S1720, S2700, S5700, and S6720 V200R011C10 Command Reference
This document describes all the configuration commands of the device, including the command function, syntax, parameters, views, default level, usage guidelines, examples, and related commands.
This document describes all the configuration commands of the device, including the command function, syntax, parameters, views, default level, usage guidelines, examples, and related commands.
OSPF Configuration Commands
- Command Support
- abr-summary (OSPF area)
- advertise mpls-lsr-id
- area (OSPF)
- asbr-summary
- authentication-mode (OSPF area)
- bandwidth-reference (OSPF)
- bfd all-interfaces (OSPF)
- default (OSPF)
- default-cost (OSPF Area)
- default-route-advertise (OSPF)
- description (OSPF)
- description (OSPF Area)
- display default-parameter ospf
- display gtsm statistics
- display ospf abr-asbr
- display ospf asbr-summary
- display ospf bfd session
- display ospf brief
- display ospf cumulative
- display ospf error
- display ospf global-statistics
- display ospf graceful-restart
- display ospf interface
- display ospf lsdb
- display ospf mesh-group
- display ospf nexthop
- display ospf peer
- display ospf request-queue
- display ospf retrans-queue
- display ospf routing
- display ospf sham-link
- display ospf spf-statistics
- display ospf statistics updated-lsa
- display ospf vlink
- display snmp-agent trap feature-name ospf all
- dn-bit-set
- dn-bit-check
- domain-id (OSPF)
- eca-route-type compatible
- enable log
- filter export (OSPF Area)
- filter import (OSPF Area)
- filter-lsa-out peer
- filter-policy export (OSPF)
- filter-policy import (OSPF)
- flooding-control
- frr (OSPF)
- frr-policy route (OSPF)
- frr-priority static low
- graceful-restart (OSPF)
- graceful-restart helper-role (OSPF)
- gtsm default-action
- gtsm log drop-packet all
- import-route (OSPF)
- loop-free-alternate (OSPF)
- lsa-arrival-interval
- lsa-originate-interval
- lsdb-overflow-limit
- maximum load-balancing (OSPF)
- maximum-routes
- mesh-group enable
- network (OSPF area)
- nexthop (OSPF)
- nssa (OSPF Area)
- opaque-capability enable
- ospf
- ospf authentication-mode
- ospf bfd
- ospf bfd block
- ospf cost
- ospf dr-priority
- ospf enable
- ospf filter-lsa-out
- ospf frr block
- ospf maxage-lsa auto-protect disable
- ospf mib-binding
- ospf mtu-enable
- ospf network-type
- ospf p2mp-mask-ignore
- ospf router-id auto-recover disable
- ospf smart-discover
- ospf suppress-flapping peer
- ospf suppress-flapping peer disable
- ospf suppress-flapping peer hold-down
- ospf suppress-flapping peer hold-max-cost disable
- ospf timer dead
- ospf timer hello
- ospf timer poll
- ospf timer retransmit
- ospf trans-delay
- ospf valid-ttl-hops
- p2mp-peer
- peer (OSPF)
- preference (OSPF)
- prefix-priority (OSPF)
- reset gtsm statistics
- reset ospf counters
- reset ospf process
- reset ospf redistribution
- reset ospf suppress-flapping peer
- retransmission-limit
- route-tag
- rfc1583 compatible
- sham-hello enable (OSPF)
- sham-link (OSPF Area)
- silent-interface (OSPF)
- snmp-agent trap enable feature-name ospf
- spf-schedule-interval
- stub (OSPF area)
- stub-router (OSPF)
- suppress-flapping peer disable (OSPF)
- vlink-peer (OSPF area)
- vpn-instance-capability simple (OSPF)
abr-summary (OSPF area)
Function
The abr-summary command configures route summarization on an area border router (ABR).
The undo abr-summary command disables route summarization on an ABR.
By default, route summarization is not configured on ABRs.
Format
abr-summary ip-address mask [ cost { cost | inherit-minimum } | [ advertise [ generate-null0-route ] | not-advertise | generate-null0-route [ advertise ] ] ] *
undo abr-summary ip-address mask
Parameters
Parameter | Description | Value |
---|---|---|
ip-address | Specifies the IP address of a summarized route. | The value is in dotted decimal notation. |
mask | Specifies the mask of the IP address of the summarized route. | The value is in dotted decimal notation. |
advertise | not-advertise | Indicates whether to advertise the summarized route. By default, the summarized route is advertised. | - |
cost cost | Specifies the cost of the summarized route. By default, the highest cost of specific routes is used as the cost of the summarized route. | The value is an integer that ranges from 0 to 16777214. |
inherit-minimum | Indicates that the smallest cost of specific routes is used as the cost of the summarized route. | - |
generate-null0-route | Generates a blackhole route to prevent routing loops. | - |
Usage Guidelines
Usage Scenario
On a large-scale OSPF network, route search speed may decrease due to a large routing table size. Route summarization can be configured to reduce the size of the routing table and simplify management.
Route summarization aggregates multiple routes with the same IP prefix into one. If a link connected to a device within a summarized IP address range alternates between Up and Down states, the link status change is not advertised to the devices outside that IP address range. This prevents route flapping and improves network stability.
When the ABR sends routing information to other areas, it originates Type 3 LSAs for each network segment. If any contiguous segments exist in this area, run the abr-summary command to summarize these segments into one. The ABR then sends just one summarized LSA, and no LSAs that belong to the summarized network segment specified by the command. Therefore, the routing table size is reduced, and switch performance is improved.
Prerequisites
The network command has been run to specify the segments that need to be summarized before configuring route summarization.
Precautions
This command applies only to ABRs for intra-area route summarization. The asbr-summary command configures AS Boundary Routers (ASBRs) to summarize the routes imported by OSPF.
Route summarization cannot be configured on ABRs in different areas of the same process.
Example
# In OSPF 100 area 1, summarize routes in two network segments, 10.42.10.0 and 10.42.110.0, into one route 10.42.0.0, and advertise the summarized route to other areas.
<HUAWEI> system-view [HUAWEI] ospf 100 [HUAWEI-ospf-100] area 1 [HUAWEI-ospf-100-area-0.0.0.1] network 10.42.10.0 0.0.0.255 [HUAWEI-ospf-100-area-0.0.0.1] network 10.42.110.0 0.0.0.255 [HUAWEI-ospf-100-area-0.0.0.1] abr-summary 10.42.0.0 255.255.0.0
advertise mpls-lsr-id
Function
The advertise mpls-lsr-id command configures OSPF to advertise MPLS LSR IDs to multiple areas as intra-area routes.
The undo advertise mpls-lsr-id command cancels the configuration.
By default, OSPF does not advertise MPLS LSR IDs to multiple areas as intra-area routes.
Parameters
Parameter | Description | Value |
---|---|---|
cost cost | Specifies the cost of the advertised route. | The value is an integer that ranges from 0 to 65535. By default, it is 0. |
Usage Guidelines
Usage Scenario
The prerequisite of a valid tunnel is that an intra-area route to the egress is reachable. When an ABR serves as the egress of tunnels in two areas, OSPF considers that only one tunnel is valid, because there is only one intra-area route to the egress, namely the IP address of the ABR's loopback interface (used as an MPLS LSR ID for tunnel establishment). To the other areas, this route is an inter-area route. To allow the tunnels in both areas to take effect, run the advertise mpls-lsr-id command to configure OSPF to advertise the intra-area route to the MPLS LSR ID to all areas connected to this device.
Prerequisites
Before running this command, the mpls te command has been run to enable MPLS TE globally.
Configuration Impact
- If the OSPF area where the local switch resides does not have the interface whose IP address is the MPLS LSR ID, the type of the OSPF routes (with the destination address being the MPLS LSR ID) on the other devices in this OSPF area will be changed from inter-area to intra-area, and the cost will also be changed.
- If an OSPF NSSA has the interface whose IP address is the MPLS LSR ID and the forwarding address of the NSSA LSAs advertised in this area is the MPLS LSR ID, the forwarding address of these NSSA LSAs will be changed and the NSSA LSAs will be re-advertised, thus causing route calculation.
area (OSPF)
Function
The area command creates an OSPF area and displays the OSPF area view.
The undo area command deletes a specified area.
By default, the system does not creates any OSPF area.
Parameters
Parameter | Description | Value |
---|---|---|
area-id | Specifies an area ID. The area with the area-id of 0 is the backbone area. | The value can be a decimal integer or in dotted decimal notation. When the value is an integer, the value ranges from 0 to 4294967295. |
Usage Guidelines
Usage Scenario
The number of devices increases with the expansion of a network. This leads to a large LSDB on every OSPF-enabled device on a large-scale network. Route flapping frequently occurs and as such, a large number of OSPF packets are transmitted on the network. This wastes bandwidth resources.
OSPF resolves this problem by partitioning an AS into different areas. An area is regarded as a logical group, and each group is identified by a unique area ID.
Configuration Impact
After OSPF partitions the AS into different areas, the functions of multiple devices in the same area, such as the timer, filter, and summarization, can be planned and configured uniformly in the area. Therefore, the size of the LSDB is reduced, and network performance is improved.
Prerequisites
An OSPF process has been started using the ospf command.
Precautions
- At the border of an area resides a switch instead of a link.
- A network segment or a link belongs to only one area. Specify the area to which each OSPF interface belongs.
- The backbone area is responsible for forwarding inter-area routing information. The routing information between the non-backbone areas must be forwarded through the backbone area.
- All non-backbone areas must maintain connectivity with the backbone area. The backbone area must also maintain connectivity within itself.
asbr-summary
Function
The asbr-summary command configures an AS Boundary Router (ASBR) to summarize the routes imported by OSPF.
The undo asbr-summary command disables an ASBR from summarizing the routes imported by OSPF.
By default, ASBRs do not summarize the routes imported by OSPF.
Format
asbr-summary ip-address mask [ [ not-advertise | generate-null0-route ] | tag tag | cost cost | distribute-delay interval ] *
asbr-summary type nssa-trans-type-reference [ cost nssa-trans-cost-reference ]
undo asbr-summary type
undo asbr-summary ip-address mask
Parameters
Parameter | Description | Value |
---|---|---|
ip-address | Specifies the IP address of a summarized route. | The value is in dotted decimal notation. |
mask | Specifies the mask of the IP address of the summarized route. | The value is in dotted decimal notation. |
not-advertise | Indicates that the summarized route is not advertised. If this parameter is not specified, the summarized route is advertised. | - |
generate-null0-route | Generates a blackhole route to prevent routing loops. | - |
tag tag | Specifies the tag of the summarized route. | The value is an integer that ranges from 0 to 4294967295. The default value is 1. |
cost cost | Specifies the cost of the summarized route. By default, for Type 1 external routes, the cost of the summarized route is the highest cost of specific routes; for Type 2 external routes, the cost of the summarized route equals the highest cost of specific routes plus 1. | The value is an integer that ranges from 0 to 16777214. |
distribute-delay interval | Specifies the delay in advertising the summarized route. | The value is an integer that ranges from 1 to 65535, in seconds. |
type nssa-trans-type-reference | Enables OSPF to consider Type 5 LSAs that have been translated from Type 7 LSAs when it sets types for summary routes on ASBRs. By default, when OSPF sets types for summary routes on ASBRs, OSPF does not consider Type 5 LSAs that have been translated from Type 7 LSAs. | - |
cost nssa-trans-cost-reference | Enables OSPF to consider Type 5 LSAs that have been translated from Type 7 LSAs when it sets costs for summary routes on ASBRs. If the asbr-summary type nssa-trans-type-reference cost nssa-trans-cost-reference command is not run, OSPF does not consider Type 5 LSAs that have been translated from Type 7 LSAs when setting types and costs for summary routes on ASBRs. | - |
Usage Guidelines
Usage Scenario
On a large-scale OSPF network, route search speed may decrease due to a large routing table size. Configure route summarization to reduce the routing table size and simplify management.
Route summarization aggregates multiple routes with the same IP prefix into one. If a link connected to a device within a summarized IP address range alternates between Up and Down states, the link status change is not advertised to the devices outside the IP address range. This prevents route flapping and improves network stability.
Imported routes with the same prefix can be summarized into one and advertised as one route using the asbr-summary command. Route summarization reduces routing information and routing table size, improving device performance.
After route summarization is implemented, if the local device:
- If a local router is an ASBR in an NSSA, the local router summarizes all imported Type 5 LSAs within the summary address range.
- If the local router is an ASBR in an NSSA, the local router summarizes all imported Type 7 LSAs within the summary address range.
- If the local router functions as both an ASBR and an ABR in an NSSA, the local router summarizes all importedType 7 LSAs within the address range. It also summarizes the Type 5 LSAs that are translated from Type 7 LSAs.
Precautions
When a large number of routes are summarized, specify the distribute-delay parameter to set a delay in advertising the summarized routes. This ensures that the advertised summarized routes contain more valid routes and avoids network flapping and incorrect routing information.
authentication-mode (OSPF area)
Function
The authentication-mode command sets an authentication mode and a password for an OSPF area.
The undo authentication-mode command cancels the authentication mode configured for an OSPF area.
By default, no authentication mode is configured.
Format
authentication-mode simple [ plain plain-text | [ cipher ] cipher-text ]
authentication-mode { md5 | hmac-md5 | hmac-sha256 } [ key-id { plain plain-text | [ cipher ] cipher-text } ]
authentication-mode keychain keychain-name
undo authentication-mode
Only the S6720EI, S6720S-EI, S5720HI, and S5720EI support the keychain keychain-name parameter.
Parameters
Parameter | Description | Value |
---|---|---|
simple | Sets simple authentication. In simple authentication, the password type is cipher by default. NOTICE:
Simple authentication carries potential security risks. As such, HMAC-SHA256 authentication is recommended. |
- |
plain | Sets a plain text password. If this parameter is specified, you can only enter a plain text password, which then is then displayed in plain text when the configuration file is viewed. NOTICE:
If plain is specified, the password is saved in the configuration file in plain text. This carries security risks. It is recommended to specify cipher to save the password in cipher text. |
- |
plain-text | Sets a plain text password. | The value is a string of case-sensitive characters that can be letters or digits without spaces. In simple authentication, the value is a string of 1 to 8 characters. In md5, hmac-md5 or hmac-sha256 authentication, the value is a string of 1 to 255 characters. |
cipher | Sets a cipher text password. Either a plain or cipher text password can be entered, and cipher text is displayed when the configuration file is viewed. | When cipher is configured, the password can only be entered in cipher text. Then, the password is displayed in cipher text in configuration files. MD5 authentication, HMAC-SHA256 authentication or HMAC-MD5 authentication defaults to use the password in cipher text. |
cipher-text | Specifies the cipher text password. | The value is a string of case-sensitive characters that can be letters or digits without spaces. In simple authentication, the value is a string of 1 to 8 characters in plain text, or a string of 24 or 32 or 48 characters in cipher text. In md5, hmac-sha256 or hmac-md5 authentication, the value is a string of 1 to 255 characters in plain text, or a string of 20 to 392 characters in cipher text. |
md5 | Indicates MD5 authentication using the cipher text password. NOTICE:
MD5 authentication poses potential security risks, and HMAC-SHA256 authentication is recommended. |
- |
hmac-md5 | Indicates HMAC MD5 authentication using the cipher text password. NOTICE:
HMAC-MD5 authentication poses potential security risks, and HMAC-SHA256 authentication is recommended. |
- |
hmac-sha256 | Indicates HMAC-SHA256 authentication. | - |
key-id | Specifies authentication key ID of the interface's cipher authentication. The key ID must be consistent with that of the peer. | The value is an integer that ranges from 1 to 255. |
keychain | Indicates keychain authentication. NOTE:
Before configuring this parameter, run the keychain command to create a keychain. Then, run the key-id, key-string, and algorithm commands to configure a key ID, a password, and an authentication algorithm for this keychain. Otherwise, OSPF authentication will fail. Currently, only the HMAC-MD5 and HMAC-SHA256 algorithms can be used in OSPF. |
- |
keychain-name | Specifies the keychain name. | The value is a string of 1 to 47 case-insensitive characters. Except the question mark (?) and space. However, when double quotation marks (") are used around the string, spaces are allowed in the string. |
Usage Guidelines
Usage Scenario
OSPF authentication can be configured to improve network security. When area authentication is used, interfaces on all devices in an area must have the same area authentication mode and the password.
Precautions
The priority of area authentication is lower than the priority of interface authentication. The ospf authentication-mode command can be used to change the priority of interface authentication.
bandwidth-reference (OSPF)
Function
The bandwidth-reference command sets a bandwidth reference value that is used to calculate interface costs.
The undo bandwidth-reference command restores the default bandwidth reference value.
The default bandwidth reference value is 100 Mbit/s.
Parameters
Parameter | Description | Value |
---|---|---|
value | Specifies a bandwidth reference value for link cost calculation. | The value is an integer ranging from 1 to 2147483648, in Mbit/s. The default value is 100 Mbit/s. |
Usage Guidelines
Usage Scenario
The calculation formula is as follows: Interface cost = Bandwidth reference value/Interface bandwidth. The integer of the calculated result is the interface cost. If the calculated result is smaller than 1, the interface cost value is 1. If the bandwidth-reference command is executed to configure a new bandwidth reference value, the interface cost will be changed. As a result, OSPF will re-select routes.
The default bandwidth reference value is 100 Mbit/s. The interface cost value is 100000000 divided by the interface bandwidth value.
Precautions
After the bandwidth-reference command is configured in a process view, bandwidth reference values of all interfaces in the process are changed to the specified value.
Generally, OSPF automatically calculates the link cost for an interface based on the bandwidth of the interface. You can modify the interface cost using the ospf cost command.
The bandwidth bandwidth command can only set an interface bandwidth obtained by the NMS from the MIB. It cannot change an interface actual bandwidth and interface cost.
If the bandwidth-reference command is run on an Eth-Trunk interface, the bandwidth of the Eth-Trunk interface is equal to the total bandwidth of all its member interfaces.
bfd all-interfaces (OSPF)
Function
The bfd all-interfaces command enables bidirectional forwarding detection (BFD) in an OSPF process and sets the parameter values of a BFD session.
The undo bfd all-interfaces command disables BFD in an OSPF process and restores the default parameter values of a BFD session.
By default, BFD is disabled.
Format
bfd all-interfaces enable
undo bfd all-interfaces enable
bfd all-interfaces { min-rx-interval receive-interval | min-tx-interval transmit-interval | detect-multiplier multiplier-value | frr-binding } *
undo bfd all-interfaces { min-rx-interval | min-tx-interval | detect-multiplier| frr-binding } *
Only the S6720EI, S6720S-EI, S5720HI, and S5720EI support the frr-binding parameter.
Parameters
Parameter | Description | Value |
---|---|---|
min-rx-interval receive-interval | Indicates the minimum interval at which BFD packets are received from the remote end. | The value is an integer that ranges from 100 to 1000, in milliseconds. After the set service-mode enhanced command is configured on the S5720HI, the value ranges from 3 to 1000.By default, the minimum interval for receiving BFD packets is 1000 ms. |
min-tx-interval transmit-interval | Indicates the minimum interval at which BFD packets are sent to the remote end. | The value is an integer that ranges from 100 to 1000, in milliseconds. After the set service-mode enhanced command is configured on the S5720HI, the value ranges from 3 to 1000.By default, the minimum interval for receiving BFD packets is 1000 ms. |
detect-multiplier multiplier-value | Indicates the local detection multiplier. | The value is an integer ranging from 3 to 50. By default, it is 3. |
frr-binding | Binds the BFD status to the link status of an interface. |
- |
Usage Guidelines
Usage Scenario
When a device communicates with its neighbors, BFD can fast detect faults to minimize the fault impact on services.
You can bind a BFD session to an interface or an OSPF process. If a BFD session is bound to both an interface and an OSPF process, the BFD session bound to an interface takes precedence over that bound to an OSPF process.
Precautions
- receive-interval is negotiated between local min-rx-interval and remote min-tx-interval. The smaller of local min-rx-interval and remote min-tx-interval is used as the remote min-tx-interval. If the local end does not receive any BFD packets within the interval of receive-interval × multiplier-value (local detection multiplier), it declares that the remote end is unreachable.
- An OSPF device sets up BFD sessions with only the neighbors in Exstart state. Two ends can set up a BFD session only when the bfd command is run on both ends to configure BFD globally and the bfd all-interfaces enable command is run.
- The bfd all-interfaces command and the ospf bfd block command are mutually exclusive.
default (OSPF)
Function
The default command configures default parameters for OSPF-imported external routes. The parameters include the cost, type (Type 1 or Type 2), tag, and number of imported routes.
The undo default command restores the default setting.
By default, the default cost of the imported external routes is 1; the upper limit of the imported external routes is 2147483647; the type of the imported external routes is Type 2; the default tag value is 1.
Format
default { cost { cost-value | inherit-metric } | limit limit | tag tag | type type } *
undo default { cost | limit | tag | type } *
Parameters
Parameter | Description | Value |
---|---|---|
cost cost-value | Specifies the default cost of the external routes imported by OSPF. | The value is an integer ranging from 0 to 16777214. By default, it is 1. |
inherit-metric | Indicates that the cost of the imported route is the cost that the route itself carries. If no cost is specified, the default cost set using the default command is used. | - |
limit limit | Specifies the default upper limit of the external routes to be imported within a given period. | The value is an integer ranging from 1 to 2147483647. |
tag tag | Specifies the tag of the external routes. | The value is an integer ranging from 0 to 4294967295. By default, it is 1. |
type type | Specifies the type of the external routes. | The value is an integer ranging from 1 to 2. By
default, it is 2.
|
Usage Guidelines
Usage Scenario
The imported external routes carry various parameters that can change the priorities and next hops of those routes in the OSPF routing table.
By setting default parameters for OSPF-imported external routes, you can change OSPF routing policies.
The route tag is used to identify protocol-related information. For example, it can be used to differentiate AS numbers when OSPF receives BGP routes. It also allows you to apply OSPF routing policies to tagged routes.
Follow-up Procedure
The priority of the default (OSPF) command is the lowest. Thus, ensure that no other commands are configured when configuring this command. Otherwise, this command cannot take effect.
Precautions
- apply cost
- import-route (OSPF)
- default (OSPF)
default-cost (OSPF Area)
Function
The default-cost command sets a cost for the Type3 default route that is transmitted to a stub or NSSA by OSPF.
The undo default-cost command restores the default setting.
By default, the cost of the Type3 default route transmitted to a stub or NSSA is 1.
Parameters
Parameter | Description | Value |
---|---|---|
cost | Specifies the cost of the Type3 default route transmitted to a stub or NSSA by OSPF. | The value is an integer ranging from 0 to 16777214. |
default-route-advertise (OSPF)
Function
The default-route-advertise command advertises default routes to a common OSPF area.
The undo default-route-advertise command disables advertisement of default routes to a common OSPF area.
By default, OSPF devices in a common OSPF area do not generate default routes.
Format
default-route-advertise [ [ always | permit-calculate-other ] | cost cost | type type | route-policy route-policy-name [ match-any ] ] *
default-route-advertise summary cost cost
undo default-route-advertise
Parameters
Parameter | Description | Value |
---|---|---|
always | Generates and advertises an LSA that describes the default route, regardless of whether there are active default routes of other OSPF processes in the routing table of the host.
|
- |
permit-calculate-other | Generates and advertises an ASE LSA that describes the default route only when there are active default routes of other OSPF processes in the routing table of the local device. The device still calculates the default routes from other devices. NOTE:
If neither always nor permit-calculate-other is configured,
|
- |
cost cost | Specifies the cost of the ASE LSA. | The value is an integer that ranges from 0 to 16777214. The default value is 1. |
type type | Specifies the type of the external routes. | The value is 1 or 2. The default value is 2.
|
route-policy route-policy-name | Specifies the name of a routing policy. The device advertises default routes according to the parameters of the configured routing policy when there are matched default routes of other OSPF processes in the routing table of the device. | The name is a string of 1 to 40 case-sensitive characters, with spaces not supported. When double quotation marks are used around the string, spaces are allowed in the string. |
summary | Advertises the Type 3 summary LSA of the specified default route. Before specifying this parameter, ensure that a VPN is enabled. Otherwise, routes cannot be advertised. | - |
match-any | Indicates that a device matches the routing entry in the routing table against a routing policy and then advertises the default route according to the parameters set through the routing policy. | - |
Usage Guidelines
Usage Scenario
The import-route (OSPF) command cannot be used to import a default route from another AS. Running the default-route-advertise command on an ASBR can advertise a non-OSPF default route in a common OSPF area.
If the ASBR has a default route, the default-route-advertise command enables the ASBR to advertise the default route 0.0.0.0 to the OSPF area.
With always configured: The ASBR can advertise the default route 0.0.0.0 even if there is no default route. This allows the default route to remain in the routing table and prevents the ASBR from using a default route sent by another device.
Without always configured: The ASBR generates an LSA. It describes a default route only when the local routing table contains an activated non-OSPF default route (except BGP route).
If the local routing table contains an activated default BGP route, the default route can be injected to the OSPF routing table based on the following situations:
- Whether the ospf process-id vpn-instance vpn-instance-name command is run together with
the vpn-instance-capability simple command:
- If the two commands are executed together, to inject an activated default EBGP route into the OSPF routing table, run the default-route-advertise command. To inject an activated default IBGP route to the OSPF routing table, run the import-route bgp permit-ibgp command before you run the default-route-advertise command.
- If only the ospf process-id vpn-instance vpn-instance-name command is run, to inject an activated default EBGP or IBGP route into the OSPF routing table, run the default-route-advertise command.
- If the ospf process-id vpn-instance vpn-instance-name command is not run, to inject an activated default EBGP route into the OSPF routing table, run the default-route-advertise command. To inject an activated default IBGP route to the OSPF routing table, run the import-route bgp permit-ibgp command before you run the default-route-advertise command.
- Whether the ospf process-id vpn-instance vpn-instance-name command is run together with
the vpn-instance-capability simple command:
- A route configured with type takes precedence over that not configured with type. A route configured with a smaller type value takes precedence over that configured with a larger type value.
- A route configured with cost takes precedence over that not configured with cost. A route configured with a smaller cost value takes precedence over that configured with a larger cost value.
- A route configured with tag takes precedence over that not configured with tag. A route configured with a smaller tag value takes precedence over that configured with a larger tag value.
Prerequisites
Before advertising a default route, OSPF compares the priorities of default routes in an OSPF area and then advertises a default route with the highest priority. If a static default route is configured on an OSPF device, check the priority of the static default route. The priority must be lower than that of the default route to be advertised by OSPF. This ensures that the default route advertised by OSPF will be added to the routing table of the OSPF device.
Configuration Impact
After the default-route-advertise command is configured on the ASBR, the ASBR will generate a Type 5 ASE LSA with a link state ID of 0.0.0.0 and mask of 0.0.0.0. In addition, it will advertise the ASE LSA in an entire OSPF area.
If a routing policy is configured, default routes are advertised based on the following principles:
- If a default route matches the routing policy, a default route is generated on an OSPF device based on the parameters configured in the routing policy. Parameters such as cost, tag, and type can be configured in the routing policy.
- If the default route does not match the routing policy, and always is configured, the default route is still advertised.
- If always is not configured, the OSPF device will not advertise the default route.
- If always is configured, OSPF devices will advertise the default route. In addition, only always configured in the default-route-advertise command takes effect on advertisement of default routes.
Precautions
In different OSPF areas, OSPF advertises default routes using different modes. This default-route-advertise command can be used to advertise default routes to a common OSPF area. In a stub, totally stub, or totally NSSA area, default routes are advertised automatically. In an NSSA, the nssa default-route-advertise command is used to advertise default routes.
Creating a route-policy before it is referenced is recommended. By default, nonexistent route-policies cannot be referenced using the command. If the route-policy nonexistent-config-check disable command is run in the system view and a nonexistent route-policy is referenced using the current command, the device advertises the default route as long as a default route that is not generated by the current OSPF process exists in the local routing table.
description (OSPF)
Function
The description command configures a description for an OSPF process.
The undo description command deletes the description.
By default, there is no description for any OSPF process.
Parameters
Parameter | Description | Value |
---|---|---|
text | Specifies the description of an OSPF process. | The value is a string of 1 to 80 case-sensitive characters, spaces supported. |
description (OSPF Area)
Function
The description command configures a description for an OSPF area.
The undo description command deletes the description.
By default, there is no description for any OSPF area.
Parameters
Parameter | Description | Value |
---|---|---|
text | Specifies the description of an OSPF area. | The value is a string of 1 to 80 case-sensitive characters, spaces supported. |
display default-parameter ospf
Usage Guidelines
You can run the display default-parameter ospf command to check the default OSPF configuration during OSPF initialization. After the OSPF configuration is modified, this command still displays the default OSPF configuration during OSPF initialization.
Example
# Display the default OSPF configuration.
<HUAWEI> display default-parameter ospf
Process View:
-------------------------------------------------------
Default Metric : 1
Default Tag : 1
Default Type : 2
SPF Intelligent-timer Max-interval(msec) : 10000
SPF Intelligent-timer Start-interval(msec) : 500
SPF Intelligent-timer Hold-interval(msec) : 1000
Lsa Maxage (sec) : 3600
Lsa Refresh Time(sec) : 1800
Lsa Maxagediff Interval (sec) : 900
Minimum Lsa Arrival Interval(sec) : 1
Minimum Lsa Originate Interval(sec) : 5
Sham Link Cost : 1
VPN Domain ID : 0
VPN Router Tag : 0
Route Preference for Internal Routes : 10
Route Preference for External Routes : 150
-------------------------------------------------------
Area View:
-------------------------------------------------------
Default Stub Cost : 1
-------------------------------------------------------
Interface View:
-------------------------------------------------------
P2P&Broadcast Hello Interval(sec) : 10
P2MP&NBMA Hello Interval(sec) : 30
P2P&Broadcast Dead Interval(sec) : 40
P2MP&NBMA Dead Interval(sec) : 120
Poll Interval(sec) : 120
Router DR Priority : 1
Retransmit Interval(sec) : 5
Transmit Delay(sec) : 1
-------------------------------------------------------
Item |
Description |
---|---|
Process View |
Process view. |
Default Metric |
Default metric of the imported external route. |
Default Tag |
Default tag value of the imported external route. |
Default Type |
Default type of the imported external route. |
SPF Intelligent-timer Max-interval(msec) |
Default maximum interval of SPF calculation. |
SPF Intelligent-timer Start-interval(msec) |
Default start interval of SPF calculation. |
SPF Intelligent-timer Hold-interval(msec) |
Default hold interval of SPF calculation. |
Lsa Maxage(sec) |
Default maximum age of the LSA. |
Lsa Refresh Time(sec) |
Default maximum interval for generating an LSA. If the LS age of the LSAs generated by the device reaches the LSA Refresh Time, a new instance must be generated for the LSAs. |
Lsa Maxagediff Interval(sec) |
Default value difference in the MaxAge fields of LSAs. If the value difference in the MaxAge fields of two LSAs is greater than MaxAgeDiff Interval, the two LSAs are considered to belong to different instances of the same LSA. |
Minimum Lsa Arrival Interval(sec) |
Default minimum interval for receiving the same LSA. |
Minimum Lsa Originate Interval(sec) |
Default minimum interval for sending the same LSA. |
Sham Link Cost |
Default cost of the sham link. |
VPN Domain ID |
Default domain ID of the VPN. |
VPN Router Tag |
Default router tag of the VPN. |
Route Preference for Internal Routes |
Default preference of the internal route. |
Route Preference for External Routes |
Default preference of the external route. |
Area View |
Area view. |
Default Stub Cost |
Default cost of a route in the stub area. |
Interface View |
Interface view. |
P2P&Broadcast Hello Interval(sec) |
Default interval for sending Hello packets on a P2P or broadcast network. |
P2MP&NBMA Hello Interval(sec) |
Default interval for sending Hello packets on a P2MP or NBMA network. |
P2P&Broadcast Dead Interval(sec) |
Default interval for declaring a neighbor to be Down after no Hello packets are received on a P2P or broadcast network. |
P2MP&NBMA Dead Interval(sec) |
Default interval for declaring a neighbor to be Down after no Hello packets are received on a P2MP or NBMA network. |
Poll Interval(sec) |
Default interval for the local device to send Hello packets to a neighbor in the Down state on the NBMA network. The value of Poll Interval is greater than the value of Hello Interval. |
Router DR Priority |
Default priority of the DR. |
Retransmit Interval(sec) |
Default interval for retransmitting packets. |
Transmit Delay(sec) |
Default estimated time for transmitting an LSU packet over this interface. LSAs in the LSU packet must have their age incremented by this amount before transmission. |
display gtsm statistics
Usage Guidelines
You can run the display gtsm statistics command to view GTSM statistics, including the total number of BGP, BGPv6, OSPF, LDP, OSPFv3, or RIP packets, the number of packets that have passed, and the number of discarded packets on a device.
