Hi Remi,

I've installed a lab with OpenBSD6.6 VM's to see if would happen in the
newer version.

I was able to reproduce it again, but in slightly different manner.

First of all, you need to have BGP running in FW's also, and have the
same route received through BGP, otherwise the issue is not
reproducible, because the MPATH flag will behave well with OSPF only.
Without the MPATH issue you can't reproduce the rest.

So LAB setup(all openbsd6.6 VM's):

2x fw/router
2x host
1x bgp router

fw1:192.168.98.200

fw2:192.168.98.201

host1:192.168.98.202

host2:192.168.98.203

bgp:192.168.98.204


In the hosts I run carp with VIP 10.10.10.10/32, carp configured with
preempt in kernel.

ospf config for host1/2 is (only router id change):

host1# more
/etc/ospfd.conf                                                                 
                                                                                
                                                                                
                                

# $OpenBSD: ospfd.conf,v 1.2 2018/08/07 07:06:20 claudio Exp $

# macros
id="192.168.98.202"

# global configuration
router-id $id
# fib-update no
# stub router no
# spf-delay 1
# spf-holdtime 5

# auth-key secret
# auth-type simple
# hello-interval 10
metric 10
# retransmit-interval 5
# router-dead-time 40
router-priority 0
# transmit-delay 1

# rtlabel "DMZ" external-tag 1

# areas
area 0.0.0.0 {
        interface em0 {
                auth-type simple
                auth-key secret
        }

        interface carp1 {
                passive
        }
}
host1#

For FW1/2 is(router ID and router priority change, in FW2 priority is
10, so BDR):

fw1# more
/etc/ospfd.conf                                                                 
                                                                                
                                                                                
                                  

# $OpenBSD: ospfd.conf,v 1.2 2018/08/07 07:06:20 claudio Exp $

# macros
id="192.168.98.200"

# global configuration
router-id $id
# fib-update no
# stub router no
# spf-delay 1
# spf-holdtime 5

# auth-key secret
# auth-type simple
# hello-interval 10
metric 10
# retransmit-interval 5
# router-dead-time 40
router-priority 100
# transmit-delay 1

# rtlabel "DMZ" external-tag 1

# areas
area 0.0.0.0 {
        interface em0 {
                auth-type simple
                auth-key secret
        }
}
fw1#

For BGPD configs:

FW1/2:


fw1# more
/etc/bgpd.conf                                                                  
                                                                                
                                                                                
                                  

# $OpenBSD: bgpd.conf,v 1.15 2018/11/17 17:22:38 deraadt Exp $
# example bgpd configuration file, see bgpd.conf(5)

# define our own ASN as a macro
ASN="65123"

# global configuration
AS $ASN
router-id 192.168.98.200

# list of networks that may be originated by our ASN
prefix-set mynetworks {         \
        192.0.6.0/24            \
        2001:db8:abef::/48      \
}

# define bogon prefixes which should not be part of the DFZ
prefix-set bogons {
        0.0.0.0/8 or-longer             # 'this' network [RFC1122]
        10.0.0.0/8 or-longer            # private space [RFC1918]
        100.64.0.0/10 or-longer         # CGN Shared [RFC6598]
        127.0.0.0/8 or-longer           # localhost [RFC1122]
        169.254.0.0/16 or-longer        # link local [RFC3927]
        172.16.0.0/12 or-longer         # private space [RFC1918]
        192.0.2.0/24 or-longer          # TEST-NET-1 [RFC5737]
        192.88.99.0/24 or-longer        # 6to4 anycast relay [RFC7526]
        192.168.0.0/16 or-longer        # private space [RFC1918]
        198.18.0.0/15 or-longer         # benchmarking [RFC2544]
        198.51.100.0/24 or-longer       # TEST-NET-2 [RFC5737]
        203.0.113.0/24 or-longer        # TEST-NET-3 [RFC5737]
        224.0.0.0/4 or-longer           # multicast
        240.0.0.0/4 or-longer           # reserved for future use
        ::/8 or-longer                  # RFC 4291 IPv4-compatible,
loopback, et al
        0100::/64 or-longer             # Discard-Only [RFC6666]
        2001:2::/48 or-longer           # BMWG [RFC5180]
        2001:10::/28 or-longer          # ORCHID [RFC4843]
        2001:db8::/32 or-longer         # docu range [RFC3849]
        2002::/16 or-longer             # 6to4 anycast relay [RFC7526]
        3ffe::/16 or-longer             # old 6bone
        fc00::/7 or-longer              # unique local unicast
        fe80::/10 or-longer             # link local unicast
        fec0::/10 or-longer             # old site local unicast
        ff00::/8 or-longer              # multicast
}

# Generate routes for the networks our ASN will originate.
# The communities (read 'tags') are later used to match on what
# is announced to EBGP neighbors
network prefix-set mynetworks set large-community $ASN:1:1

# assume simple network with 3 routers in IBGP full mesh
group "ibgp mesh v4" {
        remote-as $ASN
        # use loopback for IBGP sessions, assume its distributed in OSPF
        local-address 192.168.98.200
        neighbor 192.168.98.204         # router 2 ipv4
#        neighbor 192.168.98.201         # router 3 ipv4
}
# define the IPv6 IBGP sessions
group "ibgp mesh v6" {
        remote-as $ASN
        local-address 2001:db8:abcd::1
        neighbor 2001:db8:abcd::2       # router 2 ipv6
        neighbor 2001:db8:abcd::3       # router 3 ipv6
}

# upstream providers
group "upstreams" {
        neighbor 203.0.113.1 {
                remote-as 65002
                descr "IPv4 Transit Provider A"
        }
        neighbor 198.51.100.0 {
                remote-as 65123
                descr "IPv4 Transit provider B"
        }
        neighbor 2001:db8:666::2 {
                remote-as 65123
                descr "IPv6 Transit provider B"
        }
}

## rules section

# uncomment the following two lines to accept a default route from upstreams
#allow from group upstreams prefix 0.0.0.0/0
#allow from group upstreams prefix ::/0

### for simple BGP setups, no editing below this line is required ###

# Outbound EBGP: only allow self originated networks to ebgp peers
# Don't leak any routes from upstream or peering sessions. This is done
# by checking for routes that are tagged with the large-community $ASN:1:1
allow to ebgp prefix-set mynetworks large-community $ASN:1:1

# deny more-specifics of our own originated prefixes
deny quick from ebgp prefix-set mynetworks or-longer

# IBGP: allow all updates to and from our IBGP neighbors
allow from ibgp
allow to ibgp

# Scrub normal and large communities relevant to our ASN from EBGP neighbors
# https://tools.ietf.org/html/rfc7454#section-11
match from ebgp set { community delete $ASN:* }
match from ebgp set { large-community delete $ASN:*:* }

# filter out prefixes longer than 24 or shorter than 8 bits for IPv4
# and longer than 48 or shorter than 16 bits for IPv6.
allow from any inet prefixlen 8 - 24
allow from any inet6 prefixlen 16 - 48

# Honor requests to gracefully shutdown BGP sessions
# https://tools.ietf.org/html/rfc8326
#match from any community GRACEFUL_SHUTDOWN set { localpref 0 }

#deny quick from any prefix-set bogons

# filter bogon AS numbers
# AS_TRANS (23456) is not supposed to show up in any path and indicates a
# missconfiguration. Additionally Private or Reserved ASNs have no place in
# the public DFZ.
http://www.iana.org/assignments/as-numbers/as-numbers.xhtml
#deny quick from any AS 23456
#deny quick from any AS 64496 - 131071
#deny quick from any AS 4200000000 - 4294967295

# filter out too long paths
deny from any max-as-len 100
fw1#


For BGP router:


bgp1# more /etc/bgpd.conf      
# $OpenBSD: bgpd.conf,v 1.15 2018/11/17 17:22:38 deraadt Exp $
# example bgpd configuration file, see bgpd.conf(5)

# define our own ASN as a macro
ASN="65123"

# global configuration
AS $ASN
router-id 192.168.98.204

# list of networks that may be originated by our ASN
prefix-set mynetworks {         \
        192.0.2.0/24            \
        2001:db8:abcd::/48      \
        10.10.10.10/32          \
}

# define bogon prefixes which should not be part of the DFZ
prefix-set bogons {
        0.0.0.0/8 or-longer             # 'this' network [RFC1122]
        10.0.0.0/8 or-longer            # private space [RFC1918]
        100.64.0.0/10 or-longer         # CGN Shared [RFC6598]
        127.0.0.0/8 or-longer           # localhost [RFC1122]
        169.254.0.0/16 or-longer        # link local [RFC3927]
        172.16.0.0/12 or-longer         # private space [RFC1918]
        192.0.2.0/24 or-longer          # TEST-NET-1 [RFC5737]
        192.88.99.0/24 or-longer        # 6to4 anycast relay [RFC7526]
        192.168.0.0/16 or-longer        # private space [RFC1918]
        198.18.0.0/15 or-longer         # benchmarking [RFC2544]
        198.51.100.0/24 or-longer       # TEST-NET-2 [RFC5737]
        203.0.113.0/24 or-longer        # TEST-NET-3 [RFC5737]
        224.0.0.0/4 or-longer           # multicast
        240.0.0.0/4 or-longer           # reserved for future use
        ::/8 or-longer                  # RFC 4291 IPv4-compatible,
loopback, et al
        0100::/64 or-longer             # Discard-Only [RFC6666]
        2001:2::/48 or-longer           # BMWG [RFC5180]
        2001:10::/28 or-longer          # ORCHID [RFC4843]
        2001:db8::/32 or-longer         # docu range [RFC3849]
        2002::/16 or-longer             # 6to4 anycast relay [RFC7526]
        3ffe::/16 or-longer             # old 6bone
        fc00::/7 or-longer              # unique local unicast
        fe80::/10 or-longer             # link local unicast
        fec0::/10 or-longer             # old site local unicast
        ff00::/8 or-longer              # multicast
}

