Ospf Book
Ospf Book
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED
WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED
WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version
©
of the UNIX operating system. All rights reserved. Copyright 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL
FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE
PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR
ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output,
network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content
is unintentional and coincidental.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
http:// www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (1110R)
©
2016 Cisco Systems, Inc. All rights reserved.
CONTENTS
CHAPTER22 OSPF Inbound Filtering Using Route Maps with a Distribute List 229
CHAPTER31 OSPF Support for Unlimited Software VRFs per PE Router 295
CHAPTER35 OSPF MIB Support of RFC 1850 and Latest Extensions 321
Example: TTL Security Support on Virtual Links for OSPFv3 on IPv6 353
Example: TTL Security Support on Sham Links for OSPFv3 on IPv6 354
Additional References 354
Feature Information for TTL Security Support for OSPFv3 on IPv6 355
CHAPTER38 Configuring OSPF TTL Security Check and OSPF Graceful Shutdown 357
CHAPTER40 OSPF SNMP ifIndex Value for Interface ID in Data Fields 381
CHAPTER42 OSPF Support for Forwarding Adjacencies over MPLS TE Tunnels 401
Metric 436
Equal-Cost Multipath Primary Paths 436
Candidate Repair-Path Lists 436
How to Configure OSPFv2 Loop-Free Alternate Fast Reroute 436
Enabling Per-Prefix OSPFv2 Loop-Free Alternate Fast Reroute 436
Specifying Prefixes to Be Protected by LFA FRR 437
Configuring a Repair Path Selection Policy 439
Creating a List of Repair Paths Considered 440
Prohibiting an Interface From Being Used as the Next Hop 441
Configuration Examples for OSPFv2 Loop-Free Alternate Fast Reroute 442
Example Enabling Per-Prefix LFA IP FRR 442
Example Specifying Prefix-Protection Priority 443
Example Configuring Repair-Path Selection Policy 443
Example Auditing Repair-Path Selection 443
Example Prohibiting an Interface from Being a Protecting Interface 443
Additional References 443
Feature Information for OSPFv2 Loop-Free Alternate Fast Reroute 445
Note The Feature Information table in the technology configuration guide mentions when a feature was
introduced. It might or might not mention when other platforms were supported for that feature. To
determine if a particular feature is supported on your platform, look at the technology configuration
guides posted on your product landing page. When a technology configuration guide is displayed on
your product landing page, it indicates that the feature is supported on that platform.
Read Me First
This module describes how to configure Open Shortest Path First (OSPF). OSPF is an Interior Gateway
Protocol (IGP) developed by the OSPF working group of the Internet Engineering Task Force (IETF).
OSPF was designed expressly for IP networks and it supports IP subnetting and tagging of externally
derived routing information. OSPF also allows packet authentication and uses IP multicast when sending
and receiving packets.
Cisco supports RFC 1253, OSPF Version 2 Management Information Base, August 1991. The OSPF MIB
defines an IP routing protocol that provides management information related to OSPF and is supported by
Cisco routers.
For protocol-independent features that work with OSPF, see the "Configuring IP Routing Protocol-
Independent Features" module.
• Route redistribution—Routes learned via any IP routing protocol can be redistributed into any other IP
routing protocol. At the intradomain level, OSPF can import routes learned via Interior Gateway Routing
Protocol (IGRP), Routing Information Protocol (RIP), and Intermediate System-to-Intermediate System
(IS-IS). OSPF routes can also be exported into IGRP, RIP, and IS-IS. At the interdomain level, OSPF can
import routes learned via Exterior Gateway Protocol (EGP) and Border Gateway Protocol (BGP). OSPF
routes can be exported into EGP and BGP.
• Not-so-stubby area (NSSA)—RFC 3101, which replaces and is backward compatible with RFC 1587.
• Nonbroadcast multiaccess (NBMA) networks (Switched Multimegabit Data Service [SMDS], Frame
Relay, and X.25)
• Point-to-point networks (High-Level Data Link Control [HDLC] and PPP)
On point-to-multipoint broadcast networks, there is no need to specify neighbors. However, you can
specify neighbors with the neighbor router configuration command, in which case you should specify a
cost to that neighbor.
Before the point-to-multipoint keyword was added to the ip ospf network interface configuration
command, some OSPF point-to-multipoint protocol traffic was treated as multicast traffic. Therefore, the
neighbor router configuration command was not needed for point-to-multipoint interfaces because
multicast took care of the traffic. Hello, update, and acknowledgment messages were sent using multicast.
In particular, multicast hello messages discovered all neighbors dynamically.
On point-to-multipoint, nonbroadcast networks, use the neighbor router configuration command to identify
neighbors. Assigning a cost to a neighbor is optional.
Prior to Cisco IOS Release 12.0, some customers were using point-to-multipoint on nonbroadcast media
(such as classic IP over ATM), so their routers could not dynamically discover their neighbors. This feature
allows the neighbor router configuration command to be used on point-to-multipoint interfaces.
Area Parameters
Use OSPF Not-So-Stubby Areas (NSSA) feature to simplify administration if you are an Internet service
provider (ISP) or a network administrator that must connect a central site that is using OSPF to a remote site
that is using a different routing protocol.
Prior to NSSA, the connection between the corporate site border router and the remote router could not be
run as an OSPF stub area because routes for the remote site could not be redistributed into the stub area, and
two routing protocols needed to be maintained. A simple protocol such as RIP was usually run and handled
the redistribution. With NSSA, you can extend OSPF to cover the remote connection by defining the area
between the corporate router and the remote router as an NSSA.
As with OSPF stub areas, NSSA areas cannot be injected with distributed routes via Type 5 LSAs. Route
redistribution into an NSSA area is possible only with a special type of LSA that is known as Type 7 that
can exist only in an NSSA area. An NSSA ASBR generates the Type 7 LSA so that the routes can be
redistributed, and an NSSA ABR translates the Type 7 LSA into a Type 5 LSA, which can be flooded
throughout the whole OSPF routing domain. Summarization and filtering are supported during the
translation.
RFC 3101 allows you to configure an NSSA ABR router as a forced NSSA LSA translator. This means that
the NSSA ABR router will unconditionally assume the role of LSA translator, preempting the default
behavior, which would only include it among the candidates to be elected as translator.
Note Even a forced translator might not translate all LSAs; translation depends on the contents of each LSA.
The figure below shows a network diagram in which OSPF Area 1 is defined as the stub area. The Enhanced
Interior Gateway Routing Protocol (EIGRP) routes cannot be propagated into the OSPF domain because
The redistributed routes from the RIP router will not be allowed into OSPF Area 1 because NSSA is an
extension to the stub area. The stub area characteristics will still exist, including the exclusion of Type 5
LSAs.
Route summarization is the consolidation of advertised addresses. This feature causes a single summary
route to be advertised to other areas by an ABR. In OSPF, an ABR will advertise networks in one area into
another area. If the network numbers in an area are assigned in a way such that they are contiguous, you
can configure the ABR to advertise a summary route that covers all the individual networks within the area
that fall into the specified range.
When routes from other protocols are redistributed into OSPF (as described in the module "Configuring IP
Routing Protocol-Independent Features"), each route is advertised individually in an external LSA.
However, you can configure the Cisco IOS software to advertise a single route for all the redistributed
routes that are covered by a specified network address and mask. Doing so helps decrease the size of the
OSPF link-state database.
In OSPF, all areas must be connected to a backbone area. If there is a break in backbone continuity, or the
backbone is purposefully partitioned, you can establish a virtual link. The two endpoints of a virtual link
are ABRs. The virtual link must be configured in both routers. The configuration information in each router
consists of the other virtual endpoint (the other ABR) and the nonbackbone area that the two routers have
in common (called the transit area). Note that virtual links cannot be configured through stub areas.
You can force an ASBR to generate a default route into an OSPF routing domain. Whenever you
specifically configure redistribution of routes into an OSPF routing domain, the router automatically
becomes an ASBR. However, an ASBR does not, by default, generate a defaultroute into the OSPF routing
domain.
You can configure OSPF to look up Domain Naming System (DNS) names for use in all OSPF show
EXEC command displays. You can use this feature to more easily identify a router, because the router is
displayed by name rather than by its router ID or neighbor ID.
The group pacing interval is inversely proportional to the number of LSAs that the router is refreshing,
checksumming, and aging. For example, if you have approximately 10,000 LSAs, decreasing the pacing
interval would benefit you. If you have a very small database (40 to 100 LSAs), increasing the pacing
interval to 10 to 20 minutes might benefit you slightly.
The default value of pacing between LSA groups is 240 seconds (4 minutes). The range is from 10 seconds
to 1800 seconds (30 minutes).
By default, OSPF floods new LSAs over all interfaces in the same area, except the interface on which the
LSA arrives. Some redundancy is desirable, because it ensures robust flooding. However, too much
redundancy can waste bandwidth and might destabilize the network due to excessive link and CPU usage in
certain topologies. An example would be a fully meshed topology.
You can block OSPF flooding of LSAs in two ways, depending on the type of networks:
• On broadcast, nonbroadcast, and point-to-point networks, you can block flooding over specified OSPF
interfaces.
• On point-to-multipoint networks, you can block flooding to a specified neighbor.
The growth of the Internet has increased the importance of scalability in IGPs such as OSPF. By design,
OSPF requires LSAs to be refreshed as they expire after 3600 seconds. Some implementations have tried to
improve the flooding by reducing the frequency to refresh from 30 minutes to about 50 minutes. This
solution reduces the amount of refresh traffic but requires at least one refresh before the LSA expires. The
OSPF flooding reduction solution works by reducing unnecessary refreshing and flooding of already
known and unchanged information. To achieve this reduction, the LSAs are now flooded with the higher bit
set. The LSAs are now set as “do not age.”
Cisco routers do not support LSA Type 6 Multicast OSPF (MOSPF), and they generate syslog messages if
they receive such packets. If the router is receiving many MOSPF packets, you might want to configure the
router to ignore the packets and thus prevent a large number of syslog messages.
How to Configure OSPF
The former OSPF implementation for sending update packets needed to be more efficient. Some update
packets were getting lost in cases where the link was slow, a neighbor could not receive the updates quickly
enough, or the router was out of buffer space. For example, packets might be dropped if either of the
following topologies existed:
• During flooding, several neighbors sent updates to a single router at the same time.
OSPF update packets are now automatically paced so they are not sent less than 33 milliseconds apart.
Pacing is also added between resends to increase efficiency and minimize lost retransmissions. Also, you
can display the LSAs waiting to be sent out an interface. The benefit of pacing is that OSPF update and
retransmission packets are sent more efficiently. There are no configuration tasks for this feature; it occurs
automatically.
You can display specific statistics such as the contents of IP routing tables, caches, and databases.
Information provided can be used to determine resource utilization and solve network problems. You can
also display information about node reachability and discover the routing path that your device packets are
taking through the network.
Enabling OSPF
SUMMARY STEPS
1. enable
2. configure terminal
3. router ospf process-id
4. network ip-address wildcard-mask area area-id
5. end
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode. •
Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 router ospf process-id Enables OSPF routing and enters router configuration
mode.
Example:
Device(config)# router ospf 109
Step 4 network ip-address wildcard-mask area area-id Defines an interface on which OSPF runs and defines
the area ID for that interface.
Example:
Device(config-router)# network 192.168.129.16
0.0.0.3 area 20
1. enable
2. configure terminal
3. interface type number
4. ip ospf cost cost
5. ip ospf retransmit-interval seconds
6. ip ospf transmit-delay seconds
7. ip ospf priority number-value
8. ip ospf hello-interval seconds
9. ip ospf dead-interval seconds
10. ip ospf authentication-key key
11. ip ospf message-digest-key key-id md5 key
12. ip ospf authentication [message-digest | null]
13. end
Configuring OSPF Interface Parameters
DETAILED STEPS
Command or Action Purpose
Example:
Device# configure terminal
Step 3 interface type number Configures an interface type and enters interface
configuration mode.
Example:
Device(config)# interface Gigabitethernet
0/0
Step 4 ip ospf cost cost Explicitly specifies the cost of sending a packet on an
OSPF interface.
Example:
Device(config-if)# ip ospf cost 65
Step 5 ip ospf retransmit-interval seconds Specifies the number of seconds between link-state
advertisement (LSA) retransmissions for adjacencies
Example: belonging to an OSPF interface.
Device(config-if)# ip ospf retransmit-
interval
1
Step 6 ip ospf transmit-delay seconds Sets the estimated number of seconds required to send a
link-state update packet on an OSPF interface.
Example:
Device(config-if)# ip ospf transmit-delay
Step 7 ip ospf priority number-value Sets priority to help determine the OSPF designated router
for a network.
Example:
Device(config-if)# ip ospf priority 1
Step 8 ip ospf hello-interval seconds Specifies the length of time between the hello packets that
the Cisco IOS software sends on an OSPF interface.
Example:
Device(config-if)# ip ospf hello-interval 1
Step 9 ip ospf dead-interval seconds Sets the number of seconds that a device must wait before
it declares a neighbor OSPF router down because it has not
Example: received a hello packet.
Device(config-if)# ip ospf dead-interval 1
Step 11 ip ospf message-digest-key key-id md5 key Enables OSPF MD5 authentication. The values for the key-
id and key arguments must match values specified for other
Example: neighbors on a network segment.
Device(config-if)# ip ospf message-digest-
key
1 md5 23456789
Step 12 ip ospf authentication [message-digest | null] Specifies the authentication type for an interface.
Example:
Device(config-if)# ip ospf authentication
message-digest
1. configure terminal
2. interface type number
3. ip ospf network point-to-multipoint
4. exit
5. router ospf process-id
6. neighbor ip-address [cost number]
Configuring OSPF over Different Physical Networks
DETAILED STEPS
Command or Action Purpose
Example:
Device# configure terminal
Step 2 interface type number Specifies an interface type and number, and enters interface
configuration mode.
Example:
Device(config)# interface gigabitethernet
0/0/0
Example:
Device#(config-if) exit
Step 5 router ospf process-id Configures an OSPF routing process and enters router
configuration mode.
Example:
Device#(config) router ospf 109
Step 6 neighbor ip-address [cost number] Specifies a neighbor and assigns a cost to the neighbor.
1. configure terminal
2. interface type number
3. ip ospf network point-to-multipoint non-broadcast
4. exit
5. router ospf process-id
6. neighbor ip-address [cost number]
DETAILED STEPS
Command or Action Purpose
Step 1 configure terminal Enters global configuration mode.
Example:
Device# configure terminal
Step 2 interface type number Specifies an interface type and number, and enters
interface configuration mode.