Example
# Display GTSM statistics on the device.
<HUAWEI> display gtsm statistics all
GTSM Statistics Table ---------------------------------------------------------------- SlotId Protocol Total Counters Drop Counters Pass Counters ---------------------------------------------------------------- 0 BGP 0 0 0 0 BGPv6 0 0 0 0 OSPF 0 0 0 0 LDP 0 0 0 0 OSPFv3 0 0 0 0 RIP 0 0 0 ----------------------------------------------------------------
Item |
Description |
---|---|
SlotId |
Slot ID. |
Protocol |
Protocol type:
|
Total Counters |
Total number of packets. |
Drop Counters |
Total number of dropped packets. |
Pass Counters |
Total number of packets that have passed. |
display ospf abr-asbr
Parameters
Parameter | Description | Value |
---|---|---|
process-id | Specifies the ID of an OSPF process. | The value is an integer ranging from 1 to 65535. |
router-id | Specifies the router ID of an ABR or ASBR. | The value is in dotted decimal notation. |
Usage Guidelines
An area border router (ABR) can belong to two or more areas. One of the areas must be a backbone area. An ABR is used to connect the backbone area and non-backbone areas. The connection with the backbone area can be physically or logically.
An AS boundary router (ASBR) exchanges routing information with other ASs. An ASBR may not reside at the boundary of an AS. It can be an internal device or an ABR. If an OSPF device imports external routes, the device is an ASBR.
This command can view information about the ABRs and ASBRs of OSPF.
Example
# Display information about the ABRs and ASBRs of OSPF.
<HUAWEI> display ospf abr-asbr
OSPF Process 1 with Router ID 1.1.1.1 Routing Table to ABR and ASBR RtType Destination Area Cost Nexthop Type Intra-area 10.10.10.11 0.0.0.0 1 10.2.0.3 ABR
Item |
Description |
---|---|
RtType |
Intra-area or inter-area router. |
Destination |
Router ID of the ABR or ASBR. |
Area |
Area ID. |
Cost |
Cost of the route from the local device to the ABR or ASBR. |
NextHop |
Next hop address through which packets are transmitted to the ABR or ASBR. |
Type |
ABR or ASBR. |
display ospf asbr-summary
Parameters
Parameter | Description | Value |
---|---|---|
process-id | Specifies the ID of an OSPF process. | The value is an integer ranging from 1 to 65535. |
ip-address | Specifies the summary IP address. | The value is in dotted decimal notation. |
mask | Specifies the mask of the summary IP address. If no IP address or mask is specified, summarization information of all the imported routes is displayed. | The value is in dotted decimal notation. |
Usage Guidelines
After an AS is divided into areas, configuring route aggregation can reduce routing information transmitted between areas. This reduces the size of the routing table and improves route performance.
To check information about OSPF route summarization, run the asbr-summary command.
Example
# Display summarization information about all the imported OSPF routes.
<HUAWEI> display ospf asbr-summary
OSPF Process 1 with Router ID 192.168.1.2
Summary Addresses
Total summary address count: 1
Summary Address
net : 10.0.0.0
mask : 255.0.0.0
tag : 10
status : Advertise
Cost : 0 (Not Configured)
delay : 30 (Configured)
The Count of Route is : 2
Destination Net Mask Proto Process Type Metric
10.1.0.0 255.255.0.0 Static 1 2 10
10.2.0.0 255.255.0.0 Static 1 2 10
Item |
Description |
---|---|
Total summary address count |
Number of routes that are being summarized through the asbr-summary command. |
net |
Network address of the summary route. |
mask |
Network mask of the summary route. |
tag |
Tag of the summary route. |
status |
Advertisement status of the summary route:
|
Cost |
Cost of the summarized route. |
delay |
Delay for advertising the summary route. |
The Count of Route is |
Number of routes that are being summarized. |
Destination |
Destination address of the routes that are being summarized. |
Net Mask |
Mask of the routes that are being summarized. |
Proto |
Protocol of the routes that are being summarized. |
Process |
Process ID. |
Type |
Type of the imported AS external route, which can be Type 1 or Type 2. |
Metric |
Metric of the routes that are being summarized. |
display ospf bfd session
Format
display ospf [ process-id ] bfd session interface-type interface-number [ router-id ]
display ospf [ process-id ] bfd session { router-id | all }
Parameters
Parameter | Description | Value |
---|---|---|
process-id | Specifies the ID of an OSPF process. | The value is an integer ranging from 1 to 65535. |
interface-type interface-number | Specifies the type and number of an interface. | - |
router-id | Specifies the router ID of the neighbor. | The value is in dotted decimal notation. |
all | Indicates all the OSPF-enabled interfaces in the OSPF process. | - |
Usage Guidelines
A BFD session can be associated with OSPF to fast detect a link fault and notifies OSPF of the fault. This speeds up OSPF's response to the change of the network topology.
The display ospf bfd session command displays information about the BFD-enabled neighbor.
Example
# Display information about the BFD-enabled neighbor.
<HUAWEI> display ospf bfd session all
OSPF Process 1 with Router ID 10.3.3.3 Area 0.0.0.0 interface 100.1.1.1(Vlanif100)'s BFD Sessions NeighborId:10.2.2.2 AreaId:0.0.0.0 Interface:Vlanif100 BFDState:up rx :1000 tx :1000 Multiplier:3 BFD Local Dis:8198 LocalIpAdd:10.1.1.1 RemoteIpAdd:10.1.1.2 Diagnostic Info:No diagnostic information
Item |
Description |
---|---|
NeighborId |
Router ID of the neighbor. |
AreaId |
Area ID. |
Interface |
Interface through which the local device establishes a BFD session with the neighbor. |
BFDState |
BFD status:
|
rx |
Negotiated minimum interval for receiving BFD packets. |
tx |
Negotiated minimum interval for sending BFD packets. |
Multiplier |
Remote detection multiplier. |
BFD Local Dis |
Local discriminator dynamically assigned by BFD. |
LocalIpAdd |
Local IP address. |
RemoteIpAdd |
Remote IP address. |
Diagnostic Info |
Diagnostic information:
|
display ospf brief
Parameters
Parameter | Description | Value |
---|---|---|
process-id | Specifies the ID of an OSPF process. If no OSPF process ID is specified, brief information about all the OSPF processes is displayed. |
The value is an integer ranging from 1 to 65535. |
Usage Guidelines
Configured Router ID
Configured VPN domain ID
When locating OSPF faults, you can run the display ospf brief command to obtain OSPF brief information. You can then analyze OSPF faults according to the brief information.
Example
# Display OSPF brief information.
<HUAWEI> display ospf brief
OSPF Process 1 with Router ID 10.5.5.5 OSPF Protocol Information RouterID: 10.5.5.5 Border Router: AREA Multi-VPN-Instance is not enabled Opaque Capable Global DS-TE Mode: Non-Standard IETF Mode Graceful-restart capability: disabled Helper support capability : not configured filter capability : disabled policy capability : strict lsa check, planned and un-planned Applications Supported: MPLS Traffic-Engineering Spf-schedule-interval: max 10000ms, start 500ms, hold 1000ms Default ASE parameters: Metric: 1 Tag: 1 Type: 2 Route Preference: 10 ASE Route Preference: 150 SPF Computation Count: 99 RFC 1583 Compatible Retransmission limitation is disabled Import routes limitation is enabled, the maximal limitation value: 4294967295 Area Count: 3 Nssa Area Count: 0 ExChange/Loading Neighbors: 0 Process total up interface count: 1 Process valid up interface count: 0 Flush protect mode: false Area: 0.0.0.0 (MPLS TE not enabled) Authtype: None Area flag: Normal SPF scheduled Count: 94 ExChange/Loading Neighbors: 0 Router ID conflict state: Normal Area interface up count: 1 Interface: 172.16.16.5 (Vlanif1001) Cost: 1 State: BDR Type: Broadcast MTU: 1500 Priority: 1 Designated Router: 172.16.16.2 Backup Designated Router: 172.16.16.5 Timers: Hello 10 , Dead 40 , Poll 120 , Retransmit 5 , Transmit Delay 1 Area: 0.0.0.1 Authtype: Simple Area flag: Normal SPF scheduled Count: 83 ExChange/Loading Neighbors: 0 Router ID conflict state: Normal Area interface up count: 0 Area: 0.0.0.2 Authtype: None Area flag: Normal SPF scheduled Count: 81 ExChange/Loading Neighbors: 0 Router ID conflict state: Normal Area interface up count: 0 Interface: 10.100.100.100 (LoopBack100) Cost: 0 State: P-2-P Type: P2P MTU: 1500 Timers: Hello 10 , Dead 40 , Poll 120 , Retransmit 5 , Transmit Delay 1
Item |
Description |
---|---|
RouterID |
Current router ID. |
Border Router |
Border router:
|
Multi-VPN-Instance is not enabled |
The current process does not support multi-VPN-instance. |
Opaque Capable |
Opaque-LSA capability is enabled. To enable the Opaque-LSA capability, run theopaque-capability enable command. |
Global DS-TE Mode |
Globally configured DS-TE mode:
|
Graceful-restart capability |
Whether graceful restart is enabled:
To enable the GR function, run the graceful-restart (OSPF) command. |
Helper support capability |
Whether the Helper mode is enabled:
To configure a device as a GR helper, run the graceful-restart helper-role (OSPF) command. |
filter capability |
Whether the filtering rule of the Helper mode is enabled:
|
policy capability |
Whether a policy is configured for the Helper mode:
|
Applications Supported: MPLS Traffic-Engineering |
OSPF supports Traffic Engineering (TE). |
Spf-schedule-interval |
Interval for performing SPF calculation. To set the interval for OSPF to calculate routes, run the spf-schedule-interval command. |
Route Preference |
Preference of the default route. |
ASE Route Preference |
Priority of the external route. |
Default ASE parameters |
Default parameters of the external LSA.
|
SPF Computation Count |
Number of times that SPF calculation is performed. |
RFC 1583 Compatible |
Whether RFC 1583 compatibility is enabled. To convert rules defined in RFC 2328 into rules defined in RFC 1583, run the rfc1583 compatible command. |
Retransmission limitation is disabled |
Retransmission limit is disabled. To enable retransmission limit and set the maximum number of retransmissions, run the retransmission-limit command. |
Import routes limitation is enabled, the maximal limitation value |
Maximum number of imported routes is restricted and that the maximum value is displayed. |
Area Count |
Number of areas in the current process. |
Nssa Area Count |
Number of NSSAs in the current process. |
Process total up interface count |
Number of interfaces that are up. |
Process valid up interface count |
Number of interfaces that are valid. |
Flush protect mode |
Whether master/slave board switching triggered by abnormal OSPF LSA aging is enabled:
|
ExChange/Loading Neighbors |
Number of neighbors in the ExChange/Loading state. |
Area |
Information about each area in the current process, including ID of the current area in dotted decimal notation. |
Authtype |
Area authentication type, including none-authentication, simple authentication, MD5 authentication, HMAC-SHA256 authentication, and HMAC-MD5 authentication. |
Area flag |
Flag used to describe the area attributes, including Transit/Vlink/Stub/Nssa/Normal. |
SPF scheduled Count |
Number of times that SPF calculation is performed. |
Interface |
Interface information in the area. |
Cost |
Cost of an OSPF interface. To set the cost for an OSPF on an interface, run the ospf cost command. |
State |
Interface status:
|
Type |
Interface type, including P2P, broadcast, NBMA, and P2MP. |
MTU |
MTU value of the interface. |
Priority |
Interface priority. |
Designated Router |
(Optional) the current interface is not the DR. |
Backup Designated Router |
(Optional) the current interface is not the BDR. |
Timers |
Interval of the timer. |
Hello |
Interval of the Hello timer. To set the interval for sending Hello packets on an interface, run the ospf timer hello command. |
Dead |
Interval of the Dead timer. To set the dead interval after which an interface considers its OSPF neighbor invalid, run the ospf timer dead command. |
Poll |
Interval of the Poll timer. To set the poll interval for sending Hello packets on NBMA networks, run the ospf timer poll command. |
Retransmit |
Interval of the Retransmit timer. To set the interval for retransmitting LSA on an interface, run the ospf timer retransmit command. |
Transmit Delay |
(Optional) delay for transmitting LSAs on the interface. To add the transmission delay to LSAs before they are sent by an interface, run the ospf trans-delay command. |
Router ID conflict state |
Status of the automatic recovery function. The value can
be one of the following:
|
Area interface up count |
The number of interfaces up in the area. |
display ospf cumulative
Parameters
Parameter | Description | Value |
---|---|---|
process-id | Specifies the ID of an OSPF process. If no OSPF process ID is specified, statistics of all the OSPF processes are displayed. |
The value is an integer ranging from 1 to 65535. |
Example
# Display OSPF statistics.
<HUAWEI> display ospf cumulative
OSPF Process 1 with Router ID 10.1.1.1 Cumulations IO Statistics Type Input Output Hello 26 62 DB Description 3 2 Link-State Req 1 1 Link-State Update 5 5 Link-State Ack 3 3 ASE: 2 Checksum Sum: 233779 LSAs originated by this router Router: 1 Network: 0 Sum-Net: 0 Sum-Asbr: 0 External: 3 NSSA: 0 Opq-Link: 0 Opq-Area: 0 Opq-As: 0 LSAs Originated: 4 LSAs Received: 14 Routing Table: Intra Area: 2 Inter Area: 0 ASE: 2 Up Interface Cumulate: 2 Neighbor Cumulate: ======================================================= Neighbor cumulative data. (Process 1) ------------------------------------------------------- Down: 0 Init: 0 Attempt: 0 2-Way: 0 Exstart: 0 Exchange: 0 Loading: 0 Full: 1 Retransmit Count: 0 Neighbor cumulative data. (Total) ------------------------------------------------------- Down: 0 Init: 0 Attempt: 0 2-Way: 0 Exstart: 0 Exchange: 0 Loading: 0 Full: 1 Retransmit Count: 0
Item |
Description |
---|---|
IO Statistics |
Statistics of the transmitted packets and LSAs. |
Type |
OSPF packet type. |
Input |
Number of received packets. |
Output |
Number of sent packets. |
Hello |
OSPF Hello packet. |
DB Description |
OSPF Database Description packet. |
Link-State Req |
OSPF Link State Request packet. |
Link-State Update |
OSPF Link State Update packet. |
Link-State Ack |
OSPF Link State Acknowledgement packet. |
Checksum Sum |
Checksum of the AS external LSA. |
ASE |
Number of ASE routes (If there are no ASE routes, Disabled is displayed.). |
LSAs originated by this router |
Detailed statistics of the transmitted LSAs. |
Router |
Router LSA. |
Network |
Network LSA. |
Sum-Net |
Type 3 summary LSA. |
Sum-Asbr |
Type 4 summary LSA. |
External |
AS external LSA. |
NSSA |
NSSA. |
Opq-Link |
Number of Type 9 Opque LSAs. |
Opq-Area |
Number of Type 10 Opque LSAs. |
Opq-As |
Number of Type 11 Opque LSAs |
LSAs Originated |
Generated LSAs. |
LSAs Received |
Received LSAs. |
Routing Table |
Routing table. |
Intra Area |
Number of intra-area routes. |
Inter Area |
Number of inter-area routes. |
Up Interface Cumulate |
Statistics of up state interface. |
Neighbor Cumulate |
Statistics of neighbors. |
Neighbor cumulative data |
Detailed statistics of neighbors:
|
Retransmit Count |
Total number of nodes in the retransmission list. |
display ospf error
Parameters
Parameter | Description | Value |
---|---|---|
process-id | Specifies the ID of an OSPF process. If no OSPF process ID is specified, error information of all OSPF processes is displayed. |
The value is an integer ranging from 1 to 65535. |
lsa | Displays the OSPF LSA errors. | - |
interface interface-type interface-number | Specifies the type and number of an interface. | - |
Usage Guidelines
When locating OSPF faults, you can run the display ospf error command to obtain OSPF error information. You can then analyze OSPF faults according to the OSPF error information.
Example
# Display OSPF error information.
<HUAWEI> display ospf error
OSPF Process 1 with Router ID 10.1.1.1 OSPF error statistics General packet errors: 0 : IP: received my own packet 0 : Bad packet 0 : Bad version 0 : Bad checksum 0 : Bad area id 0 : Drop on unnumbered interface 1 : Bad virtual link 0 : Bad authentication type 0 : Bad authentication key 0 : Packet too small 0 : Packet size > ip length 0 : Transmit error 0 : Interface down 0 : Unknown neighbor 0 : Bad net segment 0 : Extern option mismatch 0 : Router id confusion 0 : Bad authentication sequence number HELLO packet errors: 0 : Netmask mismatch 0 : Hello timer mismatch 0 : Dead timer mismatch 0 : Virtual neighbor unknown 0 : NBMA neighbor unknown 0 : Invalid Source Address DD packet errors: 0 : Neighbor state low 0 : Unknown LSA type 0 : MTU option mismatch LS ACK packet errors: 0 : Neighbor state low 0 : Unknown LSA type LS REQ packet errors: 0 : Neighbor state low 0 : Empty request 0 : Bad request LS UPD packet errors: 0 : Neighbor state low 0 : Newer self-generate LSA 0 : LSA checksum bad 0 : Received less recent LSA 0 : Unknown LSA type Opaque errors: 0 : 9-out of flooding scope 0 : 10-out of flooding scope 0 : 11-out of flooding scope 0 : Unknown TLV type Retransmission for packet over Limitation errors: 0 : Number for DD Packet 0 : Number for Update Packet 0 : Number for Request Packet Receive Grace LSA errors: 0 : Number of invalid LSAs 0 : Number of policy failed LSAs 0 : Number of wrong period LSAs Configuration errors: 0 : Tunnel cost mistake
Item |
Description |
---|---|
General packet errors |
Indicates general packet errors. |
IP: received my own packet |
Indicates that the packet sent by its own interface is received and therefore the packet is not processed. |
Bad packet |
Indicates that the parsed packet is incorrect, including the checksum of the length field. |
Bad version |
Indicates that the OSPF version is incorrect, that is, it is not version 2. |
Bad checksum |
Indicates that the OSPF checksum is incorrect. |
Bad area id |
Indicates that the area ID in the received packet does not match the local area ID. (Vlink can receive packets from only Area 0 and its own area.) |
Drop on unnumbered interface |
Indicates that the unnumbered rather than P2P interface receives packets (the interface must be of the P2P type). |
Bad virtual link |
Indicates that the Vlink receives invalid packets. |
Bad authentication type |
Indicates that packet authentication is incorrect. If the value of this field keeps increasing, the OSPF authentication types of the two devices that establish the neighbor relationship are inconsistent. In this case, run the area-authentication-mode command to configure the same authentication type for the two devices. |
Bad authentication key |
Packet authentication key is incorrect. |
Packet too small |
Indicates that the length of the received packet does not equal the sum of the IP header length and the packet length. |
Packet size > ip length |
Indicates that the length of the OSPF packet is greater than the permitted length of the IP packet. |
Transmit error |
Indicates that sending packets to the socket fails. |
Interface down |
Indicates the number of times that the OSPF interface goes Down. |
Unknown neighbor |
Indicates that OSPF packets are received from non-OSPF neighbors on NBMA networks, virtual links, and sham links. |
HELLO packet errors |
Indicates Hello packet errors. |
Netmask mismatch |
Indicates that the address mask does not match the local address mask. |
Hello timer mismatch |
Indicates that the Hello intervals on the two ends are inconsistent. If the value of this field keeps increasing, the value of the Hello timers on the two devices that establish the neighbor relationship are inconsistent. In this case, check the interface configurations of the two devices and run the ospf timer hello command to set the same value for the Hello timers. |
Dead timer mismatch |
Indicates that the Dead intervals on the two ends are inconsistent. If the value of this field keeps increasing, the values of the dead timers on the two devices that establish the neighbor relationship are inconsistent. In this case, check the interface configurations of the two devices and run the ospf timer dead command to set the same value for the dead timers. |
Extern option mismatch |
Indicates that the extension attributes of the Hello packets on the two ends are inconsistent. If the value of this field keeps increasing, the area types of the two devices that establish the neighbor relationship are inconsistent (the area type of one device is common area, and the area type of the other device is stub area or NSSA). In this case, configure the same area type for the two devices (in the OSPF area view, the stub command indicates the area type is stub and the stub command indicates the area type is nssa). |
Bad net segment |
The source address of received packets is not on the same network segment as the IP address of the interface that receives packets. |
Router id confusion |
Indicates that the router IDs on the two ends are the same. |
Bad authentication sequence number |
Indicates bad authentication sequence number errors. |
Virtual neighbor unknown |
Indicates that the router ID of the packet is inconsistent with that of the neighbor that is configured by the virtual link. |
NBMA neighbor unknown |
Indicates that the status of the NBMA neighbor is not active. |
Invalid Source Address |
Indicates that the source address of LSA is invalid. |
DD packet errors |
Indicates DD packet errors. |
Neighbor state low |
Indicates the following situations:
|
Unknown LSA type |
Indicates the unknown LSA type. |
MTU option mismatch |
Indicates that the MTU check of the OSPF interface is enabled and the MTU of the DD packet received by the interface is greater than the MTU of the interface. |
LS ACK packet errors |
Indicates LSAck packet errors. |
Bad ack |
Indicates the number of times that incorrect LSAck packets are received. |
Duplicate ack |
Indicates the number of times that duplicate LSAck packets are received. |
LS REQ packet errors |
Indicates LSR packet errors. |
Empty request |
Indicates empty LSR packets. |
Bad request |
Indicates the BadRequest event in the protocol. |
LS UPD packet errors |
Indicates LSU packet errors. |
Newer self-generate LSA |
Indicates the number of new self-generated LSAs. This field is reserved for future use. |
LSA checksum bad |
Indicates that the LSA checksum is incorrect. |
Received less recent LSA |
Indicates that the LSA older than the local LSA is received. |
Opaque errors |
Indicates opaque errors. |
9-out of flooding scope |
Indicates the number of Type 9 LSAs that exceed the flooding scope. |
10-out of flooding scope |
Indicates the number of Type 10 LSAs that exceed the flooding scope. |
11-out of flooding scope |
Indicates the number of Type 11 LSAs that exceed the flooding scope. |
Unknown TLV type |
Indicates the unknown TLV type. |
Retransmission for packet over Limitation errors |
Indicates the number of times that retransmitting packets expires. |
Number for DD Packet |
Indicates the number of times that retransmitting DD packets expires. |
Number for Update Packet |
Indicates the number of times that retransmitting LSU packets expires. |
Number for Request Packet |
Indicates the number of times that retransmitting LSR packets expires. |
Receive Grace LSA errors |
Indicates the number of received incorrect Grace LSAs. |
Number of invalid LSAs |
Indicates the total number of invalid LSAs. |
Number of policy failed LSAs |
Indicates the total number of policy failed LSAs. |
Number of wrong period LSAs |
Indicates the total number of wrong period LSAs. |
Configuration errors |
Indicates configuration errors. |
Tunnel cost mistake |
Indicates the number of times that the cost of the OSPF tunnel interface is smaller than 1. This count increases by one each time the cost of the OSPF tunnel interface is smaller than one. If the cost is smaller than one, the cost is calculated as one. |
<HUAWEI> display ospf error lsa
OSPF Process 1 with Router ID 10.1.1.14 Last Received Bad LSA Header LS Age : 36 Link State Type : 0x0008 Link State ID : 0.0.1.66 Advertising Router : 10.10.10.22 LS Sequence Number : 0x80000002 LS Checksum : 0x00bd2e Length : 96 Interface : Vlanif100 Recv Time : 2011-05-27 14:37:17
Item |
Description |
---|---|
Last Received Bad LSA Header |
Bad LSA information received last time. |
LS Age |
Aging time of the LSA. |
Link State Type |
LSA type. |
Link State ID |
LSA state ID. |
Advertising Router |
Router that advertises or generates LSAs. |
LS Sequence Number |
Sequence number in the LSA header. |
LS Checksum |
LSA checksum. |
Length |
Size of the LSA. |
Interface |
LSA receiving interface. |
Recv Time |
LSA receiving time. |
display ospf global-statistics
Function
The display ospf global-statistics command displays global OSPF statistics. If no OSPF process ID is specified, brief information about all the OSPF processes is displayed.
Format
display ospf global-statistics { process process-id | vpn-instance vpn-instance-name | public-instance | timewheel | brief }
Parameters
Parameter | Description | Value |
---|---|---|
process process-id | Specifies the ID of an OSPF process. | The value is an integer ranging from 1 to 65535. |
vpn-instance vpn-instance-name | Specifies the name of a VPN instance. | The value must be an existing VPN instance name. |
public-instance | Displays the statistics of all the public network instances. | - |
timewheel | Displays the number of updated or aged LSAs in different periods. | - |
brief | Displays brief information. | - |
Usage Guidelines
You can run the display ospf global-statistics command to check global OSPF statistics for fault location.
Example
# Display global OSPF statistics, including statistics of neighbors, processes, and instances.
<HUAWEI> display ospf global-statistics brief
Neighbor cumulative data (OSPF total statistics):
----------------------------------------------------------
Down: 0 Init: 0 Attempt: 0 2-Way: 0
Exstart: 0 Exchange: 0 Loading: 0 Full: 2400
Instance Numer: 1 Process Number: 2
HighSocketExpire: 27 HighSocketEmpty: 526275
Total Neighbor Number: 0
Total Press: LOW
Item |
Description |
---|---|
Neighbor cumulative data (OSPF total statistics) |
Neighbor statistics. |
Instance Number |
Number of instances, including public network instances and VPN instances. |
Process Number |
Number of OSPF processes running on the device. |
HighSocketExpire |
Number of unprocessed messages in high-priority queues. |
HighSocketEmpty |
Number of processed messages in high-priority queues. |
Total Neighbor Number |
Total number of OSPF neighbors. |
Total Press |
Total pressure of the current service. In most cases, the Total Press field is LOW. If the number of retransmission timers or the number of LSAs being flooded in the OSPF processes exceeds a certain value (default 300), or the number of OSPF neighbors exceeds 300, the Total Press field is HIGH. If the number of retransmission timers and the number of LSAs being flooded in the OSPF processes fall below a certain value (default 300), or the number of OSPF neighbors falls below 300, the Total Press field is LOW. |
# Display global statistics of OSPF process 1.
<HUAWEI> display ospf global-statistics process 1
OSPF 1 statistics data:
-----------------------------------------
LSA NUM of Flood cache: 0
Packet NUM of FloodUpdt Hash: 0
Packet NUM of Flood Queue: 0
Item |
Description |
---|---|
LSA NUM of Flood cache | Number of LSAs being flooded in the OSPF process. |
Packet NUM of FloodUpdt Hash | Number of Update packets waiting to be flooded in the OSPF process, and the total size of the Update packets does not reach the MTU. |
Packet NUM of Flood Queue | Number of Update packets waiting to be flooded in the OSPF process, and the total size of the Update packets reaches the MTU. |
# Display OSPF time wheel information.
<HUAWEI> display ospf global-statistics timewheel
=================== TimeWheel Info Begin ===================
TimeWheel current index is 2845, datanode count is 8
Bucket Number: 3596, Expiry time: 1306(s), Datanode Count: 0
High expiry time: 0, Low expiry time 527742(s)
Bucket Number: 3597, Expiry time: 1307(s), Datanode Count: 0
High expiry time: 0, Low expiry time 527743(s)
Bucket Number: 3598, Expiry time: 1308(s), Datanode Count: 0
Item |
Description |
---|---|
TimeWheel current index | Current index of the time wheel. |
datanode count | Total number of nodes in the time wheel. |
Bucket Number | Total number of indexes of the time wheel. |
Expiry time | Expiry time of the index. |
High expiry time | High expiry time corresponding to the index in the time wheel after the system starts. |
Low expiry time | Low expiry time corresponding to the index in the time wheel after the system starts. |
display ospf graceful-restart
Parameters
Parameter | Description | Value |
---|---|---|
process-id | Specifies the ID of an OSPF process. | The value is an integer ranging from 1 to 65535. |
verbose | Displays detailed information about OSPF GR. | - |
Usage Guidelines
You can run the display ospf graceful-restart command to view details and statistics of the GR.