# Generate routes for the networks our ASN will originate.
# The communities (read 'tags') are later used to match on what
# is announced to EBGP neighbors
network prefix-set mynetworks set large-community $ASN:1:1

# assume simple network with 3 routers in IBGP full mesh
group "ibgp mesh v4" {
        remote-as $ASN
        # use loopback for IBGP sessions, assume its distributed in OSPF
        local-address 192.168.98.204
        neighbor 192.168.98.200         # router 2 ipv4
        neighbor 192.168.98.201         # router 3 ipv4
}
# define the IPv6 IBGP sessions
group "ibgp mesh v6" {
        remote-as $ASN
        local-address 2001:db8:abcd::1
        neighbor 2001:db8:abcd::2       # router 2 ipv6
        neighbor 2001:db8:abcd::3       # router 3 ipv6
}

# upstream providers
group "upstreams" {
        neighbor 203.0.113.1 {
                remote-as 65002
                descr "IPv4 Transit Provider A"
        }
        neighbor 198.51.100.0 {
                remote-as 65123
                descr "IPv4 Transit provider B"
        }
        neighbor 2001:db8:666::2 {
                remote-as 65123
                descr "IPv6 Transit provider B"
        }
}

## rules section

# uncomment the following two lines to accept a default route from upstreams
#allow from group upstreams prefix 0.0.0.0/0
#allow from group upstreams prefix ::/0

### for simple BGP setups, no editing below this line is required ###

# Outbound EBGP: only allow self originated networks to ebgp peers
# Don't leak any routes from upstream or peering sessions. This is done
# by checking for routes that are tagged with the large-community $ASN:1:1
allow to ebgp prefix-set mynetworks large-community $ASN:1:1

# deny more-specifics of our own originated prefixes
deny quick from ebgp prefix-set mynetworks or-longer

# IBGP: allow all updates to and from our IBGP neighbors
allow from ibgp
allow to ibgp

# Scrub normal and large communities relevant to our ASN from EBGP neighbors
# https://tools.ietf.org/html/rfc7454#section-11
match from ebgp set { community delete $ASN:* }
match from ebgp set { large-community delete $ASN:*:* }

# filter out prefixes longer than 24 or shorter than 8 bits for IPv4
# and longer than 48 or shorter than 16 bits for IPv6.
allow from any inet prefixlen 8 - 24
allow from any inet6 prefixlen 16 - 48

# Honor requests to gracefully shutdown BGP sessions
# https://tools.ietf.org/html/rfc8326
#match from any community GRACEFUL_SHUTDOWN set { localpref 0 }

#deny quick from any prefix-set bogons

# filter bogon AS numbers
# AS_TRANS (23456) is not supposed to show up in any path and indicates a
# missconfiguration. Additionally Private or Reserved ASNs have no place in
# the public DFZ.
http://www.iana.org/assignments/as-numbers/as-numbers.xhtml
#deny quick from any AS 23456
#deny quick from any AS 64496 - 131071
#deny quick from any AS 4200000000 - 4294967295

# filter out too long paths
deny from any max-as-len 100
bgp1# 



Reproduce the issue:


The problem in this case is faced in the recovery of the failed host
instead.

start condition:

fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.202     UG         0        0     -    32
em0 
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1#

We now force the MPATH flag by temporarly advertise the network from
host 2. For this we do "ifconfig carp1 state master" on the backup host2:


fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.202     UG         0        3     -    32
em0 
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.202     UG         0        3     -    32
em0 
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.202     UGP        0        3     -    32
em0 
10.10.10.10/32     192.168.98.203     UGP        0        0     -    32
em0 
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.202     UGP        0        3     -    32
em0 
10.10.10.10/32     192.168.98.203     UGP        0        0     -    32
em0 
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.202     UGP        0        3     -    32
em0 
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.202     UGP        0        3     -    32
em0 
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1#


We now have the MPATH flag active, even having only one OSPF route.


So, we now kill the interface of host1:


fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.202     UGP        0        3     -    32
em0 
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.202     UGP        0        6     -    32
em0 
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# ospfctl show rib | grep 10.10.10
10.10.10.10/32       192.168.98.202    Intra-Area   Network   20     
00:58:16
10.10.10.10/32       192.168.98.203    Intra-Area   Network   20     
00:00:07
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.202     UGP        0        9     -    32
em0 
10.10.10.10/32     192.168.98.203     UGP        0        0     -    32
em0 
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# ospfctl show rib | grep 10.10.10
10.10.10.10/32       192.168.98.202    Intra-Area   Network   20     
00:58:23
10.10.10.10/32       192.168.98.203    Intra-Area   Network   20     
00:00:14
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.202     UGP        0        9     -    32
em0 
10.10.10.10/32     192.168.98.203     UGP        0        0     -    32
em0 
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.202     UGP        0        9     -    32
em0 
10.10.10.10/32     192.168.98.203     UGP        0        0     -    32
em0 
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.202     UGP        0        9     -    32
em0 
10.10.10.10/32     192.168.98.203     UGP        0        0     -    32
em0 
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# ospfctl show rib | grep 10.10.10
10.10.10.10/32       192.168.98.203    Intra-Area   Network   20     
00:00:24
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.203     UGP        0        0     -    32
em0 
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.203     UGP        0        0     -    32
em0 
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1#


In this output we see that temporarily we have both OSPF routes, and
then the first one timesout living the one related to host2.
This behaviour is different from what we have in production, so in this
case, at this stage we still have service because route ended up with
correct next-hop for host2.

But again, MPATH flag was kept active when it shouldn't.

so current status is:


fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.203     UGP        0        0     -    32
em0 
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# ospfctl show rib | grep 10.10.10
10.10.10.10/32       192.168.98.203    Intra-Area   Network   20     
00:06:11
fw1#


Now we raise interface on host1 and get service down:



fw1# ospfctl show rib | grep 10.10.10
10.10.10.10/32       192.168.98.203    Intra-Area   Network   65545  
00:07:19
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.203     UGP        0        6     -    32
em0 
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# ospfctl show rib | grep 10.10.10
10.10.10.10/32       192.168.98.203    Intra-Area   Network   65545  
00:07:24
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.203     UGP        0        6     -    32
em0 
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# ospfctl show rib | grep 10.10.10
10.10.10.10/32       192.168.98.202    Intra-Area   Network   20     
00:00:04
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.203     UGP        0        6     -    32
em0 
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# ospfctl show rib | grep 10.10.10
10.10.10.10/32       192.168.98.202    Intra-Area   Network   20     
00:00:10
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.203     UGP        0        6     -    32
em0 
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# ospfctl show rib | grep 10.10.10
10.10.10.10/32       192.168.98.202    Intra-Area   Network   20     
00:00:15
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.203     UGP        0        6     -    32
em0 
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# ospfctl show rib | grep 10.10.10
10.10.10.10/32       192.168.98.202    Intra-Area   Network   20     
00:00:19
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.203     UGP        0        6     -    32
em0 
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1#



Notice that the FIB next-hop wasn't updated to 192.168.98.202.



Now the fix (commands issued repeatedly):


fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.203     UGP        0        9     -    32
em0 
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# ospfctl fib
reload                                                                          
                                                                                
                                                                                
                           

reload request sent.
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.203     UG         0        0     -    32
em0 
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.203     UG         0        0     -    32
em0 
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.202     UG         0        0     -    32
em0 
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1# route -n show | grep 10.10.10.10
10.10.10.10/32     192.168.98.202     UG         0        0     -    32
em0 
10.10.10.10/32     192.168.98.204     UG         0        0     -    48
em0 
fw1#


We still see temporarily the wrong next-hop, but it then converges to
the correct one, and we now don't have the MPATH flag anymore.


Hope this helps in your lab setup, as my real scenario is a bit
different behaviour, prbably because I'm using quagga to advertise the
prefix with network command, and the prefix is configured on same
physical interface.

In this lab scenario, the interface with the VIP is diferent from the
main OSPF interface, and because of that I was able to announce it with
passive command.

For the quagga's, there are constantly hello's being sent for the
prefix, even then no adjacency is formed on that prefix subnet.
In this LAB scenario you see updates being trade about the prefix.