Example:
Device(config)# interface gigabitethernet
0/0/0
Example:
Device#(config-if) exit
Step 5 router ospf process-id Configures an OSPF routing process and enters router
configuration mode.
Example:
Device#(config) router ospf 109
Step 6 neighbor ip-address [cost number] Specifies a neighbor and assigns a cost to the neighbor.
Configuring OSPF Area Parameters
1. enable
2. configure terminal
3. router ospf process-id
4. area area-id authentication
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 router ospf process-id Enables OSPF routing and enters router
configuration mode.
Example:
Device(config)# router ospf 10
Example:
Device(config-router)# area 10.0.0.0
authentication
Step 5 area area-id stub [no summary] Defines an area to be a stub area.
Example:
Device(config-router)# area 10.0.0.0 stub no-
summary
Step 6 area area-id default-cost cost Specifies a cost for the default summary route that is
sent into a stub area or not-so-stubby area (NSSA)
Example:
Device(config-router)# area 10.0.0.0 default-
cost
1
1. enable
2. configure terminal
3. router ospf process-id
4. redistribute protocol [process-id] {level-1 | level-1-2 | level-2} [autonomous-system-number] [metric
{metric-value | transparent}] [metric-type type-value] [match {internal | external 1 | external 2}]
[tag tag-value] [route-map map-tag] [subnets] [nssa-only]
5. network ip-address wildcard-mask area area-id
6. area area-id nssa [no-redistribution] [default-information-originate [metric] [metric-type]] [no-
summary] [nssa-only]
7. summary-address prefix mask [not-advertise] [tag tag] [nssa-only]
8. end
Configuring OSPFv2 NSSA
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 router ospf process-id Enables OSPF routing and enters router configuration
mode.
Example: • The process-id argument identifies the OSPF
process. The range is from 1 to 65535.
Device(config)# router ospf 10
Step 4 redistribute protocol [process-id] {level-1 | level-1-2 | Redistributes routes from one routing domain to
level-2} [autonomous-system-number] [metric {metric- another routing domain.
value
| transparent}] [metric-type type-value] [match {internal • In the example, Routing Information Protocol
| external 1 | external 2}] [tag tag-value] [route-map (RIP) subnets are redistributed into the OSPF
map-tag] [subnets] [nssa-only] domain.
Example:
Device(config-router)# redistribute rip subnets
Step 5 network ip-address wildcard-mask area area-id Defines the interfaces on which OSPF runs and the
area ID for those interfaces.
Example:
Device(config-router)# network 192.168.129.11
0.0.0.255 area 1
Step 6 area area-id nssa [no-redistribution] Configures a Not-So-Stubby Area (NSSA) area.
[default-information-originate [metric] [metric-type]]
[no-summary] [nssa-only]
Example:
Device(config-router)# area 1 nssa
Step 7 summary-address prefix mask [not-advertise] [tag tag] Controls the route summarization and filtering during
[nssa-only] the translation and limits the summary to NSSA areas.
Example:
Device(config-router)# summary-address 10.1.0.0
1. enable
2. configure terminal
3. router ospf process-id
4. area area-id nssa translate type7 always
5. area area-id nssa translate type7 suppress-fa
6. end
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 router ospf process-id Enables OSPF routing and enters router configuration mode.
• The process-id argument identifies the OSPF process. The
Example: range is from 1 to 65535.
Device(config)# router ospf 1
Step 6 end Exits router configuration mode and returns to privileged EXEC
mode.
Example:
Device(config-router)# end
1. enable
2. configure terminal
3. router ospf process-id
4. compatible rfc1587
5. end
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode. •
Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 router ospf process-id Enables OSPF routing and enters router configuration mode.
Example: • The process-id argument identifies the OSPF process.
Device(config)# router ospf 1
• Use router ospf process-id command to enable OSPFv2
routing.
Example:
Device(config-router)# compatible rfc1587
Prerequisites
Evaluate the following considerations before you implement this feature:
• You can set a Type 7 default route that can be used to reach external destinations. When configured, the
device generates a Type 7 default into the Not-So-Stubby Area (NSSA or the NSSA Area Border
Router (ABR).
• Every device within the same area must agree that the area is NSSA; otherwise, the devices cannot
communicate.
DETAILED STEPS
Command or Action Purpose
Step 1 summary-address {ip-address mask | prefix mask} Specifies an address and mask that covers redistributed
[not-advertise][tag tag [nssa-only] routes, so that only one summary route is advertised.
DETAILED STEPS
Command or Action Purpose
Step 1 area area-id virtual-link router-id [authentication [message-digest | null]] Establishes a virtual link.
[hello-interval seconds] [retransmit-interval seconds] [transmit-delay seconds]
[dead-interval seconds] [authentication-key key | message-digest-key key-id md5
key]
Example:
Device(config-router-af)# area 1 virtual-link 10.1.1.1 router1
Generating a Default Route
1. enable
2. configure terminal
3. router ospf process-id
4. default-information originate [always] [metric metric-value] [metric-type type-value] [route-map map-
name]
5. end
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 router ospf process-id Enables OSPF routing and enters router configuration mode.
Example:
Device(config)# router ospf 109
Step 4 default-information originate [always] [metric Forces the ASBR to generate a default route into the OSPF
metric-value] [metric-type type-value] [route- routing domain.
map map-name]
Note The always keyword includes the following exception
when a route map is used. When a route map is used,
Example: the origination of the default route by OSPF is not
Device(config-router)# default-information bound to the existence of a default route in the
originate always routing table.
Step 5 end Exits router configuration mode and returns to privileged
EXEC mode.
Example:
Device(config-router)# end
1. enable
2. configure terminal
3. ip ospf name-lookup
4. end
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 ip ospf name-lookup Enables OSPF routing and enters router configuration
mode.
Example:
Device# ip ospf name-lookup
1. configure terminal
2. interface type number
3. ip address ip-address mask
Controlling Default Metrics
DETAILED STEPS
Command or Action Purpose
Example:
Device# configure terminal
Step 2 interface type number Creates a loopback interface and enters interface
configuration mode.
Example:
Device(config)# interface loopback 0
Example:
Device#(config-if) ip address 192.108.1.27
255.255.255.0
1. enable
2. configure terminal
3. router ospf process-id
4. auto-cost reference-bandwidth ref-bw
5. end
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode. •
Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 router ospf process-id Enables OSPF routing and enters router configuration
mode.
Example:
Device# router ospf 109
Example:
Device(config-router)# auto-cost reference-
bandwidth 101
1. enable
2. configure terminal
3. router ospf process-id
4. distance ospf {intra-area | inter-area | external} dist
5. end
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode. •
Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 router ospf process-id Enables OSPF routing and enters router configuration
mode.
Example:
Device(config)# router ospf 109
Step 4 distance ospf {intra-area | inter-area | external} dist Changes the OSPF distance values.
Example:
Device(config-router)# distance ospf external
200
1. enable
2. configure terminal
3. router ospf process-id
4. timers throttle spf spf-start spf-hold spf-max-wait
5. end
Configuring OSPF over On-Demand Circuits
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 router ospf process-id Enables OSPF routing and enters router configuration
mode.
Example:
Device(config)# router ospf 109
Step 4 timers throttle spf spf-start spf-hold spf-max-wait Configures route calculation timers.
Example:
Device(config-router)# timers throttle spf 5
1000
9000
DETAILED STEPS
Command or Action Purpose
Step 1 router ospf process-id Enables OSPF operation.
Note You can prevent an interface from accepting demand-circuit requests from other routers to by specifying
the ignore keyword in the ip ospf demand-circuit command.
Prerequisites
Evaluate the following considerations before implementing the On-Demand Circuits feature:
• Because LSAs that include topology changes are flooded over an on-demand circuit, we recommend
that you put demand circuits within OSPF stub areas or within NSSAs to isolate the demand circuits
from as many topology changes as possible.
• Every router within a stub area or NSSA must have this feature loaded in order to take advantage of the
on-demand circuit functionality. If this feature is deployed within a regular area, all other regular areas
must also support this feature before the demand circuit functionality can take effect because Type 5
external LSAs are flooded throughout all areas.
• Hub-and-spoke network topologies that have a point-to-multipoint (P2MP) OSPF interface type on a
hub might not revert to nondemand circuit mode when needed. You must simultaneously reconfigure
OSPF on all interfaces on the P2MP segment when reverting them from demand circuit mode to
nondemand circuit mode.
• Do not implement this feature on a broadcast-based network topology because the overhead protocols
(such as hello and LSA packets) cannot be successfully suppressed, which means the link will remain
up.
• Configuring the router for an OSPF on-demand circuit with an asynchronous interface is not a
supported configuration. The supported configuration is to use dialer interfaces on both ends of the
circuit. For more information, refer to Why OSPF Demand Circuit Keeps Bringing Up the Link .
Logging Neighbors Going Up or Down
1. enable
2. configure terminal
3. router ospf process-id
4. log-adjacency-changes [detail]
5. end
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 router ospf process-id Enables OSPF routing and enters router configuration mode.
Example:
Device(config)# router ospf 109
Step 5 end Exits router configuration mode and returns to privileged EXEC
mode.
Example:
Device(config-router)# end
1. enable
2. configure terminal
3. router ospf process-id
4. timers pacing lsa-group seconds
5. end
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 router ospf process-id Enables OSPF routing and enters router configuration
mode.
Example:
Device(config)# router ospf 109
Step 4 timers pacing lsa-group seconds Changes the group pacing of LSAs.
Example:
Device(config-router)# timers pacing lsa-group
60
On point-to-multipoint networks, to block flooding of OSPF LSAs, use the following command in router
configuration mode:
Command Purpose
Command Purpose
show ip ospf [process-id [area-
id]] database
Command Purpose
Displays OSPF neighbor
show ip ospf neighbor [interface-name] [neighbor-id] detail information on a per-interface
basis.
Displays a list of all LSAs
requested
show ip ospf request-list [neighbor] [interface] by a router.
[interface-neighbor]
[neighbor-id]]}
DETAILED STEPS
Command or Action Purpose
Step 1 show ip ospf flood-list interface-type interface-number Displays a list of OSPF LSAs waiting to be
flooded over an interface.
Example:
Device> show ip ospf flood-list ethernet 1
Router 1 Configuration
hostname Router
1 !
interface serial 1
ip address 10.0.0.2 255.0.0.0 ip ospf
network point-to-multipoint encapsulation
frame-relay frame-relay map ip 10.0.0.1
201 broadcast frame-relay map ip 10.0.0.3
202 broadcast frame-relay map ip 10.0.0.4
203 broadcast !
router ospf 1
network 10.0.0.0 0.0.0.255 area 0
Example: OSPF Point-to-Multipoint with Broadcast
Router 2 Configuration
hostname Router
2 !
interface serial 0
ip address 10.0.0.1 255.0.0.0 ip ospf
network point-to-multipoint encapsulation
frame-relay frame-relay map ip 10.0.0.2
101 broadcast frame-relay map ip 10.0.0.4
102 broadcast !
router ospf 1
network 10.0.0.0 0.0.0.255 area 0
Router 3 Configuration
hostname Router
3 !
interface serial 3
ip address 10.0.0.4 255.0.0.0 ip ospf
network point-to-multipoint encapsulation
frame-relay clock rate 1000000 frame-relay
map ip 10.0.0.1 401 broadcast frame-relay
map ip 10.0.0.2 402 broadcast !
router ospf 1
network 10.0.0.0 0.0.0.255 area 0
Router 4 Configuration
hostname Router
4 !
interface serial 2
ip address 10.0.0.3 255.0.0.0 ip ospf
network point-to-multipoint encapsulation
frame-relay clock rate 2000000 frame-relay
map ip 10.0.0.2 301 broadcast !
router ospf 1
network 10.0.0.0 0.0.0.255 area 0
interface Serial0
ip address 10.0.1.1 255.255.255.0
encapsulation frame-relay
ip ospf cost 100
ip ospf network point-to-multipoint
frame-relay map ip 10.0.1.3 202 broadcast
frame-relay map ip 10.0.1.4 203 broadcast
frame-relay map ip 10.0.1.5 204 broadcast
frame-relay local-dlci 200 !
router ospf 1
network 10.0.1.0 0.0.0.255 area 0
neighbor 10.0.1.5 cost 5
neighbor 10.0.1.4 cost 10
Example: OSPF Point-to-Multipoint with Nonbroadcast
interface serial 0
ip address 10.0.1.3 255.255.255.0 ip ospf
network point-to-multipoint encapsulation
frame-relay frame-relay local-dlci 301
frame-relay map ip 10.0.1.1 300 broadcast
no shutdown !
router ospf 1 network 10.0.1.0
0.0.0.255 area 0
The output shown for neighbors in the first configuration is as follows:
Device# show ip ospf neighbor
Neighbor ID Pri State Dead Time Address Interface
172.16.1.1 1 FULL/ - 00:01:50 10.0.1.5 Serial0
172.16.1.4 1 FULL/ - 00:01:47 10.0.1.4 Serial0
172.16.1.8 1 FULL/ - 00:01:45 10.0.1.3 Serial0
The route information in the first configuration is as follows:
interface Serial0
ip address 10.0.1.1 255.255.255.0
ip ospf network point-to-multipoint non-broadcast
encapsulation frame-relay no keepalive frame-
relay local-dlci 200 frame-relay map ip 10.0.1.3
202 frame-relay map ip 10.0.1.4 203 frame-relay
map ip 10.0.1.5 204 no shutdown !
router ospf 1
network 10.0.1.0 0.0.0.255 area 0
neighbor 10.0.1.3 cost 5
neighbor 10.0.1.4 cost 10
neighbor 10.0.1.5 cost 15
The following example is the configuration for the router on the other side:
interface Serial9/2
ip address 10.0.1.3 255.255.255.0
encapsulation frame-relay
ip ospf network point-to-multipoint non-broadcast
no ip mroute-cache no keepalive no fair-queue
Example: Variable-Length Subnet Masks
interface ethernet 0
ip address 172.16.10.1 255.255.255.0
! 8 bits of host address space reserved for ethernets
interface serial 0
ip address 172.16.20.1 255.255.255.252
! 2 bits of address space reserved for serial
lines ! Router is configured for OSPF and assigned
AS 107 router ospf 107
! Specifies network directly connected to the router
network 172.16.0.0 0.0.255.255 area 0.0.0.0
!
router ospf 1
area 1
nssa ! end
Device 2
Device 3
Device 4
Device 5
Example: OSPF NSSA Area with RFC 3101 Disabled and RFC 1587 Active
In the following example, the output for the show ip ospf and show ip ospf database nssa commands shows
an Open Shortest Path First Not-So-Stubby Area (OSPF NSSA) area where RFC 3101 is disabled, RFC 1587
is active, and an NSSA Area Border Router (ABR) device is configured as a forced NSSA LSA translator. If
RFC 3101 is disabled, the forced NSSA LSA translator remains inactive.
