\r\nPING 1.1.1.1 (1.1.1.1) 72(100) bytes of data.\r\n80 bytes from 1.1.1.1: icmp_req=1 ttl=64 time=151 ms\r\n80 bytes from 1.1.1.1: icmp_req=2 ttl=64 time=94.2 ms\r\n80 bytes from 1.1.1.1: icmp_req=3 ttl=64 time=24.4 ms\r\n80 bytes from 1.1.1.1: icmp_req=4 ttl=64 time=18.5 ms\r\n80 bytes from 1.1.1.1: icmp_req=5 ttl=64 time=84.8 ms\r\n\r\n--- 1.1.1.1 ping statistics ---\r\n5 packets transmitted, 5 received, 0% packet loss, time 545ms\r\nrtt min\/avg\/max\/mdev = 18.594\/74.807\/151.959\/49.255 ms, ipg\/ewma 136.416\/111.940 ms\r\nArista01#ping 2.2.2.2\r\nPING 2.2.2.2 (2.2.2.2) 72(100) bytes of data.\r\n80 bytes from 2.2.2.2: icmp_req=1 ttl=64 time=51.7 ms\r\n80 bytes from 2.2.2.2: icmp_req=2 ttl=64 time=40.1 ms\r\n80 bytes from 2.2.2.2: icmp_req=3 ttl=64 time=21.4 ms\r\n80 bytes from 2.2.2.2: icmp_req=4 ttl=64 time=11.1 ms\r\n80 bytes from 2.2.2.2: icmp_req=5 ttl=64 time=7.46 ms\r\n\r\n--- 2.2.2.2 ping statistics ---\r\n5 packets transmitted, 5 received, 0% packet loss, time 192ms\r\nrtt min\/avg\/max\/mdev = 7.462\/26.396\/51.712\/17.004 ms, ipg\/ewma 48.130\/37.885 ms\r\nArista01#ping 3.3.3.3\r\nPING 3.3.3.3 (3.3.3.3) 72(100) bytes of data.\r\n80 bytes from 3.3.3.3: icmp_req=1 ttl=64 time=0.130 ms\r\n80 bytes from 3.3.3.3: icmp_req=2 ttl=64 time=0.045 ms\r\n80 bytes from 3.3.3.3: icmp_req=3 ttl=64 time=0.073 ms\r\n80 bytes from 3.3.3.3: icmp_req=4 ttl=64 time=0.045 ms\r\n80 bytes from 3.3.3.3: icmp_req=5 ttl=64 time=0.043 ms\r\n\r\n--- 3.3.3.3 ping statistics ---\r\n5 packets transmitted, 5 received, 0% packet loss, time 3ms\r\nrtt min\/avg\/max\/mdev = 0.043\/0.067\/0.130\/0.033 ms, ipg\/ewma 0.978\/0.097 ms\r\nArista01#ping 4.4.4.4\r\nPING 4.4.4.4 (4.4.4.4) 72(100) bytes of data.\r\n80 bytes from 4.4.4.4: icmp_req=1 ttl=255 time=42.5 ms\r\n80 bytes from 4.4.4.4: icmp_req=2 ttl=255 time=33.1 ms\r\n80 bytes from 4.4.4.4: icmp_req=3 ttl=255 time=16.9 ms\r\n80 bytes from 4.4.4.4: icmp_req=4 ttl=255 time=24.0 ms\r\n80 bytes from 4.4.4.4: icmp_req=5 ttl=255 time=11.2 ms\r\n\r\n--- 4.4.4.4 ping statistics ---\r\n5 packets transmitted, 5 received, 0% packet loss, time 159ms\r\nrtt min\/avg\/max\/mdev = 11.291\/25.582\/42.522\/11.193 ms, ipg\/ewma 39.930\/33.360 ms\r\nArista01#<\/pre>\n<h6>Cisco<\/h6>\n<pre class=\"lang:sh decode:true\">Cisco01#ping 1.1.1.1\r\nType escape sequence to abort.\r\nSending 5, 100-byte ICMP Echos to 1.1.1.1, timeout is 2 seconds:\r\n!!!!!\r\nSuccess rate is 100 percent (5\/5), round-trip min\/avg\/max = 2\/9\/18 ms\r\nCisco01#ping 2.2.2.2\r\nType escape sequence to abort.\r\nSending 5, 100-byte ICMP Echos to 2.2.2.2, timeout is 2 seconds:\r\n!!!!!\r\nSuccess rate is 100 percent (5\/5), round-trip min\/avg\/max = 2\/9\/18 ms\r\nCisco01#ping 3.3.3.3\r\nType escape sequence to abort.\r\nSending 5, 100-byte ICMP Echos to 3.3.3.3, timeout is 2 seconds:\r\n!!!!!\r\nSuccess rate is 100 percent (5\/5), round-trip min\/avg\/max = 25\/43\/86 ms\r\nCisco01#ping 4.4.4.4\r\nType escape sequence to abort.\r\nSending 5, 100-byte ICMP Echos to 4.4.4.4, timeout is 2 seconds:\r\n!!!!!\r\nSuccess rate is 100 percent (5\/5), round-trip min\/avg\/max = 1\/1\/3 ms\r\nCisco01#<\/pre>\n<h6>Juniper<\/h6>\n<pre class=\"lang:sh decode:true\">root@vMX01&gt; ping count 5 1.1.1.1 \r\nPING 1.1.1.1 (1.1.1.1): 56 data bytes\r\n64 bytes from 1.1.1.1: icmp_seq=0 ttl=64 time=11.263 ms\r\n64 bytes from 1.1.1.1: icmp_seq=1 ttl=64 time=3.556 ms\r\n64 bytes from 1.1.1.1: icmp_seq=2 ttl=64 time=12.002 ms\r\n64 bytes from 1.1.1.1: icmp_seq=3 ttl=64 time=6.014 ms\r\n64 bytes from 1.1.1.1: icmp_seq=4 ttl=64 time=3.728 ms\r\n\r\n--- 1.1.1.1 ping statistics ---\r\n5 packets transmitted, 5 packets received, 0% packet loss\r\nround-trip min\/avg\/max\/stddev = 3.556\/7.313\/12.002\/3.640 ms\r\n\r\nroot@vMX01&gt; ping count 5 2.2.2.2    \r\nPING 2.2.2.2 (2.2.2.2): 56 data bytes\r\n64 bytes from 2.2.2.2: icmp_seq=0 