This is the captures in the lab environment when I issue the ospfctl fib
reload (captures being taken on fw2):


13:46:36.739839 192.168.98.200 > 224.0.0.5: OSPFv2-hello  44: rtrid
192.168.98.200 backbone auth "secret^@^@" E mask 255.255.255.0 int 10
pri 100 dead 40 nbrs [tos 0xc0] [ttl 1] (id 34942, len 64)
13:46:36.740057 192.168.98.201 > 224.0.0.5: OSPFv2-hello  56: rtrid
192.168.98.201 backbone auth "secret^@^@" E mask 255.255.255.0 int 10
pri 10 dead 40 dr 192.168.98.201 nbrs 192.168.98.200 192.168.98.202
192.168.98.203 [tos 0xc0] [ttl 1] (id 20542, len 76)
13:46:36.740182 192.168.98.202 > 224.0.0.5: OSPFv2-hello  56: rtrid
192.168.98.202 backbone auth "secret^@^@" E mask 255.255.255.0 int 10
pri 0 dead 40 dr 192.168.98.201 nbrs 192.168.98.201 192.168.98.200
192.168.98.203 [tos 0xc0] [ttl 1] (id 47644, len 76)
13:46:36.740269 192.168.98.202 > 224.0.0.5: OSPFv2-hello  56: rtrid
192.168.98.202 backbone auth "secret^@^@" E mask 255.255.255.0 int 10
pri 0 dead 40 dr 192.168.98.201 nbrs 192.168.98.201 192.168.98.200
192.168.98.203 [tos 0xc0] [ttl 1] (id 30044, len 76)
13:46:36.740550 192.168.98.201 > 224.0.0.5: OSPFv2-ls_upd  100: rtrid
192.168.98.201 backbone auth "secret^@^@" { E S 80000001 age 1 net dr
192.168.98.201 if 192.168.98.201 mask 255.255.255.0 rtrs 192.168.98.202
192.168.98.203 192.168.98.201 } { E S 8000000D age 1 rtr 192.168.98.201
} [|ospf] [tos 0xc0] [ttl 1] (id 26274, len 120)
13:46:36.741005 192.168.98.203 > 224.0.0.5: OSPFv2-hello  56: rtrid
192.168.98.203 backbone auth "secret^@^@" E mask 255.255.255.0 int 10
pri 0 dead 40 dr 192.168.98.201 nbrs 192.168.98.201 192.168.98.200
192.168.98.202 [tos 0xc0] [ttl 1] (id 59174, len 76)
13:46:36.741692 192.168.98.200 > 224.0.0.5: OSPFv2-hello  44: rtrid
192.168.98.200 backbone auth "secret^@^@" E mask 255.255.255.0 int 10
pri 100 dead 40 nbrs [tos 0xc0] [ttl 1] (id 48099, len 64)
13:46:38.743078 192.168.98.203 > 224.0.0.6: OSPFv2-ls_ack  64: rtrid
192.168.98.203 backbone auth "secret^@^@" { E S 80000001 age 1 net dr
192.168.98.201 if 192.168.98.201 } { E S 8000000D age 1 rtr
192.168.98.201 } [tos 0xc0] [ttl 1] (id 55607, len 84)
13:46:38.744309 192.168.98.202 > 224.0.0.6: OSPFv2-ls_ack  64: rtrid
192.168.98.202 backbone auth "secret^@^@" { E S 80000001 age 1 net dr
192.168.98.201 if 192.168.98.201 } { E S 8000000D age 1 rtr
192.168.98.201 } [tos 0xc0] [ttl 1] (id 31253, len 84)
13:46:41.752541 192.168.98.203 > 224.0.0.6: OSPFv2-ls_upd  76: rtrid
192.168.98.203 backbone auth "secret^@^@" { E S 80000021 age 6 rtr
192.168.98.203 { net 10.10.10.10 mask 255.255.255.255 tos 0 metric 65535
} { dr 192.168.98.201 if 192.168.98.203 tos 0 metric 10 } } [tos 0xc0]
[ttl 1] (id 9379, len 96)
13:46:41.752841 192.168.98.201 > 224.0.0.5: OSPFv2-ls_upd  76: rtrid
192.168.98.201 backbone auth "secret^@^@" { E S 80000021 age 7 rtr
192.168.98.203 { net 10.10.10.10 mask 255.255.255.255 tos 0 metric 65535
} { dr 192.168.98.201 if 192.168.98.203 tos 0 metric 10 } } [tos 0xc0]
[ttl 1] (id 52657, len 96)
13:46:41.753134 192.168.98.202 > 224.0.0.6: OSPFv2-ls_upd  76: rtrid
192.168.98.202 backbone auth "secret^@^@" { E S 80000017 age 6 rtr
192.168.98.202 { net 10.10.10.10 mask 255.255.255.255 tos 0 metric 10 }
{ dr 192.168.98.201 if 192.168.98.202 tos 0 metric 10 } } [tos 0xc0]
[ttl 1] (id 6608, len 96)
13:46:41.753335 192.168.98.201 > 224.0.0.5: OSPFv2-ls_upd  76: rtrid
192.168.98.201 backbone auth "secret^@^@" { E S 80000017 age 7 rtr
192.168.98.202 { net 10.10.10.10 mask 255.255.255.255 tos 0 metric 10 }
{ dr 192.168.98.201 if 192.168.98.202 tos 0 metric 10 } } [tos 0xc0]
[ttl 1] (id 22390, len 96)
13:46:43.747722 192.168.98.201 > 192.168.98.203: OSPFv2-ls_upd  76:
rtrid 192.168.98.201 backbone auth "secret^@^@" { E S 80000017 age 9 rtr
192.168.98.202 { net 10.10.10.10 mask 255.255.255.255 tos 0 metric 10 }
{ dr 192.168.98.201 if 192.168.98.202 tos 0 metric 10 } } [tos 0xc0]
[ttl 1] (id 29312, len 96)
13:46:43.747795 192.168.98.201 > 192.168.98.202: OSPFv2-ls_upd  76:
rtrid 192.168.98.201 backbone auth "secret^@^@" { E S 80000021 age 9 rtr
192.168.98.203 { net 10.10.10.10 mask 255.255.255.255 tos 0 metric 65535
} { dr 192.168.98.201 if 192.168.98.203 tos 0 metric 10 } } [tos 0xc0]
[ttl 1] (id 42301, len 96)
13:46:43.748098 192.168.98.203 > 192.168.98.201: OSPFv2-ls_ack  44:
rtrid 192.168.98.203 backbone auth "secret^@^@" { E S 80000017 age 9 rtr
192.168.98.202 } [tos 0xc0] [ttl 1] (id 56865, len 64)
13:46:43.748136 192.168.98.202 > 192.168.98.201: OSPFv2-ls_ack  44:
rtrid 192.168.98.202 backbone auth "secret^@^@" { E S 80000021 age 9 rtr
192.168.98.203 } [tos 0xc0] [ttl 1] (id 43582, len 64)
13:46:43.762045 192.168.98.203 > 224.0.0.6: OSPFv2-ls_ack  44: rtrid
192.168.98.203 backbone auth "secret^@^@" { E S 80000017 age 7 rtr
192.168.98.202 } [tos 0xc0] [ttl 1] (id 1486, len 64)
13:46:43.763373 192.168.98.202 > 224.0.0.6: OSPFv2-ls_ack  44: rtrid
192.168.98.202 backbone auth "secret^@^@" { E S 80000021 age 7 rtr
192.168.98.203 } [tos 0xc0] [ttl 1] (id 2479, len 64)
13:46:46.742883 192.168.98.200 > 224.0.0.5: OSPFv2-hello  44: rtrid
192.168.98.200 backbone auth "secret^@^@" E mask 255.255.255.0 int 10
pri 100 dead 40 nbrs [tos 0xc0] [ttl 1] (id 41604, len 64)
13:46:46.743098 192.168.98.202 > 224.0.0.5: OSPFv2-hello  56: rtrid
192.168.98.202 backbone auth "secret^@^@" E mask 255.255.255.0 int 10
pri 0 dead 40 dr 192.168.98.201 nbrs 192.168.98.201 192.168.98.200
192.168.98.203 [tos 0xc0] [ttl 1] (id 732, len 76)
13:46:46.743099 192.168.98.203 > 224.0.0.5: OSPFv2-hello  56: rtrid
192.168.98.203 backbone auth "secret^@^@" E mask 255.255.255.0 int 10
pri 0 dead 40 dr 192.168.98.201 nbrs 192.168.98.201 192.168.98.200
192.168.98.202 [tos 0xc0] [ttl 1] (id 28204, len 76)
13:46:46.743141 192.168.98.201 > 224.0.0.5: OSPFv2-hello  56: rtrid
192.168.98.201 backbone auth "secret^@^@" E mask 255.255.255.0 int 10
pri 10 dead 40 dr 192.168.98.201 nbrs 192.168.98.200 192.168.98.202
192.168.98.203 [tos 0xc0] [ttl 1] (id 35443, len 76)
13:46:46.744985 192.168.98.200 > 224.0.0.5: OSPFv2-hello  56: rtrid
192.168.98.200 backbone auth "secret^@^@" E mask 255.255.255.0 int 10