Example
# Display OSPF GR information.
<HUAWEI> display ospf graceful-restart
OSPF Process 1 with Router ID 10.1.1.1 Graceful-restart capability : enabled Graceful-restart support : planned and un-planned, totally Helper-policy support : planned and un-planned, strict lsa check Current GR state : normal Graceful-restart period : 120 seconds Number of neighbors under helper: Normal neighbors : 0 Virtual neighbors : 0 Sham-link neighbors : 0 Total neighbors : 0 Number of restarting neighbors : 0 Last exit reason: On graceful restart : successful exit On Helper : none
# Display detailed information about OSPF GR.
<HUAWEI> display ospf graceful-restart verbose
OSPF Process 1 with Router ID 10.1.1.1 Graceful-restart capability : enabled Graceful-restart support : planned and un-planned, totally Helper-policy support : planned and un-planned, strict lsa check Current GR state : normal Graceful-restart period : 120 seconds Number of neighbors under helper: Normal neighbors : 0 Virtual neighbors : 0 Sham-link neighbors : 0 Total neighbors : 0 Number of restarting neighbors : 0 Last exit reason: On graceful restart : successful exit On Helper : none All area count : 1 Area ID : 0.0.0.0 Authtype : None Area flag : Normal Normal interface count: 1 Interface: 10.1.1.1 (Vlanif100) GR state : normal State: P-2-P Type: P2P Last Helper Exit reason: none Neighbor count of this interface : 1 Neighbor IP address GR state Last Helper Exit reason 10.2.2.2 10.1.1.2 Normal none
Item |
Description |
---|---|
Graceful-restart capability |
Whether IETF GR is enabled:
|
Graceful-restart support |
IETF GR mode that is supported currently:
|
Helper-policy support |
Policy that supports the Helper:
|
Current GR state |
Current GR status:
|
Graceful-restart period |
GR period. |
Number of neighbors under helper |
Number of neighbors in the Helper state:
|
Number of restarting neighbors |
Number of restarted devices displayed on the Helper. |
Last exit reason |
Reason why a device exits from GR last time:
|
On graceful restart |
Reason why the Restarter exits from GR:
|
On Helper |
Reason why the Helper exits from GR:
|
All area count |
Number of areas in the process. |
Area ID |
Area ID. |
Authtype |
Authentication type. |
Area flag |
Area attributes:
|
Normal interface count |
Number of interfaces in the area. |
Interface |
IP address of the interface. |
GR state |
GR status of the interface:
|
State |
Interface status:
|
Type |
Interface type:
|
Last Helper Exit reason |
Reason why the neighbor exits from the Helper mode the last
time:
|
Neighbor count of this interface |
Total number of neighbors of this interface. |
Neighbor |
Router ID of the neighbor. |
IP address |
IP address of the neighboring interface. |
GR state |
GR status of the neighbor:
|
display ospf interface
Parameters
Parameter | Description | Value |
---|---|---|
process-id | Specifies the ID of an OSPF process. | The value is an integer ranging from 1 to 65535. |
all | Displays information about all OSPF interfaces. | - |
interface-type interface-number | Specifies the interface type and the interface number. | - |
verbose | Display verbose configuration information. | - |
Usage Guidelines
The display ospf interface command output displays the configuration and operating status of OSPF, which facilitate fault location and configuration verification.
Example
# Display OSPF interface information.
<HUAWEI> display ospf interface
OSPF Process 1 with Router ID 192.168.1.1 Interfaces Area: 0.0.0.0 (MPLS TE not enabled) IP Address Type State Cost Pri DR BDR 192.168.1.2 Broadcast DR 1 1 192.168.1.2 192.168.1.3 Area: 0.0.0.1 (MPLS TE not enabled) IP Address Type State Cost Pri DR BDR 172.16.0.1 Broadcast DR 1 1 172.16.0.1 172.16.0.2
Item |
Description |
---|---|
Area |
ID of the area to which the interface belongs. |
IP Address |
IP address of the interface (regardless of whether TE is enabled on the interface). |
Type |
Interface type: P2P, PTMP, broadcast, or NBMA |
State |
Status of the interface, which is determined by the OSPF interface state machines:
|
Cost |
Cost of the interface. |
Pri |
Priority of the device interface during the DR and BDR election The greater the value, the higher the priority. |
DR |
DR of the network where the interface resides. |
BDR |
BDR of the network where the interface resides. |
Timer Hello |
Interval for sending Hello packets. |
# Display detailed information about an OSPF interface.
<HUAWEI> display ospf interface Vlanif 501 verbose
OSPF Process 1 with Router ID 192.168.2.1 Interfaces Interface: 192.168.100.2 (Vlanif501) Cost: 1 State: BDR Type: Broadcast MTU: 1500 Priority: 1 Designated Router: 192.168.100.1 Backup Designated Router: 192.168.100.2 Timers: Hello 10 , Dead 40 , Poll 120 , Retransmit 5 , Transmit Delay 1 IO Statistics Type Input Output Hello 11 10 DB Description 3 2 Link-State Req 1 1 Link-State Update 4 3 Link-State Ack 2 3 ALLSPF GROUP ALLDR GROUP OpaqueId: 0 PrevState: Waiting Effective cost: 1, enabled by OSPF Protocol Suppress flapping peer: enable(flapping-count: 0, threshold: 10)
Item |
Description |
---|---|
IO Statistics |
Statistics about received and sent OSPF packets. |
Type |
OSPF packet type. |
Input |
Number of OSPF packets that the interface receives. |
Output |
Number of OSPF packets sent by the interface. |
DB Description |
Statistics about received and sent OSPF DD packets. |
Link-State Req |
Statistics about received and sent OSPF LSR packets. |
Link-State Update |
Statistics about received and sent OSPF LSU packets. |
Link-State Ack |
Statistics about received and sent OSPF LSAck packets. |
ALLSPF GROUP |
ALLSPF GROUP that the interface joins. |
ALLDR GROUP |
ALLDR GROUP that the interface joins. |
OpaqueId |
Opaque ID of the interface. |
PrevState |
Previous state of the interface. |
Effective cost |
Effective cost of the interface, which may be any of the following values:
|
Suppress flapping peer |
Status of OSPF neighbor relationship flapping suppression:
|
display ospf lsdb
Format
display ospf [ process-id ] lsdb [ brief ]
display ospf [ process-id ] lsdb [ { router | network | summary | asbr | ase | nssa | opaque-link | opaque-area | opaque-as } [ link-state-id ] ] [ originate-router [ advertising-router-id ] | self-originate ] [ age { min-value min-age-value | max-value max-age-value } * ]
Parameters
Parameter | Description | Value |
---|---|---|
process-id | Specifies the ID of an OSPF process. | The value is an integer ranging from 1 to 65535. |
brief | Displays brief information about the LSDB. | - |
router | Displays information about the router LSA. | - |
network | Displays information about the network LSA. | - |
summary | Displays information about the network summary LSA. | - |
asbr | Displays information about the ASBR summary LSA. | - |
ase | Displays information about the AS external LSA. | - |
nssa | Displays information about the status of external links in the NSSA. | - |
opaque-link | Displays information about the opaque link LSA. | - |
opaque-area | Displays information about the opaque area LSA. | - |
opaque-as | Displays information about the opaque AS LSA. | - |
originate-router | Displays the LSA of the advertising router. | - |
link-state-id | Specifies the ID of an LSA. | The value is an IP address in dotted decimal notation. |
advertising-router-id | Specifies the router ID of the device that advertises the LSA. | The value is an IP address in dotted decimal notation. |
self-originate | Displays information about the self-originated LSA. | - |
age | Displays the LSAs that meet the age filtering rule. | - |
min-value min-age-value | Displays information about only LASs with the age value greater than or equal to the min-age-value value. | The value is an integer ranging from 0 to 3600. |
max-value max-age-value | Displays information only about LASs with the age value less than or equal to the max-age-value value. | The value is an integer ranging from 0 to 3600. |
Usage Guidelines
To check information about the LSDB, run the display ospf lsdb command. You can choose to view:
- Brief information about the LSDB
- LSAs of a specified type
- LSAs of the originating device
- Locally originated LSAs
The command output helps you troubleshoot OSPF faults.
Example
# Display brief information about the OSPF LSDB.
<HUAWEI> display ospf lsdb
OSPF Process 1 with Router ID 10.1.1.1 Link State Database Area: 0.0.0.0 Type LinkState ID AdvRouter Age Len Sequence Metric Router 10.1.1.1 10.1.1.1 1348 48 800007C9 10000 Router 10.1.1.2 10.1.1.2 1078 60 80000654 0 Network 192.168.10.1 192.168.10.1 1349 32 80000060 0 AS External Database Type LinkState ID AdvRouter Age Len Sequence Metric External 0.0.0.0 10.1.1.2 1743 36 800005FE 1
Item |
Description |
---|---|
Area |
Area whose LSDB information needs to be displayed. |
Type |
LSA type: Router, Network, Sum-Net, Sum-Asbr, NSSA, External, Opq-Link, Opq-Area, and Opq-As. |
LinkState ID |
Link State ID in the LSA header. |
AdvRouter |
Device that advertises or generates LSAs. |
Age |
Aging time of the LSA. |
Len |
Size of the LSA. |
Sequence |
Sequence number in the LSA header. |
Metric |
Metric. |
AS External Database |
LSDB that contains external LSAs. |
# Display information about router LSAs in the LSDB.
<HUAWEI> display ospf lsdb router
OSPF Process 1 with Router ID 10.1.1.1 Area: 0.0.0.0 Link State Database Type : Router Ls id : 10.2.2.2 Adv rtr : 10.2.2.2 Ls age : 52 Len : 48 Options : E seq# : 80000006 chksum : 0xbf5a Link count: 2 Link ID: 10.2.1.2 Data : 10.2.1.2 Link Type: TransNet Metric : 1 Link ID: 10.2.2.2 Data : 255.255.255.255 Link Type: StubNet Metric : 0 Priority : Medium
Item |
Description |
---|---|
Ls id |
Link State ID in the LSA header. |
Adv rtr |
Device that advertises or generates LSAs. |
Ls age |
Aging time of the LSA. |
Len |
Size of the LSA. |
Options |
Options field as below:
|
seq# |
Sequence number, which is used to check the order of LSAs. |
chksum |
LSA checksum. |
Link count |
Number of links. |
Link ID |
Link ID of the router LSA, which is classified according to the link type.
|
Data |
Link data of the router LSA.
|
Link Type |
Link type of the router LSA: P-2-P, TransNet, StubNet, or Virtual. |
Metric |
Link metric of the router LSA. |
Priority |
OSPF convergence priorities:
|
# Display information about network LSAs in the LSDB.
<HUAWEI> display ospf 1 lsdb network 10.1.1.1
OSPF Process 1 with Router ID 10.1.1.1 Area: 0.0.0.0 Link State Database Type : Network Ls id : 10.1.1.1 Adv rtr : 10.1.1.1 Ls age : 167 Len : 32 Options : E seq# : 80000002 chksum : 0x3408 Net mask : 255.255.255.0 Attached Router 10.2.2.2 Attached Router 10.1.1.1
Item |
Description |
---|---|
Net mask |
Network mask of the network LSA. |
Attached Router |
Device that is connected to the network. |
# Display information about network summary LSAs in the LSDB.
<HUAWEI> display ospf 1 lsdb summary 10.20.1.0
OSPF Process 1 with Router ID 10.1.1.1
Area: 0.0.0.0
Link State Database
Type : Sum-Net
Ls id : 10.1.1.0
Adv rtr : 10.2.2.2
Ls age : 419
Len : 28
Options : E
seq# : 80000001
chksum : 0x1d21
Net mask : 255.255.255.0
Tos 0 metric: 1
Priority : Medium
Item |
Description |
---|---|
Net mask |
Network mask of the network summary LSA. |
Tos |
Type of service of the network summary LSA. |
Metric |
Metric or cost of the route from the advertising router to the network, which is carried in the network summary LSA. |
Priority |
OSPF convergence priorities:
|
<HUAWEI> display ospf 1 lsdb asbr 10.2.2.2
OSPF Process 1 with Router ID 10.1.1.1 Area: 0.0.0.2 Link State Database Type : Sum-Asbr Ls id : 10.2.2.2 Adv rtr : 10.1.1.1 Ls age : 90 Len : 28 Options : E seq# : 80000001 chksum : 0xec62 Tos 0 metric: 1
<HUAWEI> display ospf 100 lsdb ase 10.1.1.0
OSPF Process 1 with Router ID 10.1.1.1 Link State Database Type : External Ls id : 10.1.1.0 Adv rtr : 10.2.2.2 Ls age : 569 Len : 36 Options : E seq# : 80000002 chksum : 0x90d0 Net mask : 255.255.255.0 Tos 0 Metric: 1 E type : 2 Forwarding Address : 0.0.0.0 Tag : 1 Priority : Medium
Item |
Description |
---|---|
Net mask |
Network mask of the ASE or NSSA LSA. |
Tos |
Type of service of the ASE or NSSA LSA. |
Metric |
Metric or cost of the route from the advertising router to the network, which is carried in the ASE or NSSA LSA. |
E type |
E type of the ASE or NSSA LSA. |
Forwarding Address |
Forwarding address of the ASE or NSSA LSA. |
Tag |
32-bit tag, which is carried in Type 5 and Type 7 LSAs to avoid routing loops |
Priority |
OSPF convergence priorities:
|
# Display information about NSSA external LSAs in the LSDB.
<HUAWEI> display ospf 1 lsdb nssa 192.168.1.0
OSPF Process 1 with Router ID 10.1.1.1
Area: 0.0.0.1
Link State Database
Type : NSSA
Ls id : 10.1.1.0
Adv rtr : 10.2.2.2
Ls age : 521
Len : 36
Options : None
seq# : 80000005
chksum : 0x9ea7
Net mask : 255.255.255.0
Tos 0 Metric: 1
E type : 2
Forwarding Address : 10.1.1.2
Tag : 1
Priority : Medium
# Display information about Opaque-link LSAs in the LSDB.
<HUAWEI> display ospf 1 lsdb opaque-link
OSPF Process 1 with Router ID 10.1.1.1
Area: 0.0.0.0
Link State Database
Link State Database for interface 10.1.1.1 (Vlanif200) Type: Broadcast
Type : Opq-Link
Ls id : 10.0.0.0
Adv rtr : 10.2.2.2
Ls age : 12
Len : 44
Options : E
seq# : 80000001
chksum : 0x9579
Opaque type : 3, Opaque ID : 0
Grace LSA TLV information:
Grace Period : 1800
GR reason : 1
IP address : 10.1.1.2
Item |
Description |
---|---|
Opaque type |
Opaque-link LSA. |
Opaque ID |
Opaque ID of an Opaque-link LSA (Link state ID in the LSA header consists of Opaque type and Opaque ID.). |
Grace LSA TLV information: |
GR information. |
Grace Period |
GR waiting period. |
GR reason |
Cause of GR:
|
IP address |
Address of the interface that performs GR on the switch. |
# Display information about Opaque-area LSAs in the LSDB.
<HUAWEI> display ospf 1 lsdb opaque-area
OSPF Process 1 with Router ID 10.1.1.1
Area: 0.0.0.0
Link State Database
Type : Opq-Area
Ls id : 10.0.0.1
Adv rtr : 10.1.1.1
Ls age : 639
Len : 200
Options : E
seq# : 80000001
chksum : 0x2175
Opaque Type: 1
Opaque Id: 1
Opaque lsa information:
00 02 00 b0 00 01 00 01 02 00 00 00 00 02 00 04
0a 01 01 01 00 03 00 04 0a 01 01 01 00 04 00 04
00 00 00 00 00 05 00 04 00 00 00 01 80 02 00 04
00 00 00 01 00 06 00 04 00 00 00 00 00 07 00 04
00 00 00 00 80 00 00 04 00 00 00 00 00 09 00 04
00 00 00 00 00 08 00 20 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 80 01 00 20 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 0a 00 09
00 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 04
00 01 00 01
display ospf mesh-group
Parameters
Parameter | Description | Value |
---|---|---|
process-id | Specifies the ID of an OSPF process. If no process ID is specified, brief information about mesh groups in all OSPF processes is displayed. |
The value is an integer ranging from 1 to 65535. |
brief | Displays brief information about mesh groups in each OSPF area. | - |
Usage Guidelines
When concurrent links exist between a switch and its neighbor, run the mesh-group enable command to enable the mesh group function and identify the mesh group using the router ID of the switch. When receiving LSAs, the switch will select a primary link to flood LSAs. The link interface does not flood in reverse. This avoids repeated flooding, reducing link load and saving resources.
Running the display ospf mesh-group command allows you to check brief information about mesh groups in a specified process in an OSPF area.
Example
# Display brief information about OSPF mesh groups.
<HUAWEI> display ospf mesh-group
OSPF Process 1 with Router ID 10.1.1.1 Mesh-Groups Area 0.0.0.0 Mesh-Group ID:10.2.2.2 Interface IP Address/Mask Nbr State Vlanif100 10.11.10.202/24 Exchange Vlanif200 10.22.20.202/24 Loading Vlanif300 10.33.30.202/24 Full Count of Interface in this Mesh-Group: 1 Count of Mesh-Group in this Area: 1
Item |
Description |
---|---|
Area |
OSPF area. |
Mesh-Group ID |
Key ID of a mesh group, namely, the router ID of a neighbor. |
Interface |
Interface enabled with the mesh-group feature. |
IP Address/Mask |
IP address and mask of the interface enabled with the mesh-group feature. |
Nbr State |
Neighbor status on the interface. |
Count of Interface in this Mesh-Group |
Number of interfaces in the mesh group. |
Count of Mesh-Group in this Area |
Number of mesh groups in the area. |
display ospf nexthop
Parameters
Parameter | Description | Value |
---|---|---|
process-id | Specifies the ID of an OSPF process. | The value is an integer ranging from 1 to 65535. |
Usage Guidelines
The command output can display information about all the OSPF next hops, which helps you troubleshoot OSPF faults.
Example
# Display OSPF next hop information.
<HUAWEI> display ospf nexthop
OSPF Process 100 with Router ID 10.0.0.1 Routing Nexthop information Next hops: Address Type Refcount IntfAddr Intf Name ---------------------------------------------------------------------- 10.0.0.1 Local 3 10.0.0.1 Vlanif100 10.0.0.2 Local 5 10.0.0.1 Vlanif100
Item |
Description |
---|---|
Next hops |
Detailed information about the next hop. |
Address |
Address of the next hop. |
Type |
Type of the route passing through the next hop. Local indicates that the route is destined for the local network segment. |
Refcount |
Number of OSPF routes that use the next hop. |
IntfAddr |
IP address of the interface. |
Intf Name |
Name of the interface. |
display ospf peer
Format
display ospf [ process-id ] peer [ [ interface-type interface-number ] [ neighbor-id ] | brief | last-nbr-down ]
Parameters
Parameter | Description | Value |
---|---|---|
process-id | Specifies the ID of an OSPF process. | The value is an integer ranging from 1 to 65535. |
interface-type interface-number | Specifies the interface type and the interface number. | - |
neighbor-id | Specifies the neighbor's router ID. | It is in dotted decimal notation. |
brief | Displays brief information about neighbors in each OSPF area. | - |
last-nbr-down | Displays brief information about the last neighbor that went Down in the OSPF area. | - |
Usage Guidelines
The command output can display information about OSPF neighbors, and help you troubleshoot OSPF faults, verify the configurations of OSPF neighbors, and check whether the neighbor performs Graceful Restart (GR).
Example
# Display information about the OSPF neighbor.
<HUAWEI> display ospf peer
OSPF Process 1 with Router ID 10.1.1.2 Neighbors Area 0.0.0.0 interface 10.1.1.2(Vlanif100)'s neighbors Router ID: 10.1.1.1 Address: 10.1.1.1 GR State: Normal State: Full Mode:Nbr is Slave Priority: 1 DR: 10.1.1.2 BDR: 10.1.1.1 MTU: 0 Dead timer due in 35 sec Retrans timer interval: 5 Neighbor is up for 00:00:05 Authentication Sequence: [ 0 ]
Item |
Description |
---|---|
Area |
Area to which the neighbor belongs. |
interface |
Interface that connects to the neighbor. |
Router ID |
Router ID of the neighbor. |
Address |
Address of the neighboring interface. |
GR State |
GR status after OSPF GR is enabled:
|
State |
Neighbor status:
|
Mode |
Master or slave in the process of exchanging DD packets:
|
Priority |
Priority of the neighboring device. |
DR |
Designated router. |
BDR |
Backup designated router. |
MTU |
MTU value of the neighboring interface. |
Dead timer due in 35 sec |
The dead timer due in 35 seconds. |
Retrans timer interval |
Interval for retransmitting LSAs, in seconds. |
Neighbor is up for |
Time during which the neighbor remains Up. |
Authentication Sequence |
Authentication sequence number. |
# Display brief information about OSPF neighbors.
<HUAWEI> display ospf 1 peer brief
OSPF Process 1 with Router ID 10.10.10.1 Peer Statistic Information ---------------------------------------------------------------------------- Area Id Interface Neighbor id State 0.0.0.0 Vlanif10 10.10.10.3 Full ---------------------------------------------------------------------------- Total Peer(s): 1
Item |
Description |
---|---|
Area Id |
Area to which the neighbor belongs. |
Interface |
Interface that connects to the neighbor. |
Neighbor id |
Router ID of the neighbor. |
Total Peer(s) |
Number of neighbors. |
# Display information about the OSPF neighbor that went Down for the last time.
<HUAWEI> display ospf 1 peer last-nbr-down
OSPF Process 1 with Router ID 10.1.1.1 Last Down OSPF Peer Neighbor Ip Address : 10.2.1.2 Neighbor Area Id : 0.0.0.0 Neighbor Router Id : 2.2.2.2 Interface : Vlanif100 Immediate Reason : Neighbor Down Due to Kill Neighbor Primary Reason : Logical Interface State Change Down Time : 2012-09-14 17:17:7
Item |
Description |
---|---|
Neighbor Ip Address |
Address of the neighboring interface. |
Neighbor Area Id |
Area to which the neighbor belongs. |
Neighbor Router Id |
Router ID of the neighbor. |
Interface |
Interface that connects to the neighbor. |
Immediate Reason |
Immediate reason that the neighbor went Down:
|
Primary Reason |
Primary reason that the neighbor went Down:
|
Down Time |
Time when the neighbor went Down. |
display ospf request-queue
Format
display ospf [ process-id ] request-queue [ interface-type interface-number ] [ neighbor-id ]
Parameters
Parameter | Description | Value |
---|---|---|
process-id | Specifies the ID of an OSPF process. | The value is an integer ranging from 1 to 65535. |
interface-type interface-number | Specifies the interface type and number. | - |
neighbor-id | Specifies the neighbor's router ID. | The value is in dotted decimal notation. |
Example
# Display the OSPF request list.
<HUAWEI> display ospf request-queue
OSPF Process 1 with Router ID 10.1.1.1
OSPF Request List
The Router's Neighbor is Router ID 10.4.4.4 Address 172.16.4.2
Interface 172.16.4.1 Area 0.0.0.2
Request list:
Type LinkState ID AdvRouter Sequence Age
Router 10.1.1.1 10.1.1.1 8000001b 677
Item |
Description |
---|---|
The Router's Neighbor is Router ID |
Router ID of the neighbor. |
Address |
IP address of the neighboring interface. |
Interface |
IP address of the interface. |
Area |
Area to which the local device belongs. |
Request list |
Request list. |
Type |
LSA type: Router LSA, network LSA, network summary LSA, ASBR summary LSA, AS external LSA, NSSA LSA, and opaque LSA |
LinkState ID |
Link state ID in the LSA header. |
AdvRouter |
Advertising router in the LSA header. |
Sequence |
Sequence number in the LSA header. |
Age |
Aging time in the LSA header. |
display ospf retrans-queue
Format
display ospf [ process-id ] retrans-queue [ interface-type interface-number ] [ neighbor-id ] [ low-level-of-retrans-times-range min-time ] [ high-level-of-retrans-times-range max-time ]
Parameters
Parameter | Description | Value |
---|---|---|
process-id | Specifies the ID of an OSPF process. | The value is an integer ranging from 1 to 65535. |
interface-type interface-number | Specifies the interface type and number. | - |
neighbor-id | Specifies the neighbor's router ID. | It is in dotted decimal notation. |
low-level-of-retrans-times-range min-time | Specifies the minimum number of allowed LSA retransmission. | The value is an integer ranging from 0 to 65535. |
high-level-of-retrans-times-range max-time | Specifies the maximum number of allowed LSA retransmission. | The value is an integer ranging from 1 to 65535. |
Example
# Display the OSPF retransmission list.
<HUAWEI> display ospf retrans-queue
OSPF Process 1 with Router ID 10.1.1.1 OSPF Retransmit List The Router's Neighbor is Router ID 10.2.2.2 Address 192.168.0.2 Interface 192.168.0.1 Area 0.0.0.0 Retransmit list: Type LinkState ID AdvRouter Sequence Age Router 10.1.1.1 10.1.1.1 80000002 533
Item |
Description |
---|---|
The Router's Neighbor |
Basic information about the neighboring switch. |
Router ID |
Router ID of the neighbor. |
Address |
IP address of the neighboring interface. |
Interface |
IP address of the interface. |
Area |
Area ID. |
Retransmit List |
Retransmission list. |
Type |
LSA type: Router LSA, network LSA, network summary LSA, ASBR summary LSA, AS external LSA, NSSA LSA, and opaque LSA |
LinkState ID |
Link state ID in the LSA header. |
AdvRouter |
Advertising router in the LSA header. |
Sequence |
Sequence number in the LSA header. |
Age |
Aging time in the LSA header. |
display ospf routing
Format
display ospf [ process-id ] routing router-id [ router-id ]
display ospf [ process-id ] routing [ ip-address [ mask | mask-length ] ] [ interface interface-type interface-number ] [ nexthop nexthop-address ]
Parameters
Parameter | Description | Value |
---|---|---|
process-id | Specifies the ID of an OSPF process. | The value is an integer ranging from 1 to 65535. |
router-id router-id | Specifies the router ID of a destination router. | The value is in dotted decimal notation. |
ip-address | Specifies an IP address. | The value is in dotted decimal notation. |
mask | Specifies a subnet mask. | The value is in dotted decimal notation. |
mask-length | Specifies the mask length. | The value is an integer ranging from 0 to 32. |
interface interface-type interface-number | Specifies the type and number of an interface. | - |
nexthop nexthop-address | Displays the route with a specified next hop IP address. | The value is in dotted decimal notation. |
Usage Guidelines
By using this command with different parameters, you can view the routes of a specified interface or next hop.
The command output helps you troubleshoot OSPF faults.
Example
# Display the OSPF routing table.
<HUAWEI> display ospf routing
OSPF Process 1 with Router ID 10.2.2.9 Routing Tables Routing for Network Destination Cost Type NextHop AdvRouter Area 10.12.12.0/24 1 Transit 10.12.12.10 10.2.2.9 0.0.0.1 10.13.13.0/24 1 Stub 10.13.13.1 10.2.2.9 0.0.0.0 10.11.11.0/24 2 Transit 10.12.12.11 10.0.0.1 0.0.0.1 Routing for ASEs Destination Cost Type Tag NextHop AdvRouter 10.0.0.0/8 1 Type2 1 10.12.12.11 10.0.0.1 Total Nets: 4 Intra Area: 3 Inter Area: 0 ASE: 1 NSSA: 0
Item |
Description |
---|---|
Destination |
Destination network. |
Cost |
Cost of the route to the destination address. |
Type |
Type of the destination network:
|
NextHop |
Next hop address to the destination address. |
AdvRouter |
Device that advertises LSAs. |
Area |
Area ID. |
Tag |
Tag of the external route. |
Total Nets |
Total number of networks in an area, between areas, in ASE areas, and in NSSAs. |
Intra Area |
Total number of intra-area networks (that is, stub networks and transit networks). |
Inter Area |
Total number of inter-area networks. |
ASE |
Total number of networks in the ASE area. |
NSSA |
Total number of networks in the NSSA. |
display ospf sham-link
Function
The display ospf sham-link command displays the sham links of an OSPF area.
If no OSPF process ID or area ID is specified, all sham links are displayed.
Parameters
Parameter | Description | Value |
---|---|---|
process-id | Specifies the ID of an OSPF process. | The value is an integer ranging from 1 to 65535. |
area area-id | Specifies the ID of an OSPF area. | The value is an integer ranging from 0 to 4294967295 or in the IPv4 address format. |
Usage Guidelines
You can run the display ospf sham-link command to check information about the sham links of an OSPF area. The information helps determine the establishment of sham links.
Example
# Display all OSPF sham links.
<HUAWEI> display ospf sham-link
OSPF Process 100 with Router ID 10.1.1.2 Sham Link: Area NeighborId Source-IP Destination-IP State Cost 0.0.0.1 10.1.1.2 10.3.3.3 10.5.5.5 P-2-P 10
# Display the OSPF sham link of Area 1.
<HUAWEI> display ospf sham-link area 1
OSPF Process 100 with Router ID 10.1.1.2 Sham-Link: 10.3.3.3 --> 10.5.5.5 Neighbor ID: 10.1.1.2, State: Full Area: 0.0.0.1 Cost: 10 State: P-2-P, Type: Sham Timers: Hello 10 , Dead 40 , Retransmit 5 , Transmit Delay 1
Item |
Description |
---|---|
Area |
OSPF area that the sham link belongs to. |
NeighborId |
Neighbor ID of the switch. |
Source-IP |
Source IP address of the sham link. |
Destination-IP |
Destination IP address of the sham link. |
State |
Interface status of the sham link. P-2-P indicates the point-to-point link. |
Cost |
Cost of the sham link. |
Type |
Connection type. |
Timers |
Information about the following items: the interval for sending Hello messages, Dead time, retransmission interval, and transmission delay on the interface. |
display ospf spf-statistics
Function
The display ospf spf-statistics command displays route calculation statistics in OSPF processes.
Parameters
Parameter | Description | Value |
---|---|---|
process-id | Specifies the ID of an OSPF process. If no OSPF process ID is specified, brief information about route calculation statistics in all processes is displayed. |
The value is an integer ranging from 1 to 65535. |
verbose | Displays detailed information about route calculation statistics. | - |
Usage Guidelines
The display ospf spf-statistics command displays route calculation statistics in OSPF processes, including the time when route calculation occurs, cause of route calculation, and number of changed routes.
When identifying the cause of OSPF route flapping, you can run this command to obtain OSPF route calculation statistics, and then identify the cause according to the command output.
Example
# Display brief information about route calculation statistics in OSPF process 1.
<HUAWEI> display ospf 1 spf-statistics
OSPF Process 1 with Router ID 10.2.2.2 Routing table change statistics: Date Time Intra Inter External Reason 2008-08-14 10:17:16 17 17 17 LSA 2008-08-14 09:16:47 77 62 127 Other 2008-08-14 08:16:37 0 0 0 LSA 2008-08-14 07:04:40 24 230 108 LSA 2008-08-14 06:03:15 204 230 18 Other 2008-08-14 05:02:55 34 236 128 LSA 2008-08-14 04:01:49 54 130 158 LSA 2008-08-14 03:01:48 44 220 138 LSA 2008-08-14 02:01:43 22 233 158 LSA 2008-08-14 01:00:53 977 897 907 LSA
Item |
Description |
---|---|
Date |
Date when route calculation occurs. |
Time |
Time when route calculation occurs. |
Intra |
Number of intra-area routes in the routing table, which are changed because of route calculation. |
Inter |
Number of inter-area routes in the routing table, which are changed because of route calculation. |
External |
Number of external routes in the routing table, which are changed because of route calculation. |
Reason |
Cause of route calculation:
|
# Display detailed information about route calculation statistics in OSPF process 1.
<HUAWEI> display ospf 1 spf-statistics verbose
OSPF Process 1 with Router ID 10.10.10.2 Routing table change statistics: Index: 1 Time : 2008-11-29,17:36:59 Intra : 0 Added,0 Deleted, 0 Modified Inter : 0 Added,0 Deleted, 0 Modified External : 10 Added,0 Deleted, 0 Modified The reason of calculation is:LSA NO. Type LS ID Adv Router 1 External 10.1.5.0 10.10.10.1 2 External 10.1.3.0 10.10.10.1 3 External 10.1.9.0 10.10.10.1 4 External 10.1.4.0 10.10.10.1 5 External 10.1.2.0 10.10.10.1 6 External 10.1.8.0 10.10.10.1 7 External 10.1.7.0 10.10.10.1 8 External 10.1.6.0 10.10.10.1 9 External 10.1.10.0 10.10.10.1 10 External 10.1.1.0 10.10.10.1
Item |
Description |
---|---|
Time |
Date and time when route calculation occurs. |
Intra |
Number of intra-area routes in the routing table, which are added and deleted because of route calculation. |
Inter |
Number of inter-area routes in the routing table, which are added and deleted because of route calculation. |
External |
Number of external routes in the routing table, which are added and deleted because of route calculation. |
The reason of calculation is |
Cause of route calculation:
|
No. |
Sequence number of the LSA that causes route calculation, which ranges from 1 to 10. |
Type |
Type of the LSA that causes route calculation, including Router, Network, Sum-Net, External, and NSSA. |
LS ID |
Link state ID of the LSA that causes route calculation. |
Adv Router |
Router ID of the switch that generates the LSA that causes route calculation. |
display ospf statistics updated-lsa
Function
The display ospf statistics updated-lsa command displays the frequent updates of the LSAs that the LSDB receives.