ttl=64 time=0.379 ms\r\n64 bytes from 2.2.2.2: icmp_seq=1 ttl=64 time=0.116 ms\r\n64 bytes from 2.2.2.2: icmp_seq=2 ttl=64 time=0.048 ms\r\n64 bytes from 2.2.2.2: icmp_seq=3 ttl=64 time=0.231 ms\r\n64 bytes from 2.2.2.2: icmp_seq=4 ttl=64 time=0.167 ms\r\n\r\n--- 2.2.2.2 ping statistics ---\r\n5 packets transmitted, 5 packets received, 0% packet loss\r\nround-trip min\/avg\/max\/stddev = 0.048\/0.188\/0.379\/0.113 ms\r\n\r\nroot@vMX01&gt; ping count 5 3.3.3.3    \r\nPING 3.3.3.3 (3.3.3.3): 56 data bytes\r\n64 bytes from 3.3.3.3: icmp_seq=0 ttl=64 time=70.368 ms\r\n64 bytes from 3.3.3.3: icmp_seq=1 ttl=64 time=9.457 ms\r\n64 bytes from 3.3.3.3: icmp_seq=2 ttl=64 time=17.251 ms\r\n64 bytes from 3.3.3.3: icmp_seq=3 ttl=64 time=9.931 ms\r\n64 bytes from 3.3.3.3: icmp_seq=4 ttl=64 time=11.101 ms\r\n\r\n--- 3.3.3.3 ping statistics ---\r\n5 packets transmitted, 5 packets received, 0% packet loss\r\nround-trip min\/avg\/max\/stddev = 9.457\/23.622\/70.368\/23.540 ms\r\n\r\nroot@vMX01&gt; ping count 5 4.4.4.4    \r\nPING 4.4.4.4 (4.4.4.4): 56 data bytes\r\n64 bytes from 4.4.4.4: icmp_seq=0 ttl=255 time=5.418 ms\r\n64 bytes from 4.4.4.4: icmp_seq=1 ttl=255 time=2.295 ms\r\n64 bytes from 4.4.4.4: icmp_seq=2 ttl=255 time=20.893 ms\r\n64 bytes from 4.4.4.4: icmp_seq=3 ttl=255 time=6.589 ms\r\n64 bytes from 4.4.4.4: icmp_seq=4 ttl=255 time=78.685 ms\r\n\r\n--- 4.4.4.4 ping statistics ---\r\n5 packets transmitted, 5 packets received, 0% packet loss\r\nround-trip min\/avg\/max\/stddev = 2.295\/22.776\/78.685\/28.678 ms\r\n<\/pre>\n<h6>Cumulus<\/h6>\n<pre class=\"lang:sh decode:true\">cumulus@cumulus01:~$ ping 1.1.1.1 -c 5\r\nPING 1.1.1.1 (1.1.1.1) 56(84) bytes of data.\r\n64 bytes from 1.1.1.1: icmp_seq=1 ttl=64 time=0.194 ms\r\n64 bytes from 1.1.1.1: icmp_seq=2 ttl=64 time=0.059 ms\r\n64 bytes from 1.1.1.1: icmp_seq=3 ttl=64 time=0.058 ms\r\n64 bytes from 1.1.1.1: icmp_seq=4 ttl=64 time=0.054 ms\r\n64 bytes from 1.1.1.1: icmp_seq=5 ttl=64 time=0.056 ms\r\n\r\n--- 1.1.1.1 ping statistics ---\r\n5 packets transmitted, 5 received, 0% packet loss, time 3999ms\r\nrtt min\/avg\/max\/mdev = 0.054\/0.084\/0.194\/0.055 ms\r\ncumulus@cumulus01:~$ ping 2.2.2.2 -c 5\r\nPING 2.2.2.2 (2.2.2.2) 56(84) bytes of data.\r\n64 bytes from 2.2.2.2: icmp_seq=1 ttl=64 time=1.16 ms\r\n64 bytes from 2.2.2.2: icmp_seq=2 ttl=64 time=1.10 ms\r\n64 bytes from 2.2.2.2: icmp_seq=3 ttl=64 time=0.931 ms\r\n64 bytes from 2.2.2.2: icmp_seq=4 ttl=64 time=1.03 ms\r\n64 bytes from 2.2.2.2: icmp_seq=5 ttl=64 time=0.986 ms\r\n\r\n--- 2.2.2.2 ping statistics ---\r\n5 packets transmitted, 5 received, 0% packet loss, time 4006ms\r\nrtt min\/avg\/max\/mdev = 0.931\/1.044\/1.165\/0.085 ms\r\ncumulus@cumulus01:~$ ping 3.3.3.3 -c 5\r\nPING 3.3.3.3 (3.3.3.3) 56(84) bytes of data.\r\n64 bytes from 3.3.3.3: icmp_seq=1 ttl=64 time=60.4 ms\r\n64 bytes from 3.3.3.3: icmp_seq=2 ttl=64 time=9.62 ms\r\n64 bytes from 3.3.3.3: icmp_seq=3 ttl=64 time=7.31 ms\r\n64 bytes from 3.3.3.3: icmp_seq=4 ttl=64 time=6.94 ms\r\n64 bytes from 3.3.3.3: icmp_seq=5 ttl=64 time=7.10 ms\r\n\r\n--- 3.3.3.3 ping statistics ---\r\n5 packets transmitted, 5 received, 0% packet loss, time 4007ms\r\nrtt min\/avg\/max\/mdev = 6.943\/18.286\/60.442\/21.100 ms\r\ncumulus@cumulus01:~$ ping 4.4.4.4 -c 5\r\nPING 4.4.4.4 (4.4.4.4) 56(84) bytes of data.\r\n64 bytes from 4.4.4.4: icmp_seq=1 ttl=255 time=0.398 ms\r\n64 bytes from 4.4.4.4: icmp_seq=2 ttl=255 time=0.335 ms\r\n64 bytes from 4.4.4.4: icmp_seq=3 ttl=255 time=0.328 ms\r\n64 bytes from 4.4.4.4: icmp_seq=4 ttl=255 time=0.300 ms\r\n64 bytes from 4.4.4.4: icmp_seq=5 ttl=255 time=0.322 ms\r\n\r\n--- 4.4.4.4 ping statistics ---\r\n5 packets transmitted, 5 received, 0% packet loss, time 4000ms\r\nrtt min\/avg\/max\/mdev = 0.300\/0.336\/0.398\/0.038 ms<\/pre>\n<p>&nbsp;<\/p>\n<h3>Pliki konfiguracyjne<\/h3>\n<p>Poni\u017cej znajdziemy pliki konfiguracyjne z urz\u0105dze\u0144, z konfiguracji usun\u0105\u0142em u\u017cytkownik\u00f3w oraz ich has\u0142a.