pri 100 dead 40 dr 192.168.98.200 nbrs 192.168.98.203 192.168.98.201
192.168.98.202 [tos 0xc0] [ttl 1] (id 33192, len 76)
13:46:46.745048 192.168.98.200 > 192.168.98.201: OSPFv2-dd  32: rtrid
192.168.98.200 backbone auth "secret^@^@" E I/M/MS mtu 1500 S 99BF222A
[tos 0xc0] [ttl 1] (id 6154, len 52)
13:46:46.745344 192.168.98.201 > 192.168.98.200: OSPFv2-dd  32: rtrid
192.168.98.201 backbone auth "secret^@^@" E I/M/MS mtu 1500 S 99BF222B
[tos 0xc0] [ttl 1] (id 38910, len 52)
13:46:46.745345 192.168.98.201 > 224.0.0.5: OSPFv2-hello  56: rtrid
192.168.98.201 backbone auth "secret^@^@" E mask 255.255.255.0 int 10
pri 10 dead 40 dr 192.168.98.200 bdr 192.168.98.201 nbrs 192.168.98.200
192.168.98.202 192.168.98.203 [tos 0xc0] [ttl 1] (id 17052, len 76)
13:46:46.745399 192.168.98.202 > 224.0.0.5: OSPFv2-hello  56: rtrid
192.168.98.202 backbone auth "secret^@^@" E mask 255.255.255.0 int 10
pri 0 dead 40 dr 192.168.98.200 nbrs 192.168.98.201 192.168.98.200
192.168.98.203 [tos 0xc0] [ttl 1] (id 30271, len 76)
13:46:46.745399 192.168.98.203 > 224.0.0.5: OSPFv2-hello  56: rtrid
192.168.98.203 backbone auth "secret^@^@" E mask 255.255.255.0 int 10
pri 0 dead 40 dr 192.168.98.200 nbrs 192.168.98.201 192.168.98.200
192.168.98.202 [tos 0xc0] [ttl 1] (id 49111, len 76)
13:46:46.745530 192.168.98.201 > 224.0.0.5: OSPFv2-ls_upd  100: rtrid
192.168.98.201 backbone auth "secret^@^@" { E S 8000000E age 1 rtr
192.168.98.201 { net 192.168.98.0 mask 255.255.255.0 tos 0 metric 10 } }
{ E S 80000001 age 1:00:00 net dr 192.168.98.201 if 192.168.98.201 }
[|ospf] [tos 0xc0] [ttl 1] (id 42835, len 120)
13:46:46.745579 192.168.98.203 > 192.168.98.201: OSPFv2-dd  32: rtrid
192.168.98.203 backbone auth "secret^@^@" E I/M/MS mtu 1500 S E1DEE91C
[tos 0xc0] [ttl 1] (id 39759, len 52)
13:46:46.745580 192.168.98.202 > 192.168.98.201: OSPFv2-dd  32: rtrid
192.168.98.202 backbone auth "secret^@^@" E I/M/MS mtu 1500 S 361091BE
[tos 0xc0] [ttl 1] (id 15662, len 52)
13:46:46.745654 192.168.98.203 > 224.0.0.5: OSPFv2-hello  56: rtrid
192.168.98.203 backbone auth "secret^@^@" E mask 255.255.255.0 int 10
pri 0 dead 40 dr 192.168.98.200 bdr 192.168.98.201 nbrs 192.168.98.201
192.168.98.200 192.168.98.202 [tos 0xc0] [ttl 1] (id 41333, len 76)
13:46:46.745657 192.168.98.202 > 224.0.0.5: OSPFv2-hello  56: rtrid
192.168.98.202 backbone auth "secret^@^@" E mask 255.255.255.0 int 10
pri 0 dead 40 dr 192.168.98.200 bdr 192.168.98.201 nbrs 192.168.98.201
192.168.98.200 192.168.98.203 [tos 0xc0] [ttl 1] (id 35399, len 76)
13:46:46.745657 192.168.98.200 > 224.0.0.5: OSPFv2-hello  56: rtrid
192.168.98.200 backbone auth "secret^@^@" E mask 255.255.255.0 int 10
pri 100 dead 40 dr 192.168.98.200 bdr 192.168.98.201 nbrs 192.168.98.203
192.168.98.201 192.168.98.202 [tos 0xc0] [ttl 1] (id 5018, len 76)
13:46:46.745783 192.168.98.201 > 192.168.98.203: OSPFv2-dd  32: rtrid
192.168.98.201 backbone auth "secret^@^@" E I/M/MS mtu 1500 S E1DF7C38
[tos 0xc0] [ttl 1] (id 19213, len 52)
13:46:46.745930 192.168.98.200 > 192.168.98.201: OSPFv2-dd  132: rtrid
192.168.98.200 backbone auth "secret^@^@" E M mtu 1500 S 99BF222B { E S
80000013 age 10 rtr 192.168.98.200 } { E S 8000000C age 13:17 rtr
192.168.98.201 } { E [tos 0xc0] [ttl 1] (id 9643, len 152)
13:46:46.745954 192.168.98.201 > 192.168.98.202: OSPFv2-dd  32: rtrid
192.168.98.201 backbone auth "secret^@^@" E I/M/MS mtu 1500 S 3610C5FF
[tos 0xc0] [ttl 1] (id 48123, len 52)
13:46:46.746257 192.168.98.201 > 192.168.98.200: OSPFv2-dd  132: rtrid
192.168.98.201 backbone auth "secret^@^@" E M/MS mtu 1500 S 99BF222C { E
S 80000012 age 13:21 rtr 192.168.98.200 } { E S 8000000E age 0 rtr
192.168.98.201 } { E [tos 0xc0] [ttl 1] (id 60171, len 152)
13:46:46.746524 192.168.98.200 > 192.168.98.201: OSPFv2-dd  32: rtrid
192.168.98.200 backbone auth "secret^@^@" E mtu 1500 S 99BF222C [tos
0xc0] [ttl 1] (id 20148, len 52)
13:46:46.746593 192.168.98.201 > 192.168.98.200: OSPFv2-dd  32: rtrid
192.168.98.201 backbone auth "secret^@^@" E MS mtu 1500 S 99BF222D [tos
0xc0] [ttl 1] (id 29634, len 52)
13:46:46.746857 192.168.98.200 > 192.168.98.201: OSPFv2-dd  32: rtrid
192.168.98.200 backbone auth "secret^@^@" E mtu 1500 S 99BF222D [tos
0xc0] [ttl 1] (id 15253, len 52)
13:46:46.746858 192.168.98.200 > 192.168.98.201: OSPFv2-ls_req  60:
rtrid 192.168.98.200 backbone auth "secret^@^@" { rtr 192.168.98.201 } {
rtr 192.168.98.202 } { rtr 192.168.98.203 } [tos 0xc0] [ttl 1] (id 8075,
len 80)
13:46:46.747077 192.168.98.201 > 192.168.98.200: OSPFv2-ls_req  48:
rtrid 192.168.98.201 backbone auth "secret^@^@" { rtr 192.168.98.200 } {
net dr 192.168.98.200 if 192.168.98.200 } [tos 0xc0] [ttl 1] (id 29745,
len 68)
13:46:46.747152 192.168.98.201 > 192.168.98.200: OSPFv2-ls_upd  160:
rtrid 192.168.98.201 backbone auth "secret^@^@" { E S 8000000E age 1 rtr
192.168.98.201 { net 192.168.98.0 mask 255.255.255.0 tos 0 metric 10 } }
{ E S 80000017 age 12 rtr 192.168.98.202 } [|ospf] [tos 0xc0] [ttl 1]
(id 21137, len 180)
13:46:46.747581 192.168.98.200 > 192.168.98.201: OSPFv2-ls_ack  44:
rtrid 192.168.98.200 backbone auth "secret^@^@" { E S 80000017 age 12
rtr 192.168.98.202 } [tos 0xc0] [ttl 1] (id 7102, len 64)
13:46:46.747666 192.168.98.200 > 224.0.0.5: OSPFv2-ls_upd  112: rtrid
192.168.98.200 backbone auth "secret^@^@" { E S 80000022 age 2 rtr
192.168.98.203 { net 10.10.10.10 mask 255.255.255.255 tos 0 metric 65535
} { net 192.168.98.0 mask 255.255.255.0 tos 0 metric 10 } } { E [|ospf]
[tos 0xc0] [ttl 1] (id 40964, len 132)
13:46:46.747696 192.168.98.200 > 192.168.98.201: OSPFv2-dd  32: rtrid
192.168.98.200 backbone auth "secret^@^@" E I/M/MS mtu 1500 S 99BFEEF2
[tos 0xc0] [ttl 1] (id 16937, len 52)
13:46:46.747813 192.168.98.201 > 192.168.98.200: OSPFv2-dd  32: rtrid
192.168.98.201 backbone auth "secret^@^@" E I/M/MS mtu 1500 S 99BF5FD9
[tos 0xc0] [ttl 1] (id 3855, len 52)
13:46:46.747848 192.168.98.200 > 224.0.0.5: OSPFv2-ls_upd  96: rtrid
192.168.98.200 backbone auth "secret^@^@" { E S 80000014 age 1 rtr
192.168.98.200 { dr 192.168.98.200 if 192.168.98.200 tos 0 metric 10 } }
{ E S 8000000C age 1 net dr 192.168.98.200 if 192.168.98.200 } [|ospf]
[tos 0xc0] [ttl 1] (id 45786, len 116)