Field Description
Supports NSSA (compatible with RFC 1587) Specifies that RFC 1587 is active or that the OSPF
NSSA area is RFC 1587 compatible.
Configured to translate Type-7 LSAs, inactive Specifies that OSPF NSSA area has an ABR
(RFC3101 support disabled) device configured to act as a forced translator of
Type 7 LSAs. However, it is inactive because RFC
3101 is disabled
Device2# show ip ospf database nssa
AS Boundary Router
Unconditional NSSA translator
Number of Links: 1
Link connected to: a Stub Network
(Link ID) Network/subnet number: 192.0.2.5
(Link Data) Network Mask: 255.255.255.0
Number of MTID metrics: 0
TOS 0 Metrics: 10
The table below describes the show ip ospf database nssa display fields and their descriptions.
Field Description
Unconditional NSSA translator Specifies that NSSA ASBR device is a forced
NSSA
LSA translator
Example: OSPF Routing and Route Redistribution
OSPF typically requires coordination among many internal routers, ABRs, and ASBRs. At a minimum, OSPF-
based routers can be configured with all default parameter values, with no authentication, and with interfaces
assigned to areas.
Three types of examples follow:
• The second example illustrates a configuration for an internal router, ABR, and ASBRs within a single,
arbitrarily assigned, OSPF autonomous system.
• The third example illustrates a more complex configuration and the application of various tools available
for controlling OSPF-based routing environments.
interface ethernet 0
ip address 10.93.1.1 255.255.255.0
ip ospf cost 1
!
interface ethernet 1 ip address
10.94.1.1 255.255.255.0 !
router ospf 9000
network 10.93.0.0 0.0.255.255 area 0.0.0.0
redistribute rip metric 1 subnets !
router rip
network 10.94.0.0
redistribute ospf 9000
default-metric 1
Example: Basic OSPF Configuration for Internal Router ABR and ASBRs
The following example illustrates the assignment of four area IDs to four IP address ranges. In the example,
OSPF routing process 109 is initialized, and four OSPF areas are defined: 10.9.50.0, 2, 3, and 0. Areas
10.9.50.0, 2, and 3 mask specific address ranges, and area 0 enables OSPF for all other networks.
• Router C is an OSPF ABR. Note that for Router C, Area 1 is assigned to E3 and area 0 is assigned to S0.
• Router D is an internal router in area 0 (backbone area). In this case, both network router configuration
commands specify the same area (area 0, or the backbone area).
• Router E is an OSPF ASBR. Note that BGP routes are redistributed into OSPF and that these routes are
advertised by OSPF.
Example: OSPF Routing and Route Redistribution
Note You do not need to include definitions of all areas in an OSPF autonomous system in the configuration of
all routers in the autonomous system. Only the directly connected areas must be defined. In the example
that follows, routes in area 0 are learned by the routers in area 1 (Router A and Router B) when the
ABR (Router C) injects summary LSAs into area 1.
interface ethernet 1
ip address 192.168.1.1 255.255.255.0
router ospf 1
network 192.168.0.0 0.0.255.255 area 1
interface ethernet 2
ip address 192.168.1.2 255.255.255.0
router ospf 202
network 192.168.0.0 0.0.255.255 area 1
Router C Configuration—ABR
interface ethernet 4 ip
address 10.0.0.4 255.0.0.0
interface serial 1
ip address 192.168.2.4 255.255.255.0
router ospf 50
network 192.168.2.0 0.0.0.255 area 0
network 10.0.0.0 0.255.255.255 area 0
Router E Configuration—ASBR
interface ethernet 5 ip
address 10.0.0.5 255.0.0.0
interface serial 2 ip address
172.16.1.5 255.255.255.0
router ospf 65001
network 10.0.0.0 0.255.255.255 area 0
redistribute bgp 109 metric 1 metric-type 1
router bgp 109
network 192.168.0.0
network 10.0.0.0
neighbor 172.16.1.6 remote-as 110
• Route redistribution
The specific tasks outlined in this configuration are detailed briefly in the following descriptions. The figure
below illustrates the network address ranges and area assignments for the interfaces.
• Create a stub area with area ID 36.0.0.0. (Note that the authentication and stub options of the area
router configuration command are specified with separate area command entries, but can be merged into
a single area command.)
• Redistribute IGRP and RIP into OSPF with various options set (including including metric-type, metric,
tag, and subnet).
• Redistribute IGRP and OSPF into RIP.
Examples: Route Map
interface ethernet 0
ip address 192.0.2.201 255.255.255.0
ip ospf authentication-key abcdefgh
ip ospf cost 10
!
interface ethernet 1
The following example redistributes RIP routes with a hop count equal to 1 into OSPF. These routes will be
redistributed into OSPF as external LSAs with a metric of 5, a metric type of Type 1, and a tag equal to 1.
router isis
redistribute ospf 109 route-map 2
redistribute iso-igrp nsfnet route-map 3 !
route-map 2 permit
match route-type external
match tag 5 set
metric 5 set level
level-2 !
route-map 3 permit
match address 2000
set metric 30
With the following configuration, OSPF external routes with tags 1, 2, 3, and 5 are redistributed into RIP with
metrics of 1, 1, 5, and 5, respectively. The OSPF routes with a tag of 4 are not redistributed.
router isis
redistribute rip route-map 1
redistribute iso-igrp remote route-map
1 !
route-map 1 permit
match ip address 1
match clns address 2
set metric 5 set
level level-2 !
access-list 1 permit 192.168.0.0 0.0.255.255
clns filter-set 2 permit 49.0001.0002...
The following configuration example illustrates how a route map is referenced by the default-information
router configuration command. This type of reference is called conditional default origination. OSPF will
originate the default route (network 0.0.0.0) with a Type 2 metric of 5 if 172.16.0.0 is in the routing table.
Note Only routes external to the OSPF process can be used for tracking, such as non-OSPF routes or OSPF
routes from a separate OSPF process.
Router A Configuration
router ospf 1
redistribute ospf 2 subnet
distance ospf external 200 !
router ospf 2
redistribute ospf 1 subnet
distance ospf external 200
Router B Configuration
router ospf 1
redistribute ospf 2 subnet
distance ospf external 200 !
router ospf 2
redistribute ospf 1 subnet
distance ospf external 200 Example:
OSPF over On-Demand Routing
Router A Configuration
Router B Configuration
router ospf
timers pacing lsa-group 60
interface ethernet 0
ip ospf database-filter all out
The following example prevents flooding of OSPF LSAs to point-to-multipoint networks to the neighbor at
IP address 10.10.10.45:
Cisco IOS commands Cisco IOS Master Command List, All Releases
RFCs
RFC Title
Open Shortest Path First version 3 (OSPFv3) is an IPv4 and IPv6 link-state routing protocol that supports
IPv6 and IPv4 unicast address families (AFs).
OSPF automatically prefers a loopback interface over any other kind, and it chooses the highest IP address
among all loopback interfaces. If no loopback interfaces are present, the highest IP address in the device is
chosen. You cannot tell OSPF to use any particular interface.
LSA Types for OSPFv3
• Device LSAs (Type 1)—Describes the link state and costs of a device’s links to the area. These LSAs
are flooded within an area only. The LSA indicates if the device is an Area Border Router (ABR) or
Autonomous System Boundary Router (ASBR), and if it is one end of a virtual link. Type 1 LSAs are
also used to advertise stub networks. In OSPFv3, these LSAs have no address information and are
network-protocol-independent. In OSPFv3, device interface information may be spread across
multiple device LSAs. Receivers must concatenate all device LSAs originated by a given device when
running the SPF calculation.
• Network LSAs (Type 2)—Describes the link-state and cost information for all devices attached to the
network. This LSA is an aggregation of all the link-state and cost information in the network. Only a
designated device tracks this information and can generate a network LSA. In OSPFv3, network
LSAs have no address information and are network-protocol-independent.
• Interarea-prefix LSAs for ABRs (Type 3)—Advertises internal networks to devices in other areas
(interarea routes). Type 3 LSAs may represent a single network or a set of networks summarized into
one advertisement. Only ABRs generate summary LSAs. In OSPFv3, addresses for these LSAs are
expressed as prefix, prefix length instead of address, mask. The default route is expressed as a prefix
with length 0.
• Interarea-device LSAs for ASBRs (Type 4)—Advertises the location of an ASBR. Devices that are
trying to reach an external network use these advertisements to determine the best path to the next
hop. Type 4 LSAs are generated by ABRs on behalf of ASBRs.
• Autonomous system external LSAs (Type 5)—Redistributes routes from another autonomous system,
usually from a different routing protocol into OSPFv3. In OSPFv3, addresses for these LSAs are
expressed as prefix, prefix length instead of address, mask. The default route is expressed as a prefix
with length 0.
• Link LSAs (Type 8)—Have local-link flooding scope and are never flooded beyond the link with
which they are associated. Link LSAs provide the link-local address of the device to all other devices
attached to the link, inform other devices attached to the link of a list of prefixes to associate with the
link, and allow the device to assert a collection of Options bits to associate with the network LSA that
will be originated for the link.
• Intra-Area-Prefix LSAs (Type 9)—A device can originate multiple intra-area-prefix LSAs for each
device or transit network, each with a unique link-state ID. The link-state ID for each intra-area-prefix
LSA describes its association to either the device LSA or the network LSA and contains prefixes for
stub and transit networks.
An address prefix occurs in almost all newly defined LSAs. The prefix is represented by three fields:
PrefixLength, PrefixOptions, and Address Prefix. In OSPFv3, addresses for these LSAs are expressed as
prefix, prefix length instead of address, mask. The default route is expressed as a prefix with length 0. Type
3 and Type 9 LSAs carry all prefix (subnet) information that, in OSPFv2, is included in device LSAs and
network LSAs. The Options field in certain LSAs (device LSAs, network LSAs, interarea-device LSAs,
and link LSAs) has been expanded to 24 bits to provide support for OSPFv3.
In OSPFv3, the sole function of the link-state ID in interarea-prefix LSAs, interarea-device LSAs, and
autonomous-system external LSAs is to identify individual pieces of the link-state database. All addresses
or device IDs that are expressed by the link-state ID in OSPF version 2 are carried in the body of the LSA
in OSPFv3.
Load Balancing in OSPFv3
The link-state ID in network LSAs and link LSAs is always the interface ID of the originating device on the
link being described. For this reason, network LSAs and link LSAs are now the only LSAs whose size
cannot be limited. A network LSA must list all devices connected to the link, and a link LSA must list all of
the address prefixes of a device on the link.
OSPFv3 Customization
You can customize OSPFv3 for your network, but you likely will not need to do so. The defaults for
OSPFv3 are set to meet the requirements of most customers and features. If you must change the defaults,
refer to the IPv6 command reference to find the appropriate syntax.
Caution Be careful when changing the defaults. Changing defaults will affect your OSPFv3 network, possibly
adversely.
SUMMARY STEPS
1. enable
2. configure terminal
3. router ospfv3 [process-id]
4. area area-ID [default-cost | nssa | stub]
5. auto-cost reference-bandwidth Mbps
6. default {area area-ID [range ipv6-prefix | virtual-link router-id]} [default-information originate
[always | metric | metric-type | route-map] | distance | distribute-list prefix-list prefix-list-name {in |
out} [interface] | maximum-paths paths | redistribute protocol | summary-prefix ipv6-prefix]
7. ignore lsa mospf
8. interface-id snmp-if-index
9. log-adjacency-changes [detail]
10. passive-interface [default | interface-type interface-number]
11. queue-depth {hello | update} {queue-size | unlimited}
12. router-id router-id
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
Example:
Device# configure terminal
Step 3 router ospfv3 [process-id] Enters router configuration mode for the IPv4 or
IPv6 address family.
Example:
Device(config)# router ospfv3 1
Example:
Device(config-router)# area 1
Step 5 auto-cost reference-bandwidth Mbps Controls the reference value OSPFv3 uses when
calculating metrics for interfaces in an IPv4 OSPFv3
Example: process.
Device(config-router)# auto-cost reference-
bandwidth 1000
Step 6 default {area area-ID [range ipv6-prefix | virtual-link Returns an OSPFv3 parameter to its default value.
router-id]} [default-information originate [always |
metric | metric-type | route-map] | distance | distribute-
list prefix-list prefix-list-name {in | out} [interface] |
maximum-paths paths | redistribute protocol |
summary-prefix ipv6-prefix]
Example:
Device(config-router)# default area 1
Step 7 ignore lsa mospf Suppresses the sending of syslog messages when the
device receives LSA Type 6 multicast OSPFv3
Example: packets, which are unsupported.
Device(config-router)# ignore lsa mospf
Step 9 log-adjacency-changes [detail] Configures the device to send a syslog message when
an OSPFv3 neighbor goes up or down.
Example:
Device(config-router)# log-adjacency-changes
Example:
Device(config-router)# passive-interface default
Forcing an SPF Calculation
Step 12 router-id router-id Enter this command to use a fixed router ID.
Example:
Device(config-router)# router-id 10.1.1.1
1. enable
2. clear ospfv3 [process-id] force-spf
3. clear ospfv3 [process-id] process
4. clear ospfv3 [process-id] redistribution
5. clear ipv6 ospf [process-id] {process | force-spf | redistribution}
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
Step 2 clear ospfv3 [process-id] force-spf Runs SPF calculations for an OSPFv3 process.
Example: • If the clear ospfv3 force-spf command is configured, it overwrites
Device# clear ospfv3 1 force-spf the clear ipv6 ospf configuration.
• Once the clear ospfv3 force-spf command has been used, the
clear ipv6 ospf command cannot be used.
Device# clear ospfv3 2 process • Once the clear ospfv3 force-spf command has been used, the clear
ipv6 ospf command cannot be used.
• Once the clear ospfv3 force-spf command has been used, the clear
ipv6 ospf command cannot be used.
Step 5 clear ipv6 ospf [process-id] {process | Clears the OSPFv3 state based on the OSPFv3 routing process ID, and
force-spf | redistribution} forces the start of the SPF algorithm.
Example: • If the clear ospfv3 force-spf command is configured, it overwrites
Device# clear ipv6 ospf force-spf the clear ipv6 ospf configuration.
• Once the clear ospfv3 force-spf command has been used, the clear
ipv6 ospf command cannot be used.
SUMMARY STEPS
1. enable
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Step 2 show ospfv3 [process-id] [address-family] border-routers Displays the internal OSPFv3 routing table
entries to an ABR and ASBR.