<\/p>\n<h6><a href=\"http:\/\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/08\/Arista_config.txt\">Arista_config<\/a><\/h6>\n<h6><a href=\"http:\/\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/08\/Cisco_config.txt\">Cisco_config<\/a><\/h6>\n<h6><a href=\"http:\/\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/08\/Juniper_config.txt\">Juniper_config<\/a><\/h6>\n<h6><a href=\"http:\/\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/08\/Cumulus.txt\">Cumulus<\/a><\/h6>\n<p>dla Cumulusa jest wynik polecenia\u00a0<em>net show configuration<\/em><\/p>\n<p>I na tym ko\u0144czymy dzisiejszy wpis, niebawem kolejny w podobnym stylu.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ostatnio pracuj\u0119 w \u015brodowisku heterogenicznej infrastruktury sieciowej. Ale co to znaczy dzi\u015b heterogeniczna infrastruktura sieciowa jest to tw\u00f3r w kt\u00f3rym mamy kliku r\u00f3\u017cnych producent\u00f3w sprz\u0119tu. Co raz cz\u0119\u015bciej w spotykam si\u0119 z sytuacj\u0105, \u017ce dany blog funkcjonalny jest realizowany przez jakiego\u015b producenta, np. sie\u0107 WAN Sie\u0107 LAN Sie\u0107 DC z czasem przychodzi potrzeba aby po\u0142\u0105czy\u0107 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1821,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"Heterogeniczna infrastruktura sieciowa @CumulusNetworks @CiscoChampion @JuniperEngineer #vExpert @AristaNetworks","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"enabled":false},"version":2}},"categories":[311,4,474,5,84],"tags":[312,482,13,485,74,479,478,487,475,486,480,483,210,481,476,477,201,202,386,484],"class_list":["post-1916","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-arista","category-cisco","category-cumulus","category-juniper","category-lab","tag-arista","tag-arista-ospf","tag-cisco","tag-cisco-ospf","tag-cli","tag-cli-cisco","tag-cli-juniper","tag-cumulus-loopback","tag-cumulus-networks","tag-cumulus-ospf","tag-how-to-configure","tag-juniper-ospf","tag-juniper-vmx","tag-junos-cli","tag-konfiguracja-cisco","tag-konfiguracja-juniper","tag-ospf","tag-routing","tag-routing-dynamiczyny","tag-useradd"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Heterogeniczna infrastruktura sieciowa vol. 1 - SafeKom Blog<\/title>\n<meta name=\"description\" content=\"Wpis po\u015bwi\u0119cony podstawowej konfiguracji urz\u0105dze\u0144 Cisco, Juniper, Cumulus oraz Arista. Jak skonfigurowa\u0107 interfejsy oraz ospf. Heterogeniczna infrastruktura\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.safekom.pl\/blog\/lab\/heterogeniczna-infrastruktura-sieciowa-vol-1\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Heterogeniczna infrastruktura sieciowa vol. 1 - SafeKom Blog\" \/>\n<meta property=\"og:description\" content=\"Wpis po\u015bwi\u0119cony podstawowej konfiguracji urz\u0105dze\u0144 Cisco, Juniper, Cumulus oraz Arista. Jak skonfigurowa\u0107 interfejsy oraz ospf. Heterogeniczna infrastruktura\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.safekom.pl\/blog\/lab\/heterogeniczna-infrastruktura-sieciowa-vol-1\/\" \/>\n<meta property=\"og:site_name\" content=\"SafeKom Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/safekompl\" \/>\n<meta property=\"article:published_time\" content=\"2017-08-01T13:56:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-08-03T07:52:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/06\/cropped-logo-rastrowe-bez-t\u0142a.png?fit=512%2C512&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"512\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Micha\u0142 Iwa\u0144czuk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@MIwaczuk\" \/>\n<meta name=\"twitter:site\" content=\"@MIwaczuk\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"Micha\u0142 