13:46:46.748155 192.168.98.200 > 192.168.98.201: OSPFv2-dd  152: rtrid
192.168.98.200 backbone auth "secret^@^@" E M mtu 1500 S 99BF5FD9 { E S
80000014 age 0 rtr 192.168.98.200 } { E S 8000000D age 12 rtr
192.168.98.201 } { E [tos 0xc0] [ttl 1] (id 24835, len 172)
13:46:46.748551 192.168.98.201 > 192.168.98.200: OSPFv2-dd  132: rtrid
192.168.98.201 backbone auth "secret^@^@" E M/MS mtu 1500 S 99BF5FDA { E
S 80000012 age 13:21 rtr 192.168.98.200 } { E S 8000000E age 0 rtr
192.168.98.201 } { E [tos 0xc0] [ttl 1] (id 47662, len 152)
13:46:46.748693 192.168.98.200 > 192.168.98.201: OSPFv2-dd  32: rtrid
192.168.98.200 backbone auth "secret^@^@" E mtu 1500 S 99BF5FDA [tos
0xc0] [ttl 1] (id 21631, len 52)
13:46:46.748799 192.168.98.201 > 192.168.98.200: OSPFv2-dd  32: rtrid
192.168.98.201 backbone auth "secret^@^@" E MS mtu 1500 S 99BF5FDB [tos
0xc0] [ttl 1] (id 48058, len 52)
13:46:46.748938 192.168.98.200 > 192.168.98.201: OSPFv2-dd  32: rtrid
192.168.98.200 backbone auth "secret^@^@" E mtu 1500 S 99BF5FDB [tos
0xc0] [ttl 1] (id 16434, len 52)
13:46:46.748962 192.168.98.200 > 192.168.98.201: OSPFv2-ls_req  36:
rtrid 192.168.98.200 backbone auth "secret^@^@" { rtr 192.168.98.201 }
[tos 0xc0] [ttl 1] (id 28004, len 56)
13:46:46.749045 192.168.98.201 > 192.168.98.200: OSPFv2-ls_req  60:
rtrid 192.168.98.201 backbone auth "secret^@^@" { rtr 192.168.98.200 } {
net dr 192.168.98.200 if 192.168.98.200 } { net dr 192.168.98.201 if
192.168.98.201 } [tos 0xc0] [ttl 1] (id 33841, len 80)
13:46:46.749209 192.168.98.201 > 192.168.98.200: OSPFv2-ls_upd  64:
rtrid 192.168.98.201 backbone auth "secret^@^@" { E S 8000000E age 1 rtr
192.168.98.201 { net 192.168.98.0 mask 255.255.255.0 tos 0 metric 10 } }
[tos 0xc0] [ttl 1] (id 5235, len 84)
13:46:48.752528 192.168.98.200 > 224.0.0.5: OSPFv2-ls_ack  104: rtrid
192.168.98.200 backbone auth "secret^@^@" { E S 8000000D age 12 rtr
192.168.98.201 } { E S 80000017 age 13 rtr 192.168.98.202 } { E S
80000022 age 1 rtr 192.168.98.203 } [tos 0xc0] [ttl 1] (id 50978, len 124)
13:46:48.752670 192.168.98.201 > 224.0.0.5: OSPFv2-ls_ack  64: rtrid
192.168.98.201 backbone auth "secret^@^@" { E S 80000022 age 2 rtr
192.168.98.203 } { E S 80000001 age 13 net dr 192.168.98.201 if
192.168.98.201 } [tos 0xc0] [ttl 1] (id 17804, len 84)
13:46:48.752696 192.168.98.202 > 224.0.0.6: OSPFv2-ls_ack  44: rtrid
192.168.98.202 backbone auth "secret^@^@" { E S 80000022 age 2 rtr
192.168.98.203 } [tos 0xc0] [ttl 1] (id 60705, len 64)
13:46:48.752887 192.168.98.203 > 224.0.0.6: OSPFv2-ls_ack  64: rtrid
192.168.98.203 backbone auth "secret^@^@" { E S 80000013 age 11 rtr
192.168.98.200 } { E S 8000000B age 11 net dr 192.168.98.200 if
192.168.98.200 } [tos 0xc0] [ttl 1] (id 30728, len 84)
13:46:51.756275 192.168.98.201 > 192.168.98.203: OSPFv2-dd  32: rtrid
192.168.98.201 backbone auth "secret^@^@" E I/M/MS mtu 1500 S E1DF7C38
[tos 0xc0] [ttl 1] (id 13078, len 52)
13:46:51.756285 192.168.98.201 > 192.168.98.202: OSPFv2-dd  32: rtrid
192.168.98.201 backbone auth "secret^@^@" E I/M/MS mtu 1500 S 3610C5FF
[tos 0xc0] [ttl 1] (id 53410, len 52)
13:46:51.756310 192.168.98.201 > 192.168.98.200: OSPFv2-ls_req  60:
rtrid 192.168.98.201 backbone auth "secret^@^@" { rtr 192.168.98.200 } {
net dr 192.168.98.200 if 192.168.98.200 } { net dr 192.168.98.201 if
192.168.98.201 } [tos 0xc0] [ttl 1] (id 33659, len 80)
13:46:51.756826 192.168.98.202 > 192.168.98.201: OSPFv2-dd  32: rtrid
192.168.98.202 backbone auth "secret^@^@" E I/M/MS mtu 1500 S 361091BE
[tos 0xc0] [ttl 1] (id 64021, len 52)
13:46:51.756827 192.168.98.203 > 192.168.98.201: OSPFv2-dd  32: rtrid
192.168.98.203 backbone auth "secret^@^@" E I/M/MS mtu 1500 S E1DEE91C
[tos 0xc0] [ttl 1] (id 12508, len 52)
13:46:51.756827 192.168.98.200 > 192.168.98.201: OSPFv2-ls_upd  96:
rtrid 192.168.98.200 backbone auth "secret^@^@" { E S 80000014 age 6 rtr
192.168.98.200 { dr 192.168.98.200 if 192.168.98.200 tos 0 metric 10 } }
{ E S 8000000C age 6 net dr 192.168.98.200 if 192.168.98.200 } [|ospf]
[tos 0xc0] [ttl 1] (id 13626, len 116)
13:46:51.756828 192.168.98.200 > 192.168.98.201: OSPFv2-ls_req  36:
rtrid 192.168.98.200 backbone auth "secret^@^@" { rtr 192.168.98.201 }
[tos 0xc0] [ttl 1] (id 41975, len 56)
13:46:51.756828 192.168.98.200 > 192.168.98.201: OSPFv2-ls_upd  132:
rtrid 192.168.98.200 backbone auth "secret^@^@" { E S 80000014 age 6 rtr
192.168.98.200 { dr 192.168.98.200 if 192.168.98.200 tos 0 metric 10 } }
{ E S 8000000C age 6 net dr 192.168.98.200 if 192.168.98.200 } [|ospf]
[tos 0xc0] [ttl 1] (id 52527, len 152)
13:46:51.757543 192.168.98.200 > 224.0.0.5: OSPFv2-ls_upd  76: rtrid
192.168.98.200 backbone auth "secret^@^@" { E S 80000018 age 7 rtr
192.168.98.202 { net 10.10.10.10 mask 255.255.255.255 tos 0 metric 10 }
{ net 192.168.98.0 mask 255.255.255.0 tos 0 metric 10 } } [tos 0xc0]
[ttl 1] (id 2414, len 96)
13:46:51.757553 192.168.98.201 > 192.168.98.200: OSPFv2-ls_ack  44:
rtrid 192.168.98.201 backbone auth "secret^@^@" { E S 80000014 age 6 rtr
192.168.98.200 } [tos 0xc0] [ttl 1] (id 49941, len 64)
13:46:51.757553 192.168.98.201 > 192.168.98.200: OSPFv2-ls_ack  44:
rtrid 192.168.98.201 backbone auth "secret^@^@" { E S 8000000C age 6 net
dr 192.168.98.200 if 192.168.98.200 } [tos 0xc0] [ttl 1] (id 54649, len 64)
13:46:51.757554 192.168.98.201 > 192.168.98.202: OSPFv2-dd  132: rtrid
192.168.98.201 backbone auth "secret^@^@" E M mtu 1500 S 361091BE { E S
80000012 age 13:26 rtr 192.168.98.200 } { E S 8000000E age 5 rtr
192.168.98.201 } { E [tos 0xc0] [ttl 1] (id 35843, len 152)
13:46:51.757555 192.168.98.201 > 192.168.98.200: OSPFv2-ls_upd  64:
rtrid 192.168.98.201 backbone auth "secret^@^@" { E S 8000000E age 6 rtr
192.168.98.201 { net 192.168.98.0 mask 255.255.255.0 tos 0 metric 10 } }
[tos 0xc0] [ttl 1] (id 14024, len 84)
13:46:51.757556 192.168.98.201 > 224.0.0.5: OSPFv2-ls_upd  64: rtrid
192.168.98.201 backbone auth "secret^@^@" { E S 80000001 age 1:00:00 net
dr 192.168.98.201 if 192.168.98.201 mask 255.255.255.0 rtrs
192.168.98.202 192.168.98.203 192.168.98.201 } [tos 0xc0] [ttl 1] (id
22555, len 84)
13:46:51.757583 192.168.98.201 > 192.168.98.203: OSPFv2-dd  132: rtrid