Format
display ospf [ process-id ] statistics updated-lsa [ originate-router advertising-router-id | history ]
Parameters
Parameter | Description | Value |
---|---|---|
process-id | Specifies the ID of an OSPF process. If no OSPF process ID is specified, this command displays brief information about the route calculation statistics in all processes. |
The value is an integer ranging from 1 to 65535. |
originate-router | Specifies the link status of the advertising switch. | - |
advertising-router-id | Specifies the ID of the advertising switch. | The value is in dotted decimal notation |
history | Specifies the update history of LSAs that the LSDB receives. | - |
Usage Guidelines
Usage Scenario
The display ospf statistics updated-lsa command displays the frequent updates of LSAs, facilitating the location of the cause for a routing flapping.
- If the history parameter is not configured, the display ospf statistics updated-lsa command only displays the updates of LSAs within the latest hour.
- If the history parameter is configured, the display ospf statistics updated-lsa command displays the update history of LSAs within the last 24 hours.
Precautions
- If you run the reset ospf command to restart the OSPF process, the real-time and historical statistics on the process will be cleared.
- The display ospf statistics updated-lsa command is used only to display the frequent updates of LSAs. The updated LSAs are compared with the LSAs in the local LSDB, and those with the age greater than 900 will not be displayed except those with the age of 3600.
Example
# Display the LSA updates within the last one hour.
<HUAWEI> display ospf statistics updated-lsa
OSPF Process 1 with Router ID 10.1.1.1
Statistics of Received LSAs
Begin time: 2011-04-25 11:37:32
AdvRouter Total Updated at
10.1.1.1 18 11:37:40/2011/04/25
10.2.2.2 5 11:37:40/2011/04/25
10.3.3.3 5 11:37:41/2011/04/25
10.4.4.4 5 11:37:41/2011/04/25
10.5.5.5 2 11:37:40/2011/04/25
10.6.6.6 3 11:37:40/2011/04/25
10.7.7.7 5 11:37:40/2011/04/25
10.8.8.8 6 11:37:41/2011/04/25
Item |
Description |
---|---|
Begin time |
Start time of collecting statistics. |
AdvRouter |
Advertising switch. |
Total |
Total update times of LSAs. |
Updated at |
Latest update time. |
# Display the LSA updates of the specified advertising switch.
<HUAWEI> display ospf statistics updated-lsa originate-router 10.1.1.1
OSPF Process 1 with Router ID 10.2.2.2 Statistics of Received LSAs Begin time: 2011-04-25 11:37:32 AdvRouter : 10.1.1.1 Total : 6 Updated at : 2011-04-25 11:37:41 Router(1) : 3 Network(2) : 2 Summary-Net(3) : 0 Summary-Asbr(4) : 0 External(5) : 1 NSSA(7) : 0 Opaque-link(9) : 0 Opaque-area(10) : 0 Opaque-AS(11) : 0
Item |
Description |
---|---|
Router(1) |
Update times of Router LSAs. |
Network(2) |
Update times of Network LSAs. |
Summary-Net(3) |
Update times of Network Summary LSAs. |
Summary-Asbr(4) |
Update times of ASBR Summary LSAs. |
External(5) |
Update times of AS External LSAs. |
nssa(7) |
Update times of Type7 LSAs. |
Opaque-link(9) |
Update times of Type9 LSAs. |
Opaque-area(10) |
Update times of Type10 LSAs. |
Opaque-AS(11) |
Update times of Type11 LSAs. |
# Display the update history of LSAs.
<HUAWEI> display ospf statistics updated-lsa history
OSPF Process 1 with Router ID 10.1.1.1 History Information for Received LSAs Record 1: Begin time: 2011-04-25 11:39:32 End time: 2011-04-25 11:41:32 no Record Record 2: Begin time: 2011-04-25 11:37:32 End time: 2011-04-25 11:39:32 AdvRouter : 10.1.1.1 Total : 18 Router(1) : 0 Network(2) : 0 Summary-Net(3) : 0 Summary-Asbr(4) : 18 External(5) : 0 NSSA(7) : 0 Opaque-link(9) : 0 Opaque-area(10) : 0 Opaque-AS(11) : 0 AdvRouter : 10.2.2.2 Total : 5 Router(1) : 3 Network(2) : 2 Summary-Net(3) : 0 Summary-Asbr(4) : 0 External(5) : 0 NSSA(7) : 0 Opaque-link(9) : 0 Opaque-area(10) : 0 Opaque-AS(11) : 0 AdvRouter : 10.3.3.3 Total : 5 Router(1) : 3 Network(2) : 2 Summary-Net(3) : 0 Summary-Asbr(4) : 0 External(5) : 0 NSSA(7) : 0 Opaque-link(9) : 0 Opaque-area(10) : 0 Opaque-AS(11) : 0 AdvRouter : 10.4.4.4 Total : 5 Router(1) : 2 Network(2) : 2 Summary-Net(3) : 0 Summary-Asbr(4) : 0 External(5) : 1 NSSA(7) : 0 Opaque-link(9) : 0 Opaque-area(10) : 0 Opaque-AS(11) : 0
display ospf vlink
Parameters
Parameter | Description | Value |
---|---|---|
process-id | Specifies the ID of an OSPF process. | The value is an integer ranging from 1 to 65535. |
Example
# Display OSPF virtual links.
<HUAWEI> display ospf vlink
OSPF Process 1 with Router ID 10.1.1.1
Virtual Links
Virtual-link Neighbor-id -> 10.2.2.2, Neighbor-State: Full
Interface: 10.1.1.1 (Vlanif10)
Cost: 1 State: P-2-P Type: Virtual
Transit Area: 0.0.0.1
Timers: Hello 10 , Dead 40 , Retransmit 5 , Transmit Delay 1
GR State: Normal
Item |
Description |
---|---|
Virtual-link Neighbor-id |
ID of the neighboring switch that is connected through the virtual link. |
Neighbor-State |
Neighbor status, such as Down, Init, 2-Way, ExStart, Exchange, Loading, and Full. |
Interface |
Information about interfaces in the area, that is, IP address and name of the primary interface (If the interface is a serial interface, Unknown is displayed.) |
Cost |
Cost. |
State |
Interface status. |
Type |
Interface type. |
Transit Area |
Transit area ID if the current interface is a virtual link. |
Timers |
Information about the following items: the interval for sending Hello messages, Dead time, retransmission interval, and transmission delay on the interface. |
GR State |
GR status:
|
display snmp-agent trap feature-name ospf all
Function
The display snmp-agent trap feature-name ospf all command displays all trap messages of the OSPF module.
Usage Guidelines
The Simple Network Management Protocol (SNMP) is a standard network management protocol widely used on TCP/IP networks. It uses a central computer (a network management station) that runs network management software to manage network elements. The management agent on the network element automatically reports traps to the network management station. After that, the network administrator immediately takes measures to resolve the problem.
The display snmp-agent trap feature-name ospf all command displays whether all trap functions of the OSPF module are enabled.
Example
# Display all trap messages of the OSPF module.
<HUAWEI> display snmp-agent trap feature-name ospf all
------------------------------------------------------------------------------ Feature name: OSPF Trap number : 22 ------------------------------------------------------------------------------ Trap name Default switch status Current switch status ospfIfStateChange off off ospfVirtIfStateChange off off ospfNbrStateChange off off ospfVirtNbrStateChange off off ospfIfAuthFailure off off ospfVirtIfAuthFailure off off ospfIfRxBadPacket off off ospfVirtIfRxBadPacket off off ospfLsdbOverflow off off ospfLsdbApproachingOverflow off off ospfRestartStatusChange off off ospfNbrRestartHelperStatusChange off off ospfVirtNbrRestartHelperStatusChange off off ospfNssaTranslatorStatusChange off off ospfIfConfigError off off ospfVirtIfConfigError off off ospfTxRetransmit off off ospfVirtIfTxRetransmit off off ospfOriginateLsa off off ospfMaxAgeLsa off off hwOspfv2IntraAreaRouteridConflict on on hwOspfv2IntraAreaDRIpAddressConflict on on hwOspfv2IntraAreaRouterIdConflictRecovered on on hwOspfv2PeerFlappingSuppressStatusChange off off
Item |
Description |
---|---|
Feature name |
Name of the feature |
Trap number |
Number of traps |
Trap name |
Name of the trap:
|
Default switch status |
Status of the default trap switch:
|
Current switch status |
Status of the current trap switch:
|
dn-bit-set
Function
The dn-bit-set disable command disables OSPF from setting the DN bit in LSAs.
The undo dn-bit-set disable command enables OSPF to set the DN bit in LSAs.
By default, OSPF is enabled to set the DN bit in LSAs.
Parameters
Parameter | Description | Value |
---|---|---|
summary | Specifies that the DN bit is not set in summary LSAs. | - |
ase | Specifies that the DN bit is not set in ASE LSAs. | - |
nssa | Specifies that the DN bit is not set in NSSA LSAs. | - |
Usage Guidelines
Usage Scenario
The dn-bit-set disable command can be used in the following scenarios:
- In the VPN option A scenario, the local PE imports BGP routes to generate LSAs and advertise the generated LSAs to the peer PE. According to RFC 4577, setting of the DN bit is restricted. The peer PE may fail to calculate a route. In this situation, the dn-bit-set disable command can be used to set the DN bit on or remove the setting of the DN bit from the local PE.
- When a PE is connected to an MCE, the MCE needs to calculate routes advertised by the PE. By default, the MCE does not check the DN bit. In this situation, the dn-bit-set disable command can be used to set the DN bit on or remove the setting of the DN bit from the local PE.
Configuration Impact
When the dn-bit-set disable command is used to disable OSPF from setting the DN bit in LSAs, routing loops may occur. If the parameter ase or nssa is specified, the DN bit in ASE LSAs or NSSA LSAs is not set. You can use the route-tag command to set the same tag value to prevent routing loops. Therefore, it is recommended that the dn-bit-set disable command be used in only the scenarios specified in Usage Scenario.
If the dn-bit-set disable ase command is configured, the DN bit is not set in type 5 LSAs that are converted from type 7 LSAs even if the DN bit is set in type 7 LSAs.
Precautions
The dn-bit-set disable command can be configured for only private OSPF processes. The configuration of this command takes effect only on the PEs.
The dn-bit-check disable command can be used to control whether OSPF running on the peer PE checks the DN bit when calculating routes.
Example
# Disable OSPF from setting the DN bit in ASE LSAs.
<HUAWEI> system-view
[HUAWEI] ip vpn-instance huawei
[HUAWEI-vpn-instance-huawei] route-distinguisher 100:1
[HUAWEI-vpn-instance-huawei-af-ipv4] quit
[HUAWEI-vpn-instance-huawei] quit
[HUAWEI] ospf 100 vpn-instance huawei
[HUAWEI-ospf-100] dn-bit-set disable ase
dn-bit-check
Function
The dn-bit-check disable command disables OSPF from checking the DN bit in LSAs.
The undo dn-bit-check disable command enables OSPF to check the DN bit in LSAs.
By default, OSPF is enabled to check the DN bit in LSAs.
Format
dn-bit-check disable { summary [ router-id router-id ] | ase | nssa }
undo dn-bit-check disable { summary [ router-id router-id ] | ase | nssa }
Parameters
Parameter | Description | Value |
---|---|---|
summary | Specifies that the DN bit in summary LSAs is not checked. | - |
router-id router-id | Specifies the ID of a device on which the DN bit in summary LSAs is checked. | - |
ase | Specifies that the DN bit in ASE LSAs is not checked. | - |
nssa | Specifies that the DN bit in NSSA LSAs is not checked. | - |
Usage Guidelines
Usage Scenario
In the VPN option A scenario, the local PE imports BGP routes to generate LSAs and advertise the generated LSAs to the peer PE. According to RFC 4577, setting of the DN bit is restricted. The peer PE may fail to calculate a route. In this situation, you need to use the dn-bit-check disable command to disable OSPF from checking the DN bit in LSAs.
Configuration Impact
When the dn-bit-check disable command is run, routing loops may occur. If the parameter ase or nssa is specified, the DN bit in ASE LSAs or NSSA LSAs is not checked. You can use the route-tag command to set the same tag value to prevent routing loops. Therefore, run the dn-bit-check disable command only in the scenario specified in Usage Scenario.
Precautions
When a PE is connected to an MCE, the MCE does not check the DN bit by default.
The dn-bit-check disable command can be configured only for private OSPF processes. The configuration of this command takes effect only on the PEs.
In this scenario, you can run the dn-bit-set disable command to set the DN bit on or remove the setting of the DN bit from the local PE.
Example
# Disable OSPF from checking the DN bit in summary LSAs.
<HUAWEI> system-view
[HUAWEI] ip vpn-instance huawei
[HUAWEI-vpn-instance-huawei] route-distinguisher 100:1
[HUAWEI-vpn-instance-huawei-af-ipv4] quit
[HUAWEI-vpn-instance-huawei] quit
[HUAWEI] ospf 100 vpn-instance huawei
[HUAWEI-ospf-100] dn-bit-check disable summary router-id 10.1.1.1
domain-id (OSPF)
Function
The domain-id command sets an ID for an OSPF domain.
The undo domain-id command restores the default setting.
By default, the domain ID is null.
Format
domain-id { null | domain-id [ type type value value | secondary ] * }
undo domain-id [ domain-id [ type type value value ] ]
Parameters
Parameter | Description | Value |
---|---|---|
domain-id | Specifies the ID of an OSPF domain. | The value can be an integer or in dotted decimal notation.
|
null | Indicates that the OSPF domain ID is null. | - |
type type | Specifies the type of the OSPF domain ID. | It can be 0005, 0105, 0205, or 8005. By default, it is 0005. |
value value | Specifies the value of the type of the OSPF domain ID. | The value is a hexadecimal number that ranges from 0x0 to 0xffff, and the default value is 0x0. |
secondary | Indicates the ID of a secondary domain. | The maximum number of domain-id secondary in each OSPF process is 1000. |
Usage Guidelines
Usage Scenario
Domain IDs are used to identify domains.
If the local OSPF area and an OSPF area of a remote VPN attempts to exchange Type 3 LSAs, the two areas must be in the same OSPF domain. You can run the domain-id command to configure the same domain ID for the two OSPF areas.
The routes that are imported from a PE switch are advertised using External-LSAs. The routes destined for different nodes in the same OSPF domain are advertised based on Type 3 LSAs. This requires that the nodes in the same OSPF domain be configured with the same domain ID.
If the undo domain-id command without any parameter is executed, the primary domain ID will be deleted.
Configuration Impact
Before sending routes to a remote CE switch, a PE switch sends Type 3 LSAs or Type 5 LSAs to the CE based on domain ID. If local domain IDs are the same as or compatible with remote domain IDs in BGP routes, the PE advertises Type 3 routes. If local domain IDs are different from or incompatible with remote domain IDs in BGP routes, the PE advertises Type 5 routes.
Precautions
- Each OSPF domain has one or multiple domain IDs. One of them is a primary ID and the others are secondary IDs.
- If an OSPF instance does not have a specific domain ID, its ID is considered as null.
- If the value of the domain ID is 0, secondary cannot be configured.
- The maximum number of domain-id secondary items configured in an OSPF process is 1000.
- The domain-id command is forbidden in public networks.
eca-route-type compatible
Function
The eca-route-type compatible command sets the route type of the extended community attribute of OSPF VPN to 0x8000.
The undo eca-route-type compatible command restores the route type of the extended community attribute of OSPF VPN to 0x0306.
By default, the route type of the extended community attribute of OSPF VPN is 0x0306.
Usage Guidelines
Usage Scenario
The eca-route-type compatible command is used in OSPF VPN scenarios.
- For the switch supporting RFC 4577, you can set the route type of the extended community attribute of OSPF VPN to 0x0306 and configure the switch to identify both 0x0306 and 0x8000 route types.
- For the switch that does not support RFC 4577, you can set the route type of the extended community attribute of OSPF VPN to 0x8000 and configure the switch to identify only the 0x8000 route type.
The eca-route-type compatible command enables different switchs to communicate with each other and avoid the failure in parsing the route type because the route type of the extended community attribute of OSPF VPN is unrecognized.
Precautions
The eca-route-type compatible command is forbidden in public network.
Example
# Set the route type of the extended community attribute of OSPF VPN to 0x8000.
<HUAWEI> system-view
[HUAWEI] ip vpn-instance huawei
[HUAWEI-vpn-instance-huawei] route-distinguisher 100:1
[HUAWEI-vpn-instance-huawei-af-ipv4] quit
[HUAWEI-vpn-instance-huawei] quit
[HUAWEI] ospf 1 vpn-instance huawei
[HUAWEI-ospf-1] eca-route-type compatible
enable log
Function
The enable log command enables the logging function.
The undo enable log command disables the logging function.
By default, the logging function is disabled.
Format
enable log [ config | error | state | snmp-trap ]
undo enable log [ config | error | state | snmp-trap ]
Parameters
Parameter | Description | Value |
---|---|---|
config | Enables the configuration log. | - |
state | Enables the state log. | - |
error | Enables the error log. | - |
snmp-trap | Enables the SNMP trap log. | - |
Usage Guidelines
Usage Scenario
Running the enable log command can enable the logging function. You can view running status of devices based on logs, facilitating device maintenance.
If the undo enable log command is executed, the logging function will be disabled. Then, running status of devices will be not displayed. This is inconvenient for network maintenance.
Precautions
Configuring different parameters in the enable log command can display different log information. If no parameter is not specified, the command output displays all log information.
filter export (OSPF Area)
Function
The filter export command filters the outgoing Type3 LSAs of the local area.
The undo filter export command restores the default setting.
By default, the outgoing Type3 LSAs of the local area are not filtered.
Format
filter { acl-number | acl-name acl-name | ip-prefix ip-prefix-name | route-policy route-policy-name } export
undo filter [ acl-number | acl-name acl-name | ip-prefix ip-prefix-name | route-policy route-policy-name ] export
Parameters
Parameter | Description | Value |
---|---|---|
acl-number | Specifies the number of a basic ACL. | The value is an integer ranging from 2000 to 2999. |
acl-name acl-name | Specifies the name of a named ACL. | The value is a string of 1 to 64 case-sensitive characters without spaces. The value must start with a letter. |
ip-prefix ip-prefix-name | Specifies the name of an IP prefix list. | The name is a string of 1 to 169 case-sensitive characters, with spaces not supported. When double quotation marks are used around the string, spaces are allowed in the string. |
route-policy route-policy-name | Specifies the name of a routing policy. | The name is a string of 1 to 40 case-sensitive characters, with spaces not supported. When double quotation marks are used around the string, spaces are allowed in the string. |
Usage Guidelines
Usage Scenario
The command can be used to filter out invalid LSAs sent to neighbors to reduce the size of the LSDB and speed up network convergence.
Configuration Impact
After filtering conditions are set for the outgoing summary LSAs to be advertised using the filter export command, only the outgoing Type3 LSAs that pass the filtering can be advertised.
Precautions
- The command can be configured only on an ABR.
- For an ACL, when the rule command is used to configure a filtering rule, the filtering rule takes effective only when the source address range is specified by the source parameter and the time period is specified by the time-range parameter.
- Run the filter import command to set filtering conditions for the incoming Type3 LSAs to be advertised.
Creating an ACL before it is referenced is recommended. If a nonexistent ACL is referenced using the command, OSPF advertises all Type 3 LSAs.
Creating an IP prefix list or route-policy before it is referenced is recommended. By default, nonexistent IP prefix lists or route-policies cannot be referenced using the command. If the route-policy nonexistent-config-check disable command is run in the system view and a nonexistent IP prefix list or route-policy is referenced using the current command, OSPF advertises all Type 3 LSAs.
filter import (OSPF Area)
Function
The filter import command filters the incoming Type3 LSAs of the local area.
The undo filter import command restores the default setting.
By default, the incoming Type3 LSAs are not filtered.
Format
filter { acl-number | acl-name acl-name | ip-prefix ip-prefix-name | route-policy route-policy-name } import
undo filter [ acl-number | acl-name acl-name | ip-prefix ip-prefix-name | route-policy route-policy-name ] import
Parameters
Parameter | Description | Value |
---|---|---|
acl-number | Specifies the number of a basic ACL. | The value is an integer ranging from 2000 to 2999. |
acl-name acl-name | Specifies the name of an ACL. | The value is a string of 1 to 64 case-sensitive characters without spaces. The value must start with a letter. |
ip-prefix ip-prefix-name | Specifies the name of an IP prefix list. | The name is a string of 1 to 169 case-sensitive characters, with spaces not supported. When double quotation marks are used around the string, spaces are allowed in the string. |
route-policy route-policy-name | Specifies the name of a route-policy. | The name is a string of 1 to 40 case-sensitive characters, with spaces not supported. When double quotation marks are used around the string, spaces are allowed in the string. |
Usage Guidelines
Usage Scenario
After filtering conditions are set for the incoming summary LSAs to be advertised using the filter import command, only the incoming Type3 LSAs that pass the filtering can be received.
Configuration Impact
The command can be used to filter out invalid LSAs sent to neighbors to reduce the size of the LSDB and speed up network convergence.
Precautions
- The command can be configured only on an ABR.
- For an ACL , when the rule command is used to configure a filtering rule, the filtering rule takes effect only when the source address range is specified by the source parameter and the time period is specified by the time-range parameter.
- Run the filter export command to set filtering conditions for the outgoing Type3 LSAs to be advertised.
Creating an ACL before it is referenced is recommended. If a nonexistent ACL is referenced using the command, OSPF receives all Type 3 LSAs.
Creating an IP prefix list or route-policy before it is referenced is recommended. By default, nonexistent IP prefix lists or route-policies cannot be referenced using the command. If the route-policy nonexistent-config-check disable command is run in the system view and a nonexistent IP prefix list or route-policy is referenced using the current command, OSPF receives all Type 3 LSAs.
Creating a route-policy before it is referenced is recommended. By default, nonexistent route-policies cannot be referenced using the command. If the route-policy nonexistent-config-check disable command is run in the system view and a nonexistent route-policy is referenced using the current command, all the routes learned by the specified protocol are imported to the OSPF routing table.
filter-lsa-out peer
Function
The filter-lsa-out peer command configures a switch to filter the LSAs that are sent by specified neighbors on a P2MP network.
The undo filter-lsa-out peer command cancels the configuration.
By default, the LSAs that are sent by specified neighbors on a P2MP network are not filtered.
Format
filter-lsa-out peer ip-address { all | { summary [ acl { acl-number | acl-name } ] | ase [ acl { acl-number | acl-name } ] | nssa [ acl { acl-number | acl-name } ] } * }
undo filter-lsa-out peer ip-address
Parameters
Parameter | Description | Value |
---|---|---|
ip-address | Specifies the IP address of a P2MP neighbor. This parameter is configured by the neighbor using the ip address command. |
The value is in dotted decimal notation. |
all | Filters all the outgoing LSAs except Grace LSAs. | - |
summary | Filters the outgoing network summary LSAs (Type 3). | - |
acl acl-number | Specifies the number of a basic ACL. | The value is an integer that ranges from 2000 to 2999. |
acl acl-name | Specifies the name of a named ACL. | The value is a string of 1 to 64 case-sensitive characters without spaces. The value must start with a letter. |
ase | Filters the outgoing AS external LSAs (Type 5). | - |
nssa | Filters the outgoing NSSA LSAs (Type 7). | - |
Usage Guidelines
Usage Scenario
On a P2MP network, when multiple P2MP links exist between two devices, you can configure the local device to filter the outgoing LSAs on the specified link. This reduces unnecessary LSA retransmission attempts and saves bandwidth resources.
For an ACL, when the rule command is used to configure filtering rules, only the source address range that is specified by the source parameter and the period of time that is specified by the time-range parameter take effect.
Prerequisites
OSPF does not regard a network as a P2MP network by default regardless of any link layer protocol. A P2MP network is forcibly changed from the network of another type using the ospf network-type p2mp command.
Configuration Impact
This command is valid for all the interfaces of the OSPF process.
Follow-up Procedure
Configure a device to filter the outgoing LSAs on the specified OSPF interface by using the ospf filter-lsa-out command.
filter-policy export (OSPF)
Function
The filter-policy export command filters the imported routes when these routes are advertised based on a filtering policy.
The undo filter-policy export command restores the default setting.
By default, the imported routes to be advertised are not filtered.
Format
filter-policy { acl-number | acl-name acl-name | ip-prefix ip-prefix-name | route-policy route-policy-name } export [ protocol [ process-id ] ]
undo filter-policy [ acl-number | acl-name acl-name | ip-prefix ip-prefix-name | route-policy route-policy-name ] export [ protocol [ process-id ] ]
Parameters
Parameter | Description | Value |
---|---|---|
acl-number | Specifies the number of a basic ACL. | The value is an integer that ranges from 2000 to 2999. |
acl-name acl-name | Specifies the name of a named ACL. | The value is a string of 1 to 64 case-sensitive characters without spaces. The value must start with a letter. |
ip-prefix ip-prefix-name | Specifies the name of an IP prefix list. | The name is a string of 1 to 169 case-sensitive characters, with spaces not supported. When double quotation marks are used around the string, spaces are allowed in the string. |
route-policy route-policy-name | Specifies the name of a routing policy. | The name is a string of 1 to 40 case-sensitive characters, with spaces not supported. When double quotation marks are used around the string, spaces are allowed in the string. |
protocol process-id | Filters imported routes of a specified protocol. The value can be direct, rip, isis, bgp, ospf, unr, or static. When the routing protocol is RIP, IS-IS, or OSPF, you can specify a process ID. | The value is an integer that ranges from 1 to 65535. The default value is 1. |
Usage Guidelines
Usage Scenario
After OSPF imports external routes using the import-route command, you can use the filter-policy export command to filter the imported routes to be advertised. Only the external routes that pass the filtering can be converted into AS-external LSAs and advertised.
The protocol or process-id parameter can be specified to determine a specified protocol or process. If the protocol or process-id parameter is not specified, OSPF filters all imported routes.
Precautions
This command can be configured only on ASBRs because AS-external-LSAs are generated by ASBRs.
- For an ACL, when the rule command is used to configure a filtering rule, the filtering rule takes effective only when the source address range is specified by the source parameter and the time period is specified by the time-range parameter.
Creating an ACL before it is referenced is recommended. If a nonexistent ACL is referenced using the command, all external routes imported to OSPF are converted to Type 5 LSAs (AS-external-LSAs) or Type 7 LSAs (NSSA-external-LSAs) and then are advertised to neighbors.
Creating an IP prefix list or route-policy before it is referenced is recommended. By default, nonexistent IP prefix lists or route-policies cannot be referenced using the command. If the route-policy nonexistent-config-check disable command is run in the system view and a nonexistent IP prefix list or route-policy is referenced using the current command, all external routes imported to OSPF are converted to Type 5 LSAs (AS-external-LSAs) or Type 7 LSAs (NSSA-external-LSAs) and then are advertised to neighbors.
filter-policy import (OSPF)
Function
The filter-policy import command configures a filtering policy to filter routes received by OSPF.
The undo filter-policy import command restores the default setting.
By default, OSPF does not filter received routes.
Format
filter-policy { acl-number | acl-name acl-name | ip-prefix ip-prefix-name | route-policy route-policy-name [ secondary ] } import
undo filter-policy [ acl-number | acl-name acl-name | ip-prefix ip-prefix-name | route-policy route-policy-name [ secondary ] ] import
Parameters
Parameter | Description | Value |
---|---|---|
acl-number | Specifies the basic ACL number. | The value is an integer ranging from 2000 to 2999. |
acl-name acl-name | Specifies the name of a named ACL. | The value is a string of 1 to 64 case-sensitive characters without spaces. The value must start with a letter. |
ip-prefix ip-prefix-name | Specifies the name of an address prefix list. | The name is a string of 1 to 169 case-sensitive characters, with spaces not supported. When double quotation marks are used around the string, spaces are allowed in the string. |
route-policy route-policy-name | Specifies the name of the route policy. | The name is a string of 1 to 40 case-sensitive characters, with spaces not supported. When double quotation marks are used around the string, spaces are allowed in the string. |
secondary | Selects a secondary route. | - |
Usage Guidelines
Usage Scenario
The filter-policy import command is used to set a filtering policy for received routes. Only the routes that pass the filtering can be added to the routing table. The routes that fail to pass the filtering cannot be added to the routing table but can be advertised.
The OSPF routing information is recorded in the LSDB. Instead of filtering the received or sent LSAs, the device filters routes calculated by OSPF using the filter-policy import command.
Precautions
For an ACL configured using the acl command, when the rule command is used to configure a filtering rule, the filtering rule takes effect only when the source address range is specified by the source parameter and the time period is specified by the time-range parameter.
Creating an ACL before it is referenced is recommended. If a nonexistent ACL is referenced using the command, all routes received by OSPF are delivered to the IP routing table.
Creating an IP prefix list or route-policy before it is referenced is recommended. By default, nonexistent IP prefix lists or route-policies cannot be referenced using the command. If the route-policy nonexistent-config-check disable command is run in the system view and a nonexistent IP prefix list or route-policy is referenced using the current command, all routes received by OSPF are delivered to the IP routing table.
flooding-control
Function
The flooding-control command restricts the flooding of updated LSAs.
The undo flooding-control command cancels the restriction on the flooding of updated LSAs.
By default, this function is enabled when the number of neighbors exceeds 256.