Example:
Device# show ospfv3 border-routers
Step 3 show ospfv3 [process-id [area-id]] [address-family] database Displays lists of information related to the
[database-summary | internal | external [ipv6-prefix ] [link-state- OSPFv3 database for a specific device.
id] | grace | inter-area prefix [ipv6-prefix | link-state-id] | inter-
area router [destination-router-id | link-state-id] | link [interface
Verifying OSPFv3 Configuration and Operation
Example:
Device# show ospfv3 database
Step 4 show ospfv3 [process-id] [address-family] events [generic | Displays detailed information about OSPFv3
interface | lsa | neighbor | reverse | rib | spf] events.
Example:
Device# show ospfv3 events
Step 5 show ospfv3 [process-id] [area-id] [address-family] flood-list Displays a list of OSPFv3 LSAs waiting to
interface-type interface-number be flooded over an interface.
Example:
Device# show ospfv3 flood-list
Step 6 show ospfv3 [process-id] [address-family] graceful-restart Displays OSPFv3 graceful restart
information.
Example:
Device# show ospfv3 graceful-restart
Step 7 show ospfv3 [process-id] [area-id] [address-family] interface [type Displays OSPFv3-related interface
number] [brief] information.
Example:
Device# show ospfv3 interface
Step 8 show ospfv3 [process-id] [area-id] [address-family] neighbor Displays OSPFv3 neighbor information on a
[interface-type interface-number] [neighbor-id] [detail] per-interface basis.
Example:
Device# show ospfv3 neighbor
Step 9 show ospfv3 [process-id] [area-id] [address-family] request- Displays a list of all LSAs requested by a
list[neighbor] [interface] [interface-neighbor] device.
Example:
Device# show ospfv3 request-list
Configuration Examples for Load Balancing in OSPFv3
Example:
Device# show ospfv3 retransmission-list
Step 11 show ospfv3 [process-id] [address-family] statistic [detail] Displays OSPFv3 SPF calculation
statistics.
Example:
Device# show ospfv3 statistic
Step 12 show ospfv3 [process-id] [address-family] summary-prefix Displays a list of all summary address
redistribution information configured under
Example: an OSPFv3 process.
Device# show ospfv3 summary-prefix
Step 13 show ospfv3 [process-id] [address-family] timers rate-limit Displays all of the LSAs in the rate limit
queue.
Example:
Device# show ospfv3 timers rate-limit
Step 14 show ospfv3 [process-id] [address-family] traffic[interface-type Displays OSPFv3 traffic statistics.
interface-number]
Example:
Device# show ospfv3 traffic
Step 15 show ospfv3 [process-id] [address-family] virtual-links Displays parameters and the current state of
OSPFv3 virtual links.
Example:
Device# show ospfv3 virtual-links
Additional References
Related Documents
Related Topic Document Title
In order to ensure that Open Shortest Path First version 3 (OSPFv3) packets are not altered and re-sent to
the device, OSPFv3 packets must be authenticated. OSPFv3 uses the IPsec secure socket API to add
authentication to OSPFv3 packets. This API supports IPv6.
Configure the IP Security (IPsec) secure socket application program interface (API) on OSPFv3 in order to
enable authentication and encryption.
Information About IPv6 Routing: OSPFv3 Authentication Support with IPsec
• NULL: Do not create a secure socket for the interface if authentication is configured for the area.
• DOWN: IPsec has been configured for the interface (or the area that contains the interface), but OSPFv3
either has not requested IPsec to create a secure socket for this interface, or there is an error condition.
• GOING UP: OSPFv3 has requested a secure socket from IPsec and is waiting for a
CRYPTO_SS_SOCKET_UP message from IPsec.
• UP: OSPFv3 has received a CRYPTO_SS_SOCKET_UP message from IPsec.
• CLOSING: The secure socket for the interface has been closed. A new socket may be opened for the
interface, in which case the current secure socket makes the transition to the DOWN state. Otherwise, the
interface will become UNCONFIGURED.
• UNCONFIGURED: Authentication is not configured on the interface.
How to Configure IPv6 Routing: OSPFv3 Authentication Support with IPsec
OSPFv3 will not send or accept packets while in the DOWN state.
SUMMARY STEPS
1. enable
2. configure terminal 3. interface type number
4. Do one of the following:
• ipv6 ospf authentication {null | ipsec spi spi authentication-algorithm [key-encryption-type] [key]}
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode. •
Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 interface type number Specifies an interface type and number, and places the
device in interface configuration mode.
Example:
Note For Cisco ASR 901 Series Routers, you
Device(config)# interface ethernet 0/0 should configure the OSPFv3 authentication
of the VLAN interface, instead of the physical
interface. See the below example:
Device(config)# interface VLAN 60
Step 4 Do one of the following: Specifies the authentication type for an interface.
• ospfv3 authentication {ipsec spi} {md5 | sha1}{
key-encryption-type key} | null
Example:
Device(config-if)# ospfv3 authentication md5 0
27576134094768132473302031209727
Example:
Or
1. enable
2. configure terminal
3. ipv6 router ospf process-id
4. area area-id authentication ipsec spi spi authentication-algorithm [key-encryption-type] key
Configuration Examples for IPv6 Routing: OSPFv3 Authentication Support with IPsec
IPv6 Routing: OSPFv3 Authentication Support with IPsec
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 ipv6 router ospf process-id Enables OSPFv3 router configuration mode.
Example:
Device(config)# ipv6 router ospf
1
Step 4 area area-id authentication ipsec spi spi authentication- Enables authentication in an OSPFv3 area.
algorithm [key-encryption-type] key
Example:
Device(config-rtr)# area 1 authentication ipsec spi
678 md5 1234567890ABCDEF1234567890ABCDEF
The following example shows how to define authentication on a VLAN interface of the Cisco ASR 901 Series
Router:
interface Vlan60 ipv6 ospf encryption ipsec spi 300 esp 3des
4D92199549E0F2EF009B4160F3580E5528A11A45017F3887
md5 79054025245FB1A26E4BC422AEF54501
IPv6 Routing: OSPF for IPv6 Authentication Support with IPsec “Configuring OSPF ” module in
IP Routing: OSPF Configuration
Guide
Standards and RFCs
Standard/RFC Title
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/index.html
provides online resources to download
documentation, software, and tools. Use these
resources to install and configure the software and
to troubleshoot and resolve technical issues with
Cisco products and technologies. Access to most
tools on the Cisco Support and Documentation
website requires a Cisco.com user ID and
password.
The following table provides release information about the feature or features described in this module.
This table lists only the software release that introduced support for a given feature in a given software
release train. Unless noted otherwise, subsequent releases of that software release train also support that
feature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support.
To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Table 5: Feature Information for IPv6 Routing: OSPF for IPv6 Authentication Support with IPsec
To prevent unauthorized or invalid routing updates in your network, Open Shortest Path First version 2
(OSPFv2) protocol packets must be authenticated.
There are two methods of authentication that are defined for OSPFv2: plain text authentication and
cryptographic authentication. This module describes how to configure cryptographic authentication using
the Hashed Message Authentication Code - Secure Hash Algorithm (HMAC-SHA). OSPFv2 specification
(RFC 2328) allows only the Message-Digest 5 (MD5) algorithm for cryptographic authentication.
However, RFC 5709 (OSPFv2 HMAC-SHA Cryptographic Authentication) allows OSPFv2 to use
HMAC-SHA algorithms for cryptographic authentication.
• Accept lifetime
• Send lifetime
While adding a new key, the Send lifetime is set to a time in the future so that the same key can be
configured on all devices in the network before the new key becomes operational. Old keys are removed
only after the new key is operational on all devices in the network. When packets are received, the key ID
is used to fetch the data for that key. The packet is verified using the cryptographic authentication algorithm
and the configured key ID. If the key ID is not found, the packet is dropped.
Use the ip ospf authentication key-chain command to configure key chains for OSPFv2 cryptographic
authentication.
Note If OSPFv2 is configured to use a key chain, all MD5 keys that were previously configured using the ip
ospf message-digest-key command are ignored.
1. enable
2. configure terminal
3. key chain name
4. key key-id
5. key-string name
6. cryptographic-algorithm name
7. send-lifetime start-time {infinite | end-time | duration seconds}
8. end
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 key chain name Specifies the key chain name and enters key-chain
configuration mode.
Example:
Device(config)# key chain sample1
Step 4 key key-id Specifies the key identifier and enters key-chain key
configuration mode. The range is from 1 to 255.
Example:
Device(config-keychain)# key 1
Example:
Device(config-keychain-key)# key-string
string1
Step 6 cryptographic-algorithm name Configures the key with the specified cryptographic
algorithm.
Example:
Device(config-keychain-key)# cryptographic-
algorithm hmac-sha-256
Step 7 send-lifetime start-time {infinite | end-time | duration Sets the time period during which an authentication key
seconds} on a key chain is valid to be sent during key exchange
with another device.
Example:
Device(config-keychain-key)# send-lifetime
local 10:00:00 5 July 2013 infinite
1. enable
2. configure terminal
3. interface type number
4. ip ospf authentication key-chain name
5. end
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
82
Configuration Examples for OSPFv2 Cryptographic Authentication
Example:
Device# configure terminal
Step 3 interface type number Specifies an interface type and number and enters
interface configuration mode.
Example:
Device(config)# interface gigabitethernet0/0/0
Step 4 ip ospf authentication key-chain name Specifies the key chain for an interface.
Example:
Device(config-if)# ip ospf authentication key-
chain ospf1
Field Description
accept lifetime The time interval within which the device accepts
the key during key exchange with another device.
send lifetime The time interval within which the device sends the
key during a key exchange with another device.
Field Description
GigabitEthernet Status of the physical link and operational status of
the protocol.
Cisco IOS commands Cisco IOS Master Command List, All Releases
CHAPTER 6 OSPFv3
External Path
Preference Option
The Open Shortest Path First version 3 (OSPFv3) external path preference option feature provides a way to
calculate external path preferences per RFC 5340.
• The other paths, intraarea backbone paths and interarea paths, are of equal preference.
How to Calculate OSPFv3 External Path Preference Option
These rules apply when the same ASBR is reachable through multiple areas, or when trying to decide
which of several AS-external-LSAs should be preferred. In the former case the paths all terminate at the
same ASBR, and in the latter the paths terminate at separate ASBRs or forwarding addresses. In either case,
each path is represented by a separate routing table entry. This feature applies only when RFC 1583
compatibility is set to disabled using the no compatibility rfc1583 command (RFC 5340 provides an
update to RFC 1583).
Caution To minimize the chance of routing loops, set identical RFC compatibility for all OSPF routers in an OSPF routing
domain.
1. enable
Example:
Device# configure terminal
1 2. configureterminal
Step 3 router ospfv2 [process-id] Enables OSPFv3 router configuration mode for the
IPv3or IPv6 address family.
Example:
Device(config)# router ospfv3 1
DETAILED STEPS
The following table provides release information about the feature or features described in this module. This
table lists only the software release that introduced support for a given feature in a given software release
train. Unless noted otherwise, subsequent releases of that software release train also support that feature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support.
To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
CHAPTER 7 OSPFv3
Graceful Restart
The graceful restart feature in Open Shortest Path First version 3 (OSPFv3) allows nonstop data forwarding
along routes that are already known while the OSPFv3 routing protocol information is being restored.
To perform the graceful restart function, a device must be in high availability (HA) stateful switchover
(SSO) mode (that is, dual Route Processor (RP)). A device capable of graceful restart will perform the
graceful restart function when the following failures occur:
The graceful restart feature requires that neighboring devices be graceful-restart aware.
For further information about SSO and nonstop forwarding (NSF), see the Stateful Switchover and Cisco
Nonstop Forwarding documents.
SUMMARY STEPS
1. enable
2. configure terminal
3. router ospfv3 [process-id]
4. graceful-restart [restart-interval interval]
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Example:
Router# configure terminal
Step 3 router ospfv3 [process-id] Enables OSPFv3 router configuration mode for the
IPv4 or IPv6 address family.
Example:
Router(config)# router ospfv3 1
Enabling OSPFv3 Graceful Restart on a Graceful-Restart-Capable Router
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 router ospf process-id
4. graceful-restart [restart-interval interval]
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Example:
Router# configure terminal
Step 3 ipv6 router ospf process-id Enables OSPFv3 router configuration mode.
Example:
Router(config)# ipv6 router ospf 1
Step 4 graceful-restart [restart-interval interval] Enables the OSPFv3 graceful restart feature on a
graceful-restart-capable router.
Example:
Router(config-rtr)# graceful-restart
Enabling OSPFv3 Graceful Restart on a Graceful-Restart-Aware Router
SUMMARY STEPS
1. enable
2. configure terminal
3. router ospfv3 [process-id]
4. graceful-restart helper {disable | strict-lsa-checking
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Example:
Router# configure terminal
Step 3 router ospfv3 [process-id] Enables OSPFv3 router configuration mode for the
IPv4 or IPv6 address family.
Example:
Router(config)# router ospfv3 1
Step 4 graceful-restart helper {disable | strict-lsa-checking Enables the OSPFv3 graceful restart feature on a
graceful-restart-aware router.
Example:
Router(config-rtr)# graceful-restart helper
strict-lsa-checking
Example:
What to Do Next
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 router ospf process-id
4. graceful-restart helper {disable | strict-lsa-checking
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Example:
Router# configure terminal
Step 3 ipv6 router ospf process-id Enables OSPFv3 router configuration mode.
Example:
Router(config)# ipv6 router ospf 1
Step 4 graceful-restart helper {disable | strict-lsa-checking Enables the OSPFv3 graceful restart feature on a
graceful-restart-aware router.
Example:
Router(config-rtr)# graceful-restart helper
strict-lsa-checking
Example:
What to Do Next
Additional References
Related Documents
Additional References
release train. Unless noted otherwise, subsequent releases of that software release train also support that
feature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support.
To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
This feature provides the ability to temporarily shut down an Open Shortest Path First version 3 (OSPFv3)
process or interface in the least disruptive manner, and to notify its neighbors that it is going away. A
graceful shutdown of a protocol can be initiated on all OSPFv3 interfaces or on a specific interface.
another path through the network will be directed to that alternate path. A graceful shutdown of the
OSPFv3 protocol can be initiated using the shutdown command in router configuration mode or in address
family configuration mode.
How to Configure Graceful Shutdown Support for OSPFv3
This feature also provides the ability to shut down OSPFv3 on a specific interface. In this case, OSPFv3
will not advertise the interface or form adjacencies over it; however, all of the OSPFv3 interface
configuration will be retained. To initiate a graceful shutdown of an interface, use the ipv6 ospf shutdown
or the ospfv3 shutdown command in interface configuration mode.
1. enable
2. configure terminal
3. Do one of the following:
4. shutdown
5. end
6. Do one of the following:
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 Do one of the following: Enables OSPFv3 routing and enters router
configuration mode.