Iwa\u0144czuk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"27 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/lab\/heterogeniczna-infrastruktura-sieciowa-vol-1\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/lab\/heterogeniczna-infrastruktura-sieciowa-vol-1\/\"},\"author\":{\"name\":\"Micha\u0142 Iwa\u0144czuk\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/#\/schema\/person\/fd4cc931b624af4b7353d36d92ba7181\"},\"headline\":\"Heterogeniczna infrastruktura sieciowa vol. 1\",\"datePublished\":\"2017-08-01T13:56:11+00:00\",\"dateModified\":\"2017-08-03T07:52:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/lab\/heterogeniczna-infrastruktura-sieciowa-vol-1\/\"},\"wordCount\":782,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/lab\/heterogeniczna-infrastruktura-sieciowa-vol-1\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/06\/cropped-logo-rastrowe-bez-t%C5%82a.png?fit=512%2C512&ssl=1\",\"keywords\":[\"arista\",\"arista ospf\",\"cisco\",\"cisco ospf\",\"cli\",\"cli cisco\",\"cli juniper\",\"cumulus loopback\",\"Cumulus Networks\",\"cumulus ospf\",\"how to configure\",\"juniper ospf\",\"juniper vmx\",\"junos cli\",\"konfiguracja cisco\",\"konfiguracja Juniper\",\"ospf\",\"routing\",\"routing dynamiczyny\",\"useradd\"],\"articleSection\":[\"Arista\",\"Cisco\",\"Cumulus\",\"Juniper\",\"Lab\"],\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.safekom.pl\/blog\/lab\/heterogeniczna-infrastruktura-sieciowa-vol-1\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/lab\/heterogeniczna-infrastruktura-sieciowa-vol-1\/\",\"url\":\"https:\/\/www.safekom.pl\/blog\/lab\/heterogeniczna-infrastruktura-sieciowa-vol-1\/\",\"name\":\"Heterogeniczna infrastruktura sieciowa vol. 1 - SafeKom Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/lab\/heterogeniczna-infrastruktura-sieciowa-vol-1\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/lab\/heterogeniczna-infrastruktura-sieciowa-vol-1\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/06\/cropped-logo-rastrowe-bez-t%C5%82a.png?fit=512%2C512&ssl=1\",\"datePublished\":\"2017-08-01T13:56:11+00:00\",\"dateModified\":\"2017-08-03T07:52:23+00:00\",\"description\":\"Wpis po\u015bwi\u0119cony podstawowej konfiguracji urz\u0105dze\u0144 Cisco, Juniper, Cumulus oraz Arista. Jak skonfigurowa\u0107 interfejsy oraz ospf. Heterogeniczna infrastruktura\",\"breadcrumb\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/lab\/heterogeniczna-infrastruktura-sieciowa-vol-1\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.safekom.pl\/blog\/lab\/heterogeniczna-infrastruktura-sieciowa-vol-1\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/lab\/heterogeniczna-infrastruktura-sieciowa-vol-1\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/06\/cropped-logo-rastrowe-bez-t%C5%82a.png?fit=512%2C512&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/06\/cropped-logo-rastrowe-bez-t%C5%82a.png?fit=512%2C512&ssl=1\",\"width\":512,\"height\":512},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/lab\/heterogeniczna-infrastruktura-sieciowa-vol-1\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/www.safekom.pl\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Heterogeniczna infrastruktura sieciowa vol. 1\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/#website\",\"url\":\"https:\/\/www.safekom.pl\/blog\/\",\"name\":\"SafeKom Blog\",\"description\":\"Notatki Architekta i in\u017cyniera zwi\u0105zanego rozwi\u0105zaniami on-prem\",\"publisher\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.safekom.pl\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/#organization\",\"name\":\"SafeKom Blog\",\"url\":\"https:\/\/www.safekom.pl\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/05\/cropped-logo.png?fit=512%2C512&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/05\/cropped-logo.png?fit=512%2C512&ssl=1\",\"width\":512,\"height\":512,\"caption\":\"SafeKom Blog\"},\"image\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/safekompl\",\"https:\/\/x.com\/MIwaczuk\",\"https:\/\/www.linkedin.com\/in\/michaliwanczuk\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/#\/schema\/person\/fd4cc931b624af4b7353d36d92ba7181\",\"name\":\"Micha\u0142 Iwa\u0144czuk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cc6dda4ee8d21d1f254147e5ee6f5e38881b88a4a12a5774ca42380597e52014?