Format
flooding-control [ number transmit-number | timer-interval transmit-interval ] *
undo flooding-control [ number | timer-interval ] *
Parameters
Parameter | Description | Value |
---|---|---|
number transmit-number | Sets the number of updated LSAs to be flooded each time. | The value is an integer ranging from 1 to 1000. By default, the value is 50. |
timer-interval transmit-interval | Sets the interval for flooding updated LSAs. | The value is an integer that ranges from 30 to 100000, in milliseconds. By default, the value is 30. |
Usage Guidelines
Usage Scenario
When multiple neighbors are configured or a large number of updated LSAs are flooded, a switch may receive a large number of updated LSAs in a short period. If the switch is busy processing these update packets and discards the Hello packets that maintain neighbor relationships, neighbor relationships may be interrupted. During the reestablishment of neighbor relationships, more packets need to be exchanged, which deteriorates the processing of packets.
To avoid the preceding problem, you can run the flooding-control command to restrict the flooding of updated LSAs to keep stable neighbor relationships.
Configuration Impact
After the flooding-control command is run, the flooding of updated LSAs is immediately restricted.
Precautions
By default, a switch spends 50 ms in flooding updated LSAs each time. If not all the updated LSAs are flooded within 50 ms, the switch floods the remaining LSAs after the time specified by transmit-interval.
frr (OSPF)
Function
The frr command creates and then displays the OSPF FRR view.
The undo frr command deletes the OSPF FRR view.
By default, the OSPF FRR view does not exist.
Usage Guidelines
Usage Scenario
OSPF IP FRR allows devices to fast switch traffic from faulty links to back up links without interrupting traffic. This function protects traffic and greatly improves the reliability of OSPF networks. OSPF IP FRR must be configured in the OSPF FRR view. The frr command run in the OSPF view creates and displays the OSPF FRR view.
Prerequisites
The OSPF function has been enabled using the ospf command.
Follow-up Procedure
The frr command run in the OSPF view creates and displays the OSPF FRR view only, but cannot enable the OSPF IP FRR function. Run the loop-free-alternate command in the OSPF view to enable OSPF IP FRR to create the loop-free backup route.
frr-policy route (OSPF)
Function
The frr-policy route command configures a filtering policy for the OSPF IP FRR backup routes. The filtering policy determines what kind of OSPF backup route can be added to the routing table.
The undo frr-policy route command cancels the filtering function.
By default, the filtering function is disabled.
Parameters
Parameter | Description | Value |
---|---|---|
route-policy route-policy-name | Specifies the name of the policy used to filter OSPF backup routes. |
The name is a string of 1 to 40 case-sensitive characters, with spaces not supported. When double quotation marks are used around the string, spaces are allowed in the string. |
Usage Guidelines
Usage Scenario
OSPF IP FRR allows devices to fast switch traffic on fault links to back up links without interrupting traffic. This protects traffic and greatly improves the reliability of OSPF networks.
After the filtering policy is configured using the frr-policy route command, only the OSPF backup route that satisfies filtering rules can be delivered to the forwarding table.
Prerequisites
Before using the frr-policy route command, the OSPF IP FRR view has been entered by using the frr command, and the function of OSPF IP FRR has been enabled by using the loop-free-alternate command.
Configuration Impact
To protect the traffic over a specific OSPF route, you can configure a filtering policy route-policy-name that the OSPF route matches to ensure that the backup route can be added to the forwarding table. When this route fails, OSPF can fast switch the traffic to a backup route.
Precautions
The frr-policy route command is cyclic in nature, and only the latest configuration takes effect.
Creating a route-policy before it is referenced is recommended. By default, nonexistent route-policies cannot be referenced using the command. If the route-policy nonexistent-config-check disable command is run in the system view and a nonexistent route-policy is referenced using the current command, OSPF adds all backup routes to the IP routing table.
frr-priority static low
Function
The frr-priority static low command enables dynamic backup links to take preference over static backup links so that the LFA algorithm is used to calculate the nexthop and outbound interface.
The undo frr-priority static command disables this function.
By default, this function is disabled, static backup links take preference over dynamic backup links during route selection.
Usage Guidelines
Usage Scenario
The nexthop and outbound interface of an OSPF loop-free backup link can be obtained using either of the following methods:
- For a static backup link, after IP FRR is enabled using the ip frr command in the system view or VPN instance view, configure a nexthop and an outbound interface for the static backup link.
- For a dynamic backup link, after OSPF IP FRR is enabled using the loop-free-alternate command, enable the device to use the LFA algorithm to calculate the nexthop and outbound interface for the dynamic backup link.
By default, static backup links take preference over dynamic backup links during route selection. However, static backup links are less flexible than dynamic backup links. If a link failure occurs, static backup links cannot update automatically, but dynamic backup links can. Therefore, to ensure automatic link updates, run the frr-priority static low command to enable dynamic backup links to take preference over static backup links so that the LFA algorithm is used to calculate the nexthop and outbound interface.
Prerequisites
The OSPF IP FRR view has been displayed using the frr command.
graceful-restart (OSPF)
Function
The graceful-restart command enables the GR function.
The undo graceful-restart command disables the GR function.
By default, OSPF GR is disabled.
Format
graceful-restart [ period period | planned-only | partial ] *
undo graceful-restart [ period | planned-only | partial ] *
Parameters
Parameter | Description | Value |
---|---|---|
period period | Specifies the duration of GR. | It is an integer ranging from 1s to 1800s. The default value is 120s. |
planned-only | Indicates that the switch supports only the planned GR. By default, the switch supports both the planned GR and unplanned GR. | - |
partial | Indicates that the switch partially supports the GR. By default, the switch totally supports the GR. | - |
Planned GR: indicates that a device manually restarts or performs a master/slave device switchover by using the command. Before the device restarts or performs a master/slave device switchover, Restarter will send a grace LSA.
Unplanned GR: indicates that a device restarts or performs a master/slave device switchover because of faults. A device directly performs a master/slave device switchover without sending a grace LSA, and then enters GR after the slave device goes Up. It is different from the planned GR.
Usage Guidelines
Usage Scenario
The graceful-restart command enables OSPF GR to avoid the route flapping due to the traffic interruption or master/slave device switchover. After the graceful-restart command is run to enable GR for a switch, the Helper function is also enabled.
Prerequisites
Opaque LSAs provide a generic mechanism for OSPF extension:
- OSPF supports GR using Type 9 LSAs.
- OSPF supports TE using Type 10 LSAs.
Before configuring OSPF GR, you must enable opaque LSA capability running the opaque-capability enable command.
Configuration Impact
After an OSPF process is restarted using GR, the Restarter switch and the Helper switch reestablish the neighbor relationship, exchange routing information, synchronize the LSDB, and update the routing table and forwarding table. This implements OSPF fast convergence, prevents traffic interruption, and stabilizes the network topology.
Precautions
If there are special requirements on the GR Helper, run the graceful-restart helper-role command to configure the requirements.
You are advised not to enable OSPF GR if BFD is enabled for a stack of fixed switches. This is because the time taken for smooth data switching during a master/standby switchover in the stack may be longer than the BFD timeout interval, in which situation BFD sessions go Down and OSPF GR fails.
graceful-restart helper-role (OSPF)
Function
The graceful-restart helper-role command configures a device as a GR helper.
The undo graceful-restart helper-role command cancels the configuration.
By default, the device does not function as a GR helper.
Format
graceful-restart [ period period | partial | planned-only ] * helper-role { [ { ip-prefix ip-prefix-name | acl-number acl-number | acl-name acl-name } | ignore-external-lsa | planned-only ] * | never }
undo graceful-restart [ period | partial | planned-only ] * helper-role [ [ { ip-prefix | acl-number | acl-name } | ignore-external-lsa | planned-only ] * | never ]
Parameters
Parameter | Description | Value |
---|---|---|
period period | Specifies the duration of GR. | The value is an integer that ranges from 1 to 1800, in seconds. The default value is 120. |
planned-only | Configures the device to support only planned GR. By default, the device supports both the planned GR and unplanned GR. | - |
partial | Configures the device to support partial GR. By default, the device supports totally GR. | - |
ip-prefix ip-prefix-name | Specifies the name of an IP prefix list. The name is a string. | The name is a string of 1 to 169 case-sensitive characters, with spaces not supported. When double quotation marks are used around the string, spaces are allowed in the string. |
acl-number acl-number | Specifies the basic ACL number. | The value is an integer that ranges from 2000 to 2999. |
acl-name acl-name | Specifies the name of a named ACL. | The value is a string of 1 to 64 case-sensitive characters without spaces. The value must start with a letter. |
ignore-external-lsa | Indicates that the device does not check Type 5 and Type 7 LSAs. | - |
planned-only | Indicates that the device supports only planned GR. | By default, the device supports both planned GR and unplanned GR. |
never | Indicates that the device does not support the Helper mode. | - |
Usage Guidelines
Usage Scenario
If an OSPF neighbor supports GR and can be a restarter, the current device needs to be set to helper mode, and the neighbor is assisted to complete the GR process.
After the graceful-restart command is run to enable GR for a switch, the Helper function is also enabled.
Prerequisites
OSPF supports GR using Type 9 LSAs. So before configuring GR, run the opaque-capability enable command to enable opaque LSA capability.
gtsm default-action
Function
The gtsm default-action command sets the default action that is performed on the packets that do not match the GTSM policies.
The undo gtsm default-action drop command restores the default setting.
By default, the packets that do not match the GTSM policies can pass the filtering.
Parameters
Parameter | Description | Value |
---|---|---|
drop | Indicates that the packets that do not match the GTSM policies cannot pass the filtering. The packets are dropped. | - |
pass | Indicates that the packets that do not match the GTSM policies can pass the filtering. | - |
Usage Guidelines
Usage Scenario
For a network demanding high security, you can configure Generalized TTL Security Mechanism (GTSM) to improve the security of the OSPF network. GTSM defends against attacks by checking the Time-to-Live (TTL) value. If an attacker simulates real OSPF packets and keeps sending them to a switch, a switch receives the packets and directly sends them to the main control board for OSPF processing, without checking the validity of the packets. In this case, the switch is busy in processing these packets, causing high usage of the CPU. GTSM function protects the switch by checking whether the TTL value in the IP packet header is in a pre-defined range to improve the system security.
GTSM only checks the TTL values of the packets that match the GTSM policy. The packets that do not match the GTSM policy can pass the filtering using the undo gtsm default-action drop command or using the gtsm default-action command to set the pass parameter, or be dropped after the gtsm default-action command is run to set the drop parameter.
Configuration Impact
If the default action to be taken on GTSM packets is drop, the connection cannot be established by the switch. Therefore, GTSM improves security but reduces the ease of use.
Precautions
You can enable the log function by using the gtsm log drop-packet command to record the information about dropped packets for further fault location.
If you configure the default action by using the gtsm default-action command but not configure GTSM policy (the drop or pass parameter), GTSM does not take effect.
Example
# Set the default action performed on the packets that do not match the GTSM policies to drop.
<HUAWEI> system-view
[HUAWEI] gtsm default-action drop
# Set the default action performed on the packets that do not match the GTSM policy to pass the filtering.
<HUAWEI> system-view
[HUAWEI] undo gtsm default-action drop
gtsm log drop-packet all
Function
The gtsm log drop-packet command configures a GTSM-capable switch to record logs when it drops packets.
The undo gtsm log drop-packet command configures a GTSM-capable switch not to record logs when it drops packets.
By default, a GTSM-capable switch does not record logs when dropping packets.
Usage Guidelines
Usage Scenario
For a network demanding higher security, you can configure Generalized TTL Security Mechanism (GTSM) to improve the security of the OSPF network. GTSM defends against attacks by checking the Time-to-Live (TTL) value. If an attacker simulates real OSPF packets and keeps sending them to a device, an interface board on the device receives the packets and directly sends them to the main control board for OSPF processing, without checking the validity of the packets. In this case, the device is busy in processing these packets, causing high usage of the CPU. GTSM function protects the device by checking whether the TTL value in the IP packet header is in a pre-defined range to improve the system security.
GTSM only checks the TTL values of the packets that match the GTSM policy. The packets that do not match the GTSM policy can be allowed or dropped by using the gtsm default-action command.
You can also enable the logging function by using the gtsm log drop-packet command to record the information about dropped packets for further fault location.
Prerequisites
The gtsm default-action drop command has been run.
import-route (OSPF)
Function
The import-route command imports routes learned by other protocols.
The undo import-route command cancels the configuration.
By default, routes learned by other protocols are not imported.
Format
import-route { limit limit-number | { bgp [ permit-ibgp ] | direct | unr | rip [ process-id-rip ] | static | isis [ process-id-isis ] | ospf [ process-id-ospf ] } [ cost cost | type type | tag tag | route-policy route-policy-name ] * }
undo import-route { limit | bgp | direct | unr | rip [ process-id-rip ] | static | isis [ process-id-isis ] | ospf [ process-id-ospf ] }
Only the S6720EI, S6720S-EI, S5720HI, S5720EI, S6720SI, S6720S-SI, S5730SI, S5730S-EI, S5720SI, and S5720S-SI support the bgp [ permit-ibgp ] and isis [ process-id-isis ] parameter.
Parameters
Parameter | Description | Value |
---|---|---|
bgp | Specifies the BGP protocol whose routes are imported. NOTE:
If this parameter is specified, only EBGP routes can be imported; IBGP routes cannot be imported. |
- |
permit-ibgp | Indicates that IBGP routes are permitted to be imported. NOTE:
The import of IBGP routes may cause routing loops. Therefore, do not configure this command unless it is necessary. |
- |
direct | Specifies the direct protocol whose routes are imported. | - |
unr | Specifies the imported source routing protocol as unr. User Network Route (UNR) is allocated if dynamic routing protocols cannot be used when users are getting online. |
- |
rip | Specifies the RIP protocol whose routes are imported. | - |
process-id-rip | Specifies the process ID of the protocol whose routes are imported. | The value is an integer ranging from 1 to 65535. The default value is 1. |
static | Specifies the static protocol whose routes are imported. | - |
isis | Specifies the IS-IS protocol whose routes are imported. | - |
process-id-isis | Specifies the process ID of the protocol whose routes are imported. | The value is an integer ranging from 1 to 65535. The default value is 1. |
ospf | Specifies the OSPF protocol whose routes are imported. | - |
process-id-ospf | Specifies the process ID of the protocol whose routes are imported. | The value is an integer ranging from 1 to 65535. The default value is 1. |
limit limit-number | The maximum number of external routes that can be imported into an OSPF process. | The value is an integer that ranges from 1 to 4294967295. |
cost cost | Indicates the route cost. | The value is an integer ranging from 0 to 16777214. For details about the default value, see default (OSPF) . |
route-policy route-policy-name | Imports only the route that meets the requirements of the specified route-policy. | The name is a string of 1 to 40 case-sensitive characters, with spaces not supported. When double quotation marks are used around the string, spaces are allowed in the string. |
tag tag | Specifies the tag of the external LSA. | The value is an integer ranging from 0 to 4294967295. For details about the default value, see default (OSPF) . |
type type | Specifies the type of the external routes. | The value is an integer ranging from 1 to 2. For
details about the default value, see default (OSPF) .
|
Usage Guidelines
Usage Scenario
Importing routes discovered by other routing protocols can enrich OSPF routing information.
OSPF routes are classified into the following types in the descending order of priorities:
Intra-area routes: refer to the routes in an area within an autonomous system.
Inter-area routes: refer to the routes between different areas of the same AS. Intra-area routes and area external routes are internal routes of an AS.
Type 1 external routes: When the cost of external routes equals that of AS internal routes, and can be compared with the cost of OSPF routes, these external routes have a high reliability and can be configured as Type 1 external routes.
Type 2 external routes: When the cost of the routes from an ASBR to the destination outside an AS is much greater than the cost of the internal routes to the ASBR, these external routes have a low reliability and can be configured as Type 2 external routes.
On a non-PE device, only EBGP routes are imported after the import-route bgp command is configured. IBGP routes are also imported after the import-route bgp permit-ibgp command is configured. If IBGP routes are imported, routing loops may occur. To prevent loops, run the preference (OSPF) and preference (BGP) commands to specify preferences for OSPF and BGP routes. If IBGP routes need to be imported, run the import-route bgp permit-ibgp command, and run the preference (OSPF) and preference (BGP) commands to set the preference of OSPF ASE routes lower than that of IBGP routes (preference value of OSPF ASE routes larger than that of IBGP routes).
On a PE, configuring the import-route bgp command imports both EBGP routes and IBGP routes, regardless of whether the import-route bgp permit-ibgp command is configured or not. If the import-route bgp permit-ibgp command and the default-route-advertise (OSPF) command are both configured, the active IBGP default routes can be imported into OSPF.
Prerequisites
To import certain external routes using a route-policy, a route-policy must have been created using the route-policy command before running the import-route command.
Configuration Impact
After a route-policy is configured, the OSPF process imports only routes that satisfy certain conditions. This prevents devices from receiving unrequired routes.
Precautions
You can use the default (OSPF) command to configure default parameters for external routes imported by OSPF, including the cost, type (Type 1 or Type 2), tag, and number of routes.
The import-route (OSPF) command cannot import the default route of an external protocol. To enable a device to advertise the default route of an external protocol it learns when updating the OSPF routing table to other devices within the area, run the default-route-advertise (OSPF) command.
After the import-route direct command is executed, routes to the network segment where the IP address of the management interface belongs are also imported in the OSPF routing table. Therefore, use this command with caution.
Creating a route-policy before it is referenced is recommended. By default, nonexistent route-policies cannot be referenced using the command. If the route-policy nonexistent-config-check disable command is run in the system view and a nonexistent route-policy is referenced using the current command, all the routes learned by the specified protocol are imported to the OSPF routing table.
loop-free-alternate (OSPF)
Function
The loop-free-alternate command enables OSPF IP FRR to enable the device to use the LFA algorithm to calculate the nexthop and outbound interface for the dynamic backup link.
The undo loop-free-alternate command disables OSPF IP FRR.
By default, this function is disabled.
Usage Guidelines
Usage Scenario
The frr command run in the OSPF view creates and displays the OSPF FRR view only, but cannot enable the OSPF IP FRR function. You must run the loop-free-alternate command in the OSPF view to enable OSPF IP FRR to create the loop-free backup route.
Prerequisites
The OSPF FRR view has been created and displayed using the frr command run in the OSPF view.
Follow-up Procedure
Run the frr-policy route command in the OSPF view to configure a filtering policy for OSPF IP FRR. Only the OSPF backup route that satisfies specific rules can be delivered to the forwarding table.
lsa-arrival-interval
Function
The lsa-arrival-interval command sets an interval for receiving LSAs.
The undo lsa-arrival-interval command restores the default interval for receiving LSAs.
By default, the interval for receiving LSA packets is one second.
Format
lsa-arrival-interval { interval | intelligent-timer max-interval start-interval hold-interval }
undo lsa-arrival-interval
Parameters
Parameter | Description | Value |
---|---|---|
interval | Specifies the interval for receiving LSAs. | The value is an integer ranging from 0 to 10000, in ms. |
intelligent-timer | Enables an intelligent timer to receive LSAs. | - |
max-interval | Specifies the maximum interval for receiving LSAs. | The value is an integer ranging from 1 to 120000, in ms. The default value is 1000. |
start-interval | Specifies the initial interval for receiving LSAs. | The value is an integer ranging from 0 to 60000, in ms. The default value is 500. |
hold-interval | Specifies the Holdtime interval for receiving LSAs. | The value is an integer ranging from 1 to 60000, in ms. The default value is 500. |
Usage Guidelines
Usage Scenario
To prevent frequent LSA updates caused by network connection or frequent route flapping, you can set the interval for receiving LSAs using this command. A router receives LSAs only when it meets the set interval.
In a stable network where routes need to be fast converged, you can set the interval for receiving LSAs at millisecond level to receive and update LSAs in time. The change of the topology or the route, therefore, can be immediately detected, and LSDB synchronization speed is improved.
If there is no special requirement for the network, using the default value is recommended.
Configuration Impact
- The initial interval for receiving LSAs is specified by the parameter start-interval.
- The interval for receiving LSAs for the nth (n≥2) time is equal to hold-interval × 2(n-2).
- When the interval specified by hold-interval×2(n-2) reaches the maximum interval specified by max-interval, OSPF performs SPF calculation at the maximum interval until max-interval expires without flapping or the OSPF process is restarted.
Precautions
It is recommended to set the receiving interval specified by lsa-arrival-interval to be a value smaller than or equal to the Holdtime interval specified bylsa-originate-interval.
lsa-originate-interval
Function
The lsa-originate-interval command sets an interval for updating LSAs.
The undo lsa-originate-interval command restores the default interval for updating LSAs.
By default, the interval for updating LSA packets is 5 seconds.
Format
lsa-originate-interval { 0 | { intelligent-timer max-interval start-interval hold-interval | other-type interval } * }
undo lsa-originate-interval
Parameters
Parameter | Description | Value |
---|---|---|
0 | Sets an interval for updating LSAs to 0 ms, that is, deletes the initial interval (5000 ms) for updating LSAs. | - |
intelligent-timer | Enables an intelligent timer to update OSPF router LSAs and network LSAs. | - |
max-interval | Specifies the maximum interval for updating OSPF LSAs. | The value is an integer ranging from 1 to 120000, in ms. The default value is 5000. |
start-interval | Specifies the initial interval for updating OSPF LSAs. | The value is an integer that ranges from 0 to 60000, in ms. The default value is 500. |
hold-interval | Specifies the Holdtime interval for updating OSPF LSAs. | The value is an integer ranging from 1 to 60000, in ms. The default value is 1000. |
other-type | Sets the interval for updating the LSAs other than the OSPF router LSAs and network LSAs. | - |
interval | Specifies the interval for updating LSAs. | The value is an integer ranging from 0 to 10, in seconds. The default value is 5. |
Usage Guidelines
Usage Scenario
To prevent frequent LSA updates caused by network connection or frequent route flapping, you can set the interval for receiving LSAs using this command. A router receives LSAs only when it meets the set interval.
In a stable network where routes need to be fast converged, you can set the interval for receiving LSAs at millisecond level to update LSAs in time. The change of the topology or the route, therefore, can be immediately detected, and LSDB synchronization speed is improved.
If there is no special requirement for the network, using the default value is recommended.
Configuration Impact
- The initial interval for updating LSAs is specified by the parameter start-interval.
- The interval for updating LSAs for the nth (n≥2) time is equal to hold-interval × 2(n-2).
- When the interval specified by hold-interval×2(n-2) reaches the maximum interval specified by max-interval, OSPF performs SPF calculation at the maximum interval until max-interval expires without flapping or the OSPF process is restarted.
Precautions
It is recommended to set the updating interval specified by lsa-originate-interval to be a value longer than or equal to the Holdtime interval specified by lsa-arrival-interval.
lsdb-overflow-limit
Function
The lsdb-overflow-limit command sets the maximum number of external LSAs in an OSPF LSDB.
The undo lsdb-overflow-limit command restores the default configuration.
By default, the maximum number of external LSAs is not set.
Parameters
Parameter | Description | Value |
---|---|---|
number | Specifies the maximum number of external LSAs in an LSDB. | The value is an integer ranging from 1 to 1000000. |
Usage Guidelines
Usage Scenario
When the number of external LSAs (Type 5 and Type 7 LSAs) imported by OSPF exceeds the limit, the excessive external LSAs cannot be processed properly and are discarded.
To avoid the preceding problem, you can set the maximum number of external LSAs in the LSDB to adjust and optimize OSPF networks.
Prerequisites
If OSPF is in LSDB overflow status is displayed in the display ospf lsdb brief command output, you must run the lsdb-overflow-limit command to set the maximum number of external LSAs imported by OSPF.
Precautions
The configuration of this command must be consistent in the entire AS.
maximum load-balancing (OSPF)
Function
The maximum load-balancing command sets the maximum number of equal-cost routes for load balancing.
The undo maximum load-balancing command restores the default setting.
By default, the maximum number of equal-cost routes on the S6720SI, S6720S-SI, S5730SI, S5730S-EI, S5720S-SI or S5720SI is 8, and the maximum number of equal-cost routes on the S5720EI, S5720HI, S6720S-EI, or S6720EI is 16.
Parameters
Parameter | Description | Value |
---|---|---|
number | Specifies the maximum number of equal-cost routes. | The value is an integer that ranges from 1 to 8 on the S6720SI, S6720S-SI, S5730SI, S5730S-EI, S5720S-SI or S5720SI. The value ranges from 1 to 16 on the S5720EI, S5720HI, S6720S-EI, or S6720EI. |
Usage Guidelines
Usage Scenario
If a routing protocol discovers multiple routes with the same cost to a single destination, traffic can be balanced among these routes. The maximum load-balancing command sets the maximum number of equal-cost routes that can carry out load balancing. This optimizes the routing policy and ensures traffic forwarding on a complex network.
Configuration Impact
Packets will be balanced among multiple equal-cost routes to a single destination.
Follow-up Procedure
If more existing equal-cost OSPFv3 routes than the value set using the maximum load-balancing command are available, valid routes are selected for load balancing based on the following criteria:
- Route preference: Routes with lower preferences are selected for load balancing.
- Interface index: If routes have the same priorities, routes with higher interface index values are selected for load balancing.
- Next hop IP address: If routes have the same priorities and interface index values, routes with larger IP address are selected for load balancing.
The nexthop command allows routes with a specified weight to carry out load balancing.
Precautions
To disable load balancing, set the value of number to 1.
Example
# Set the maximum number of the equal-cost routes.
<HUAWEI> system-view
[HUAWEI] ospf 100
[HUAWEI-ospf-100] maximum load-balancing 2
# Restore the default maximum number of equal-cost routes for carrying out load balancing.
<HUAWEI> system-view
[HUAWEI] ospf 100
[HUAWEI-ospf-100] undo maximum load-balancing
maximum-routes
Function
The maximum-routes command sets the maximum number of routes of different types that OSPF supports.
The undo maximum-routes command restores the default maximum number of routes of different types that OSPF supports.
Format
maximum-routes { external | inter | intra } number
undo maximum-routes { external | inter | intra }
Parameters
Parameter | Description | Value |
---|---|---|
external | Indicates the maximum number of AS external routes that OSPF supports. | - |
inter | Indicates the maximum number of inter-area routes that OSPF supports. | - |
intra | Indicates the maximum number of intra-area routes that OSPF supports. | - |
number | Specifies the maximum number of routes of different types. | The value is an integer.
|
Usage Guidelines
Usage Scenario
Based on the real world situation of a network, such as the convergence speed, you can run the maximum-routes command to configure the maximum number of routes of different types. This ensures full use of network resources and improves network performance.
Precautions
The maximum number of routes supported by OSPF cannot exceed the maximum number of all routes supported by the switch.
The maximum-routes command configuration limits the maximum number of routes that can be locally calculated. Therefore, the command configuration affects the maximum number of routes that can be sent, but does not affect the maximum number of LSAs that can be received.
mesh-group enable
Function
The mesh-group enable command enables the mesh-group function.
The undo mesh-group enable command disables the mesh-group function.
By default, the mesh-group function is disabled.
Usage Guidelines
Usage Scenario
When concurrent links exist between the device and its neighbor, the mesh-group enable command enables the mesh-group function. The router ID of a neighboring device uniquely identifies a mesh group. After LSAs are received, the device selects a primary link to flood the received LSAs, without performing reverse flooding. This prevents repeated flooding, reduces the load on the links, and saves system resources.
Device interfaces that meet the following conditions can form a mesh group:
- The interfaces belong to the same area and OSPF process.
- The neighbor status is Exchange or Full.
- Each interface is connected only to one neighbor.
Precautions
After the device is enabled with the mesh-group function, if the router IDs of the directly connected neighbor are the same, the LSDBs of the entire network cannot be synchronized and routes cannot be calculated correctly. In this case, you need to reconfigure the router ID of the neighbors, and then restart the neighbors to validate the configured router ID.
network (OSPF area)
Function
The network command specifies the interface that runs OSPF and the area to which the interface belongs.
The undo network command deletes the interface that runs OSPF.
By default, an interface does not belong to any area.
Format
network network-address wildcard-mask [ description text ]
undo network network-address wildcard-mask
Parameters
Parameter | Description | Value |
---|---|---|
network-address | Specifies the address of the network segment where the interface resides. | The value is in dotted decimal notation. |
wildcard-mask | Specifies the wildcard mask of an IP address, which is the reverse form of the mask of the IP address. For example, 0.0.0.255 indicates that the mask length is 24 bits. | The value is in dotted decimal notation. |
description text | Specifies the description of the specified OSPF network segment. | The value is a string of 1 to 80 case-sensitive characters with spaces supported. |
Usage Guidelines
Usage Scenario
After creating an OSPF process, you can run the network command to configure the network segments in an area and specify network-address and wildcard-mask to configure one or multiple interfaces in an area. To run OSPF on an interface, ensure that the primary IP address of this interface is in the network segment range specified in the network (OSPF) command. If the secondary IP address of the main interface is in the network segment range specified in this command, the main interface cannot run OSPF.
- The mask length of the interface's IP address is not less than
that specified in the network command.
OSPF uses a reverse mask. For example, 0.0.0.255 indicates that the
mask length is 24 bits.When the wildcard-mask parameter in the network command is set to all 0s, OSPF runs on the interface if its IP address is the IP address specified in the network network-address command.
- The primary address of the interface must be within the network segment range specified in the network command.
Precautions
OSPF neighbor relationships cannot be established using the secondary IP addresses of interfaces.
After the network 0.0.0.0 0.0.0.0 command is configured, the device automatically changes the command to network 0.0.0.0 255.255.255.255. That is, all interfaces (including the management interface) will run OSPF. Therefore, exercise caution when configuring this command.
For the same network address wildcard-mask, the last description configured by description takes effect.
On a loopback interface, by default, OSPF advertises its IP address in the form of a 32-bit host route, independent of the mask length of the IP address on the interface.
To advertise the network segment route of a loopback interface, you need to run the ospf network-type command to set the network type to broadcast or NBMA.
- When an OSPF sham link is configured, the local address cannot be advertised through the OSPF process of a private network.
- Two areas that overlap cannot be configured between different processes in the same instance, or between different areas in the same process.
- The ospf enable command configuration takes precedence over the network command configuration.
Example
# Configure the primary IP address of the interface that runs OSPF to be in the network segment of 192.168.1.0/24, set the ID of the OSPF area where the interface resides to 2, and configure the description for the network segment.
<HUAWEI> system-view
[HUAWEI] ospf 100
[HUAWEI-ospf-100] area 2
[HUAWEI-ospf-100-area-0.0.0.2] network 192.168.1.0 0.0.0.255 description this network is connected to Beijing
nexthop (OSPF)
Function
The nexthop command sets a preference for equal-cost routes. After OSPF calculates the equal-cost routes, the next hop is chosen from these equal-cost routes based on the value of weights. A smaller value indicates a higher preference.
The undo nexthop command cancels the preference of these equal-cost routes.
By default, the value of weight is 255. Equal-cost routes have no preference, and they forward packets at the same time. Load balancing is performed among them.
Parameters
Parameter | Description | Value |
---|---|---|
ip-address | Indicates the IP address of the next hop. | The value is in dotted decimal notation. |
weight value | Indicates the weight of the next hop. A smaller value indicates a higher preference. | It is an integer that ranges from 1 to 254. |
Usage Guidelines
- The number of equal-cost routes on a network is larger than the value configured using the maximum load-balancing command.