• ipv6 router ospf process-id
• router ospfv3 process-id
Example:
Device(config)# ipv6 router ospf 1
Example:
Device(config)# router ospfv3 101
Example:
Device(config-router)# shutdown
Example:
Device(config-router)# end
Example:
Device# show ipv6 ospf
Example:
Device# show ospfv3
Configuration Mode
SUMMARY STEPS
1. enable
2. configure terminal
3. router ospfv3 [process-id]
4. address-family ipv6 unicast [vrf vrf-name]
5. shutdown
6. end
7. show ospfv3 [process-id]
Configuring Graceful Shutdown of the OSPFv3 Process in Address-Family Configuration Mode
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 router ospfv3 [process-id] Enables router configuration mode for the IPv6
address family.
Example:
Device(config)# router ospfv3 1
Step 4 address-family ipv6 unicast [vrf vrf-name] Enters IPv6 address family configuration mode for
OSPFv3.
Example:
Device(config-router)#address-family ipv6
Example:
Device(config-router-af)# shutdown
Example:
Device(config-router-af)# end
1. enable
2. configure terminal
3. interface type number
4. Do one of the following:
• ospfv3 shutdown
5. end
6. show ospfv3 process-id [ area-id ] [ address-family ] [ vrf {vrf-name | * }] interface [type number]
[brief]
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 interface type number Configures an interface type and number and enters
interface configuration mode.
Example:
Device(config)# interface GigabitEthernet
Step 4 Do one of the following: Initiates an OSPFv3 protocol graceful shutdown at the
interface level.
• ipv6 ospf shutdown
• When the ipv6 ospf shutdown interface command is
• ospfv3 shutdown entered, the interface on which it is configured sends
a link-state update advising its neighbors that is going
down, which allows those neighbors to begin routing
Example: OSPFv3 traffic around this device.
Device(config-if)# ipv6 ospf shutdown
Example:
Device(config-if)# ospfv3 process-id ipv6
shutdown
Example:
Device(config-if)# end
Step 6 show ospfv3 process-id [ area-id ] [ address-family ] (Optional) Displays OSPFv3-related interface information.
[ vrf {vrf-name | * }] interface [type number] [brief]
Example:
Device# show ospfv3 1 interface
The following example shows how to configure graceful shutdown of the OSPFv3 process in router
OSPFv3 configuration mode:
!
router ospfv3 1
shutdown
! address-family ipv6
unicast
exit-address-family
The following example shows how to configure graceful shutdown of the OSPFv3 process in address-
family configuration mode:
!
router ospfv3 1 ! address-
family ipv6 unicast
shutdown exit-address-
family Example: Configuring
Graceful Shutdown of the OSPFv3
Interface
Cisco IOS commands Cisco IOS Master Command List, All Releases
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/
provides online resources to download index.html
documentation, software, and tools. Use these
resources to install and configure the software and
to troubleshoot and resolve technical issues with
Cisco products and technologies. Access to most
tools on the Cisco Support and Documentation
website requires a Cisco.com user ID and
password.
Feature Information for Graceful Shutdown Support for OSPFv3
Table 11: Feature Information for Graceful Shutdown Support for OSPFv3
Graceful Shutdown Support for Cisco IOS XE Release 3.8 This feature provides the ability
OSPFv3 to temporarily shut down an
Open Shortest Path First version
3 (OSPFv3) process or interface
in the least disruptive manner,
and to notify its neighbors that it
is going away.
A graceful shutdown of a
protocol can be initiated on all
OSPFv3 interfaces or on a
specific interface.
The following commands were
introduced:
The OSPF Stub Router Advertisement feature allows you to bring a new router into a network without
immediately routing traffic through the new router and allows you to gracefully shut down or reload a router
without dropping packets that are destined for other networks.
options that allow you to configure a router that is running the Open Shortest Path First (OSPF) protocol to
advertise a maximum or infinite metric to all neighbors.
When any of these three configuration options are enabled on a router, the router will originate link-state
advertisements (LSAs) with a maximum metric (LSInfinity: 0xFFFF) through all nonstub links. The
advertisement of a maximum metric causes other routers to assign a cost to the new router that is higher than
the cost of using an alternate path. Because of the high cost assigned to paths that pass through the new router,
other routers will not use a path through the new router as a transit path to forward traffic that is destined for
other networks, which allows switching and routing functions to be up and running and routing tables to
converge before transit traffic is routed through this router.
Note Directly connected links in a stub network are not affected by the configuration of a maximum or infinite metric
because the cost of a stub link is always set to the output interface cost.
• You can configure a timer to advertise a maximum metric when the router is started or reloaded. When
this option is configured, the router will advertise a maximum metric, which forces neighbor routers to
select alternate paths until the timer expires. When the timer expires, the router will advertise accurate
(normal) metrics, and other routers will send traffic to this router depending on the cost. The configurable
range of the timer is from 5 to 86,400 seconds.
• You can configure a router to advertise a maximum metric at startup until BGP routing tables converge or
until the default timer expires (600 seconds). Once BGP routing tables converge or the default timer
expires, the router will advertise accurate (normal) metrics and other routers will send traffic to this
router, depending on the cost.
occur when there is a switch between other routers and the router that is shut down. Packets may be dropped
while the neighbor routing tables reconverge.
Benefits of OSPF Stub Router Advertisement
When this third option is configured, the router advertises a maximum metric, which allows neighbor routers to
select alternate paths before the router is shut down. This configuration option could also be used to remove a
router that is in a critical condition from the network without affecting traffic that is destined for other
networks.
Note You should not save the running configuration of a router when it is configured for a graceful shutdown
because the router will continue to advertise a maximum metric after it is reloaded.
DETAILED STEPS
Command or Action Purpose
Step 1 Router(config)# router ospf process-id Places the router in router configuration mode and enables an OSPF
routing process.
Step 2 Router(config-router)# max-metric Configures OSPF to advertise a maximum metric during startup for a
router-lsa on-startup announce-time configured period of time. The announce-time argument is a configurable
timer that must follow the on-startup keyword to be configured. There is
Configuring Advertisement Until Routing Tables Converge
DETAILED STEPS
Command or Action Purpose
Step 1 Router(config)# router ospf process-id Places the router in router configuration mode and enables an OSPF
routing process.
Step 2 Router(config-router)# max-metric Configures OSPF to advertise a maximum metric until BGP routing
router-lsa on-startup wait-for-bgp tables have converged or until the default timer has expired. The wait-
for-bgp keyword must follow the on-startup keyword to be
configured. The default timer value is 600 seconds.
DETAILED STEPS
Command or Action Purpose
Step 1 Router(config)# router ospfprocess-id Places the router in router configuration mode and enables an OSPF
routing process.
Verifying the Advertisement of a Maximum Metric
Step 3 Router(config-router)# end Ends configuration mode and places the router in privileged EXEC
mode.
Step 4 Router# show ip ospf Displays general information about OSPF routing processes.
• Use the show ip ospf command to verify that the max-metric
router-lsa command has been enabled before the router is shut
down or reloaded.
What to Do Next
Note Do not save the running configuration of a router when it is configured for a graceful shutdown because the
router will continue to advertise a maximum metric after it is reloaded.
Checksum: 0x175D
Length: 60
Area Border Router
AS Boundary Router
Number of Links: 3
Additional References
Related Documents
Related Topic Document Title
Cisco IOS commands Cisco IOS Master Commands
List,
All Releases
OSPF commands: complete command syntax, command mode, Cisco IOS IP Routing: OSPF
defaults, command history, usage guidelines, and examples Command Reference
Alternates
Feature Information for OSPF Stub Router Advertisement
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/
provides online resources to download index.html
documentation, software, and tools. Use these
resources to install and configure the software and
to troubleshoot and resolve technical issues with
Cisco products and technologies. Access to most
tools on the Cisco Support and Documentation
website requires a Cisco.com user ID and
password.
• max-metric router-lsa
• show ip ospf
Feature Information for OSPF Stub Router Advertisement
HAPTER 10
OSPF Update Packet-Pacing Configurable
Timers
This module describes the OSPF Update Packet-Pacing Configurable Timers feature, which allows you to
configure the rate at which OSPF LSA flood pacing, retransmission pacing, and group pacing updates occur.
• Configuring OSPF flood pacing timers allows you to control interpacket spacing between consecutive
link-state update packets in the OSPF transmission queue.
• Configuring OSPF retransmission pacing timers allows you to control interpacket spacing between
consecutive link-state update packets in the OSPF retransmission queue.
• Cisco IOS XE software groups the periodic refresh of LSAs to improve the LSA packing density for the
refreshes in large topologies. The group timer controls the interval that is used for group LSA
refreshment; however, this timer does not change the frequency at which individual LSAs are refreshed
(the default refresh occurs every 30 minutes).
Caution The default settings for OSPF packet-pacing timers are suitable for the majority of OSPF deployments.
You should change the default timers only as a last resort.
Caution The default settings for OSPF packet-pacing timers are suitable for the majority of OSPF deployments. You
should change the default timers only as a last resort.
To configure a flood packet-pacing timer, use the following commands beginning in global configuration
mode:
SUMMARY STEPS
DETAILED STEPS
Command or Action Purpose
Step 1 Router(config)# router ospf process-id Places the router in router configuration mode and enables
an OSPF routing process.
Step 2 Router(config-router)# timers pacing flood Configures a flood packet-pacing timer delay (in
milliseconds milliseconds).
SUMMARY STEPS
DETAILED STEPS
Command or Action Purpose
Step 1 Router(config)# router ospf process-id Places the router in router configuration mode and enables
an OSPF routing process.
Step 2 Router(config-router)# timers pacing Configures a retransmission packet-pacing timer delay (in
retransmission milliseconds milliseconds).
SUMMARY STEPS
DETAILED STEPS
Command or Action Purpose
Step 1 Router(config)# router ospf process-id Places the router in router configuration mode and enables
an OSPF routing process.
Step 2 Router(config-router)# timers pacing lsa-group Configures an LSA group packet-pacing timer delay (in
seconds seconds).
Troubleshooting Tips
If the number of OSPF packet retransmissions rapidly increases, increase the value of the packet-pacing timers.
The number of OSPF packet retransmissions is displayed in the output of the show ip ospf neighbor command.
Additional References
For additional information related to the OSPF Update Packet-Pacing Configurable Timers feature, see the
following references:
Related Documents
Related Topic Document Title
Cisco IOS master command list, all releases Cisco IOS Master Command List, All Releases
Standards
Standard Title
RFCs
RFC Title
Table 13: Feature Information for OSPF Update Packet-Pacing Configurable Timers
• timers pacing
retransmission
• show ip ospf
APTER 11
OSPF Sham-Link Support for MPLS VPN
This document describes how to configure and use a sham-link to connect Virtual Private Network (VPN)
client sites that run the Open Shortest Path First (OSPF) protocol and share backdoor OSPF links in a
Multiprotocol Label Switching (MPLS) VPN configuration.
When OSPF is used to connect PE and CE routers, all routing information learned from a VPN site is placed in
the VPN routing and forwarding (VRF) instance associated with the incoming interface. The PE routers that
attach to the VPN use the Border Gateway Protocol (BGP) to distribute VPN routes to each other. A CE router
can then learn the routes to other sites in the VPN by peering with its attached PE router. The MPLS VPN
superbackbone provides an additional level of routing hierarchy to interconnect the VPN sites running OSPF.
When OSPF routes are propagated over the MPLS VPN backbone, additional information about the prefix in
the form of BGP extended communities (route type, domain ID extended communities) is appended to the
BGP update. This community information is used by the receiving PE router to decide the type of link-state
advertisement (LSA) to be generated when the BGP route is redistributed to the OSPF PE-CE process. In this
way, internal OSPF routes that belong to the same VPN and are advertised over the VPN backbone are seen as
interarea routes on the remote sites.
For basic information about how to configure an MPLS VPN, refer to the Cisco IOS XE MPLS Configuration
Guide, Release 2.
For example, the figure above shows three client sites, each with backdoor links. Because each site runs OSPF within
the same Area 1 configuration, all routing between the three sites follows the intraarea path across the backdoor links,
rather than over the MPLS VPN backbone.
The following example shows BGP routing table entries for the prefix 10.3.1.7/32 in the PE-1 router in the figure
above. This prefix is the loopback interface of the Winchester CE router. As shown in bold in this example, the
loopback interface is learned via BGP from PE-2 and PE-3. It is also generated through redistribution into BGP on
PE-1.
Known via "ospf 100", distance 110, metric 86, type intra area
Redistributing via bgp 215
Advertised by bgp 215
Last update from 10.2.1.38 on Serial0/0/0, 00:00:17 ago Routing Descriptor Blocks:
* 10.2.1.38
, from 10.3.1.7, 00:00:17 ago, via Serial0/0/0
Route metric is 86, traffic share count is 1
This path is selected because:
• The OSPF intra-area path is preferred over the interarea path (over the MPLS VPN backbone) generated by the PE-1 router.
• OSPF has a lower administrative distance (AD) than internal BGP (BGP running between routers in the same autonomous
system).
If the backdoor links between sites are used only for backup purposes and do not participate in the VPN service, then the default route
selection shown in the preceding example is not acceptable. To reestablish the desired path selection over the MPLS VPN backbone,
you must create an additional OSPF intra-area (logical) link between ingress and egress VRFs on the relevant PE routers. This link is
called a sham-link.
A sham-link is required between any two VPN sites that belong to the same OSPF area and share an OSPF backdoor link. If no
backdoor link exists between the sites, no sham-link is required.
The figure below shows a sample sham-link between PE-1 and PE-2. A cost is configured with each sham-link and is used to decide
whether traffic will be sent over the backdoor path or the sham-link path. When a sham-link is configured between PE routers, the PEs
can populate the VRF routing table with the OSPF routes learned over the sham-link.
Because the sham-link is seen as an intra-area link between PE routers, an OSPF adjacency is created and database exchange (for the
particular OSPF process) occurs across the link. The PE router can then flood LSAs between sites from across the MPLS VPN
backbone. As a result, the desired intra-area connectivity is created.
How to Configure an OSPF Sham-Link
• Configure a separate /32 address on the remote PE so that OSPF packets can be sent over the VPN
backbone to the remote end of the sham-link. The /32 address must meet the following criteria:
• Belong to a VRF.
• Be advertised by BGP.
SUMMARY STEPS
DETAILED STEPS
Command or Action Purpose
Step 1 Router1# configure terminal Enters global configuration mode on the first PE router.
Step 2 Router1(config)# ip vrf vrf-name Defines a VPN routing and forwarding (VRF) instance and enters
VRF configuration mode.