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cc6dda4ee8d21d1f254147e5ee6f5e38881b88a4a12a5774ca42380597e52014?s=96&d=mm&r=g\",\"caption\":\"Micha\u0142 Iwa\u0144czuk\"},\"description\":\"Pasjonat komputerowy od zawsze oraz maniak w zakresie sieci, wirtualizacji oraz bezpiecze\u0144stwa IT. Kompetentny in\u017cynier z du\u017cym do\u015bwiadczeniem w realizacji projekt\u00f3w informatycznych i telekomunikacyjnych. Wieloletni administrator IT, kt\u00f3ry utrzymuje systemy informatyczne dostosowuj\u0105c je do wymog\u00f3w biznesowych z zapewnieniem dost\u0119pno\u015bci 24\/7\/365.\",\"url\":\"https:\/\/www.safekom.pl\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Heterogeniczna infrastruktura sieciowa vol. 1 - SafeKom Blog","description":"Wpis po\u015bwi\u0119cony podstawowej konfiguracji urz\u0105dze\u0144 Cisco, Juniper, Cumulus oraz Arista. Jak skonfigurowa\u0107 interfejsy oraz ospf. Heterogeniczna infrastruktura","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.safekom.pl\/blog\/lab\/heterogeniczna-infrastruktura-sieciowa-vol-1\/","og_locale":"pl_PL","og_type":"article","og_title":"Heterogeniczna infrastruktura sieciowa vol. 1 - SafeKom Blog","og_description":"Wpis po\u015bwi\u0119cony podstawowej konfiguracji urz\u0105dze\u0144 Cisco, Juniper, Cumulus oraz Arista. Jak skonfigurowa\u0107 interfejsy oraz ospf. Heterogeniczna infrastruktura","og_url":"https:\/\/www.safekom.pl\/blog\/lab\/heterogeniczna-infrastruktura-sieciowa-vol-1\/","og_site_name":"SafeKom Blog","article_publisher":"https:\/\/www.facebook.com\/safekompl","article_published_time":"2017-08-01T13:56:11+00:00","article_modified_time":"2017-08-03T07:52:23+00:00","og_image":[{"width":512,"height":512,"url":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/06\/cropped-logo-rastrowe-bez-t\u0142a.png?fit=512%2C512&ssl=1","type":"image\/png"}],"author":"Micha\u0142 Iwa\u0144czuk","twitter_card":"summary_large_image","twitter_creator":"@MIwaczuk","twitter_site":"@MIwaczuk","twitter_misc":{"Napisane przez":"Micha\u0142 Iwa\u0144czuk","Szacowany czas czytania":"27 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.safekom.pl\/blog\/lab\/heterogeniczna-infrastruktura-sieciowa-vol-1\/#article","isPartOf":{"@id":"https:\/\/www.safekom.pl\/blog\/lab\/heterogeniczna-infrastruktura-sieciowa-vol-1\/"},"author":{"name":"Micha\u0142 Iwa\u0144czuk","@id":"https:\/\/www.safekom.pl\/blog\/#\/schema\/person\/fd4cc931b624af4b7353d36d92ba7181"},"headline":"Heterogeniczna infrastruktura sieciowa vol. 1","datePublished":"2017-08-01T13:56:11+00:00","dateModified":"2017-08-03T07:52:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.safekom.pl\/blog\/lab\/heterogeniczna-infrastruktura-sieciowa-vol-1\/"},"wordCount":782,"commentCount":1,"publisher":{"@id":"https:\/\/www.safekom.pl\/blog\/#organization"},"image":{"@id":"https:\/\/www.safekom.pl\/blog\/lab\/heterogeniczna-infrastruktura-sieciowa-vol-1\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/06\/cropped-logo-rastrowe-bez-t%C5%82a.png?fit=512%2C512&ssl=1","keywords":["arista","arista ospf","cisco","cisco ospf","cli","cli cisco","cli juniper","cumulus loopback","Cumulus Networks","cumulus ospf","how to configure","juniper ospf","juniper vmx","junos cli","konfiguracja cisco","konfiguracja Juniper","ospf","routing","routing