- Valid routes must be specified for load balancing.
nssa (OSPF Area)
Function
The nssa command configures an NSSA.
The undo nssa command cancels the configuration of an NSSA.
By default, no OSPF area is configured as an NSSA.
Format
nssa [ { default-route-advertise [ backbone-peer-ignore ] | suppress-default-route } | flush-waiting-timer interval-value | no-import-route | no-summary | set-n-bit | suppress-forwarding-address | translator-always | translator-interval interval-value | zero-address-forwarding | translator-strict ] *
undo nssa [ flush-waiting-timer interval-value ]
Parameters
Parameter | Description | Value |
---|---|---|
default-route-advertise | Generates default Type7 LSAs on the ASBR and then advertises them to the NSSA. NOTE:
The ABR generates a default NSSA LSA (Type7 LSA) automatically and advertises it in the NSSA. Type 7 LSAs carrying the default route will be generated only when the default route 0.0.0.0/0 exists in the routing table on the ASBR. |
- |
backbone-peer-ignore | Prevents the ABR from checking the neighbor status when the ABR generates default Type 7 LSAs and advertises them to the NSSA. Specifically, the ABR generates default Type 7 LSAs and advertises them to the NSSA as long as an interface that is Up exists in the backbone area. | - |
suppress-default-route | Generates default Type-7 LSAs on the ASBR or ABR and then not advertises them to the NSSA. | - |
flush-waiting-timer interval-value | Indicates the interval for an ASBR to send aged Type 5 LSAs. The parameter takes effect only when it is set. | The value is an integer that ranges from 1 to 40, in seconds. |
no-import-route | Indicates that no external route is imported to an NSSA. | - |
no-summary | Indicates that an ABR is prohibited from sending summary LSAs to the NSSA. | - |
set-n-bit | Sets the N-bit in DD packets. | - |
suppress-forwarding-address | Sets the FA of the Type 5 LSAs translated from Type 7 LSAs by the NSSA ABR to 0.0.0.0. | - |
translator-always | Specifies an ABR in an NSSA as an all-the-time translator. Multiple ABRs in an NSSA can be configured as translators. | - |
translator-interval interval-value | Specifies the timeout period of a translator. | The value is an integer ranging from 1 to 120, in seconds. The default value is 40. |
zero-address-forwarding | Sets the FA of the generated NSSA LSAs to 0.0.0.0 when external routes are imported by the ABR in an NSSA. | - |
translator-strict | Configures the translator to perform strict check on the P-bit flag. The translator determines whether to translate Type 7 LSAs into Type 5 LSAs based on the P-bit flag. | - |
Usage Guidelines
Usage Scenario
An NSSA is configured in the scenario where AS external routes are to be imported but not forwarded to save system resources. AS external routes can be imported to an NSSA and transmitted to the entire NSSA.
All switches in the NSSA must be configured with NSSA attributes using the nssa command.
The default-route-advertise parameter is configured to advertise Type 7 LSAs carrying the default route on the ASBR to the NSSA.
Regardless of whether the default route 0.0.0.0/0 exists in the routing table on the ABR, Type 7 LSAs carrying the default route will be generated. However, Type 7 LSAs carrying the default route will be generated on the ASBR only when the default route 0.0.0.0/0 exists in the routing table on the ASBR.
When the area to which the ASBR belongs is configured as an NSSA, invalid Type 5 LSAs from other switches in the area where LSAs are flooded will be reserved. These LSAs will be deleted only when the aging time reaches 3600s. The switch performance is affected because the forwarding of a large number of LSAs consumes the memory resources. To resolve such a problem, you can set the parameter flush-waiting-timer to the maximum value 3600s for Type 5 LSAs. This ensures that the invalid Type 5 LSAs from other switches can be deleted in time.
When the LS age field value (aging time) in the header of an LSA reaches 3600s, the LSA is deleted.
If an ASBR also functions as an ABR, flush-waiting-timer does not take effect. This prevents Type 5 LSAs in the non-NSSAs from being deleted.
- If an ASBR also functions as an ABR, the no-import-route parameter is configured to prevent external routes imported using the import-route command from being advertised to the NSSA.
- The no-summary parameter is configured on an ABR to reduce the number of LSAs that are transmitted to the NSSA. This implementation prevents the ABR from transmitting Type 3 LSAs to the NSSA.After the nssa default-route-advertise backbone-peer-ignore no-summary command is run, the ABR generates default Type 7 and Type 3 LSAs as long as an interface that is Up exists in the backbone area. The default Type 3 LSAs preferentially take effect.
- After the set-n-bit parameter is configured, the N-bit is set in the database description (DD) packets during the synchronization between the switch and neighboring switches.
- If multiple ABRs are deployed in the NSSA, the system automatically selects an ABR (generally the switch with the largest router ID) as a translator to convert Type 7 LSAs into Type 5 LSAs. You can configure the translator-always parameter on an ABR to specify the ABR as an all-the-time translator. To specify two ABRs for load balancing, configure the translator-always parameter on the chosen ABRs to specify the ABRs as all-the-time translators. You can use this command to pre-configure a fixed translator to prevent LSA flooding caused by translator role changes.
- The translator-interval parameter is used to ensure uninterrupted services when translator roles change. The value of interval-value must be greater than the flooding period.
Configuration Impact
Configuring or deleting NSSA attributes will trigger routing updates in the area. A second configuration of NSSA attributes can be implemented or canceled only after a routing update is complete.
Precautions
It is recommended that a loopback address be configured for a switch in the NSSA so that the loopback address can be automatically selected as the FA. If other switches have routes of the same cost to the switch in the NSSA, load balancing is performed.
When the last ordinary area (other than a stub area or NSSA) under an OSPF process is deleted, useless Type 5 LSAs originated by the local switch in the area where LSAs are flooded will be deleted immediately. The local switch still reserves useless Type 5 LSAs from other switches. These useless Type 5 LSAs will be deleted only when the aging time reaches 3600s.
opaque-capability enable
Function
The opaque-capability enable command enables the Opaque-LSA capability so that an OSPF process can generate Opaque LSAs and receive Opaque LSAs from neighbors.
The undo opaque-capability command disables the Opaque-LSA capability.
By default, the Opaque-LSA capability is disabled.
Usage Guidelines
Usage Scenario
Opaque LSAs provide a generic mechanism for OSPF extension:
OSPF supports GR using Type 9 LSAs.
OSPF supports TE using Type 10 LSAs.
Before configuring OSPF GR or OSPF TE, you must enable opaque LSA capability running the opaque-capability enable command.
Configuration Impact
Enabling or disabling the opaque LSA function may delete and re-establish all sessions and instances.
ospf
Function
The ospf command creates and runs an OSPF process.
The undo ospf command terminates an OSPF process.
By default, OSPF is disabled, that is, no OSPF process runs.
Format
ospf [ process-id | router-id router-id | vpn-instance vpn-instance-name ] *
undo ospf process-id [ flush-waiting-timer time ]
Parameters
Parameter | Description | Value |
---|---|---|
process-id | Specifies the ID of an OSPF process. | The value is an integer ranging from 1 to 65535. By default, it is 1. |
router-id router-id | Specifies a router ID. | The value is in dotted decimal notation. |
vpn-instance vpn-instance-name | Specifies the name of a VPN instance. | The value must be an existing VPN instance name. |
flush-waiting-timer time | Indicates the interval for generating aged LSAs. The parameter takes effect only when it is set. | The value is an integer that ranges from 1 to 40, in seconds. |
Usage Guidelines
Usage Scenario
You can set OSPF parameters only after creating an OSPF process.
OSPF supports multi-process. More than one OSPF process can run on the same device and are independent of each other. Route interaction between different OSPF processes is similar to route interaction between different routing protocols.
The ID of an OSPF device can be configured manually. If no ID is specified through a command for an OSPF device, the router selects a router ID based on IP addresses of current interfaces. The largest IP address in loopback addresses is taken as the router ID. If no loopback interface is configured, the largest IP address configured on the interface is selected as the router ID.
- The ospf command is run to re-configure an OSPF router ID.
- The system router ID is re-configured, and the OSPF process is restarted.
- The IP address of the original system router ID is deleted, and the OSPF process is restarted.
Configuration Impact
After an OSPF process is disabled using undo ospf command, the receive end still maintains the LSAs generated by this OSPF process. These invalid LSAs occupy the system memory and are deleted only when the LS age field (aging time) reaches 3600 seconds. When the undo ospf process-id flush-waiting-timer time command is used to delete an OSPF process, the switch regenerates an LSA in the set time and sets the LS age field to 3600 seconds. After other switches receive the LSA with the LS age field as 3600 seconds, they delete the LSA immediately. If the host does not send all the LSAs in the set time, other switches still reserve invalid LSAs.
When the LS age field (aging time) in the LSA header reaches 3600 seconds, this LSA is deleted.
Precautions
An interface on a device belongs to only one OSPF process.
If a VPN instance is specified, the OSPF process specified in this command belongs to this VPN instance. If no VPN instance is specified, the OSPF process specified in this command belongs to the global VPN instance. vpn-instance-name cannot be changed after being specified.
The router ID of each OSPF process must be unique on the entire network; otherwise, the OSPF neighbor relationship cannot be set up and routing information is incorrect. Configuring a unique router ID for each OSPF process on each OSPF device is recommended.
ospf authentication-mode
Function
The ospf authentication-mode command sets an authentication mode and password used between neighboring nodes.
The ospf authentication-mode null command configures the null authentication mode on an interface.
The undo ospf authentication-mode command deletes the authentication mode on an interface.
By default, an interface does not authenticate OSPF packets.
Format
ospf authentication-mode { simple [ plain plain-text | [ cipher ] cipher-text ] | null }
ospf authentication-mode { md5 | hmac-md5 | hmac-sha256 } [ key-id { plain plain-text | [ cipher ] cipher-text } ]
ospf authentication-mode keychain keychain-name
undo ospf authentication-mode
Only the S6720EI, S6720S-EI, S5720HI, and S5720EI support the keychain keychain-name parameter.
Parameters
Parameter | Description | Value |
---|---|---|
simple | Indicates simple authentication. NOTICE:
Simple authentication carries potential security risks. As such, HMAC-SHA256 authentication is recommended. |
In simple authentication, the password type is cipher by default. |
plain | Indicates plain authentication. Only plain text can
be entered, and only plain text is displayed when the configuration
file is viewed. NOTICE:
If plain is selected, the password is saved in the configuration file in plain text. This carries security risks. Selecting cipher to save the password in cipher text is recommended. |
- |
plain-text | Specifies a plain text password. | plain-text is a string of 1 to 8 characters without spaces when simple is configured, and is a string of 1 to 255 characters without spaces when md5, hmac-md5 or hmac-sha256 is configured. |
cipher | Indicates cipher authentication. Either plain text or cipher text can be entered, and cipher text is displayed when the configuration file is viewed. | When cipher is configured, enter only the password in cipher text. Then, the password is displayed in cipher text in configuration files. MD5 authentication, HMAC-SHA256 authentication or HMAC-MD5 authentication uses the password in cipher text by default. |
cipher-text | Specifies a cipher text password. | The value is a string of characters without spaces. In simple authentication, a plain text password is a string of 1 to 8 characters and a cipher text password is a string of 24 or 32 or 48 characters. In MD5 authentication, HMAC-SHA256 authentication or HMAC-MD5 authentication, a plain text password is a string of 1 to 16 characters and a cipher text password is a string of 20 to 392 characters. |
md5 | Indicates MD5 authentication. NOTICE:
MD5 authentication carries potential security risks. As such, HMAC-SHA256 authentication is recommended. |
- |
hmac-md5 | Indicates HMAC-MD5 authentication. NOTICE:
HMAC-MD5 authentication carries potential security risks. As such, HMAC-SHA256 authentication is recommended. |
- |
hmac-sha256 | Indicates HMAC-SHA256 authentication. | - |
key-id | Specifies the authentication key ID of the interface's cipher authentication. The key ID must be consistent with that of the peer. | The value is an integer that ranges from 1 to 255. |
keychain | Indicates keychain authentication. NOTE:
Before configuring this parameter, run the keychain command to create a keychain. Then, run the key-id, key-string, and algorithm commands to configure a key ID, a password, and an authentication algorithm for this keychain. Otherwise, OSPF authentication will fail. |
- |
keychain-name | Specifies the keychain name. | The value is a string of 1 to 47 case-insensitive characters. Except the question mark (?) and space. However, when double quotation marks (") are used around the string, spaces are allowed in the string. |
null | Indicates null authentication. | - |
Usage Guidelines
Usage Scenario
Due to the defects and non-strict implementation of the TCP/IP protocol suite and increasing attacks on TCP/IP networks, the impact generated by attacks on the network may become more serious. Attacks on network devices may lead to a network crash. To improve OSPF network security, configure authentication.
Configuration Impact
Interface authentication is used to set the authentication mode and password used between neighboring devices. It takes precedence over area authentication.
Precautions
Null authentication is an authentication method. It does not indicate that no authentication is configured.
The authentication mode and password configured for interfaces on the same network segment must be the same.
OSPF does not support the configuration on a null interface.
An authentication password cannot contain spaces.
Example
# Configure OSPF HMAC-SHA256 authentication on VLANIF100.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ospf authentication-mode hmac-sha256
# Configure OSPF HMAC-SHA256 authentication on GE0/0/1.
<HUAWEI> system-view [HUAWEI] interface gigabitethernet 0/0/1 [HUAWEI-GigabitEthernet0/0/1] undo portswitch [HUAWEI-GigabitEthernet0/0/1] ospf authentication-mode hmac-sha256
ospf bfd
Function
The ospf bfd command enables BFD on an OSPF interface or sets parameter values for a BFD session.
The undo ospf bfd command deletes BFD on an OSPF interface or restores the default parameter values of a BFD session.
By default, BFD is not enabled on any OSPF interfaces.
Format
ospf bfd enable
undo ospf bfd enable
ospf bfd { min-rx-interval receive-interval | min-tx-interval transmit-interval | detect-multiplier multiplier-value | frr-binding } *
undo ospf bfd { min-rx-interval | min-tx-interval | detect-multiplier | frr-binding } *
Only the S6720EI, S6720S-EI, S5720HI, and S5720EI support the frr-binding parameter.
Parameters
Parameter | Description | Value |
---|---|---|
enable | Enables BFD. | - |
min-rx-interval receive-interval | Indicates the minimum interval at which BFD packets are received from the remote end. | The value is an integer that ranges from 100 to 1000, in milliseconds. After the set service-mode enhanced command is configured on the S5720HI, the value ranges from 3 to 1000.By default, the minimum interval for receiving BFD packets is 1000 ms. |
min-tx-interval transmit-interval | Indicates the minimum interval at which BFD packets are sent to the remote end. | The value is an integer that ranges from 100 to 1000, in milliseconds. After the set service-mode enhanced command is configured on the S5720HI, the value ranges from 3 to 1000.By default, the minimum interval for receiving BFD packets is 1000 ms. |
detect-multiplier multiplier-value | Specifies the local detection multiplier. | The value is an integer ranging from 3 to 50. By default, it is 3. |
frr-binding | Binds the BFD status to the link status of an interface. That is, when the BFD status goes Down, the link status of the interface also goes Down. This enables traffic to be switched to the backup path. | - |
Usage Guidelines
Usage Scenario
A link failure or topology change causes devices to recalculate routes. Therefore, the convergence of routing protocols must be sped up to improve network performance.
Link faults are unavoidable. Therefore, a feasible solution is required to detect faults faster and notify routing protocols of the faults immediately. If BFD is associated with routing protocols and a link fault occurs, BFD can speed up the convergence of routing protocols.
Prerequisites
The configured parameters of the BFD session are valid on an interface only when BFD is enabled on the interface.
Procedure
The receive-interval is obtained through the negotiation between the local end and peer end by comparing the values of the local min-rx-interval and the peer min-tx-interval. If the local end fails to receive a BFD packet from the peer end within an interval of receive-interval x multiplier-value, it considers that the neighbor is Down.
Configuration Impact
If global BFD is not enabled, you can enable BFD on an interface but cannot set up BFD sessions. Similarly, if only parameters of a BFD session are set but the ospf bfd enable command is not used, the BFD session cannot be set up.
BFD configured on an interface takes precedence over BFD configured in a process. If BFD is enabled on an interface, the BFD parameters on the interface are used to establish BFD sessions.
Precautions
After BFD is enabled, BFD sessions can be created only between the two ends that have set up an OSPF neighbor relationship and the relationship is in the Exstart state.
The ospf bfd enable command and the ospf bfd block command are mutually exclusive.
After BFD is disabled from an interface through the undo ospf bfd enable command, the parameters for setting up BFD sessions remain on this interface but do not take effect.
Example
# Enable BFD on VLANIF100 and set the minimum interval for receiving BFD packets to 400 ms and the local detection multiplier to 4.
<HUAWEI> system-view [HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ospf bfd enable
[HUAWEI-Vlanif100] ospf bfd min-rx-interval 400 detect-multiplier 4
# Enable BFD on GE0/0/1 and set the minimum interval for receiving BFD packets to 400 ms and the local detection multiplier to 4.
<HUAWEI> system-view [HUAWEI] interface gigabitethernet 0/0/1 [HUAWEI-GigabitEthernet0/0/1] undo portswitch [HUAWEI-GigabitEthernet0/0/1] ospf bfd enable [HUAWEI-GigabitEthernet0/0/1] ospf bfd min-rx-interval 400 detect-multiplier 4
ospf bfd block
Function
The ospf bfd block command prevents an interface from dynamically setting up a BFD session.
The undo ospf bfd block command cancels the configuration.
By default, the device does not prevent an interface from dynamically setting up a BFD session.
Usage Guidelines
Usage Scenario
After the bfd all-interfaces enable command is used for an OSPF process, BFD sessions are created on all OSPF interfaces whose neighbor status is Full. If you do not want some interfaces to have BFD sessions created, run the ospf bfd block command to prevent these interfaces from dynamically setting up BFD sessions.
Prerequisites
BFD has been enabled on interfaces.
Precautions
The ospf bfd enable command and the ospf bfd block command are mutually exclusive.
Example
# Prevent VLANIF100 from dynamically setting up a BFD session.
<HUAWEI> system-view [HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ospf bfd block
# Prevent GE0/0/1 from dynamically setting up a BFD session.
<HUAWEI> system-view [HUAWEI] interface gigabitethernet 0/0/1 [HUAWEI-GigabitEthernet0/0/1] undo portswitch [HUAWEI-GigabitEthernet0/0/1] ospf bfd block
ospf cost
Function
The ospf cost command sets a cost for an OSPF on an interface.
The undo ospf cost command restores the default cost for OSPF.
By default, OSPF automatically calculates its cost based on its interface bandwidth.
Parameters
Parameter | Description | Value |
---|---|---|
cost | Specifies the cost of an OSPF-enabled interface. | The value is an integer ranging from 1 to 65535. By default, it is 1. |
Usage Guidelines
Usage Scenario
OSPF can automatically calculate the link cost for an interface based on the bandwidth of the interface. You can also set the link cost for the interface through ospf cost commands.
Load balancing can be performed among several routes with the same protocol, cost, and destination address. According to the actual networking conditions, you can determine whether to perform load balancing by changing the cost of the interface.
Configuration Impact
If no cost is set for an OSPF interface using the ospf cost command, OSPF automatically calculates its cost based on the interface bandwidth. The calculation formula is as follows: Cost of the interface = Bandwidth reference value/Interface bandwidth. The integer of the calculated result is the cost of the interface. If the calculated result is smaller than 1, the cost is 1. Changing the bandwidth reference value changes the cost of an interface.
By default, the bandwidth reference value is 100 Mbit/s divided by the interface bandwidth. With the formula 100000000/Bandwidth, the default costs of the Ethernet (100 Mbit/s) interface is 1.
Precautions
The ospf cost command cannot run on null interfaces.
Example
# Set the cost of VLANIF100 that runs OSPF to 65.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ospf cost 65
# Set the cost of GE0/0/1 that runs OSPF to 65.
<HUAWEI> system-view [HUAWEI] interface gigabitethernet 0/0/1 [HUAWEI-GigabitEthernet0/0/1] undo portswitch [HUAWEI-GigabitEthernet0/0/1] ospf cost 65
ospf dr-priority
Function
The ospf dr-priority command sets a priority for an interface that participates in the DR election.
The undo ospf dr-priority command restores the default setting.
By default, the priority is 1.
Parameters
Parameter | Description | Value |
---|---|---|
priority | Specifies the priority of an interface that participates in the DR or BDR election. A larger value indicates a higher priority. | The value is an integer ranging from 0 to 255. |
Usage Guidelines
Usage Scenario
The DR priority of an interface determines whether it is qualified to be a DR. The interface with the highest DR priority is elected as the DR. If the DR priority of an interface on a device is 0, the device cannot be elected as a DR or a BDR. On a broadcast or NBMA network, you can set a DR priority for an interface to determine whether it is qualified to be a DR or a BDR.
Configuration Impact
When the DR and BDR are elected on a network segment, they send DD packets to all neighboring nodes and set up adjacencies with all neighboring nodes.
Precautions
Restarting or shutting down an interface will interrupt the OSPF adjacency between devices. Therefore, perform the operation with caution.
If the DR priority of a device is re-configured, the DR or BDR on the network will not be re-elected. You can re-elect a DR or a BDR by using either of the following methods. This, however, will interrupt the OSPF adjacency between devices. Therefore, use the following methods with caution.
- Restart the OSPF processes on all devices.
- Run the shutdown and then undo shutdown commands on the interfaces where OSPF adjacencies are set up.
In OSPF, the DR priority cannot be configured for null interfaces.
Example
# Set the priority of VLANIF100 that participates in the DR election to 8.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ospf dr-priority 8
# Set the priority of GE0/0/1 that participates in the DR election to 8.
<HUAWEI> system-view [HUAWEI] interface gigabitethernet 0/0/1 [HUAWEI-GigabitEthernet0/0/1] undo portswitch [HUAWEI-GigabitEthernet0/0/1] ospf dr-priority 8
ospf enable
Function
The ospf enable command enables OSPF on an interface.
The undo ospf enable command disables OSPF on an interface.
By default, the interface does not run OSPF.
Parameters
Parameter | Description | Value |
---|---|---|
process-id | Specifies the ID of an OSPF process. | The value is an integer ranging from 1 to 65535. The default value is 1. |
area area-id | Specifies an area ID. | The value can be a decimal integer or an IP address. When the value is an integer, the value ranges from 0 to 4294967295. |
Usage Guidelines
Usage Scenario
The ospf enable command configuration takes precedence over the network command configuration.
After the undo ospf enable command is run to disable OSPF on an interface, the network configuration takes effect on the interface automatically.
Configuration Impact
The interface will alternate between Up and Down when the ospf enable command and the network command are run on the interface repeatedly.
Precautions
An interface can be configured with only one OSPF process.
The configured interface and the OSPF process must be in the same VPN.
- The ospf enable command can be configured on an interface before an OSPF process is created. The interface specified by the ospf enable command and the created OSPF process must be in the same VPN.
- If a process is created before the ospf enable command is run on an interface, the process of the interface and existing process must belong to the same VPN. Otherwise, the ospf enable command cannot be run.
- If no OSPF process is created, interfaces that belong to different VPN instances cannot be added to the same OSPF process.
Example
# Enable VLANIF100 in the specified OSPF area.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ospf enable 1 area 0
# Enable GE0/0/1 in the specified OSPF area.
<HUAWEI> system-view [HUAWEI] interface gigabitethernet 0/0/1 [HUAWEI-GigabitEthernet0/0/1] undo portswitch [HUAWEI-GigabitEthernet0/0/1] ospf enable 1 area 0
ospf filter-lsa-out
Function
The ospf filter-lsa-out command configures an OSPF interface to filter outgoing LSAs.
The undo ospf filter-lsa-out command disables an OSPF interface from filtering outgoing LSAs.
By default, outgoing LSAs are not filtered.
Format
ospf filter-lsa-out { all | { summary [ acl { acl-number | acl-name } ] | ase [ acl { acl-number | acl-name } ] | nssa [ acl { acl-number | acl-name } ] } * }
undo ospf filter-lsa-out
Parameters
Parameter | Description | Value |
---|---|---|
all | Filters all outgoing LSAs except grace LSAs. | - |
summary | Filters outgoing network summary LSAs (Type3). | - |
ase | Filters outgoing AS external LSAs (Type5). | - |
nssa | Filters outgoing NSSA LSAs (Type7). | - |
acl acl-number | Specifies the number of the basic ACL. | The value is an integer that ranges from 2000 to 2999. |
acl acl-name | Specifies the name of a named ACL. | The value is a string of 1 to 64 case-sensitive characters without spaces. The value must start with a letter. |
Usage Guidelines
Usage Scenario
When multiple links exist between two switches, you can run the ospf filter-lsa-out command to configure the local switch to filter the outgoing LSAs based on the filtering policy before the device sends these LSAs along specified links. This reduces the unnecessary retransmission of LSAs and saves bandwidth resources.
Configuration Impact
Filtering the outgoing LSAs on the specified OSPF interface can prevent useless LSAs from being sent to neighbors. This can reduce the size of the LSDB of neighbors and speed up the network convergence.
After the command is configured on an interface, the OSPF neighbor relationship of the interface will automatically re-establish.
When the rule in the ACL changes, the OSPF neighbor relationship of the interface will automatically re-establish.
Precautions
When the rule command is used to configure the filtering rules for an ACL configured using the acl command, only the source address range that is specified by the source parameter and the period of time that is specified by the time-range parameter take effect.
Grace LSAs are used to inform the neighbor of the Graceful Restart (GR) time, cause, and interface instance ID when GR starts and ends. The command is not used to filter the grace LSAs.
Example
<HUAWEI> system-view [HUAWEI] interface vlanif 100 [HUAWEI-Vlanif100] ospf filter-lsa-out all
<HUAWEI> system-view [HUAWEI] interface gigabitethernet 0/0/1 [HUAWEI-GigabitEthernet0/0/1] undo portswitch [HUAWEI-GigabitEthernet0/0/1] ospf filter-lsa-out all
ospf frr block
Function
The ospf frr block command disables the OSPF IP FRR function on a specified interface.
The undo ospf frr block command restores the OSPF IP FRR function on the specified interface.
By default, the OSPF IP FRR function is enabled on a specific interface.
Usage Guidelines
Usage Scenario
OSPF IP FRR can be disabled using the ospf frr block command on an interface of a specific device that is running important services and resides on an FRR backup link. This setting prevents the device connected to this interface from being a part of a backup link and being burdened after FRR switches traffic to the backup link.
Precautions
Before configuring the ospf frr block command on a specified interface, you must run the frr command and loop-free-alternate command in the OSPF view to enable OSPF IP FRR. This way prevents the link where the interface resides from being calculated as a backup link.
ospf maxage-lsa auto-protect disable
Function
The ospf maxage-lsa auto-protect disable command disables master/slave board switching triggered by abnormal OSPF LSA aging.
The undo ospf maxage-lsa auto-protect disable command enables master/slave board switching triggered by abnormal OSPF LSA aging.
By default, master/slave board switching triggered by abnormal OSPF LSA aging is enabled.
Usage Guidelines
If the local device clock is faster than usual and the aging timer expires abnormally, the local device incorrectly clears all Router LSAs from the peer device, which causes route flapping and service interruptions. To resolve this issue, master/slave board switching triggered by abnormal OSPF LSA aging is automatically enabled. Master/Slave board switching is triggered to restore network connections and service traffic when the following condition is met:
(Number of incorrectly cleared Router LSAs/Total number of Router LSAs) x 100% ≥ 80% (Router LSAs are those sent by the peer device to the local device)
ospf mib-binding
Function
The ospf mib-binding command binds an OSPF process to SNMP and makes OSPF respond to SNMP requests.
The undo ospf mib-binding command disables the binding.
By default, OSPF processes are not bound to SNMP.
Parameters
Parameter | Description | Value |
---|---|---|
process-id | Specifies an OSPF process ID. | The value is an integer ranging from 1 to 65535. |
Usage Guidelines
Usage Scenario
The OSPF MIB is a virtual database of the device status maintained by the managed devices.
When multiple OSPF processes are started, you can specify which OSPF process is processed by the OSPF MIB. That is, you can bind the OSPF MIB to a specified OSPF process.
Prerequisites
An OSPF process has been created using the ospf command in the system view.
ospf mtu-enable
Function
The ospf mtu-enable command enables the interface to fill in an MTU value when sending DD packets.
The undo ospf mtu-enable command restores the default settings.
By default, the MTU value is 0 when the interface sends DD packets. That is, the actual MTU value of the interface is not filled in.
Usage Guidelines
Usage Scenario
The default MTU value in a DD packet is 0. By using the command, you can manually configure the interface to fill in the actual MTU value when the interface sends the DD packet.
As different vendors may adopt different default MTU values, to keep consistency, you can configure an interface to use the default value 0 when the interface sends DD packets.
Precautions
OSPF does not support the configuration on a null interface.
After the command is configured, the system automatically restarts the OSPF process.
Example
# Set Vlanif100 to fill in the MTU field when sending DD packets.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ospf mtu-enable
# Set GigabitEthernet0/0/1 to fill in the MTU field when sending DD packets.
<HUAWEI> system-view [HUAWEI] interface gigabitethernet 0/0/1 [HUAWEI-GigabitEthernet0/0/1] undo portswitch [HUAWEI-GigabitEthernet0/0/1] ospf mtu-enable
ospf network-type
Function
The ospf network-type command sets a network type for an OSPF interface.
The undo ospf network-type command restores the default network type of the OSPF interface.
By default, the network type of an interface is determined by the physical interface. The network type of Ethernet interfaces is broadcast.
Format
ospf network-type { broadcast | nbma | p2mp | p2p [ peer-ip-ignore ] }
undo ospf network-type
Parameters
Parameter | Description | Value |
---|---|---|
broadcast | Indicates that the network type of the interface is changed to broadcast. | - |
nbma | Indicates that the network type of the interface is changed to NBMA. | - |
p2mp | Indicates that the network type of the interface is changed to point-to-multipoint. | - |
p2p | Indicates that the network type of the interface is changed to point-to-point. | - |
peer-ip-ignore | Disables network segment check when IP address unnumbering is not configured for a P2P interface changed from a broadcast interface and the interface tries to establish an OSPF neighbor relationship. By default, if peer-ip-ignore is not specified in the command, OSPF checks the network segment of the two ends during which an OSPF neighbor relationship is to be established. Specifically, OSPF performs an AND operation on the local subnet mask and the local IP address, and on the local subnet mask and the remote IP address. An OSPF neighbor relationship can be established only when the results on the two ends are the same. | - |
Usage Guidelines
Usage Scenario
When link layer protocols remain unchanged, you can change network types and configure OSPF features to flexibly build networks.
In the broadcast network, if there is a device that does not support multicast address, you can change the network type of the interface to NBMA.
If the network type of the interface is NBMA, when the interface type is changed to broadcast, neighbor relationships do not need to be configured.
The condition for changing an NBMA network to broadcast network is that there must be a direct virtual circuit between any two devices, and the network must be a full mesh network.