Step 3 Router1(config-vrf)# exit Exits VRF configuration mode and returns to global confiuration
mode.
Step 4 Router1(config)# interface loopback Creates a loopback interface to be used as an endpoint of the
interface-number sham-link on PE-1 and enters interface configuration mode.
Step 5 Router1(config-if)# ip vrf forwarding vrf- Associates the loopback interface with a VRF. Removes the IP
name address.
Step 6 Router1(config-if)# ip address ip-address Reconfigures the IP address of the loopback interface on PE-1.
mask
Step 7 Router1(config-if)# end Returns to global configuration mode.
Step 9 Router2# configure terminal Enters global configuration mode on the second PE router.
Step 10 Router2(config)# interface loopback Creates a loopback interface to be used as the endpoint of the
interface-number sham-link on PE-2 and enters interface configuration mode.
Step 11 Router2(config-if)# ip vrf forwarding vrf- Associates the second loopback interface with a VRF. Removes
name the IP address.
Step 12 Router2(config-if)# ip address ip-address Reconfigures the IP address of the loopback interface on PE-2.
mask
Step 13 Router2(config-if)# end Returns to global configuration mode.
Step 15 Router1(config)# router ospf process-id vrf Configures the specified OSPF process with the VRF associated
vrf-name with the sham-link interface on PE-1 and enters interface
configuration mode.
Step 16 Router1(config-if)# area area-id sham-link Configures the sham-link on the PE-1 interface within a specified
source-address destination-address cost OSPF area and with the loopback interfaces specified by the IP
number addresses as endpoints. cost number configures the OSPF cost for
sending an IP packet on the PE-1 sham-link interface.
Step 17 Router2(config)# router ospf process-id vrf Configures the specified OSPF process with the VRF associated
vrf-name with the sham-link interface on PE-2 and enters interface
configuration mode.
Step 18 Router2(config-if)# area area-id sham-link Configures the sham-link on the PE-2 interface within a specified
source-address destination-address cost OSPF area and with the loopback interfaces specified by the IP
number
Verifying Sham-Link Creation
The figure below shows a sample MPLS VPN topology in which a sham-link configuration is necessary. A
VPN client has three sites, each with a backdoor link. Two sham-links have been configured, one between PE-1 and PE-2, and another
between PE-2 and PE-3. A sham-link between PE-1 and PE-3 is not necessary in this configuration because the Vienna and
Winchester sites do not share a backdoor link.
The following output shows the forwarding that occurs between sites from the standpoint of how PE-1 views the 10.3.1.7/32 prefix,
the loopback1 interface of the Winchester CE router in the figure.
10.3.1.7/32 10.3.1.2
notag/38
PE-1# show tag-switching forwarding 10.3.1.2
Local Outgoing Prefix Bytes tag Outgoing Next Hop
tag tag or VC or Tunnel Id switched interface
31 42 10.3.1.2/32
0 PO3/0/0 point2point
PE-1# show ip cef vrf ospf 10.3.1.7
10.3.1.7/32, version 73, epoch 0, cached adjacency to POS3/0/0
0 packets, 0 bytes tag
information set
local tag: VPN-route-head
fast tag rewrite with PO3/0/0, point2point, tags imposed: {42 38
} via 10.3.1.2
, 0 dependencies, recursive next hop 10.1.1.17,
POS3/0/0 via 10.3.1.2/32 valid cached adjacency
tag rewrite with PO3/0/0, point2point, tags imposed: {42 38}
If a prefix is learned across the sham-link and the path via the sham-link is selected as the best, the PE router
does not generate an MP-BGP update for the prefix. It is not possible to route traffic from one sham-link over
another sham-link.
In the following output, PE-2 shows how an MP-BGP update for the prefix is not generated. Although
10.3.1.7/32 has been learned via OSPF across the sham-link as shown in bold, no local generation of a route
into BGP is performed. The only entry within the BGP table is the MP-BGP update received from PE-3 (the
egress PE router for the 10.3.1.7/32 prefix).
Router1(config)
# interface loopback 1
Router1(config-if)# ip vrf forwarding ospf
Router1(config-if)# ip address 10.2.1.1 255.255.255.255 !
Router2(config)# interface loopback 1
Router2(config-if)# ip vrf forwarding ospf
Router2(config-if)# ip address 10.2.1.2 255.255.255.255 !
Additional References
Additional References
The following sections provide references related to the OSPF Sham-Link Support for MPLS VPN feature.
Related Documents
Related Topic Document Title
Cisco IOS master command list, all releases Cisco IOS Master Command List, All Releases
None --
MIBs
MIB MIBs Link
No new or modified MIBs are supported by this To locate and download MIBs for selected
feature, and support for existing MIBs has not been platforms, Cisco IOS XE releases, and feature sets,
modified by this feature. use Cisco MIB Locator found at the following
URL:
http://www.cisco.com/go/mibs
RFCs
RFC Title
RFC Title
RFC 2328 Open Shortest Path First, Version 2
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/
provides online resources to download index.html
documentation, software, and tools. Use these
resources to install and configure the software and
to troubleshoot and resolve technical issues with
Cisco products and technologies. Access to most
tools on the Cisco Support and Documentation
website requires a Cisco.com user ID and
password.
Table 14: Feature Information for OSPF Sham-Link Support for MPLS VPN
Glossary
BGP --Border Gateway Protocol. Interdomain routing protocol that exchanges reachability information with
other BGP systems. It is defined in RFC 1163.
CE router --customer edge router. A router that is part of a customer network and that interfaces to a provider
edge (PE) router. CE routers are not aware of associated VPNs.
CEF -- Cisco Express Forwarding. An advanced Layer 3 IP switching technology. CEF optimizes network
performance and scalability for networks with large and dynamic traffic patterns.
IGP --Interior Gateway Protocol. An Internet protocol used to exchange routing information within an
autonomous system. Examples of common IGPs include IGRP, OSPF, and RIP.
LSA --link-state advertisement. A broadcast packet used by link-state protocols. The LSA contains information
about neighbors and path costs and is used by the receiving router to maintain a routing table.
MPLS --Multiprotocol Label Switching. Emerging industry standard upon which tag switching is based.
OSPF --Open Shortest Path First protocol.
PE router --provider edge router. A router that is part of a service provider network connected to a customer
edge (CE) router. All VPN processing occurs in the PE router.
SPF --shortest path first calculation.
VPN --Virtual Private Network. A secure IP-based network that shares resources on one or more physical
networks. A VPN contains geographically dispersed sites that can communicate securely over a shared
backbone.
VRF --VPN routing and forwarding instance. A VRF consists of an IP routing table, a derived forwarding
table, a set of interfaces that use the forwarding table, and a set of rules and routing protocols that determine
what goes into the forwarding table. In general, a VRF includes the routing information that defines a customer
VPN site that is attached to a PE router.
Glossary
HAPTER 12
OSPF Support for Multi-VRF on CE Routers
The OSPF Support for Multi-VRF on CE Routers feature provides the capability to suppress provider edge
(PE) checks that are needed to prevent loops when the PE is performing a mutual redistribution of packets
between the OSPF and BGP protocols. When VPN routing and forwarding (VRF) is used on a router that is
not a PE (that is, one that is not running BGP), the checks can be turned off to allow for correct population of
the VRF routing table with routes to IP prefixes.
OSPF multi-VRF allows you to split the router into multiple virtual routers, where each router contains its own
set of interfaces, routing table, and forwarding table.
between the OSPF and BGP protocols. When VPN routing and forwarding (VRF) is used on a router that is not
a PE (that is, one that is not running BGP), the checks can be turned off to allow for correct population of the
VRF routing table with routes to IP prefixes.
OSPF multi-VRF allows you to split the router into multiple virtual routers, where each router contains its own
set of interfaces, routing table, and forwarding table. OSPF multi-VRF gives you the ability to segment parts of
your network and configure those segments to perform specific functions, yet still maintain correct routing
information.
SUMMARY STEPS
1. enable
2. show ip ospf [process-id
3. configure terminal
4. vpdn- group name
5. exit
6. resource-pool profile vpdn name
7. vpdn group name
8. vpn vrf vrf-name | id vpn-id
9. exit
10. router ospf process-id [vrf vpn-name]
11. capability vrf-lite
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables higher privilege levels, such as privileged EXEC mode.
Step 2 show ip ospf [process-id Displays the status of the router. If the display indicates that the
router is connected to the VPN backbone, you can use the
Example: capability vrf-lite command to decouple the PE router from
the VPN backbone.
Router# show ip ospf 1
pose
Example:
Router(config-router)# capability vrf-
lite
!
ip cef ip vrf
grc
rd 1:1
interface Serial2/0/0
ip vrf forwarding grc ip address
192.168.1.1 255.255.255.252 ! interface
Serial3/0/0
Additional References
Additional References
For additional information related to OSPF support for multi-VRF on CE routers, see the following references.
Related Documents
Related Topic Document Title
Cisco IOS master command list, all releases Cisco IOS Master Command List, All Releases
Additional References
Standards
Standard Title
Table 15: Feature Information for OSPF Support for Multi-VRF on CE Routers
• capability vrf-lite
Glossary
CE Router --Customer Edge router, an edge router in the C network, defined as a C router which attaches
directly to a P router.
C Network --Customer (enterprise or service provider) network.
PE Router --Provider Edge router, an edge router in the P network, defined as a P router which attaches directly to a
C router.
P Network --MPLS-capable service provider core network. P routers perform MPLS.
P Router --Provider router, a router in the P network.
SPF --shortest path first. A routing algorithm that iterates on length of path to determine a shortest-path spanning tree.
VPN --Virtual Private Network. Enables IP traffic to travel securely over a public TCP/IP network by encrypting all
traffic from one network to another.
VRF --VPN Routing and Forwarding.
This module describes how to configure multiarea adjacency for Open Shortest Path First version 2
(OSPFv2). You can add more than one area to an existing OSPFv2 primary interface. The additional
logical interfaces support multiarea adjacency.
• Exists as a logical construct over a primary interface for OSPF; however, the neighbor state on the
primary interface is independent of the multiarea interface.
• Establishes a neighbor relationship with the corresponding multiarea interface on the neighboring
device. A mixture of multiarea and primary interfaces is not supported.
• Advertises an unnumbered point-to-point link in the device link-state advertisement (LSA) for the
corresponding area when the neighbor state is full.
• Inherits all the OSPF parameters (such as, authentication) from the primary interface. You cannot
configure the parameters on a multiarea interface; however, you can configure the parameters on the
primary interface.
1. enable
2. configure terminal
3. interface type number
4. ip address ip-address mask
5. ip ospf proces-id area area-id
6. ip ospf network point-to-point
7. ip ospf multi-area multi-area-id
8. ip ospf multi-area multi-area-id cost interface-cost
9. end
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 interface type number Specifies an interface and enters interface configuration
mode.
Example:
Device(config)# interface Ethernet 0/0
Example:
Device(config)# ip address 10.0.12.1
255.255.255.0
Step 5 ip ospf proces-id area area-id Configures the primary OSPF interface.
• The process-id argument identifies the OSPF process.
Example: The range is from 1 to 65535.
Device (config-if)# ip ospf 10 area 8
Example:
Device (config-if)# ip ospf network point-
to-point
Step 8 ip ospf multi-area multi-area-id cost interface- (Optional) Specifies the cost of sending a packet on an Open
cost Shortest Path First (OSPF) multiarea interface,
Example:
Device (config-if)# ip ospf multi-area 11
cost 10
Step 9 end Exits interface configuration mode and returns to privileged
EXEC mode.
Example:
Device(config-if)# end
The following is a sample output from the show ip ospf 2 multi-area command.
Device# show ip ospf 2 multi-area
The following is a sample output from the show ip ospf interface command.
Device# show ip ospf interface
Next 0x0(0)/0x0(0)
Last flood scan length is 1, maximum is 2
Last flood scan time is 0 msec, maximum is 0 msec
Neighbor Count is 1, Adjacent neighbor count is 1 Adjacent
with neighbor 10.0.0.1
Suppress hello for 0 neighbor(s)
Cisco IOS commands Cisco IOS Master Command List, All Releases
RFCs
RFC Title
CHAPTER 14
OSPFv2 Autoroute Exclude
The OSPFv2 Autoroute Exclude feature allows specific destinations and prefixes to avoid Traffic
Engineering (TE) tunnels for the packet transport. The rest of the prefixes can still be set to use TE
tunnels. Prefixes that are excluded do not use a TE tunnel path. Only native non-TE paths are downloaded
to RIB for such routes. This module describes how to configure the OSPFv2 Autoroute Exclude feature.
Your software release may not support all the features documented in this module. For the latest caveats
and feature information, see Bug Search Tool and the release notes for your platform and software release.
To find information about the features documented in this module, and to see a list of the releases in which
each feature is supported, see the feature information table.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support.
To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
1. enable
2. configure terminal
3. router ospf process-ID
4. router-id ip-address
5. mpls traffic-eng router-id interface-name
6. mpls traffic-eng areanumber
7. mpls traffic-eng autoroute-exclude prefix-list prefix-list-name
8. exit
DETAILED STEPS
Command or Action Purpose
Example:
Device# configure terminal
Step 3 router ospf process-ID Configures OSPF routing process and enters OSPF router
configuration mode.
Example:
Device(config)# router ospf 18
Step 5 mpls traffic-eng router-id interface-name Specifies the traffic engineering router identifier for the
node and the IP address associated with a given interface.
Example:
Device(config-router)# mpls traffic-eng
router-id Loopback0
Step 6 mpls traffic-eng areanumber Configures a router running OSPF MPLS so that it floods
traffic engineering for the indicated OSPF area.
Example:
Device(config-router)# mpls traffic-eng area
0
Step 7 mpls traffic-eng autoroute-exclude prefix-list Allows specific destinations and prefixes to avoid routing
prefix-list-name through TE tunnels.
router-id 3.3.3.3
mpls traffic-eng router-id Loopback0 mpls
traffic-eng area 0
mpls traffic-eng autoroute-exclude prefix-list XX !
Cisco IOS commands Cisco IOS Master Command List, All Releases
MPLS Traffic Engineering Tunnel Source MPLS Traffic Engineering Path Calculation and
Setup Configuration Guide
Technical Assistance
Description Link
The Cisco Support website provides extensive http://www.cisco.com/support
online resources, including documentation and
tools for troubleshooting and resolving technical
issues with Cisco products and technologies.
To receive security and technical information about
your products, you can subscribe to various
services, such as the Product Alert Tool (accessed
from Field Notices), the Cisco Technical Services
Newsletter, and Really Simple Syndication (RSS)
Feeds.
Access to most tools on the Cisco Support website
requires a Cisco.com user ID and password.