dynamiczyny","useradd"],"articleSection":["Arista","Cisco","Cumulus","Juniper","Lab"],"inLanguage":"pl-PL","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.safekom.pl\/blog\/lab\/heterogeniczna-infrastruktura-sieciowa-vol-1\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.safekom.pl\/blog\/lab\/heterogeniczna-infrastruktura-sieciowa-vol-1\/","url":"https:\/\/www.safekom.pl\/blog\/lab\/heterogeniczna-infrastruktura-sieciowa-vol-1\/","name":"Heterogeniczna infrastruktura sieciowa vol. 1 - SafeKom Blog","isPartOf":{"@id":"https:\/\/www.safekom.pl\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.safekom.pl\/blog\/lab\/heterogeniczna-infrastruktura-sieciowa-vol-1\/#primaryimage"},"image":{"@id":"https:\/\/www.safekom.pl\/blog\/lab\/heterogeniczna-infrastruktura-sieciowa-vol-1\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/06\/cropped-logo-rastrowe-bez-t%C5%82a.png?fit=512%2C512&ssl=1","datePublished":"2017-08-01T13:56:11+00:00","dateModified":"2017-08-03T07:52:23+00:00","description":"Wpis po\u015bwi\u0119cony podstawowej konfiguracji urz\u0105dze\u0144 Cisco, Juniper, Cumulus oraz Arista. Jak skonfigurowa\u0107 interfejsy oraz ospf. Heterogeniczna infrastruktura","breadcrumb":{"@id":"https:\/\/www.safekom.pl\/blog\/lab\/heterogeniczna-infrastruktura-sieciowa-vol-1\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.safekom.pl\/blog\/lab\/heterogeniczna-infrastruktura-sieciowa-vol-1\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/www.safekom.pl\/blog\/lab\/heterogeniczna-infrastruktura-sieciowa-vol-1\/#primaryimage","url":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/06\/cropped-logo-rastrowe-bez-t%C5%82a.png?fit=512%2C512&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/06\/cropped-logo-rastrowe-bez-t%C5%82a.png?fit=512%2C512&ssl=1","width":512,"height":512},{"@type":"BreadcrumbList","@id":"https:\/\/www.safekom.pl\/blog\/lab\/heterogeniczna-infrastruktura-sieciowa-vol-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/www.safekom.pl\/blog\/"},{"@type":"ListItem","position":2,"name":"Heterogeniczna infrastruktura sieciowa vol. 1"}]},{"@type":"WebSite","@id":"https:\/\/www.safekom.pl\/blog\/#website","url":"https:\/\/www.safekom.pl\/blog\/","name":"SafeKom Blog","description":"Notatki Architekta i in\u017cyniera zwi\u0105zanego rozwi\u0105zaniami on-prem","publisher":{"@id":"https:\/\/www.safekom.pl\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.safekom.pl\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/www.safekom.pl\/blog\/#organization","name":"SafeKom Blog","url":"https:\/\/www.safekom.pl\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/www.safekom.pl\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/05\/cropped-logo.png?fit=512%2C512&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/05\/cropped-logo.png?fit=512%2C512&ssl=1","width":512,"height":512,"caption":"SafeKom Blog"},"image":{"@id":"https:\/\/www.safekom.pl\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/safekompl","https:\/\/x.com\/MIwaczuk","https:\/\/www.linkedin.com\/in\/michaliwanczuk\/"]},{"@type":"Person","@id":"https:\/\/www.safekom.pl\/blog\/#\/schema\/person\/fd4cc931b624af4b7353d36d92ba7181","name":"Micha\u0142 Iwa\u0144czuk","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/www.safekom.pl\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cc6dda4ee8d21d1f254147e5ee6f5e38881b88a4a12a5774ca42380597e52014?