How to Configure Single-Area OSPF on Cisco Routers (Step-by-Step)
A full R1/R2/R3 single-area OSPF lab with IP plan, router ospf config, and the show commands that prove neighbors are Full and routes are installed.
A full R1/R2/R3 single-area OSPF lab with IP plan, router ospf config, and the show commands that prove neighbors are Full and routes are installed.
OSPF picks a Router ID from manual config, then the highest loopback, then the highest physical IP. Here is the selection order, examples, and how to lock it down.
OSPF cost is Reference Bandwidth / Interface Bandwidth, and the default 100 Mbps reference turns every gigabit link into cost 1. Here is how to fix it properly.
OSPF has four network types: broadcast, point-to-point, NBMA, and point-to-multipoint. Each changes DR election and Hello behavior. Here is when to use which.
OSPF Hello and Dead timers must match on both sides or neighbors never form. Here is how to check them, change them safely, and tune for faster convergence.
Virtual links patch a discontiguous Area 0 by tunneling through a transit area. Configuration is simple, but treat them as a temporary fix, not a permanent design.
Stub, Totally Stubby, and NSSA areas each block different LSA types to shrink the LSDB. Here is the config, the verification output, and when to pick each one.
OSPF supports plain-text, MD5, and SHA authentication at the interface or area level. Here is how to configure each, why MD5 is the production default, and how to verify.
Multi-area OSPF across Area 0, 10, and 20 with two ABRs. Full R1 to R5 config plus show commands to confirm inter-area routes and ABR behavior.
The default-information originate command injects 0.0.0.0/0 as a Type 5 LSA and turns the router into an ASBR. Here is the syntax, the always option, and verification.
Classic OSPF passive-interface mistakes: making uplinks passive by accident, leaving user VLANs active, and using passive-default without exclusions. Here are the fixes.
OSPF learned the route but it is not in the routing table. Walk through AD conflicts, passive interfaces, distribute-lists, and next-hop reachability step by step.