The following table provides release information about the feature or features described in this module. This
table lists only the software release that introduced support for a given feature in a given software release train.
Unless noted otherwise, subsequent releases of that software release train also support that feature.
route Exclude
Feature Information for OSPFv2 Autoroute Exclude
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature
Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
HAPTER 15
OSPFv3 Address Families
The Open Shortest Path First version 3 (OSPFv3) address families feature enables both IPv4 and IPv6 unicast
traffic to be supported. With this feature, users may have two processes per interface, but only one process per
address family (AF).
SUMMARY STEPS
1. enable
2. configure terminal
3. router ospfv3 [process-id]
4. area area-ID [default-cost | nssa | stub]
5. auto-cost reference-bandwidth Mbps
6. bfd all-interfaces
7. default {area area-ID[range ipv6-prefix | virtual-link router-id]} [default-information originate
[always | metric | metric-type | route-map] | distance | distribute-list prefix-list prefix-list-name {in |
out} [interface] | maximum-paths paths | redistribute protocol | summary-prefix ipv6-prefix]
8. ignore lsa mospf
9. interface-id snmp-if-index
10. log-adjacency-changes [detail]
11. passive-interface [default | interface-type interface-number]
12. queue-depth {hello | update} {queue-size | unlimited} 13. router-id {router-id}
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step router ospfv3 [process-id] Enables OSPFv3 router configuration mode for the
3 IPv4 or IPv6 address family.
Example:
Device(config)# router ospfv3 1
Step 4 area area-ID [default-cost | nssa | stub] Configures the OSPFv3 area.
Example:
Device(config-router)# area 1
Step 5 auto-cost reference-bandwidth Mbps Controls the reference value OSPFv3 uses when
calculating metrics for interfaces in an IPv4 OSPFv3
Example: process.
Device(config-router)# auto-cost reference-
bandwidth 1000
Example:
Device(config-router)# bfd all-interfaces
Step 7 default {area area-ID[range ipv6-prefix | virtual-link Returns an OSPFv3 parameter to its default value.
router-id]} [default-information originate [always |
metric | metric-type | route-map] | distance | distribute-
list prefix-list prefix-list-name {in | out} [interface] |
maximum-paths paths | redistribute protocol |
summary-prefix ipv6-prefix]
Example:
Device(config-router)# default area 1
Step 8 ignore lsa mospf Suppresses the sending of syslog messages when the
device receives LSA Type 6 multicast OSPFv3
Example: packets, which are unsupported.
Device(config-router)# ignore lsa mospf
Step 10 log-adjacency-changes [detail] Configures the router to send a syslog message when
an OSPFv3 neighbor goes up or down.
Example:
Device(config-router)# log-adjacency-changes
Step 11 passive-interface [default | interface-type interface- Suppresses sending routing updates on an interface
number] when using an IPv4 OSPFv3 process.
Example:
Device(config-router)# passive-interface default
Step 12 queue-depth {hello | update} {queue-size | unlimited} Configures the number of incoming packets that the
IPv4 OSPFv3 process can keep in its queue.
Example:
Device(config-router)# queue-depth update 1500
Example:
Device(config-router)# router-id 10.1.1.1
SUMMARY STEPS
1. enable
2. configure terminal
3. router ospfv3 [process-id]
4. address-family ipv6 unicast
5. area area-ID range ipv6-prefix / prefix-length
6. default {area area-ID[range ipv6-prefix | virtual-link router-id]} [default-information originate
[always | metric | metric-type | route-map] | distance | distribute-list prefix-list prefix-list-name {in |
out} [interface] | maximum-paths paths | redistribute protocol | summary-prefix ipv6-prefix]
7. default-information originate [always | metric metric-value | metric-type type-value| route-map map-
name]
8. default-metric metric-value
9. distance distance
10. distribute-list prefix-list list-name {in[interface-type interface-number] | out routing-process [as-
number]}
11. maximum-paths number-paths
12. summary-prefix prefix [not-advertise | tag tag-value]
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Example:
Router# configure terminal
Step 3 router ospfv3 [process-id] Enables OSPFv3 router configuration mode for
the IPv4 or IPv6 address family.
Example:
Router(config)# router ospfv3 1
Example:
or
Purpose
tion
Step 8 default-metric metric-value Sets default metric values for IPv4 and IPv6
routes redistributed into the OSPFv3 routing
Example: protocol.
Router(config-router-af)# default-metric 10
Step 10 distribute-list prefix-list list-name {in[interface-type interface- Applies a prefix list to OSPFv3 routing updates
number] | out routing-process [as-number]} that are received or sent on an interface.
Example:
Router(config-router-af)# distribute-list prefix-list
PL1 in Ethernet0/0
Step 12 summary-prefix prefix [not-advertise | tag tag-value] Configures an IPv6 summary prefix in OSPFv3.
Example:
Router(config-router-af)# summary-prefix FEC0::/24
SUMMARY STEPS
1. enable
2. configure terminal
3. router ospfv3 [process-id]
4. address-family ipv4 unicast
5. area area-id range ip-address ip-address-mask [advertise | not-advertise] [cost cost]
6. default {area area-ID[range ipv6-prefix | virtual-link router-id]} [default-information originate
[always | metric | metric-type | route-map] | distance | distribute-list prefix-list prefix-list-name {in |
out} [interface] | maximum-paths paths | redistribute protocol | summary-prefix ipv6-prefix]
7. default-information originate [always | metric metric-value | metric-type type-value| route-map map-
name]
8. default-metric metric-value
9. distance distance
10. distribute-list prefix-list list-name {in[interface-type interface-number] | out routing-process [as-
number]}
11. maximum-paths number-paths
12. summary-prefix prefix [not-advertise | tag tag-value]
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 router ospfv3 [process-id] Enables OSPFv3 router configuration mode for
the IPv4 or IPv6 address family.
Example:
Device(config)# router ospfv3 1
Step 4 address-family ipv4 unicast Enters IPv4 address family configuration mode
for OSPFv3.
Example:
Device(config-router)# address-family ipv4 unicast
Example:
Device(config-router-af)# area 0 range 192.168.110.0
255.255.0.0
Step default {area area-ID[range ipv6-prefix | virtual-link router- Returns an OSPFv3 parameter to its default
6
id]} [default-information originate [always | metric | metric- value.
type | route-map] | distance | distribute-list prefix-list prefix-
list-name {in | out} [interface] | maximum-paths paths |
redistribute protocol | summary-prefix ipv6-prefix]
Example:
Device(config-router-af)# default area 1
Step 7 default-information originate [always | metric metric-value | Generates a default external route into an
metric-type type-value| route-map map-name] OSPFv3 for a routing domain.
Example:
Device(config-router-af)# default-information
originate always metric 100 metric-type 2
Step 8 default-metric metric-value Sets default metric values for IPv4 and IPv6
routes redistributed into the OSPFv3 routing
Example: protocol.
Device(config-router-af)# default-metric 10
Step 10 distribute-list prefix-list list-name {in[interface-type interface- Applies a prefix list to OSPFv3 routing updates
number] | out routing-process [as-number]} that are received or sent on an interface.
Example:
Device(config-router-af)# distribute-list prefix-list
PL1 in Ethernet0/0
Example:
Device(config-router-af)# summary-prefix FEC0::/24
1. enable
2. configure terminal
3. router ospfv3 [process-id]
4. address-family ipv6 unicast
5. redistribute source-protocol [process-id] [options]
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Example:
Router# configure terminal
Step 3 router ospfv3 [process-id] Enables OSPFv3 router configuration mode for the
IPv4 or IPv6 address family.
Example:
Router(config)# router ospfv3 1
Step 4 address-family ipv6 unicast Enters IPv6 address family configuration mode
Example: for OSPFv3. or
Enters IPv4 address family configuration mode for
OSPFv3.
Example:
or
Example:
address-family ipv4
unicast
Example:
Router(config-router)# address-family ipv6
unicast Example:
Example:
or
Example:
Router(config-router)# address-family ipv4
unicast
Step 5 redistribute source-protocol [process-id] [options] Redistributes IPv6 and IPv4 routes from one routing
Example: domain into another routing domain.
1. enable
2. configure terminal 3. interface type number
4. Do one of the following:
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 interface type number Specifies an interface type and number, and places
the device in interface configuration mode.
Example:
Device(config)# interface ethernet 0/0
Step 4 Do one of the following: Enables OSPFv3 on an interface with the IPv4 or
IPv6 AF.
• ospfv3 process-id area area-ID {ipv4 | ipv6}
or
[instance instance-id]
Enables OSPFv3 on an interface.
• ipv6 ospf process-idarea area-id [instance instance-
id]
Example:
Device(config-if)# ospfv3 1 area 1 ipv4
Defining an OSPFv3 Area Range for the IPv6 or IPv4 Address Family
Example:
Device(config-if)# ipv6 ospf 1 area 0
Defining an OSPFv3 Area Range for the IPv6 or IPv4 Address Family
The cost of the summarized routes will be the highest cost of the routes being summarized. For example, if the
following routes are summarized:
OI 2001:DB8:0:7::/64 [110/20] via
FE80::A8BB:CCFF:FE00:6F00, GigabitEthernet0/0/0
OI 2001:DB8:0:8::/64 [110/100] via
FE80::A8BB:CCFF:FE00:6F00, GigabitEthernet0/0/0
OI 2001:DB8:0:9::/64 [110/20] via
FE80::A8BB:CCFF:FE00:6F00, GigabitEthernet0/0/0
They become one summarized route, as follows:
SUMMARY STEPS
1. enable
2. configure terminal
3. router ospfv3 [process-id]
4. address-family ipv6 unicast
5. area area-ID range ipv6-prefix
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode. •
Enter your password if prompted.
Example:
Router> enable
Defining an OSPFv3 Area Range for the IPv6 or IPv4 Address Family
Purpose
Enters global configuration mode.
ipv6 unicast
ipv4 unicast
Defining an OSPFv3 Area Range for the IPv6 or IPv4 Address Family
SUMMARY STEPS
1. enable
2. configure terminal
DETAILED STEPS
Command or Action Purpose
Example:
Router# configure terminal
Step 3 ipv6 router ospf process-id Enables OSPFv3 router configuration mode.
Example:
Router(config)# ipv6 router ospf 1
Step 4 area area-id range ipv6-prefix / prefix-length Consolidates and summarizes routes at an area
advertise | not-advertise] [cost cost] boundary.
Example:
Router(config-rtr)# area 1 range 2001:DB8::/48
Configuration Examples for OSPFv3 Address Families
Additional References
Related Documents
Related Topic Document Title
Feature Information
APTER 16
OSPFv3 Authentication Trailer
The OSPFv3 Authentication Trailer feature as specified in RFC 6506 provides a mechanism to authenticate
Open Shortest Path First version 3 (OSPFv3) protocol packets as an alternative to existing OSPFv3 IPsec
authentication.
To perform non-IPsec cryptographic authentication, OSPFv3 devices append a special data block, that is,
Authentication Trailer, to the end of the OSPFv3 packets. The length of the Authentication Trailer is not included in
the length of the OSPFv3 packet but is included in the IPv6 payload length. The Link-Local Signaling (LLS) block is
established by the L-bit setting in the “OSPFv3 Options” field in OSPFv3 hello and database description packets. If
present, the LLS data block is included along with the OSPFv3 packet in the cryptographic authentication
computation.
A new Authentication Trailer (AT)-bit is introduced into the OSPFv3 Options field. OSPFv3 devices must set the AT-
bit in OSPFv3 Hello and Database Description packets to indicate that all the packets on this link will include an
Authentication Trailer. For OSPFv3 Hello and Database Description packets, the AT-bit indicates the AT is present.
For other OSPFv3 packet types, the OSPFv3 AT-bit setting from the OSPFv3
Hello/Database Description setting is preserved in the OSPFv3 neighbor data structure. OSPFv3 packet types that do
not include an OSPFv3 Options field will use the setting from the neighbor data structure to determine whether or not
the AT is expected. The AT-bit must be set in all OSPFv3 Hello and Database Description packets that contain an
Authentication Trailer.
To configure the Authentication Trailer, OSPFv3 utilizes existing Cisco IOS key chain command. For outgoing
OSPFv3 packets, the following rules are used to select the key from the key chain:
• If two keys have the same stop time, select the one with the highest key ID.
The security association (SA) ID maps to the authentication algorithm and the secret key, which is used to generate
and verify the message digest. If the authentication is configured but the last valid key is expired, then the packets are
sent using the key. A syslog message is also generated. If no valid key is available then the packet is sent without the
authentication trailer. When packets are received, the key ID is used to look up the data for that key. If the key ID is
not found in the key chain or if the SA is not valid, the packet is dropped. Otherwise, the packet is verified using the
algorithm and the key that is configured for the key ID. Key chains support rollover using key lifetimes. A new key
can be added to a key chain with the send start time set in the future. This setting allows the new key to be configured
on all devices before the keys are actually used.
The hello packets have higher priority than any other OSPFv3 packets and therefore can get re-ordered on the
outgoing interface. This reordering can create problems with sequence number verification on neighboring devices.
To prevent sequence mismatch, OSPFv3 verifies the sequence number separately for each packet type.
See RFC 6506 for more details on the authentication procedure.
How to Configure OSPFv3 Authentication Trailer
1. enable
2. configure terminal
3. interface type number
4. ospfv3 [pid] [ipv4 | ipv6] authentication {key-chain chain-name | null}
5. router ospfv3 [process-id]
6. address-family ipv6 unicast vrf vrf-name
7. area area-id authentication {key-chain chain-name | null}
8. area area-id virtual-link router-id authentication key-chain chain-name
9. area area-id sham-link source-address destination-address authentication key-chain chain-name
10. authentication mode {deployment | normal}
11. end
12. show ospfv3 interface
13. show ospfv3 neighbor [detail]
14. debug ospfv3 vrf authentication
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode. •
Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 interface type number Specifies the interface type and number.
Example:
Device(config)# interface GigabitEthernet 2/0
Step 4 ospfv3 [pid] [ipv4 | ipv6] authentication {key-chain Specifies the authentication type for an OSPFv3
chain-name | null} instance.
Example:
Device(config-if)# ospfv3 1 ipv4 authentication
key-chain ospf-1
Configuring OSPFv3 Authentication Trailer
Example:
Device(config-if)# router ospfv3 1
Step 6 address-family ipv6 unicast vrf vrf-name Configures the IPv6 address family in the OSPFv3
process and enters IPv6 address family
Example: configuration mode.
Device(config-router)# address-family ipv6 unicast
vrf vrf1
Step 7 area area-id authentication {key-chain chain-name | Configures the authentication trailer on all interfaces
null} in the OSPFv3 area.