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cc6dda4ee8d21d1f254147e5ee6f5e38881b88a4a12a5774ca42380597e52014?s=96&d=mm&r=g","caption":"Micha\u0142 Iwa\u0144czuk"},"description":"Pasjonat komputerowy od zawsze oraz maniak w zakresie sieci, wirtualizacji oraz bezpiecze\u0144stwa IT. Kompetentny in\u017cynier z du\u017cym do\u015bwiadczeniem w realizacji projekt\u00f3w informatycznych i telekomunikacyjnych. Wieloletni administrator IT, kt\u00f3ry utrzymuje systemy informatyczne dostosowuj\u0105c je do wymog\u00f3w biznesowych z zapewnieniem dost\u0119pno\u015bci 24\/7\/365.","url":"https:\/\/www.safekom.pl\/blog\/author\/admin\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2017\/06\/cropped-logo-rastrowe-bez-t%C5%82a.png?fit=512%2C512&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p7i9ri-uU","jetpack-related-posts":[{"id":782,"url":"https:\/\/www.safekom.pl\/blog\/cisco\/lab-vxlan-juniper-vmx-i-cisco-csr1kv-asav\/","url_meta":{"origin":1916,"position":0},"title":"LAB vxlan &#8211; Juniper vMX i Cisco CSR1kv oraz ASAv","author":"Micha\u0142 Iwa\u0144czuk","date":"26.04.2016","format":false,"excerpt":"Po pierwszym wpisie o VxLAN, gdzie opar\u0142em si\u0119 wy\u0142\u0105cznie na Cisco CSRv oraz ASAv przysz\u0142a pora na testowanie w konfiguracji multivendor. Do tego laba wykorzysta\u0142em: Cisco CSRv Cisco ASAv Juniper vMX Wszystko zosta\u0142o uruchomione na Vmware Workstation. W dobie wirtualizacji serwer\u00f3w i desktop\u00f3w postanowi\u0142em wzi\u0105\u0107 si\u0119 ostro za poznanie \u015bwiata\u2026","rel":"","context":"In &quot;Cisco&quot;","block_context":{"text":"Cisco","link":"https:\/\/www.safekom.pl\/blog\/category\/cisco\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2016\/02\/Juniper-Networks-and-Cisco-Systems.png?fit=712%2C534&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2016\/02\/Juniper-Networks-and-Cisco-Systems.png?fit=712%2C534&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2016\/02\/Juniper-Networks-and-Cisco-Systems.png?fit=712%2C534&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2016\/02\/Juniper-Networks-and-Cisco-Systems.png?fit=712%2C534&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":1070,"url":"https:\/\/www.safekom.pl\/blog\/cisco\/lab-vrf-cisco\/","url_meta":{"origin":1916,"position":1},"title":"LAB &#8211; VRF Cisco","author":"Micha\u0142 Iwa\u0144czuk","date":"14.07.2016","format":false,"excerpt":"Ostatnio bardzo du\u017co s\u0142yszymy o wirtualizacji sieci.\u00a0 Warto zatem\u00a0wr\u00f3ci\u0107 do jej podstaw kiedy to ju\u017c wtedy\u00a0w pewien spos\u00f3b \"wirtualizacja\" by\u0142a stosowana\u00a0na \u00a0urz\u0105dzeniach, na kt\u00f3rych separuje si\u0119 tablice routingu. Separacja ta jest\u00a0ukryta pod nazw\u0105 VRF (Virtual Routing and Forwarding). Drugim wariatem na \"wirtualizacj\u0119\" jest tworzenie tzw. wirtualnych system\u00f3w czy router\u00f3w. Dzi\u015b,\u2026","rel":"","context":"In &quot;Cisco&quot;","block_context":{"text":"Cisco","link":"https:\/\/www.safekom.pl\/blog\/category\/cisco\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/09\/cisco-logo.png?fit=400%2C300&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":693,"url":"https:\/\/www.safekom.pl\/blog\/cisco\/lab-vxvlan-pierwsze-podjescie\/","url_meta":{"origin":1916,"position":2},"title":"LAB &#8211; VXVLAN pierwsze podje\u015bcie","author":"Micha\u0142 Iwa\u0144czuk","date":"03.04.2016","format":false,"excerpt":"Ostatnio uczestniczy\u0142em w ciekawym webbinarium zorganizowane przy forum CCIE.pl pod tytu\u0142em\u00a0DCI \"po nowemu\" - prezentacj\u0119 prowadzi\u0142\u00a0Piotr Jab\u0142o\u0144ski. Piotr pokazywa\u0142 jak w dzisiejszych czasach mo\u017cna wykorzysta\u0107 technologi\u0119 VXVLAN do rozci\u0105gania L2 pomi\u0119dzy DataCenter lub w samym DC. Po obejrzeniu stwierdzi\u0142em \u017ce trzeba zbudowa\u0107 laba i zobaczy\u0107 z czym si\u0119 to je\u2026","rel":"","context":"In &quot;Cisco&quot;","block_context":{"text":"Cisco","link":"https:\/\/www.safekom.pl\/blog\/category\/cisco\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/09\/cisco-logo.png?fit=400%2C300&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1540,"url":"https:\/\/www.safekom.pl\/blog\/lab\/home-lab-nsx-6-2-4-esg-dlr-routing-dynamiczny-ospf\/","url_meta":{"origin":1916,"position":3},"title":"Home Lab \u2013 NSX 