192.168.98.201 backbone auth "secret^@^@" E M mtu 1500 S E1DEE91C { E S
80000012 age 13:26 rtr 192.168.98.200 } { E S 8000000E age 5 rtr
192.168.98.201 } { E [tos 0xc0] [ttl 1] (id 33297, len 152)
13:46:51.757954 192.168.98.202 > 192.168.98.201: OSPFv2-dd  152: rtrid
192.168.98.202 backbone auth "secret^@^@" E M/MS mtu 1500 S 361091BF { E
S 80000014 age 6 rtr 192.168.98.200 } { E S 8000000D age 16 rtr
192.168.98.201 } { E [tos 0xc0] [ttl 1] (id 9420, len 172)
13:46:51.758049 192.168.98.201 > 192.168.98.202: OSPFv2-dd  32: rtrid
192.168.98.201 backbone auth "secret^@^@" E mtu 1500 S 361091BF [tos
0xc0] [ttl 1] (id 26856, len 52)
13:46:51.758204 192.168.98.202 > 192.168.98.201: OSPFv2-dd  32: rtrid
192.168.98.202 backbone auth "secret^@^@" E MS mtu 1500 S 361091C0 [tos
0xc0] [ttl 1] (id 29314, len 52)
13:46:51.758286 192.168.98.203 > 192.168.98.201: OSPFv2-dd  152: rtrid
192.168.98.203 backbone auth "secret^@^@" E M/MS mtu 1500 S E1DEE91D { E
S 80000014 age 6 rtr 192.168.98.200 } { E S 8000000D age 16 rtr
192.168.98.201 } { E [tos 0xc0] [ttl 1] (id 24179, len 172)
13:46:51.758304 192.168.98.201 > 192.168.98.202: OSPFv2-dd  32: rtrid
192.168.98.201 backbone auth "secret^@^@" E mtu 1500 S 361091C0 [tos
0xc0] [ttl 1] (id 18366, len 52)
13:46:51.758353 192.168.98.201 > 192.168.98.202: OSPFv2-ls_req  36:
rtrid 192.168.98.201 backbone auth "secret^@^@" { rtr 192.168.98.202 }
[tos 0xc0] [ttl 1] (id 39434, len 56)
13:46:51.758392 192.168.98.201 > 192.168.98.203: OSPFv2-dd  32: rtrid
192.168.98.201 backbone auth "secret^@^@" E mtu 1500 S E1DEE91D [tos
0xc0] [ttl 1] (id 19583, len 52)
13:46:51.758574 192.168.98.203 > 192.168.98.201: OSPFv2-dd  32: rtrid
192.168.98.203 backbone auth "secret^@^@" E MS mtu 1500 S E1DEE91E [tos
0xc0] [ttl 1] (id 46477, len 52)
13:46:51.758655 192.168.98.201 > 192.168.98.203: OSPFv2-dd  32: rtrid
192.168.98.201 backbone auth "secret^@^@" E mtu 1500 S E1DEE91E [tos
0xc0] [ttl 1] (id 10148, len 52)
13:46:51.758695 192.168.98.201 > 192.168.98.203: OSPFv2-ls_req  36:
rtrid 192.168.98.201 backbone auth "secret^@^@" { rtr 192.168.98.203 }
[tos 0xc0] [ttl 1] (id 20293, len 56)
13:46:51.758725 192.168.98.202 > 192.168.98.201: OSPFv2-ls_req  36:
rtrid 192.168.98.202 backbone auth "secret^@^@" { rtr 192.168.98.201 }
[tos 0xc0] [ttl 1] (id 8976, len 56)
13:46:51.758725 192.168.98.202 > 192.168.98.201: OSPFv2-ls_upd  76:
rtrid 192.168.98.202 backbone auth "secret^@^@" { E S 80000018 age 1 rtr
192.168.98.202 { net 10.10.10.10 mask 255.255.255.255 tos 0 metric 10 }
{ dr 192.168.98.200 if 192.168.98.202 tos 0 metric 10 } } [tos 0xc0]
[ttl 1] (id 38525, len 96)
13:46:51.758990 192.168.98.203 > 192.168.98.201: OSPFv2-ls_req  36:
rtrid 192.168.98.203 backbone auth "secret^@^@" { rtr 192.168.98.201 }
[tos 0xc0] [ttl 1] (id 3058, len 56)
13:46:51.759005 192.168.98.203 > 192.168.98.201: OSPFv2-ls_upd  76:
rtrid 192.168.98.203 backbone auth "secret^@^@" { E S 80000023 age 1 rtr
192.168.98.203 { net 10.10.10.10 mask 255.255.255.255 tos 0 metric 65535
} { dr 192.168.98.200 if 192.168.98.203 tos 0 metric 10 } } [tos 0xc0]
[ttl 1] (id 6586, len 96)
13:46:53.760281 192.168.98.203 > 224.0.0.6: OSPFv2-ls_ack  84: rtrid
192.168.98.203 backbone auth "secret^@^@" { E S 80000014 age 6 rtr
192.168.98.200 } { E S 8000000C age 6 net dr 192.168.98.200 if
192.168.98.200 } { E S 80000018 age 7 rtr 192.168.98.202 } [tos 0xc0]
[ttl 1] (id 44630, len 104)
13:46:53.760438 192.168.98.201 > 224.0.0.5: OSPFv2-ls_ack  104: rtrid
192.168.98.201 backbone auth "secret^@^@" { E S 80000014 age 6 rtr
192.168.98.200 } { E S 8000000C age 6 net dr 192.168.98.200 if
192.168.98.200 } { E S 80000001 age 18 net dr 192.168.98.201 if
192.168.98.201 } [tos 0xc0] [ttl 1] (id 60174, len 124)
13:46:53.760534 192.168.98.200 > 224.0.0.5: OSPFv2-ls_ack  104: rtrid
192.168.98.200 backbone auth "secret^@^@" { E S 80000018 age 6 rtr
192.168.98.202 } { E S 8000000E age 6 rtr 192.168.98.201 } { E S
80000001 age 1:00:00 net dr 192.168.98.201 if 192.168.98.201 } [tos
0xc0] [ttl 1] (id 59994, len 124)
13:46:53.760642 192.168.98.202 > 224.0.0.6: OSPFv2-ls_ack  64: rtrid
192.168.98.202 backbone auth "secret^@^@" { E S 80000014 age 6 rtr
192.168.98.200 } { E S 8000000C age 6 net dr 192.168.98.200 if
192.168.98.200 } [tos 0xc0] [ttl 1] (id 11941, len 84)
13:46:56.751086 192.168.98.200 > 224.0.0.5: OSPFv2-hello  56: rtrid
192.168.98.200 backbone auth "secret^@^@" E mask 255.255.255.0 int 10
pri 100 dead 40 dr 192.168.98.200 bdr 192.168.98.201 nbrs 192.168.98.203
192.168.98.201 192.168.98.202 [tos 0xc0] [ttl 1] (id 17219, len 76)
13:46:56.751111 192.168.98.202 > 224.0.0.5: OSPFv2-hello  56: rtrid
192.168.98.202 backbone auth "secret^@^@" E mask 255.255.255.0 int 10
pri 0 dead 40 dr 192.168.98.200 bdr 192.168.98.201 nbrs 192.168.98.201
192.168.98.200 192.168.98.203 [tos 0xc0] [ttl 1] (id 54762, len 76)
13:46:56.751228 192.168.98.201 > 224.0.0.5: OSPFv2-hello  56: rtrid
192.168.98.201 backbone auth "secret^@^@" E mask 255.255.255.0 int 10
pri 10 dead 40 dr 192.168.98.200 bdr 192.168.98.201 nbrs 192.168.98.200
192.168.98.202 192.168.98.203 [tos 0xc0] [ttl 1] (id 17270, len 76)
13:46:56.751383 192.168.98.203 > 224.0.0.5: OSPFv2-hello  56: rtrid
192.168.98.203 backbone auth "secret^@^@" E mask 255.255.255.0 int 10
pri 0 dead 40 dr 192.168.98.200 bdr 192.168.98.201 nbrs 192.168.98.201
192.168.98.200 192.168.98.202 [tos 0xc0] [ttl 1] (id 10624, len 76)
13:46:56.765328 192.168.98.201 > 192.168.98.203: OSPFv2-ls_upd  64:
rtrid 192.168.98.201 backbone auth "secret^@^@" { E S 8000000E age 6 rtr
192.168.98.201 { dr 192.168.98.200 if 192.168.98.201 tos 0 metric 65535
} } [tos 0xc0] [ttl 1] (id 29796, len 84)
13:46:56.765380 192.168.98.201 > 192.168.98.202: OSPFv2-ls_upd  64:
rtrid 192.168.98.201 backbone auth "secret^@^@" { E S 8000000E age 6 rtr
192.168.98.201 { dr 192.168.98.200 if 192.168.98.201 tos 0 metric 65535
} } [tos 0xc0] [ttl 1] (id 5472, len 84)
13:46:56.765418 192.168.98.201 > 192.168.98.202: OSPFv2-ls_req  36:
rtrid 192.168.98.201 backbone auth "secret^@^@" { rtr 192.168.98.202 }
[tos 0xc0] [ttl 1] (id 56664, len 56)
13:46:56.765519 192.168.98.203 > 192.168.98.201: OSPFv2-ls_req  36:
rtrid 192.168.98.203 backbone auth "secret^@^@" { rtr 192.168.98.201 }
[tos 0xc0] [ttl 1] (id 20557, len 56)
13:46:56.765519 192.168.98.203 > 224.0.0.6: OSPFv2-ls_upd  76: rtrid
192.168.98.203 backbone auth "secret^@^@" { E S 80000023 age 6 rtr
192.168.98.203 { net 10.10.10.10 mask 255.255.255.255 tos 0 metric 65535
} { dr 192.168.98.200 if 192.168.98.203 tos 0 metric 10 } } [tos 0xc0]
[ttl 1] (id 55930, len 96)
13:46:56.765597 192.168.98.202 > 192.168.98.201: OSPFv2-ls_req  36:
rtrid 192.168.98.202 backbone auth "secret^@^@" { rtr 192.168.98.201 }
[tos 0xc0] [ttl 1] (id 60479, len 56)
13:46:56.765737 192.168.98.201 > 192.168.98.203: OSPFv2-ls_ack  44:
rtrid 192.168.98.201 backbone auth "secret^@^@" { E S 80000023 age 6 rtr
192.168.98.203 } [tos 0xc0] [ttl 1] (id 10666, len 64)
13:46:56.765796 192.168.98.201 > 224.0.0.5: OSPFv2-ls_upd  64: rtrid
192.168.98.201 backbone auth "secret^@^@" { E S 8000000F age 1 rtr
192.168.98.201 { dr 192.168.98.200 if 192.168.98.201 tos 0 metric 65535
} } [tos 0xc0] [ttl 1] (id 13632, len 84)
13:46:56.765819 192.168.98.200 > 224.0.0.5: OSPFv2-ls_upd  116: rtrid
192.168.98.200 backbone auth "secret^@^@" { E S 80000023 age 7 rtr
192.168.98.203 { net 10.10.10.10 mask 255.255.255.255 tos 0 metric 65535
} { dr 192.168.98.200 if 192.168.98.203 tos 0 metric 10 } } { E [|ospf]
[tos 0xc0] [ttl 1] (id 18213, len 136)
13:46:58.769384 192.168.98.203 > 224.0.0.6: OSPFv2-ls_ack  64: rtrid
192.168.98.203 backbone auth "secret^@^@" { E S 8000000E age 6 rtr
192.168.98.201 } { E S 8000000D age 1 net dr 192.168.98.200 if
192.168.98.200 } [tos 0xc0] [ttl 1] (id 16783, len 84)
13:46:58.769522 192.168.98.201 > 224.0.0.5: OSPFv2-ls_ack  44: rtrid
192.168.98.201 backbone auth "secret^@^@" { E S 8000000D age 1 net dr
192.168.98.200 if 192.168.98.200 } [tos 0xc0] [ttl 1] (id 18538, len 64)
13:46:58.769542 192.168.98.200 > 224.0.0.5: OSPFv2-ls_ack  44: rtrid
192.168.98.200 backbone auth "secret^@^@" { E S 8000000F age 1 rtr
192.168.98.201 } [tos 0xc0] [ttl 1] (id 29090, len 64)
13:46:58.769738 192.168.98.202 > 224.0.0.6: OSPFv2-ls_ack  124: rtrid
192.168.98.202 backbone auth "secret^@^@" { E S 8000000E age 6 rtr
192.168.98.201 } { E S 80000001 age 1:00:00 net dr 192.168.98.201 if
192.168.98.201 } { E S 80000023 age 7 rtr 192.168.98.203 } [tos 0xc0]
[ttl 1] (id 11688, len 144)
13:47:01.770218 192.168.98.200 > 192.168.98.201: OSPFv2-ls_upd  76:
rtrid 192.168.98.200 backbone auth "secret^@^@" { E S 80000023 age 12
rtr 192.168.98.203 { net 10.10.10.10 mask 255.255.255.255 tos 0 metric
65535 } { dr 192.168.98.200 if 192.168.98.203 tos 0 metric 10 } } [tos
0xc0] [ttl 1] (id 39965, len 96)
13:47:01.770242 192.168.98.202 > 224.0.0.6: OSPFv2-ls_upd  76: rtrid
192.168.98.202 backbone auth "secret^@^@" { E S 80000019 age 6 rtr
192.168.98.202 { net 10.10.10.10 mask 255.255.255.255 tos 0 metric 10 }
{ dr 192.168.98.200 if 192.168.98.202 tos 0 metric 10 } } [tos 0xc0]
[ttl 1] (id 32673, len 96)
13:47:01.770449 192.168.98.201 > 192.168.98.202: OSPFv2-ls_req  36:
rtrid 192.168.98.201 backbone auth "secret^@^@" { rtr 192.168.98.202 }
[tos 0xc0] [ttl 1] (id 8167, len 56)
13:47:01.770476 192.168.98.201 > 192.168.98.202: OSPFv2-ls_upd  64:
rtrid 192.168.98.201 backbone auth "secret^@^@" { E S 8000000F age 6 rtr
192.168.98.201 { dr 192.168.98.200 if 192.168.98.201 tos 0 metric 65535
} } [tos 0xc0] [ttl 1] (id 4781, len 84)
13:47:01.770490 192.168.98.203 > 224.0.0.6: OSPFv2-ls_upd  64: rtrid
192.168.98.203 backbone auth "secret^@^@" { E S 8000000E age 12 rtr
192.168.98.201 { dr 192.168.98.200 if 192.168.98.201 tos 0 metric 65535
} } [tos 0xc0] [ttl 1] (id 42500, len 84)
13:47:01.770518 192.168.98.200 > 224.0.0.5: OSPFv2-ls_upd  76: rtrid
192.168.98.200 backbone auth "secret^@^@" { E S 80000019 age 7 rtr
192.168.98.202 { net 10.10.10.10 mask 255.255.255.255 tos 0 metric 10 }
{ dr 192.168.98.200 if 192.168.98.202 tos 0 metric 10 } } [tos 0xc0]
[ttl 1] (id 15481, len 96)
13:47:01.770628 192.168.98.201 > 192.168.98.203: OSPFv2-ls_upd  100:
rtrid 192.168.98.201 backbone auth "secret^@^@" { E S 80000001 age
1:00:00 net dr 192.168.98.201 if 192.168.98.201 mask 255.255.255.0 rtrs
192.168.98.202 192.168.98.203 192.168.98.201 } { E S 8000000F age 6 rtr
192.168.98.201 } [|ospf] [tos 0xc0] [ttl 1] (id 18229, len 120)
13:47:01.770739 192.168.98.201 > 192.168.98.200: OSPFv2-ls_ack  44:
rtrid 192.168.98.201 backbone auth "secret^@^@" { E S 80000023 age 12
rtr 192.168.98.203 } [tos 0xc0] [ttl 1] (id 23688, len 64)
13:47:01.770839 192.168.98.202 > 192.168.98.201: OSPFv2-ls_upd  76:
rtrid 192.168.98.202 backbone auth "secret^@^@" { E S 80000019 age 6 rtr
192.168.98.202 { net 10.10.10.10 mask 255.255.255.255 tos 0 metric 10 }
{ dr 192.168.98.200 if 192.168.98.202 tos 0 metric 10 } } [tos 0xc0]
[ttl 1] (id 4824, len 96)
13:47:01.771012 192.168.98.201 > 192.168.98.202: OSPFv2-ls_ack  44:
rtrid 192.168.98.201 backbone auth "secret^@^@" { E S 80000019 age 6 rtr
192.168.98.202 } [tos 0xc0] [ttl 1] (id 48592, len 64)
13:47:01.771070 192.168.98.203 > 192.168.98.201: OSPFv2-ls_ack  44:
rtrid 192.168.98.203 backbone auth "secret^@^@" { E S 8000000F age 6 rtr
192.168.98.201 } [tos 0xc0] [ttl 1] (id 50511, len 64)
13:47:03.778476 192.168.98.203 > 224.0.0.6: OSPFv2-ls_ack  104: rtrid
192.168.98.203 backbone auth "secret^@^@" { E S 80000001 age 1:00:00 net
dr 192.168.98.201 if 192.168.98.201 } { E S 8000000F age 7 rtr
192.168.98.201 } { E S 80000001 age 1:00:00 net dr 192.168.98.201 if
192.168.98.201 } [tos 0xc0] [ttl 1] (id 63751, len 124)
13:47:03.778985 192.168.98.202 > 224.0.0.6: OSPFv2-ls_ack  44: rtrid
192.168.98.202 backbone auth "secret^@^@" { E S 8000000F age 6 rtr
192.168.98.201 } [tos 0xc0] [ttl 1] (id 34324, len 64)
13:47:06.759348 192.168.98.200 > 224.0.0.5: OSPFv2-hello  56: rtrid
192.168.98.200 backbone auth "secret^@^@" E mask 255.255.255.0 int 10
pri 100 dead 40 dr 192.168.98.200 bdr 192.168.98.201 nbrs 192.168.98.203
192.168.98.201 192.168.98.202 [tos 0xc0] [ttl 1] (id 28952, len 76)
13:47:06.759349 192.168.98.202 > 224.0.0.5: OSPFv2-hello  56: rtrid
192.168.98.202 backbone auth "secret^@^@" E mask 255.255.255.0 int 10
pri 0 dead 40 dr 192.168.98.200 bdr 192.168.98.201 nbrs 192.168.98.201