If a network does not meet the preceding conditions, you must change the type of network to point-to-multipoint. In this manner, two indirect devices can communicate with the help of one device directly connected to the two devices. Instead of configuring the neighboring device, you can change the network type of the interface to point-to-multipoint.
If there are only two devices that run OSPF in the same network segment, the network type of an interface can be changed to p2p.
Precautions
OSPF does not support the configuration on a null interface.
When the network type of an interface is NBMA or the network type of an interface is changed to NBMA manually, you must run the peer command to configure the neighbor.
Generally, the network type of two OSPF interfaces on both ends of the link must be identical. Otherwise, the two interfaces cannot set up the neighbor relationship.
Only when the network type of one OSPF interface is broadcast and the network type of the other OSPF interface is P2P or P2MP, the two interfaces can still set up the neighbor relationship, but cannot learn the OSPF routing information each other.
Example
# Set network type of VLANIF100 to NBMA.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ospf network-type nbma
# Set network type of GE0/0/1 to NBMA.
<HUAWEI> system-view [HUAWEI] interface gigabitethernet 0/0/1 [HUAWEI-GigabitEthernet0/0/1] undo portswitch [HUAWEI-GigabitEthernet0/0/1] ospf network-type nbma
ospf p2mp-mask-ignore
Function
The ospf p2mp-mask-ignore command disables a device from checking the network mask on a Point-to-Multipoint (P2MP) network.
The undo ospf p2mp-mask-ignore command configures the device to check the network mask on a P2MP network.
By default, devices on a P2MP network do not check the network mask.
Usage Guidelines
Usage Scenario
OSPF checks the network masks carried in Hello packets. If the network mask carried in a received Hello packet is not the same as the network mask of the local device, the Hello packet is discarded.
On a P2MP network, when the mask lengths of devices are different, you can use the ospf p2mp-mask-ignore command on devices to disable them from checking the network mask in Hello packets. In this manner, the OSPF neighbor relationship can be established.
Prerequisites
Because P2MP is not a link layer protocol, each P2MP network is forcibly changed from a network of another type. A common P2MP network is changed from a non-fully connected non-broadcast multiple access (NBMA) network through the ospf network-type p2mp command.
Example
# Disable a device from checking the network mask on a P2MP network.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ospf network-type p2mp
[HUAWEI-Vlanif100] ospf p2mp-mask-ignore
# Disable a device from checking the network mask on a P2MP network.
<HUAWEI> system-view [HUAWEI] interface gigabitethernet 0/0/1 [HUAWEI-GigabitEthernet0/0/1] undo portswitch [HUAWEI-GigabitEthernet0/0/1] ospf network-type p2mp [HUAWEI-GigabitEthernet0/0/1] ospf p2mp-mask-ignore
ospf router-id auto-recover disable
Function
The ospf router-id auto-recover disable command disables a device from performing automatic recovery after detecting router ID conflict.
The undo ospf router-id auto-recover disable command enables a device to perform automatic recovery after detecting router ID conflict.
By default, a device performs automatic recovery after detecting router ID conflict.
Usage Guidelines
If router ID conflict occurs in an OSPF area, the system can define a new router ID, preventing route flapping and reducing route calculation operations. Other protocols will not go Down when the CPU usage is controlled.
- If the automatic recovery function is enabled and a router ID conflict occurs between indirectly connected routers in one OSPF area, the system replaces the conflicted router ID with a newly calculated one. The automatic recovery function takes effect on both configured and automatically generated router IDs.
- The system can replace a router ID in a maximum of three attempts in case the router ID conflict persists.
ospf smart-discover
Function
The ospf smart-discover command enables smart-discover on an interface.
The undo ospf smart-discover command disables smart-discover on an interface.
By default, smart-discover is disabled on interfaces.
Usage Guidelines
Usage Scenario
In normal situations, devices periodically send Hello packets through OSPF interfaces. By sending Hello packets, devices set up and maintain neighbor relationships, and elect the DR and BDR on the multi-access network (broadcast or NBMA network). When setting up neighbor relationships or electing the DR and BDR on the multi-access network, interfaces send Hello packets only when the Hello timer expires. This slows down the establishment of neighbor relationships and election of the DR and BDR.
After smart-discover is configured, when the status of the neighbor relationship changes or the DR and BDR on the multi-access network changes, the device sends Hello packets to its neighbor immediately without waiting for the expiration of the Hello timer.
Procedure
On broadcast and NBMA networks, neighbor relationships can be rapidly set up and a DR and a BDR can be rapidly elected.
- When the neighbor status becomes 2-way for the first time or returns to Init from the 2-way or higher state, the smart-discover-enabled interface sends Hello packets to a neighbor without waiting for the expiration of the Hello timer when detecting that the neighbor status changes.
- When the status of the interface functioning as the DR or BDR on the multi-access network changes, the smart-discover-enabled interface actively sends Hello packets on the network segment and then participates in the DR or BDR election.
The principle of setting up adjacencies rapidly on P2P or P2MP networks is the same as that on broadcast and NBMA networks.
Configuration Impact
The interval for sending Hello packets on an interface is determined by the interval for sending Hello packets set on the interface.
Precautions
The default interval for sending Hello packets varies with the network type.
Example
# Enable smart-discover on VLANIF100.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ospf smart-discover
# Enable smart-discover on GE0/0/1.
<HUAWEI> system-view [HUAWEI] interface gigabitethernet 0/0/1 [HUAWEI-GigabitEthernet0/0/1] undo portswitch [HUAWEI-GigabitEthernet0/0/1] ospf smart-discover
ospf suppress-flapping peer
Function
The ospf suppress-flapping peer command configures detection parameters for OSPF neighbor relationship flapping suppression.
The undo ospf suppress-flapping peer command restores the default detection parameters.
By default, the detection interval of OSPF neighbor relationship flapping suppression is 60s, the suppression threshold is 10, and the interval for exiting from suppression is 120s.
Format
ospf suppress-flapping peer { detecting-interval detecting-interval | threshold threshold | resume-interval resume-interval } *
undo ospf suppress-flapping peer { detecting-interval detecting-interval | threshold threshold | resume-interval resume-interval } *
Parameters
Parameter | Description | Value |
---|---|---|
detecting-interval detecting-interval | Specifies a detection interval for OSPF neighbor relationship flapping suppression. Each OSPF interface on which OSPF neighbor relationship flapping suppression is enabled starts a flapping counter. If the interval between two successive neighbor status changes from Full to a non-Full state is shorter than detecting-interval, a valid flapping_event is recorded, and the flapping_count increases by 1. |
The value is an integer ranging from 1 to 300, in seconds. The default value is 60s. |
threshold threshold | Specifies the threshold of OSPF neighbor relationship flapping suppression. When the flapping-count reaches or exceeds threshold, flapping suppression takes effect. |
The value is an integer ranging from 1 to 1000. The default value is 10. |
resume-interval resume-interval | Specifies an interval for exiting from OSPF neighbor relationship flapping suppression. If the interval between two successive neighbor status changes from Full to a non-Full state is longer than resume-interval, the flapping-count is reset. NOTE:
The value of resume-interval must be greater than that of detecting-interval. |
The value is an integer ranging from 2 to 1000, in seconds. The default value is 120s. |
Usage Guidelines
Usage Scenario
To configure detection parameters for OSPF neighbor relationship flapping suppression on an interface, run the ospf suppress-flapping peer command. However, keeping the default configurations is recommended.
Prerequisites
OSPF neighbor relationship flapping suppression must have been enabled globally before you configure detection parameters for it. By default, the function is enabled. If it is disabled, run the undo suppress-flapping peer disable command to enable it before you configure the detection parameters.
Example
# Set the detection interval of OSPF neighbor relationship flapping suppression to 5s, the suppression threshold to 40, and the interval for exiting from suppression to 20s on VLANIF100.
<HUAWEI> system-view [HUAWEI] interface vlanif 100 [HUAWEI-Vlanif100] ospf suppress-flapping peer detecting-interval 5 threshold 40 resume-interval 20
ospf suppress-flapping peer disable
Function
The ospf suppress-flapping peer disable command disables OSPF neighbor relationship flapping suppression on an interface.
The undo ospf suppress-flapping peer disable command enables OSPF neighbor relationship flapping suppression on an interface.
By default, OSPF neighbor relationship flapping suppression is enabled on all interfaces.
Usage Guidelines
Usage Scenario
By default, OSPF neighbor relationship flapping suppression is enabled on all interfaces in the same OSPF process. To disable the function on one of the interfaces, run the ospf suppress-flapping peer disable command.
Prerequisites
OSPF neighbor relationship flapping suppression must have been enabled globally before you enable the function on an interface using the undo ospf suppress-flapping peer disable command. By default, the function is enabled globally. If it is disabled, run the undo suppress-flapping peer disable command to enable it.
ospf suppress-flapping peer hold-down
Function
The ospf suppress-flapping peer hold-down command configures the Hold-down mode and sets a duration for this mode.
The undo ospf suppress-flapping peer hold-down command cancels the Hold-down mode.
By default, the Hold-down mode is disabled.
Format
ospf suppress-flapping peer hold-down interval
undo ospf suppress-flapping peer hold-down [ interval ]
Parameters
Parameter | Description | Value |
---|---|---|
interval | Specifies a duration for the Hold-down mode. |
The value is an integer ranging from 1 to 600, in seconds. The default value is 60. |
Usage Guidelines
Usage Scenario
Flapping suppression works in either Hold-down or Hold-max-cost mode.
- Hold-down mode: In the case of frequent flooding and topology changes during neighbor relationship establishment, interfaces prevent neighbor relationship reestablishment during Hold-down suppression, which minimizes LSDB synchronization attempts and packet exchanges.
- Hold-max-cost mode: If the traffic forwarding path changes frequently, interfaces use 65535 as the cost of the flapping link during Hold-max-cost suppression, which prevents traffic from passing through the flapping link.
Flapping suppression can also work first in Hold-down mode and then in Hold-max-cost mode.
By default, the Hold-max-cost mode takes effect. To configure the Hold-down mode and set a duration for this mode, run the ospf suppress-flapping peer hold-down command.
Prerequisites
OSPF neighbor relationship flapping suppression must have been enabled globally before you configure the Hold-down mode and set a duration for this mode. By default, the function is enabled. If it is disabled, run the undo suppress-flapping peer disable command to enable it.
ospf suppress-flapping peer hold-max-cost disable
Function
The ospf suppress-flapping peer hold-max-cost disable command disables the Hold-max-cost mode.
The undo ospf suppress-flapping peer hold-max-cost disable command enables the Hold-max-cost mode.
By default, the Hold-max-cost mode is enabled.
Format
ospf suppress-flapping peer hold-max-cost disable
undo ospf suppress-flapping peer hold-max-cost disable
Usage Guidelines
Usage Scenario
Flapping suppression works in either Hold-down or Hold-max-cost mode.
- Hold-down mode: In the case of frequent flooding and topology changes during neighbor relationship establishment, interfaces prevent neighbor relationship reestablishment during Hold-down suppression, which minimizes LSDB synchronization attempts and packet exchanges.
- Hold-max-cost mode: If the traffic forwarding path changes frequently, interfaces use 65535 as the cost of the flapping link during Hold-max-cost suppression, which prevents traffic from passing through the flapping link.
Flapping suppression can also work first in Hold-down mode and then in Hold-max-cost mode.
By default, the Hold-max-cost mode takes effect. To configure the Hold-down mode and set a duration for this mode, run the ospf suppress-flapping peer hold-down interval command.
Prerequisites
OSPF neighbor relationship flapping suppression must have been enabled globally before you configure duration for the Hold-max-cost mode. By default, the function is enabled. If it is disabled, run the undo suppress-flapping peer disable command to enable it.
Precautions
The Hold-max-cost mode takes effect only unidirectionally. If a remote device does not support OSPF neighbor relationship flapping suppression, bidirectional traffic between the local and remote devices may travel along different paths.
ospf timer dead
Function
The ospf timer dead command sets a dead interval after which an interface considers its OSPF neighbor invalid.
The undo ospf timer dead command restores the default dead interval of the neighbor.
By default, for a P2P or broadcast interface, the dead interval for OSPF neighbors is 40 seconds; for an NBMA or P2MP interface, it is 120 seconds.
Parameters
Parameter | Description | Value |
---|---|---|
interval | Specifies the dead interval of the OSPF neighbors. | The value is an integer ranging from 1 to 235926000,
in seconds. Setting the dead interval of an OSPF neighbor to be longer than 20s is recommended. |
Usage Guidelines
Usage Scenario
If an interface does not receive any Hello packet from its neighbor within the dead interval, the interface considers its neighbor invalid. The dead interval on an OSPF interface must be greater than the transmission interval of Hello messages. In addition, the dead intervals of devices on the same network segment must be the same.
By default, the dead interval of OSPF neighbors is four times the transmission interval of Hello messages.
Precautions
OSPF does not support the configuration on a null interface.
If the dead interval of an OSPF neighbor is shorter than 20s, the session may be closed. Therefore, if dead interval is shorter than 20s, the actual dead interval of an OSPF neighbor is not shorter than 20s.
Example
# Set the dead interval on VLANIF100 to 60 seconds.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ospf timer dead 60
# Set the dead interval on GE0/0/1 to 60 seconds.
<HUAWEI> system-view [HUAWEI] interface gigabitethernet 0/0/1 [HUAWEI-GigabitEthernet0/0/1] undo portswitch [HUAWEI-GigabitEthernet0/0/1] ospf timer dead 60
ospf timer hello
Function
The ospf timer hello command sets an interval for sending Hello packets on an interface.
The undo ospf timer hello command restores the default value of the interval.
By default, for a P2P or broadcast interface, the interval for sending Hello packets is 10 seconds; for an NBMA or P2MP interface, it is 30 seconds.
Parameters
Parameter | Description | Value |
---|---|---|
interval | Specifies an interval for sending the Hello packet on an interface. | The value is an integer ranging from 1 to 65535, in
seconds. Setting interval to be longer than or equal to 5s is recommended. |
conservative | Indicates the conservative mode of the dead timer. If the conservative mode is configured, the value configured for the dead timer using the ospf timer dead command takes effect even when the value is less than 20s. | - |
Usage Guidelines
Usage Scenario
Hello packets are periodically sent on OSPF interfaces to establish and maintain neighbor relationships. A Hello packet contains information about timers, DRs, BDRs, and known neighbors.
The smaller the hello interval is, the faster the changing speed of the network topology is. The cost of routes, however, becomes greater. Ensure that the parameters of this interface and the adjacent routers are consistent.
Precautions
OSPF does not support the configuration on a null interface.
If hello interval is set but a dead interval is not set using the ospf timer dead command, the dead interval of an OSPF neighbor is four times the value of hello interval. If the dead interval of an OSPF neighbor is shorter than 20s, the session may be closed. Therefore, if hello interval is shorter than 5s, the actual dead interval of an OSPF neighbor is not shorter than 20s.
Example
# Set the interval for sending Hello packets on VLANIF100 to 20 seconds.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ospf timer hello 20
# Set the interval for sending Hello packets on GE0/0/1 to 20 seconds.
<HUAWEI> system-view [HUAWEI] interface gigabitethernet 0/0/1 [HUAWEI-GigabitEthernet0/0/1] undo portswitch [HUAWEI-GigabitEthernet0/0/1] ospf timer hello 20
ospf timer poll
Function
The ospf timer poll command sets a poll interval for sending Hello packets on NBMA networks.
The undo ospf timer poll command restores the default poll interval.
By default, it is 120 seconds.
Parameters
Parameter | Description | Value |
---|---|---|
interval | Specifies the poll interval for sending Hello packets. | The value is an integer ranging from 1 to 3600, in seconds. |
Usage Guidelines
Usage Scenario
On an NBMA network, after a device's neighbor becomes invalid, the device periodically sends Hello packets to the neighbor according to the poll interval set in the ospf timer poll command. The poll interval should be at least 4 times that of the Hello interval.
Precautions
OSPF does not support the configuration on a null interface.
Example
# Set the poll interval for sending Hello packets on VLANIF100 to 130 seconds.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ospf timer poll 130
# Set the poll interval for sending Hello packets on GE0/0/1 to 130 seconds.
<HUAWEI> system-view [HUAWEI] interface gigabitethernet 0/0/1 [HUAWEI-GigabitEthernet0/0/1] undo portswitch [HUAWEI-GigabitEthernet0/0/1] ospf timer poll 130
ospf timer retransmit
Function
The ospf timer retransmit command sets an interval for retransmitting LSA on an interface.
The undo ospf timer retransmit command restores the default interval for retransmitting LSA on an interface.
By default, the interval time is 5 seconds.
Parameters
Parameter | Description | Value |
---|---|---|
interval | Specifies interval for retransmitting LSA on an interface. | The value is an integer ranging from 1 to 3600, in seconds. |
Usage Guidelines
Usage Scenario
When a device transmits an LSA to its neighbor, it has to wait for the ACK packet from the neighbor. If no ACK packet is received from the neighbor in the LSA retransmission interval, this LSA is retransmitted.
Do not set LSA retransmission intervals too short between adjacent routers. Otherwise, it leads to unnecessary retransmission.
Precautions
OSPF does not support the configuration on a null interface.
Example
# Specify the interval for retransmitting LSAs between VLANIF100 and the adjacent device to 8 seconds.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ospf timer retransmit 8
# Specify the interval for retransmitting LSAs between GE0/0/1 and the adjacent device to 8 seconds.
<HUAWEI> system-view [HUAWEI] interface gigabitethernet 0/0/1 [HUAWEI-GigabitEthernet0/0/1] undo portswitch [HUAWEI-GigabitEthernet0/0/1] ospf timer retransmit 8
ospf trans-delay
Function
The ospf trans-delay command adds a transmission delay to LSAs before they are sent by an interface.
The undo ospf trans-delay command restores the default transmission delay of LSAs on an interface.
By default, the transmission delay is 1 second.
Parameters
Parameter | Description | Value |
---|---|---|
interval | Specifies a transmission delay to be added to LSAs before they are sent by an interface. | The value is an integer ranging from 1 to 500, in seconds. |
Usage Guidelines
Usage Scenario
LSAs age (increase by 1 each second) in LSDBs but do not age during transmission in the network. To ensure that the aging time of LSAs transmitted to the remote device is correct, run the ospf trans-delay command to add a transmission delay to LSAs before they are sent by a local interface. This configuration is especially important to low-speed networks.
Precautions
OSPF does not support the configuration on a null interface.
Example
# Add a transmission delay of 3 seconds to LSAs before they are sent by a VLANIF100.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ospf trans-delay 3
# Add a transmission delay of 3 seconds to LSAs before they are sent by a GE0/0/1.
<HUAWEI> system-view [HUAWEI] interface gigabitethernet 0/0/1 [HUAWEI-GigabitEthernet0/0/1] undo portswitch [HUAWEI-GigabitEthernet0/0/1] ospf trans-delay 3
ospf valid-ttl-hops
Function
The ospf valid-ttl-hops command enables OSPF GTSM and sets a TTL value to be checked.
The undo ospf valid-ttl-hops command disables OSPF GTSM.
By default, OSPF GTSM is disabled.
Format
ospf valid-ttl-hops hops [ nonstandard-multicast ] [ vpn-instance vpn-instance-name ]
undo ospf valid-ttl-hops [ hops [ nonstandard-multicast ] ] [ vpn-instance vpn-instance-name ]
Parameters
Parameter | Description | Value |
---|---|---|
hops | Specifies a TTL value to be checked. | The value is an integer that ranges from 1 to 255. The default value is 255. |
nonstandard-multicast | Specifies the GTSM configuration is also valid for multicast packets. When the nonstandard-multicast parameter is configured:
|
- |
vpn-instance vpn-instance-name | Specifies the name of a VPN instance. If the parameter is specified, only the TTL value of the packets in the specified VPN instance needs to be checked. | The value must be an existing VPN instance name. |
Usage Guidelines
Usage Scenario
In a network demanding higher security, you can enable GTSM to improve the security of the OSPF network. GTSM defends against attacks by checking the TTL value. If an attacker simulates and keeps sending OSPF unicast packets to a switch, the switch receives and directly sends the packets to the main control board for OSPF processing, without checking the validity of the packets. In this case, the switch is busy processing these packets, causing high CPU usage. GTSM protects the switches and enhances the system security by checking whether the TTL value in the IP packet header is within a pre-defined range.
The ospf valid-ttl-hops command is used to enable OSPF GTSM. To check the TTL value of packets that match the GTSM policy, the vpn-instance parameter must be specified in the command.
For example, running the ospf valid-ttl-hops command enables OSPF GTSM on both the public network and the private network. If you run the ospf valid-ttl-hops 5 vpn-instance vpn1 command:
- OSPF GTSM is enabled on both the public network and the private network.
- The TTL value of OSPF packets in the VPN instance named vpn1 is detected.
- The default action is performed for packets that are from the public network and other VPN instances and do not match the GTSM policy.
Precautions
- If a VPN instance is specified in the ospf valid-ttl-hops command and the interface is bound to the VPN instance, all the unicast packets sent to this interface are dropped when the set number of TTL hops is smaller than the actual number of hops on the network.
- If a virtual link or sham link is configured, the actual TTL value and the configured TTL value must be the same. That means that the number of virtual links or sham links that pass through the switch is calculated. Otherwise, packets sent from neighbors of a virtual link or a sham link will be dropped.
GTSM only checks the TTL values of the packets that match the GTSM policy. If the packets do not match the GTSM policy, you can set the pass parameter or drop parameter in the gtsm default-action command to pass or drop these packets.
- If only a private or public network policy is configured, run the gtsm default-action command to set the default behavior for processing the packets unmatched with the GTSM policy to pass to prevent the OSPF packets of other instances from being discarded.
p2mp-peer
Function
The p2mp-peer command sets a cost for an OSPF route to a specified neighbor on a P2MP network.
The undo p2mp-peer command restores the default value.
By default, the cost of an OSPF route to a neighbor in a P2MP network equals the interface cost.
Parameters
Parameter | Description | Value |
---|---|---|
ip-address | Specifies the IP address of a neighbor on a P2MP network. | The value is in dotted decimal notation. |
cost cost | Sets a cost for an OSPF route to a specified neighbor on a P2MP network. | The value is an integer ranging from 1 to 65535. |
Usage Guidelines
By default, the cost of an OSPF route to a neighbor equals the interface cost on a P2MP network. If this default cost is not suitable, run the p2mp-peer command to set a desired cost.
The interface cost calculation formula is as follows: Cost of an interface = Bandwidth reference value/Interface bandwidth. The integer of the calculated result is used as the interface cost, and 1 is used as the interface cost if the calculated result is smaller than 1. The bandwidth reference value is set using the bandwidth-reference command, with the default value being 100 Mbit/s.
peer (OSPF)
Function
The peer command sets an IP address and a DR priority for the adjacent switch on an NBMA network.
The undo peer command cancels the IP address of the adjacent switch on an NBMA network.
By default, the IP address and DR priority for the adjacent switch on an NBMA network are not set.
Parameters
Parameter | Description | Value |
---|---|---|
ip-address | Specifies an IP address for the adjacent switch. | The value is in dotted decimal notation. |
dr-priority priority | Sets a DR priority for the adjacent switch. | The value of the priority is an integer that ranges from 0 to 255. By default, it is 1. |
Usage Guidelines
On an NBMA network (such as an X.25 or FR network), the entire network can be fully meshed based on the mapping configuration. This means that there is a virtual link between any two devices. In this case, the network running OSPF can be considered as a broadcast network where a DR or a BDR can be selected. However, you must run the peer command to manually specify an IP address and a DR priority for an adjacent switch. This is necessary because it is impossible to find the adjacent devices dynamically by broadcasting Hello packets.
preference (OSPF)
Function
The preference command sets a preference for an OSPF route.
The undo preference command restores the default preference of OSPF routes.
By default, the preference of OSPF routes is 10 and that of ASE routes is 150.
Parameters
Parameter | Description | Value |
---|---|---|
ase | Indicates the preference of an AS external route. | - |
preference | Specifies the preference of an OSPF route. The smaller the preference value, the higher the preference. |
The value is an integer ranging from 1 to 255. |
route-policy route-policy-name | Specifies the name of a route policy. | The name is a string of 1 to 40 case-sensitive characters, with spaces not supported. When double quotation marks are used around the string, spaces are allowed in the string. |
Usage Guidelines
Usage Scenario
Multiple dynamic routing protocols can run on a switch at the same time. This creates a problem of route sharing and selecting among routing protocols. The system sets a default preference for each routing protocol. If different protocols have routes to the same destination, the protocol with a higher preference is selected to forward IP packets. To set a preference for an OSPF route, run the preference command.
- If the apply preference clause is configured for the route-policy,
route preference is determined as follows:
Route matching the route-policy: Its preference is determined by the apply clause.
Route that does not match the route-policy: Its preference is determined by the preference command.
In the following example, the preference of the route matching the route-policy abc is set to 50 and the preference of the route that does not match the route-policy is set to 30.
# route-policy abc permit node 1 if-match cost 20 apply preference 50 # ospf 1 preference 30 route-policy abc
If the apply preference clause is not included in the route-policy, the preference of routes is set by the preference command.
In the above example, if the apply preference 50 clause is not included in the policy abc, the preference of all routes is set to 30.
Configuration Impact
When there are routes discovered by multiple routing protocols on the same switch, you can make the switch prefer OSPF routes by setting a high preference for them.
Precautions
Creating a route-policy before it is referenced is recommended. By default, nonexistent route-policies cannot be referenced using the command. If the route-policy nonexistent-config-check disable command is run in the system view and a nonexistent route-policy is referenced using the current command, the configured priority apply to all OSPF routes.
prefix-priority (OSPF)
Function
The prefix-priority command sets a convergence priority for OSPF routes.
The undo prefix-priority command restores the default convergence priority of OSPF routes.
By default, the convergence priority of public 32-bit host routes is medium, and the convergence of other OSPF routes is low.
Format
prefix-priority { critical | high | medium } ip-prefix ip-prefix-name
undo prefix-priority { critical | high | medium }
Parameters
Parameter | Description | Value |
---|---|---|
critical | Sets the convergence priority of OSPF routes to critical. | - |
high | Sets the convergence priority of OSPF routes to high. | - |
medium | Sets the convergence priority of OSPF routes to medium. | - |
ip-prefix ip-prefix-name | Specifies the name of an IP prefix list. | The name is a string of 1 to 169 case-sensitive characters, with spaces not supported. When double quotation marks are used around the string, spaces are allowed in the string. |
Usage Guidelines
Usage Scenario
The prefix-priority command sets a convergence priority for OSPF routes according to a specified IP prefix list name. It takes effect on the public network only.
After the prefix-priority command is run in the OSPF view, OSPF route calculation, link-state advertisement (LSA) flooding, and LSDB synchronization can be implemented according to the configured priority, which accelerates route convergence.
Prerequisites
An IP prefix list has been created using the ip ip-prefix command in the system view.
Configuration Impact
When an LSA meets multiple priorities, the highest priority takes effect.
With the prefix-priority command, OSPF can calculate and flood LSAs, and synchronize LSDBs according to priorities. This speeds up route convergence. OSPF calculates LSAs in the sequence of intra-area routes, inter-area routes, and AS external routes. This command makes OSPF calculate the three types of routes separately according to the specified route calculation priorities. Convergence priorities are critical, high, medium, and low. To speed up the processing of LSAs with the higher priority, during LSA flooding, the LSAs need to be placed into the corresponding critical, high, medium, and low queues according to priorities.
Precautions
By default, the convergence priorities of public OSPF host routes, direct routes, static routes, and other protocol (such as BGP and RIP) routes are medium, high, medium, and low respectively. In the public network, OSPF 32-bit host routes are uniformly identified as medium.
reset gtsm statistics
reset ospf counters
Format
reset ospf [ process-id ] counters [ neighbor [ interface-type interface-number ] [ router-id ] ]
Parameters
Parameter | Description | Value |
---|---|---|
process-id | Indicates an OSPF process ID. If the parameter is not specified, all OSPF processes are restarted. | The value is an integer ranging from 1 to 65535. |
neighbor | Specifies neighbor information of an interface. | - |
interface-type interface-number | Specifies the type and the number of an interface. | - |
router-id | Specifies the router ID of the neighbor. | The value is in dotted decimal notation. |
Usage Guidelines
When the switch restarts an OSPF process, the neighboring switch always reserves invalid LSAs. This occupies the memory of the system. These LSAs are deleted only when they expire, which happens when the LS age field in the LSA reaches 3600 seconds. After the reset ospf is used to restart an OSPF process and only when the router ID is changed, the switch generates an LSA in the set time and sets the LS age field to 3600 seconds. After receiving the LSA, other switches delete the LSA immediately from their LSDBs. If a switch does not send all the LSAs within the set time, other neighboring switches still store some invalid LSAs.
Clearing OSPF statistics does not affect the normal operation of OSPF services.
Once deleted, statistics cannot be restored. Therefore, exercise caution when deleting statistics.
reset ospf process
Parameters
Parameter | Description | Value |
---|---|---|
process-id | Indicates an OSPF process ID. If the parameter is not specified, all OSPF processes are restarted. |
The value is an integer ranging from 1 to 65535. |
flush-waiting-timer time | Specified the time when the LSA is generated. The parameter takes effect only when it is set. | The value is an integer that ranges from 1 to 40, in seconds. |
graceful-restart | Indicates that graceful restart is enabled. | - |
Usage Guidelines
Usage Scenario
The reset ospf process command can be used to clear OSPF information to reset the board.
Configuration Impact
After the reset ospf process command is used to restart OSPF, the following situations may occur:
If a router ID is changed, a new router ID will take effect after the command is run.
Re-elect a DR and BDR.
OSPF configuration will not be lost after OSPF restarts.
Precautions
Configuring the flush-waiting-timer parameter when OSPF starts allows you to clear invalid LSAs within the set time before LSAs time out.
Whether all invalid LSAs on other switches can be deleted depends on the set time.
When the switch restarts an OSPF process, the neighboring switch always reserves invalid LSAs. This occupies the memory of the system. These LSAs are deleted only when they expire, which happens when the LS age field in the LSA reaches 3600 seconds. After the reset ospf is used to restart an OSPF process and only when the router ID is changed, the switch generates an LSA in the set time and sets the LS age field to 3600 seconds. After receiving the LSA, other switches delete the LSA immediately from their LSDBs. If a device does not send all the LSAs within the set time, other neighboring switches still store some invalid LSAs.
reset ospf redistribution
Parameters
Parameter | Description | Value |
---|---|---|
process-id | Specifies the ID of an OSPF process. If this parameter is not specified, all OSPF processes are restarted. | The value is an integer that ranges from 1 to 65535. |
reset ospf suppress-flapping peer
Function
The reset ospf suppress-flapping peer command forces an interface to exit from OSPF neighbor relationship flapping suppression.