6.2.4 ESG DLR Routing dynamiczny OSPF","author":"Micha\u0142 Iwa\u0144czuk","date":"05.12.2016","format":false,"excerpt":"W poprzednim wpisie skupili\u015bmy na konfiguracji routingu dynamicznego z wykorzystaniem BGP, dzi\u015b poka\u017ce jak wykona\u0107 konfiguracj\u0119 w NSX OSPF'a Rysunek pogl\u0105dowy Konfiguracja DLR wybieramy edge-6, gdzie w nowym oknie przechodzimy do Manage > \u00a0Routing > Global Configuration\u00a0,\u00a0gdzie nadamy router ID klikaj\u0105c Edit gdzie w nowym oknie wybieramy z listy IP\u2026","rel":"","context":"In &quot;Lab&quot;","block_context":{"text":"Lab","link":"https:\/\/www.safekom.pl\/blog\/en\/category\/lab\/"},"img":{"alt_text":"routing_dynamiczny3","src":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2016\/12\/routing_dynamiczny3.png?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2016\/12\/routing_dynamiczny3.png?resize=350%2C200 1x, https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2016\/12\/routing_dynamiczny3.png?resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2016\/12\/routing_dynamiczny3.png?resize=700%2C400 2x, https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2016\/12\/routing_dynamiczny3.png?resize=1050%2C600 3x"},"classes":[]},{"id":171,"url":"https:\/\/www.safekom.pl\/blog\/cisco\/lab-ipsec-juniper-srx-cisco-router\/","url_meta":{"origin":1916,"position":4},"title":"Lab &#8211; IPSEC Juniper SRX &#8211; Cisco router","author":"Micha\u0142 Iwa\u0144czuk","date":"21.08.2015","format":false,"excerpt":"Dzi\u015b postanowi\u0142em opisa\u0107 troch\u0119 labowania, temat ostatnio bardzo mocno przerabiany IPSEC. Poni\u017cej opisz\u0119 wariant policy base vpn, kt\u00f3ry jest bardzo elastyczny. Za\u0142o\u017cenia: Faza 1 aes256 sha-1 pfs g2 3600s Faza 2 aes256 sha-1 pfs g2 3600s Cisco Juniper SRX Sieci kt\u00f3re b\u0119d\u0105 podlega\u0142y szyfrowaniu 172.16.10.0\/24 10.10.10.0\/24 Cisco Juniper SRX Interfejs\u2026","rel":"","context":"In &quot;Cisco&quot;","block_context":{"text":"Cisco","link":"https:\/\/www.safekom.pl\/blog\/category\/cisco\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/08\/junos_multicolor_burst.png?fit=361%2C393&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":595,"url":"https:\/\/www.safekom.pl\/blog\/cisco\/f5-konfiguracja-podstawowa-konfiguracja-sieci\/","url_meta":{"origin":1916,"position":5},"title":"F5 &#8211; konfiguracja podstawowa konfiguracja sieci","author":"Micha\u0142 Iwa\u0144czuk","date":"24.02.2016","format":false,"excerpt":"W dzisiejszym wpisie opisz\u0119 podstawow\u0105 konfiguracj\u0119 sieciow\u0105\u00a0sk\u0142ada si\u0119 z: Konfiguracji interfejsu tworzenie port channel z Lacp vlan Self IP Routing rysunek pogl\u0105dowy. Po\u0142\u0105czenia: F5 member Switch member 1.1 Trunk01 eth1\/1 Port chanel 10 1.2 eth1\/2 Przechodzimy do konfiguracji logujemy si\u0119 na urz\u0105dzenie, przechodzimy do\u00a0Network \u203a Trunks \u203a Trunk List\u00a0klikamy create,\u00a0podobnie\u2026","rel":"","context":"In &quot;Cisco&quot;","block_context":{"text":"Cisco","link":"https:\/\/www.safekom.pl\/blog\/category\/cisco\/"},"img":{"alt_text":"f5_net","src":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2016\/02\/f5_net.png?resize=350%2C200","width":350,"height":200},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/posts\/1916","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/comments?post=1916"}],"version-history":[{"count":0,"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/posts\/1916\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/media\/1821"}],"wp:attachment":[{"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/media?parent=1916"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/categories?post=1916"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/tags?post=1916"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}