192.168.98.200 192.168.98.203 [tos 0xc0] [ttl 1] (id 25646, len 76)
13:47:06.759524 192.168.98.203 > 224.0.0.5: OSPFv2-hello  56: rtrid
192.168.98.203 backbone auth "secret^@^@" E mask 255.255.255.0 int 10
pri 0 dead 40 dr 192.168.98.200 bdr 192.168.98.201 nbrs 192.168.98.201
192.168.98.200 192.168.98.202 [tos 0xc0] [ttl 1] (id 3310, len 76)
13:47:06.759532 192.168.98.201 > 224.0.0.5: OSPFv2-hello  56: rtrid
192.168.98.201 backbone auth "secret^@^@" E mask 255.255.255.0 int 10
pri 10 dead 40 dr 192.168.98.200 bdr 192.168.98.201 nbrs 192.168.98.200
192.168.98.202 192.168.98.203 [tos 0xc0] [ttl 1] (id 23021, len 76)
13:47:06.788050 192.168.98.203 > 224.0.0.6: OSPFv2-ls_upd  112: rtrid
192.168.98.203 backbone auth "secret^@^@" { E S 8000000F age 13 rtr
192.168.98.201 { dr 192.168.98.200 if 192.168.98.201 tos 0 metric 65535
} } { E S 80000019 age 13 rtr 192.168.98.202 } [|ospf] [tos 0xc0] [ttl
1] (id 12815, len 132)
13:47:06.788051 192.168.98.200 > 192.168.98.201: OSPFv2-ls_upd  76:
rtrid 192.168.98.200 backbone auth "secret^@^@" { E S 80000019 age 12
rtr 192.168.98.202 { net 10.10.10.10 mask 255.255.255.255 tos 0 metric
10 } { dr 192.168.98.200 if 192.168.98.202 tos 0 metric 10 } } [tos
0xc0] [ttl 1] (id 31226, len 96)
13:47:06.788317 192.168.98.201 > 192.168.98.203: OSPFv2-ls_ack  44:
rtrid 192.168.98.201 backbone auth "secret^@^@" { E S 8000000F age 13
rtr 192.168.98.201 } [tos 0xc0] [ttl 1] (id 26313, len 64)
13:47:06.788367 192.168.98.201 > 192.168.98.203: OSPFv2-ls_ack  44:
rtrid 192.168.98.201 backbone auth "secret^@^@" { E S 80000019 age 13
rtr 192.168.98.202 } [tos 0xc0] [ttl 1] (id 15304, len 64)
13:47:06.788414 192.168.98.201 > 192.168.98.200: OSPFv2-ls_ack  44:
rtrid 192.168.98.201 backbone auth "secret^@^@" { E S 80000019 age 12
rtr 192.168.98.202 } [tos 0xc0] [ttl 1] (id 22491, len 64)
13:47:06.789275 192.168.98.202 > 224.0.0.6: OSPFv2-ls_upd  112: rtrid
192.168.98.202 backbone auth "secret^@^@" { E S 80000023 age 18 rtr
192.168.98.203 { net 10.10.10.10 mask 255.255.255.255 tos 0 metric 65535
} { dr 192.168.98.200 if 192.168.98.203 tos 0 metric 10 } } { E [|ospf]
[tos 0xc0] [ttl 1] (id 22696, len 132)
13:47:06.789496 192.168.98.201 > 192.168.98.202: OSPFv2-ls_ack  44:
rtrid 192.168.98.201 backbone auth "secret^@^@" { E S 80000023 age 18
rtr 192.168.98.203 } [tos 0xc0] [ttl 1] (id 777, len 64)
13:47:06.789497 192.168.98.201 > 192.168.98.202: OSPFv2-ls_ack  44:
rtrid 192.168.98.201 backbone auth "secret^@^@" { E S 80000001 age
1:00:00 net dr 192.168.98.201 if 192.168.98.201 } [tos 0xc0] [ttl 1] (id
26560, len 64)
13:47:16.771753 192.168.98.201 > 224.0.0.5: OSPFv2-hello  56: rtrid
192.168.98.201 backbone auth "secret^@^@" E mask 255.255.255.0 int 10
pri 10 dead 40 dr 192.168.98.200 bdr 192.168.98.201 nbrs 192.168.98.200
192.168.98.202 192.168.98.203 [tos 0xc0] [ttl 1] (id 16260, len 76)
13:47:16.772049 192.168.98.200 > 224.0.0.5: OSPFv2-hello  56: rtrid
192.168.98.200 backbone auth "secret^@^@" E mask 255.255.255.0 int 10
pri 100 dead 40 dr 192.168.98.200 bdr 192.168.98.201 nbrs 192.168.98.203
192.168.98.201 192.168.98.202 [tos 0xc0] [ttl 1] (id 9947, len 76)
13:47:16.772050 192.168.98.202 > 224.0.0.5: OSPFv2-hello  56: rtrid
192.168.98.202 backbone auth "secret^@^@" E mask 255.255.255.0 int 10
pri 0 dead 40 dr 192.168.98.200 bdr 192.168.98.201 nbrs 192.168.98.201
192.168.98.200 192.168.98.203 [tos 0xc0] [ttl 1] (id 54548, len 76)
13:47:16.772050 192.168.98.203 > 224.0.0.5: OSPFv2-hello  56: rtrid
192.168.98.203 backbone auth "secret^@^@" E mask 255.255.255.0 int 10
pri 0 dead 40 dr 192.168.98.200 bdr 192.168.98.201 nbrs 192.168.98.201
192.168.98.200 192.168.98.202 [tos 0xc0] [ttl 1] (id 21814, len 76)
13:47:26.774278 192.168.98.203 > 224.0.0.5: OSPFv2-hello  56: rtrid
192.168.98.203 backbone auth "secret^@^@" E mask 255.255.255.0 int 10
pri 0 dead 40 dr 192.168.98.200 bdr 192.168.98.201 nbrs 192.168.98.201
192.168.98.200 192.168.98.202 [tos 0xc0] [ttl 1] (id 50490, len 76)
13:47:26.774423 192.168.98.201 > 224.0.0.5: OSPFv2-hello  56: rtrid
192.168.98.201 backbone auth "secret^@^@" E mask 255.255.255.0 int 10
pri 10 dead 40 dr 192.168.98.200 bdr 192.168.98.201 nbrs 192.168.98.200
192.168.98.202 192.168.98.203 [tos 0xc0] [ttl 1] (id 17263, len 76)
13:47:26.774518 192.168.98.200 > 224.0.0.5: OSPFv2-hello  56: rtrid
192.168.98.200 backbone auth "secret^@^@" E mask 255.255.255.0 int 10
pri 100 dead 40 dr 192.168.98.200 bdr 192.168.98.201 nbrs 192.168.98.203
192.168.98.201 192.168.98.202 [tos 0xc0] [ttl 1] (id 24212, len 76)
13:47:26.774518 192.168.98.202 > 224.0.0.5: OSPFv2-hello  56: rtrid
192.168.98.202 backbone auth "secret^@^@" E mask 255.255.255.0 int 10
pri 0 dead 40 dr 192.168.98.200 bdr 192.168.98.201 nbrs 192.168.98.201
192.168.98.200 192.168.98.203 [tos 0xc0] [ttl 1] (id 49902, len 76)
13:47:36.778146 192.168.98.201 > 224.0.0.5: OSPFv2-hello  56: rtrid
192.168.98.201 backbone auth "secret^@^@" E mask 255.255.255.0 int 10
pri 10 dead 40 dr 192.168.98.200 bdr 192.168.98.201 nbrs 192.168.98.200
192.168.98.202 192.168.98.203 [tos 0xc0] [ttl 1] (id 27885, len 76)
13:47:36.778382 192.168.98.200 > 224.0.0.5: OSPFv2-hello  56: rtrid
192.168.98.200 backbone auth "secret^@^@" E mask 255.255.255.0 int 10
pri 100 dead 40 dr 192.168.98.200 bdr 192.168.98.201 nbrs 192.168.98.203
192.168.98.201 192.168.98.202 [tos 0xc0] [ttl 1] (id 9857, len 76)
13:47:36.778618 192.168.98.202 > 224.0.0.5: OSPFv2-hello  56: rtrid
192.168.98.202 backbone auth "secret^@^@" E mask 255.255.255.0 int 10
pri 0 dead 40 dr 192.168.98.200 bdr 192.168.98.201 nbrs 192.168.98.201
192.168.98.200 192.168.98.203 [tos 0xc0] [ttl 1] (id 57404, len 76)
13:47:36.778618 192.168.98.203 > 224.0.0.5: OSPFv2-hello  56: rtrid
192.168.98.203 backbone auth "secret^@^@" E mask 255.255.255.0 int 10
pri 0 dead 40 dr 192.168.98.200 bdr 192.168.98.201 nbrs 192.168.98.201
192.168.98.200 192.168.98.202 [tos 0xc0] [ttl 1] (id 23172, len 76)
^C
3693 packets received by filter
0 packets dropped by kernel
fw2#



This post is very extensive already, let me know in case you need any
specific info.

I'll keep lab running.

Thank you.

Reply via email to