Format
reset ospf process-id suppress-flapping peer [ interface-type interface-number ] [ notify-peer ]
Parameters
Parameter | Description | Value |
---|---|---|
process-id | Specifies the ID of an OSPF process. | The value is an integer ranging from 1 to 65535. |
interface-type interface-number | Specifies an interface type and number. | - |
notify-peer | Instructs neighbors to exit from OSPF neighbor relationship flapping suppression too. | - |
Usage Guidelines
Interfaces exit from flapping suppression in any of the following scenarios:
- The suppression timer expires.
- The corresponding OSPF process is reset.
- The reset ospf suppress-flapping peer command is run.
- OSPF neighbor relationship flapping suppression is disabled globally using the suppress-flapping peer disable command in the OSPF view.
If notify-peer is specified when the reset ospf suppress-flapping peer command is run on a device, the device sends Hello packets in which HelloInterval and RouterDeadInterval are 0s to its neighbors to instruct the neighbors to exit from OSPF neighbor relationship flapping suppression too. If the neighbors fail to receive such Hello packets, the function of notify-peer does not take effect. To force the neighbors to exit from OSPF neighbor relationship flapping suppression, run the reset ospf suppress-flapping peer command on them.
retransmission-limit
Function
The retransmission-limit command enables retransmission limit and sets the maximum number of retransmissions.
The undo retransmission-limit command disables retransmission limit.
By default, retransmission limit is disabled.
Parameters
Parameter | Description | Value |
---|---|---|
max-number | Indicates the maximum number of retransmissions. | The value is an integer that ranges from 2 to 255. The default value is 30. |
Usage Guidelines
Usage Scenario
The retransmission-limit command can be used to enable Retransmission Limitation for OSPF (RL-for OSPF) to prevent dead loops caused by repeated transmissions if neighbors cannot receive packets.
Configuration Impact
The OSPF retransmission limit can be used in the following packets:
DD packets
LSU packets
LSR packets
Limit the maximum number of retransmissions. If the preceding three types of packets cannot be responded within the allowed retransmission times, disconnect neighbor relationships.
route-tag
Function
The route-tag command sets a tag value for imported VPN routes.
The undo route-tag command restores the default setting.
By default, the tag value of a VPN route is calculated based on the AS number of BGP. If no BGP is configured, the default tag value is 0.
Parameters
Parameter | Description | Value |
---|---|---|
tag | Specifies the tag value of the imported VPN routes. | The value is an integer ranging from 0 to 4294967295. |
disable | Disables a device from using a VPN route tag to detect loops. | - |
Usage Guidelines
Usage Scenario
The route-tag command can be used only in VPN scenarios to prevent loops on Type-5 and Type-7 LSAs when a CE is dual-homed to two PEs.
In a networking where a CE is dual-homed to two PEs, PE1 generates Type-5 and Type-7 LSAs based on the imported BGP routes and sends the LSAs to the CE, then to PE2. Because OSPF routes have higher priorities over BGP routes, OSPF routes will replace BGP routes on PE2, causing loops. After the route-tag command is run, if the tag value of the PE and an LSA are the same, the PE will neglect the LSA, and a loop is prevented.
By default, the first two bytes of the tag value are fixed as 0xD000, while the last two bytes are the AS number of the local BGP. If a BGP AS number is greater than 65535, the default tag 0 is used. You can use the command to change the tag in this case.
Precautions
- Configuring the same VPN route tag on the PEs within the same area is recommended.
- Different OSPF processes can be configured with the same VPN route tag.
The tags set by the route-tag command or other commands are different only in preference.
- The preference of the tag configured using the import-route command is the highest.
- The preference of the tag configured using the route-tag command is medium.
- The preference of the tag configured using the default tag command is the lowest.
Example
# Set the route tag for OSPF process 100 to 100 in a VPN instance named huawei.
<HUAWEI> system-view
[HUAWEI] ip vpn-instance huawei
[HUAWEI-vpn-instance-huawei] route-distinguisher 100:1
[HUAWEI-vpn-instance-huawei-af-ipv4] quit
[HUAWEI-vpn-instance-huawei] quit
[HUAWEI] ospf 100 vpn-instance huawei
[HUAWEI-ospf-100] route-tag 100
rfc1583 compatible
Function
The rfc1583 compatible command converts rules defined in RFC 2328 into rules defined in RFC 1583.
The undo rfc1583 compatible command converts rules defined in RFC 1583 into rules defined in RFC 2328.
By default, OSPF supports the routing rule of RFC 1583.
Usage Guidelines
RFC 2328 and RFC 1583 define different OSPF route selection rules. When enabling OSPF, configure the same route selection rules on all devices in the same OSPF area. For example, in scenarios where an OSPF device uses the default route selection rules defined in RFC 1583, if the other switches in the same OSPF area use route selection rules defined in RFC 2328, you need to run the undo rfc1583 compatible command.
sham-hello enable (OSPF)
Function
The sham-hello enable command enables the sham-hello function of OSPF.
The undo sham-hello command disables the sham-hello function.
By default, the sham-hello feature is disabled.
sham-link (OSPF Area)
Function
The sham-link command configures a sham link or sets parameter values for a sham link.
The undo sham-link command deletes a sham link or restores the default parameter values of a sham link.
By default, no sham link is configured for OSPF.
Format
sham-link source-ip-address destination-ip-address [ [ simple [ plain plain-text | [ cipher ] cipher-text ] | { md5 | hmac-md5 | hmac-sha256 } [ key-id { plain plain-text | [ cipher ] cipher-text } ] | authentication-null | keychain keychain-name ] | smart-discover | cost cost | dead dead-interval | hello hello-interval | retransmit retransmit-interval | trans-delay trans-delay-interval ] *
undo sham-link source-ip-address destination-ip-address [ [ simple | md5 | hmac-md5 | hmac-sha256 | authentication-null | keychain ] | smart-discover | cost | dead | hello | retransmit | trans-delay ] *
Parameters
Parameter | Description | Value |
---|---|---|
source-ip-address | Specifies the source IP address. | The value is in dotted decimal notation. |
destination-ip-address | Specifies the destination IP address. | The value is in dotted decimal notation. |
smart-discover | Indicates that Hello packets are sent automatically and immediately. | - |
simple | Indicates simple authentication. In simple authentication, the password type is cipher by default. NOTICE:
Simple authentication carries potential security risks. As such, HMAC-SHA256 authentication is recommended. |
- |
plain | Indicates plain authentication. Only plain text can be entered, and only plain text is displayed when the configuration file is viewed. NOTICE:
If plain is selected, the password is saved in the configuration file in plain text. This carries security risks. You are advised to select cipher to save the password in cipher text. |
- |
plain-text | Specifies a plain text password. |
|
cipher | Indicates cipher authentication. Either plain text or cipher text can be entered, and cipher text is displayed when the configuration file is viewed. |
- |
cipher-text | Specifies a cipher text password. |
|
md5 | Indicates MD5 authentication. NOTICE:
MD5 authentication carries potential security risks. As such, HMAC-SHA256 authentication is recommended. |
- |
hmac-md5 | Indicates hmac-md5 authentication. NOTICE:
HMAC-MD5 authentication carries potential security risks. As such, HMAC-SHA256 authentication is recommended. |
- |
hmac-sha256 | Indicates HMAC-SHA256 authentication. | - |
key-id | Specifies the authentication key ID of the interface's
cipher authentication. The key ID must be consistent with that of the peer. |
The value is an integer that ranges from 1 to 255. |
authentication-null | Indicates that no authentication is used. | - |
keychain | Indicates keychain authentication. NOTE:
Before configuring this parameter, run the keychain command to create a keychain. Then, run the key-id, key-string, and algorithm commands to configure a key ID, a password, and an authentication algorithm for this keychain. Otherwise, OSPF authentication will fail. |
- |
keychain-name | Specifies the keychain name. | The value is a string of 1 to 47 case-insensitive characters. Except the question mark (?) and space. However, when double quotation marks (") are used around the string, spaces are allowed in the string. |
cost cost | Specifies the cost of the sham link. | The value of the cost is an integer that ranges from 1 to 65535. The default value is 1. |
dead dead-interval | Specifies the dead interval. This value must be equal to dead-interval of the switch that sets up a virtual link with the local switch, and must be at least four times that of hello-interval. |
The value of the interval is an integer that ranges from 1 to 23592600, in seconds. |
hello hello-interval | Specifies an interval for transmitting Hello packets
on an interface. This value must be equal to hello-interval of the switch that sets up a virtual link with the local switch. |
The value is an integer that ranges from 1 to 65535, in seconds. |
retransmit retransmit-interval | Specifies an interval for retransmitting the LSA packets on an interface. | The value is an integer that ranges from 1 to 3600, in seconds. |
trans-delay trans-delay-interval | Specifies the delay in transmitting LSA packets on an interface. | The value is an integer that ranges from 1 to 3600, in seconds. |
Usage Guidelines
Usage Scenario
The sham-link command can be used only in VPN scenarios.
This command can create a sham link to allow VPN traffic to be preferentially forwarded through routes within the backbone area. This prevents traffic from the same VPN in the same OSPF area from being forwarded through intra-area OSPF routes.
Before enabling neighbors of a sham link to set up adjacencies quickly, configure the smart-discover parameter to actively send Hello packets immediately.
Configuration Impact
After a sham link is configured between two PEs, the sham link is considered as an intra-area OSPF route. This configuration enables a route passing through an MPLS VPN backbone network to become an intra-area OSPF route, preventing VPN traffic from being transmitted through this route. A 32-bit loopback interface address is specified as the source and destination addresses of the sham link. The loopback interface must be bound to a VPN instance and advertised using BGP.
Precautions
The route to the endpoint address of a sham link cannot be advertised to the remote PE using an OSPF process in a private network. Otherwise, two routes to the endpoint address of the sham link exist on the remote PE. One route is learned from the OSPF process and the other is learned using MP-BGP. OSPF routes have higher priorities over BGP routes. As such, the remote PE selects an incorrect OSPF route. As a result, the sham link cannot be created.
silent-interface (OSPF)
Function
The silent-interface command disables an interface from receiving and sending OSPF packets.
The undo silent-interface command restores the default setting.
By default, the interface is permitted to receive or send OSPF packet.
Format
silent-interface { all | interface-type interface-number }
undo silent-interface { all | interface-type [ interface-number ] }
Parameters
Parameter | Description | Value |
---|---|---|
all | Indicates all interfaces in a specified process. | - |
interface-type interface-number | Specifies the interface type and interface number. | - |
Usage Guidelines
Usage Scenario
To ensure that OSPF routing information is not obtained by the devices of a certain network and the local device does not receive routing update information advertised by other devices, you can run the silent-interface command to disable an interface from receiving and sending OSPF packets, thereby preventing routing loops.
Configuration Impact
After an OSPF interface is set to be in the silent state, the interface can still advertise its direct routes. Hello packets on the interface, however, will be blocked and no neighbor relationship can be established on the interface. This can enhance the networking adaptability of OSPF and reduce the consumption of system resources.
snmp-agent trap enable feature-name ospf
Function
The snmp-agent trap enable feature-name ospf command enables the trap function for the OSPF module.
The undo snmp-agent trap enable feature-name ospf command disables the trap function for the OSPF module.
By default, the trap function is disabled for the OSPF module.
Format
snmp-agent trap enable feature-name ospf [ trap-name { ospfifauthfailure | ospfifconfigerror | ospfifrxbadpacket | ospfifstatechange | ospflsdbapproachingoverflow | ospflsdboverflow | ospfmaxagelsa | ospfnbrrestarthelperstatuschange | ospfnbrstatechange | ospfnssatranslatorstatuschange | ospforiginatelsa | ospfrestartstatuschange | ospftxretransmit | ospfvirtifauthfailure | ospfvirtifconfigerror | ospfvirtifrxbadpacket | ospfvirtifstatechange | ospfvirtiftxretransmit | ospfvirtnbrrestarthelperstatuschange | ospfvirtnbrstatechange | hwospfv2intraareadripaddressconflict | hwospfv2intraarearouteridconflict | hwospfv2intraarearouteridconflictrecovered | hwospfv2peerflappingsuppressstatuschange } ]
undo snmp-agent trap enable feature-name ospf [ trap-name { ospfifauthfailure | ospfifconfigerror | ospfifrxbadpacket | ospfifstatechange | ospflsdbapproachingoverflow | ospflsdboverflow | ospfmaxagelsa | ospfnbrrestarthelperstatuschange | ospfnbrstatechange| ospfnssatranslatorstatuschange | ospforiginatelsa | ospfrestartstatuschange | ospftxretransmit | ospfvirtifauthfailure | ospfvirtifconfigerror | ospfvirtifrxbadpacket | ospfvirtifstatechange | ospfvirtiftxretransmit | ospfvirtnbrrestarthelperstatuschange | ospfvirtnbrstatechange | hwospfv2intraareadripaddressconflict | hwospfv2intraarearouteridconflict | hwospfv2intraarearouteridconflictrecovered | hwospfv2peerflappingsuppressstatuschange } ]
Parameters
Parameter | Description | Value |
---|---|---|
trap-name | Enables the traps of OSPF events of specified types. | - |
hwospfv2intraareadripaddressconflict | Enables the traps of the IP addresses conflict of DRs in an intra area. | By default, this trap is enabled. |
hwospfv2intraarearouteridconflict | Enables the traps of the router IDs conflict in an intra area. | By default, this trap is enabled. |
ospfifauthfailure | Enables the traps of the failure of the interface authentication. | By default, this trap is disabled. |
ospfifconfigerror | Enables the traps of errors of the interface configuration. | By default, this trap is disabled. |
ospfifrxbadpacket | Enables the traps of received bad packets. | By default, this trap is disabled. |
ospfifstatechange | Enables the traps of changes of the interface state. | By default, this trap is disabled. |
ospflsdbapproachingoverflow | Enables the traps of LSDB overflow. | By default, this trap is disabled. |
ospflsdboverflow | Enables the traps of LSDB overflow. | By default, this trap is disabled. |
ospfmaxagelsa | Enables the traps of Max Age of LSA. | By default, this trap is disabled. |
ospfnbrrestarthelperstatuschange | Enables the traps of changes of the neighbor state. | By default, this trap is disabled. |
ospfnbrstatechange | Enables the traps of changes of the state of the helper during GR. | By default, this trap is disabled. |
ospfnssatranslatorstatuschange | Enables the traps of the status change of the NSSA switch converting Type7 LSAs to Type5 LSAs. | By default, this trap is disabled. |
ospforiginatelsa | Enables the traps of LSAs that are locally generated. | By default, this trap is disabled. |
ospfrestartstatuschange | Enables the traps of changes of the state of the restarter during GR. | By default, this trap is disabled. |
ospftxretransmit | Enables the traps of the receiving and sending of packets on the interface. | By default, this trap is disabled. |
ospfvirtifauthfailure | Enables the traps of failure of the virtual interface authentication. | By default, this trap is disabled. |
ospfvirtifconfigerror | Enables the traps of error of the virtual interface configuration. | By default, this trap is disabled. |
ospfvirtifrxbadpacket | Enables the traps of the bad packet that is received on the virtual interface. | By default, this trap is disabled. |
ospfvirtifstatechange | Enables the traps of changes of the virtual interface state. | By default, this trap is disabled. |
ospfvirtiftxretransmit | Enables the traps of sending and receiving of packets on the virtual interface. | By default, this trap is disabled. |
ospfvirtnbrrestarthelperstatuschange | Enables the traps of changes of the GR helper state of neighboring nodes on the virtual link. | By default, this trap is disabled. |
ospfvirtnbrstatechange | Enables the traps of changes of the state for the neighbor of the virtual-link. | By default, this trap is disabled. |
hwospfv2intraarearouteridconflictrecovered | The OSPF router ID conflict is resolved. | By default, this trap is enabled. |
hwospfv2peerflappingsuppressstatuschange | The status of OSPF neighbor relationship flapping suppression changed. | By default, this trap is disabled. |
spf-schedule-interval
Function
The spf-schedule-interval command sets an interval for OSPF to calculate routes.
The undo spf-schedule-interval command restores the default setting.
By default, the intelligent timer is enabled. The interval for the SPF calculation is expressed in milliseconds. The maximum interval for the SPF calculation is 10000 ms, the initial interval is 500 ms, and the Holdtime interval is 1000 ms.
Format
spf-schedule-interval { interval1 | intelligent-timer max-interval start-interval hold-interval | millisecond interval2 }
undo spf-schedule-interval
Parameters
Parameter | Description | Value |
---|---|---|
interval1 | Specifies an interval for OSPF to perform the SPF calculation. | The value is an integer ranging from 1 to 10, in seconds. |
intelligent-timer | Sets an interval for OSPF SPF calculation through an intelligent timer. | - |
max-interval | Specifies a maximum interval for OSPF to perform the SPF calculation. | The value is an integer ranging from 1 to 120000, in milliseconds. The default value is 10000. |
start-interval | Specifies the initial interval for OSPF to perform the SPF calculation. | The value is an integer ranging from 1 to 60000, in milliseconds. The default value is 500. |
hold-interval | Specifies the Holdtime interval for OSPF to perform the SPF calculation. | The value is an integer ranging from 1 to 60000, in milliseconds. The default value is 1000. |
millisecond interval2 | Specifies an interval for OSPF to perform the SPF calculation. | The value is an integer ranging from 1 to 10000, in milliseconds. |
Usage Guidelines
Based on the LSDB, the device that runs OSPF calculates the SPT with itself as the root based on the SPF arithmetic, and determines the next hop to the destination network according to the SPT. When the OSPF LSDB changes, the shortest path needs to be recalculated. Frequent network changes and continual calculation of the shortest path consume many system resources and affect the efficiency of the devices. You can configure an intelligent timer and set a proper interval for the SPF calculation to prevent the excessive consumption of device memory and bandwidth resources.
On a network where the convergence time of routes is required to be shorter, set millisecond as the unit of interval to increase the frequency of calculating routes. This increases route convergence. In other networking environments, the default value is recommended.
Configuration ImpactAfter this command is configured, the interval for the SPF calculation is as follows:
- The initial interval for the SPF calculation is specified by the parameter start-interval.
- The interval for the SPF calculation for the nth (n≥2) time is equal to hold-interval×2(n-2).
- When the interval specified by hold-interval×2(n-2) reaches the maximum interval specified by max-interval, OSPF performs SPF calculation at the maximum interval until max-interval expires without flapping or the OSPF process is restarted.
stub (OSPF area)
Function
The stub command sets an area to a stub area.
The undo stub command cancels the settings.
By default, no area is set to a stub area.
Parameters
Parameter | Description | Value |
---|---|---|
no-summary | Forbids an ABR to send Summary LSAs to the stub area. | - |
default-route-advertise | Enables an ABR to generate default Type 3 LSAs and advertise them to the stub area. | - |
backbone-peer-ignore | Prevents an ABR from checking the neighbor status when the ABR generates default Type 3 LSAs and advertises them to the stub area. Specifically, the ABR generates default Type 3 LSAs and advertises them to the stub area as long as an interface that is Up exists in the backbone area. | - |
Usage Guidelines
The two configuration commands for stub areas include stub and default-cost (OSPF area). If you want to configure one area as a stub area, you must configure all devices in the area by the stub command.
The default-cost (OSPF area) command takes effect only when it is configured on an ABR. The command is used to specify a cost for the default summary route transmitted by the ABR to the stub area.
On an ABR, you can specify no-summary in the stub command to prevent Type 3 LSAs from entering the stub area that the ABR connects to.
The backbone area cannot be configured as a stub area.
stub-router (OSPF)
Function
The stub-router command configures a stub router.
The undo stub-router command restores the default configuration.
By default, no device is configured as a stub router.
Parameters
Parameter | Description | Value |
---|---|---|
on-startup [ interval ] | Specifies the interval during which a device acts as
a stub router when the device is restarted or faulty.
|
The value is an integer that ranges from 5 to 65535, in seconds. By default, the value is 500 seconds. |
Usage Guidelines
After the stub router command is configured on a device, the device informs other devices not to use this stub router to forward data by increasing the metric to 65535 of the links in the LSA that is generated by the device. As the metric is not infinite, there can still be a route to this stub router. The metric of the LSA links that are generated by the stub router is very high.
suppress-flapping peer disable (OSPF)
Function
The suppress-flapping peer disable command disables OSPF neighbor relationship flapping suppression globally.
The undo suppress-flapping peer disable command enables OSPF neighbor relationship flapping suppression globally.
By default, OSPF neighbor relationship flapping suppression is enabled globally.
Usage Guidelines
If an OSPF interface alternates between Up and Down, OSPF neighbor relationship flapping occurs on the interface. During the flapping, OSPF frequently sends Hello packets to reestablish the neighbor relationship, synchronizes LSDBs, and recalculates routes. In this process, a large number of packets are exchanged, adversely affecting neighbor relationship stability, OSPF services, and other OSPF-dependent services, such as LDP and BGP. OSPF neighbor relationship flapping suppression can address this problem by delaying OSPF neighbor relationship reestablishment or preventing service traffic from passing through flapping links.
By default, OSPF neighbor relationship flapping suppression is enabled globally. To disable this function globally, run the suppress-flapping peer disable command.
vlink-peer (OSPF area)
Function
The vlink-peer command creates and configures a virtual link.
The undo vlink-peer command deletes the virtual link or restores the default setting.
By default, no virtual link is configured for OSPF.
Format
vlink-peer router-id [ dead dead-interval | hello hello-interval | retransmit retransmit-interval | smart-discover | trans-delay trans-delay-interval | [ simple [ plain plain-text | [ cipher ] cipher-text ] | { md5 | hmac-md5 | hmac-sha256 } [ key-id { plain plain-text | [ cipher ] cipher-text } ] | authentication-null | keychain keychain-name ] ] *
undo vlink-peer router-id [ dead | hello | retransmit | smart-discover | trans-delay | simple | md5 | hmac-md5 | hmac-sha256 | authentication-null | keychain ]
Only the S6720EI, S6720S-EI, S5720HI, and S5720EI support the keychain keychain-name parameter.
Parameters
Parameter | Description | Value |
---|---|---|
router-id | Specifies the router ID of virtual link neighbor. | - |
dead dead-interval | Specifies a dead interval. This value must be equal to dead-interval of the Switch that sets up a virtual link with the interface and must be at least 4 times that of hello-interval. |
The value is an integer that ranges from 1 to 235926000, in seconds. The default value is 40 seconds. |
hello hello-interval | Specifies an interval for transmitting Hello packets
on an interface. This value must be equal to hello-interval value of the Switch that sets up a virtual link with the interface. The default value is 10 seconds. |
The value ranges from 1 to 65535 seconds. The default value is 10 seconds. |
retransmit retransmit-interval | Specifies an interval for retransmitting the LSA packets on an interface. | The value is an integer that ranges from 1 to 3600, in seconds. The default value is 5 seconds. |
smart-discover | Automatically sends Hello packets | - |
trans-delay trans-delay-interval | Specifies the delay in transmitting LSA packets on an interface. | The value is an integer that ranges from 1 to 3600, in seconds. The default value is 1 second. |
simple | Indicates simple authentication. In simple authentication, the password type is cipher by default. NOTICE:
Simple authentication carries potential security risks. As such, HMAC-SHA256 authentication is recommended. |
- |
plain | Indicates plain authentication. Only plain text can be entered, and only plain text is displayed when the configuration file is viewed. NOTICE:
If plain is selected, the password is saved in the configuration file in plain text. This carries security risks. Select cipher to save the password in cipher text for increased security. |
- |
plain-text | Specifies a plain text password. |
|
cipher | Indicates cipher authentication. Either plain text or cipher text can be entered, and cipher text is displayed when the configuration file is viewed. |
- |
cipher-text | Specifies a cipher text password. |
|
md5 | Indicates MD5 authentication. In MD5 authentication,
the password type is cipher by default. NOTICE:
MD5 authentication carries potential security risks. As such, HMAC-SHA256 authentication is recommended. |
- |
hmac-md5 | Indicates HMAC-MD5 authentication. In HMAC-MD5 authentication,
the password type is cipher by default. NOTICE:
HMAC-MD5 authentication carries potential security risks. As such, HMAC-SHA256 authentication is recommended. |
- |
hmac-sha256 | Indicates HMAC-SHA256 authentication. In HMAC-SHA256 authentication, the password type is cipher by default. | - |
key-id | Specifies the authentication key ID of the interface's
cipher authentication. The key ID must be consistent with that of the peer. |
The value is an integer that ranges from 1 to 255. |
authentication-null | Indicates that no authentication is used. | - |
keychain | Indicates keychain authentication. NOTE:
Before configuring this parameter, run the keychain command to create a keychain. Then, run the key-id, key-string, and algorithm commands to configure a key ID, a password, and an authentication algorithm for this keychain. Otherwise, OSPF authentication will fail. |
- |
keychain-name | Specifies the keychain name. | The value is a string of 1 to 47 case-insensitive characters. Except the question mark (?) and space. However, when double quotation marks (") are used around the string, spaces are allowed in the string. |
Usage Guidelines
Usage Guidelines
After OSPF areas are defined, OSPF route updates between non-backbone areas are transmitted through a backbone area. Therefore, OSPF requires that all non-backbone areas be directly connected to the backbone area and devices within the backbone area keep connected as well. However, these requirements may not be met due to various limitations. OSPF virtual links can be configured to solve the problem.
Follow-up Procedure
After virtual links are established, devices provided by different vendors may use different default MTUs. To ensure consistent MTUs on the devices, run the undo ospf mtu-enable command to set the default MTU in DD packets sent by interfaces to 0.
Precautions
When configuring parameters, pay attention to the following:
- A smaller hello value indicates faster detection of changes in network topology and higher network resource usage.
- A retransmit value that is too small leads to unnecessary retransmission of LSAs. On a low-speed network, set a large retransmit value.
- The authentication mode of a virtual link must be the same as that in the backbone area.
vpn-instance-capability simple (OSPF)
Function
The vpn-instance-capability simple command directly calculates a route instead of conducting the routing loop detection.
The undo vpn-instance-capability command detects the DN bit to avoid routing loops.
By default, the routing-loop check is enabled.
Usage Guidelines
Usage Scenario
If OSPF VPN multi-instance is deployed on a Multi-VPN-Instance CE (MCE), routes cannot be calculated based on Type3, Type5, or Type7 LSAs with the DN bit. Therefore, OSPF detects routing loops when calculating routes. In this case, the vpn-instance-capability simple command is used to disable OSPF routing loop detection and enable OSPF to calculate routes based on received LSAs without checking the DN bit and route-tag in the LSAs. The route-tag is restored to the default value 1.
Prerequisites
OSPF VPN multi-instance has been deployed on an MCE using the ospf process-id vpn-instance vpn-instance-name command.
Configuration Impact
If there is no ABR and the vpn-instance-capability simple command is run on an MCE, the MEC cannot become an ABR.
After the vpn-instance-capability simple command is run, OSPF routes that have been imported by BGP do not carry any OSPF domain ID, route tag, or router ID.
By default, when BGP imports an OSPF route, it uses the cost of the OSPF route plus 1 as the MED value. The MED in BGP is similar to the cost in an IGP in terms of functions. After the vpn-instance-capability simple command is run, BGP uses the cost of an OSPF route as the MED when it imports the OSPF route. Therefore, MED values change after the command is run, which may affect the route selection result.
Precautions
The undo vpn-instance-capability command cannot be used to enable OSPF routing loop detection in a scenario without MCEs.
Example
# Disable the OSPF routing-loop check.
<HUAWEI> system-view
[HUAWEI] ip vpn-instance vrf1
[HUAWEI-vpn-instance-vrf1] route-distinguisher 100:1
[HUAWEI-vpn-instance-vrf1-af-ipv4] vpn-target 3:3 export-extcommunity
[HUAWEI-vpn-instance-vrf1-af-ipv4] vpn-target 4:4 import-extcommunity
[HUAWEI-vpn-instance-vrf1-af-ipv4] quit
[HUAWEI-vpn-instance-vrf1] quit
[HUAWEI] ospf 100 vpn-instance vrf1
[HUAWEI-ospf-100] vpn-instance-capability simple
- Command Support
- abr-summary (OSPF area)
- advertise mpls-lsr-id
- area (OSPF)
- asbr-summary
- authentication-mode (OSPF area)
- bandwidth-reference (OSPF)
- bfd all-interfaces (OSPF)
- default (OSPF)
- default-cost (OSPF Area)
- default-route-advertise (OSPF)
- description (OSPF)
- description (OSPF Area)
- display default-parameter ospf
- display gtsm statistics
- display ospf abr-asbr
- display ospf asbr-summary
- display ospf bfd session
- display ospf brief
- display ospf cumulative
- display ospf error
- display ospf global-statistics
- display ospf graceful-restart
- display ospf interface
- display ospf lsdb
- display ospf mesh-group
- display ospf nexthop
- display ospf peer
- display ospf request-queue
- display ospf retrans-queue
- display ospf routing
- display ospf sham-link
- display ospf spf-statistics
- display ospf statistics updated-lsa
- display ospf vlink
- display snmp-agent trap feature-name ospf all
- dn-bit-set
- dn-bit-check
- domain-id (OSPF)
- eca-route-type compatible
- enable log
- filter export (OSPF Area)
- filter import (OSPF Area)
- filter-lsa-out peer
- filter-policy export (OSPF)
- filter-policy import (OSPF)
- flooding-control
- frr (OSPF)
- frr-policy route (OSPF)
- frr-priority static low
- graceful-restart (OSPF)
- graceful-restart helper-role (OSPF)
- gtsm default-action
- gtsm log drop-packet all
- import-route (OSPF)
- loop-free-alternate (OSPF)
- lsa-arrival-interval
- lsa-originate-interval
- lsdb-overflow-limit
- maximum load-balancing (OSPF)
- maximum-routes
- mesh-group enable
- network (OSPF area)
- nexthop (OSPF)
- nssa (OSPF Area)
- opaque-capability enable
- ospf
- ospf authentication-mode
- ospf bfd
- ospf bfd block
- ospf cost
- ospf dr-priority
- ospf enable
- ospf filter-lsa-out
- ospf frr block
- ospf maxage-lsa auto-protect disable
- ospf mib-binding
- ospf mtu-enable
- ospf network-type
- ospf p2mp-mask-ignore
- ospf router-id auto-recover disable
- ospf smart-discover
- ospf suppress-flapping peer
- ospf suppress-flapping peer disable
- ospf suppress-flapping peer hold-down
- ospf suppress-flapping peer hold-max-cost disable
- ospf timer dead
- ospf timer hello
- ospf timer poll
- ospf timer retransmit
- ospf trans-delay
- ospf valid-ttl-hops
- p2mp-peer
- peer (OSPF)
- preference (OSPF)
- prefix-priority (OSPF)
- reset gtsm statistics
- reset ospf counters
- reset ospf process
- reset ospf redistribution
- reset ospf suppress-flapping peer
- retransmission-limit
- route-tag
- rfc1583 compatible
- sham-hello enable (OSPF)
- sham-link (OSPF Area)
- silent-interface (OSPF)
- snmp-agent trap enable feature-name ospf
- spf-schedule-interval
- stub (OSPF area)
- stub-router (OSPF)
- suppress-flapping peer disable (OSPF)
- vlink-peer (OSPF area)
- vpn-instance-capability simple (OSPF)