Example:
Device(config-router-af)# area 1 authentication
key-chain ospf-chain-1
Step 8 area area-id virtual-link router-id authentication key- Configures the authentication for virtual links.
chain chain-name
Example:
Device(config-router-af)# area 1 virtual-link
1.1.1.1 authentication key-chain ospf-chain-1
Step 9 area area-id sham-link source-address destination- Configures the authentication for sham links.
address authentication key-chain chain-name
Example:
Device(config-router-af)# area 1 sham-link 1.1.1.1
1.1.1.0 authentication key-chain ospf-chain-1
Step 10 authentication mode {deployment | normal} Specifies the type of authentication used for the
OSPFv3 instance.
Example:
Device(config-router-af)# authentication mode • The deployment keyword provides adjacency
deployment between configured and unconfigured
authentication devices.
Step 13 show ospfv3 neighbor [detail] (Optional) Displays OSPFv3 neighbor information
on a per-interface basis.
Example:
Device# show ospfv3 neighbor detail
Configuration Examples for OSPFv3 Authentication Trailer
Neighbor 1.1.1.1
In the area 0 via interface GigabitEthernet0/0
Neighbor: interface-id 2, link-local address FE80::A8BB:CCFF:FE01:2D00
Neighbor priority is 1, State is FULL, 6 state changes
DR is 2.2.2.2 BDR is 1.1.1.1
Options is 0x000413 in Hello (V6-Bit, E-Bit, R-Bit, AT-Bit)
Options is 0x000413 in DBD (V6-Bit, E-Bit, R-Bit, AT-Bit)
Dead timer due in 00:00:33
Additional References for OSPFv3 Authentication Trailer
Cisco IOS commands Cisco IOS Master Command List, All Releases
Technical Assistance
Description Link
The Cisco Support website provides extensive http://www.cisco.com/support
online resources, including documentation and
tools for troubleshooting and resolving technical
issues with Cisco products and technologies.
To receive security and technical information about
your products, you can subscribe to various
services, such as the Product Alert Tool (accessed
from Field Notices), the Cisco Technical Services
Newsletter, and Really Simple Syndication (RSS)
Feeds.
Access to most tools on the Cisco Support website
requires a Cisco.com user ID and password.
HAPTER 17
Autoroute Announce and Forwarding
Adjacencies For OSPFv3
The Autoroute Announce and Forwarding Adjacencies for OSPFv3 feature advertises IPv6 routes over
MPLS/TE IPv4 tunnels. This module describes how to configure the Autoroute Announce and Forwarding
Adjacencies for OSPFv3 feature.
• When an autoroute announce is used, OSPFv3 does not advertise the tunnel.
• When forwarding adjacencies are used, OSPFv3 advertises the tunnel link in an LSA.
1. enable
2. configure terminal
3. ip cef distributed
4. interface type number
5. ip address ip-address-mask
6. no shutdown
7. exit
8. interface type number
9. ospfv3 pid af mpls traffic-eng autoroute announce area aid
10. ospfv3 pid af mpls traffic-eng autoroute metric {metric | absolute metric | relative delta}
11. ip ospf cost cost
12. exit
13. interface type number
14. ospfv3 pid af mpls traffic-eng forwarding-adj areaaid
15. ospfv3[ pid [af ]] mpls traffic-eng forwarding-adj interface ID [ local ID ] [nbr ID]
16. ip ospf cost cost
17. exit
18. router ospfv3 router-ID
19. address-family ipv4 unicast [vrf vrf-name ]
20. area aid mpls traffic-engineering tunnel-tail af interface type
21. exit
22. show ospfv3 database
23. show ospfv3 mpls traffic-eng
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode. •
Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 4 interface type number Configures an interface type and enters interface
configuration mode.
Example:
Device(config)# interface tunnel 0
Example:
Device (config-if)# no shutdown
Step 8 interface type number Enables loopback interface and enters interface
configuration mode.
Example:
Device (config)# interface loopback 0
Step 9 ospfv3 pid af mpls traffic-eng autoroute announce Enable Open Shortest Path First version 3 (OSPFv3)
area aid on an interface with the IP address family (AF).
Example:
Device(config-if)# ospfv3 1 af mpls traffic-eng
autoroute announce area 1
Step 10 ospfv3 pid af mpls traffic-eng autoroute metric Specifies the MPLS traffic engineering auto route
{metric | absolute metric | relative delta} metric value for the SPF calculation.
Example:
Device(config-if)# ospfv3 1 af mpls traffic-eng
autoroute metric
1
Configuring Autoroute Announce and Forwarding Adjacencies For OSPFv3
Purpose
Explicitly specifies the cost of sending a packet on an
OSPF interface.
t 60
nel 1
mpls traffic-eng
mpls traffic-eng
t 55
18
Configuration Examples for Autoroute Announce and Forwarding Adjacencies For OSPFv3
Example:
Device(config-router-af)# area 1 mpls
traffic-engineering tunnel-tail af
loopback
Step 22 show ospfv3 database (Optional) Displays list of information related to the
OSPFv3 database for a specific router.
Example:
Device(config)# show ospfv3 database
Step 23 show ospfv3 mpls traffic-eng (Optional) Displays autoroute announce, forwarding
adjacency, and tunnel-tail information related to
Example: OSPFv3.
Device(config)# show ospfv3 mpls traffic-eng
interface loopback 0
ospfv3 1 af mpls traffic-eng autoroute announce area 1
ospfv3 1 af mpls traffic-eng autoroute metric 1 ip ospf
cost 60
interface tunnel 1
ospfv3 1 af mpls traffic-eng forwarding-adj area 1
ospfv3 1 af mpls traffic-eng forwarding-adj nbr 1 ip
ospf cost 55
router ospfv3 18
address-family ipv4 unicast
Additional References for Autoroute Announce and Forwarding Adjacencies For OSPFv3
!
! !
Cisco IOS commands Cisco IOS Master Command List, All Releases
Table 20: Feature Information for Autoroute Announce and Forwarding Adjacencies For OSPFv3
HAPTER 18
OSPFv3 Autoroute Exclude
OSPFv3 Autoroute Exclude feature allows you to use specific destinations and prefix-list to specify a list of
prefixes that are routed using native paths instead of TE tunnels for packet transport. The rest of the prefixes
can still be set to use TE tunnels. Prefixes that are excluded do not use a TE tunnel path. IPv6 routes over TE
tunnels are supported by OSPFv3 using Autoroute Announce (AA) or Forwarding Adjacencies (FA).
This module describes how to configure the OSPFv3 Autoroute Exclude feature.
• Auto route announce and forwarding adjacencies must be configured. You can configure either auto route
announce or forwarding adjacencies on an interface. You cannot configure them both on the same
interface.
1. enable
2. configure terminal
DETAILED STEPS
Command or Action Purpose
Example:
Device# configure terminal
Step 3 router ospfv3 process-ID Configures OSPFv3 routing process and enters OSPF
router configuration mode.
Example:
Device(config)# router ospfv3 18
Step 4 address-family ipv6 unicast Enters IPv6 address family configuration mode for
OSPFv3.
Example:
Device(config-router)# address-family ipv6
unicast
Step 5 mpls traffic-engineering autoroute-exclude prefix- Allows specific destinations and prefixes to avoid
list prefix-list-name routing through TE tunnels.
!
Additional References for OSPFv3 Autoroute Exclude
Autoroute Announce and Forwarding Adjacencies For OSPFv3 IP Routing: OSPF Configuration
Guide
HAPTER 19
OSPFv2 IP FRR Local Microloop Avoidance
The OSPFv2 IP FRR Local Microloop Avoidance feature helps to avoid local microloop that happens
between a node and its neighbor where the link-down event occurred. This document explains how to
configure the OSPFv2 IP FRR Local Microloop Avoidance feature.
Once the traffic is moved to the post-convergence path, it is inclined to a microloop. Microloops are formed as
a result of the fact that each node on the path does its calculation at different times and independently of other
nodes. If certain nodes converge and sends traffic to a neighbor node, which has not converged yet, traffic may
be looped between these two nodes.
Microloops are formed between the router where the failure is detected and its neighbors. Local microloops are
created in cases where there is no local loop-free alternate (LFA) backup available in ring or square topologies.
In such topologies, remote LFA provides a backup, but the fast-convergence benefit of the remote LFA cannot
be completely utilized due to the high probability of the local microloop creation. Avoiding the local micro
loop provides a significant improvement in the fast convergence in the ring and square topologies.
Note Microloop avoidance is automatically enabled as soon as remote LFA (rLFA) is enabled.
When using microloop avoidance for prefixes (for which a repair path has been installed in the forwarding
plane), the OSPFv2 IP FRR Local Microloop Avoidance feature is enabled when the forwarding plane is
triggered to switch to using a pre installed repair path. The local microloop avoidance for the link-down event
supports the following triggers:
• Adjacency down event due to the Bidirectional Forwarding Detection (BFD) session down.
If microloop avoidance is used regardless of whether a repair path has been installed in the forwarding plane,
then in addition the third trigger is used:
When the neighbor reports loss of adjacency to the local system in its link state neighbor advertisements, the
value of using microloop avoidance depends on whether the remote event that caused loss of adjacency on the
neighbor is detectable by the local forwarding plane (that is, whether the forwarding plane will react and
switch to using pre programmed repair paths).
1. enable
2. configure terminal
3. router ospf process-id
4. microloop avoidance [protected | disable]
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode. •
Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 router ospf process-id Configures an OSPF routing process and enters router
configuration mode.
Example:
Device(config)# router ospf 109
Step 4 microloop avoidance [protected | disable] Configures the local microloop avoidance between a node and
its neighbor where the link-down event has occurred.
Example:
Device(config-router)# microloop • When the protected keyword is used, the local microloop
avoidance protected avoidance is only applied to prefixes that have a valid
backup path.
• When the disable keyword is used, the local microloop
avoidance is disabled if it is enabled automatically earlier.
Step 5 microloop avoidance rib-update-delay delay- Delays the local microloop avoidance as per the configured
period delay period.
Example:
Device(config-router)# microloop
avoidance rib-update-delay 6500
Step 6 exit Exits router configuration mode and returns to privileged EXEC
mode.
Example:
Device(config-router)# exit
Cisco IOS commands Cisco IOS Master Command List, All Releases
Table 22: Feature Information for OSPFv2 IP FRR Local Microloop Avoidance
HAPTER 20
OSPFv2-OSPF Live-Live
The OSPFv2-OSPF Live-Live feature delivers multicast streams over non overlapping paths to various
applications. The multicast traffic is split into multiple streams at the beginning of a protected network. All
streams flow over non overlapping paths so that when a link failure occurs on one path, multicast traffic is still
delivered through other paths. All streams are merged back at the end of the protected network. This module
describes how to configure the OSPFv2-OSPF Live-Live feature.
of sensitive data streams to large audiences. Packet drop is a critical issue in multimedia traffic. There is a demand
to reduce multicast traffic loss to the range of milliseconds or to zero packet loss. The zero packet loss solution for
multicast in case of single link failure is also known as live-live.
In a live-live network, multicast streams (typically two flows) form their own reverse path forwarding
(RPF)/shortest path trees (SPT) over diversified physical links, so that failure on one link does not affect multicast
traffic on other link. The existing multi topology technology in Cisco IOS software supports the multiple multicast
topologies.
The OSPFv2-OSPF Live-Live feature enables the protocol independent multicast (PIM) to handle multiple
multicast topologies. When a multicast topology is created and enabled on OSPF, IP prefixes on each topology are
injected into topology-based Routing Information Base (RIB). PIM then decides which RIB to use for RPF
lookup.
PIM RPF topology is a collection of routes used by PIM to perform the RPF operation when building shared or
source trees. In a multi topology environment, multiple RPF topologies can be created in the same network. A
particular source may be reachable in only one of the topologies or in several of them through different paths.
To select the RPF topology for a particular multicast distribution tree, consider the following:
1 Configure a policy that maps a group range to a topology. When RPF information needs to be resolved for the
RP or the sources for a group within the range, the RPF lookup takes place in the specified topology. This can
be used for PIM Sparse Mode (PIM-SM)/source-specific multicast (SSM)/Bidirectional(Bidir) PIM.
2 Configure a policy that maps a source prefix range to a topology. This can be used for PIM-SM and PIM-SSM.
3 Use the topology identified by the Join Attribute encoding in the received PIM packets.
The PIM Join Attribute extends PIM signaling to identify a topology that should be used when constructing a
particular multicast distribution tree. For more details on the PIM Join Attribute, see PIM Multi-Topology ID
(MT-ID) Join-Attribute IEEE draft.
How to Configure OSPFv2-OSPF Live-Live
1. enable
2. configure terminal
3. ip multicast-routing
4. ip multicast rpf multitopology
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode. •
Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Example:
Device(config)# ip multicast-routing
Step 4 ip multicast rpf multitopology Enables Multi Topology Routing (MTR) support for IP
multicast routing.
Example:
Device(config)# ip multicast rpf
multitopology
Step 5 global-address-family ipv4 multicast Enters global address family configuration mode and
configures multi topology routing.
Example:
Device(config)# global-address-family ipv4
multicast
Step 6 topology {topology-A | topology-B} Configures an OSPF process to route IP traffic under the
specified topology instance.
Example:
Device(config-af)# topology live-A
Step 8 interface type number Configures an interface type and enters interface
configuration mode.
Example:
Device(config)# interface Gigabitethernet
1/0
Step 9 ip address address mask Sets a primary or secondary IP address for an interface.
Example:
Device(config-if)# ip address 192.108.1.27
255.255.255.0
Step 10 ip pim sparse-dense-mode Enables PIM on an interface and treats the interface in
either sparse mode or dense mode of operation, depending
Example: on which mode the multicast group operates in.
Device(config-if)# ip pim sparse-dense-mode
Configuring OSPFv2-OSPF Live-Live
v2 on an interface.
OSPF
enters router configuration mode.
al configuration mode.
Step 21 ip multicast rpf select topology multicast Associates a multicast topology with a multicast group with
topology-name access-list number a specific route entry.
• Repeat this step to associate the topology with another
Example: multicast group (ip multicast rpf select topology
Device(config)# ip multicast rpf select multicast live-B 122).
topology multicast topology live-A 111
Step 22 ip access-list extended access-list-number Defines an IP access list to enable filtering for packets with
IP helper-address destinations and enters extended named
Example: access list configuration mode.
Device(config)# ip access-list extended 111
Step 23 permit ip any ip-adddress Sets condition to allow a packet to pass a named IP access
list.
Example: • Repeat Steps 22 and 23 to define another IP access
Device(config-ext-nacl)# permit ip any list and to set conditions to allow a packet to pass
203.0.113.1 another named IP access list.
Step 24 end Exits extended named access list configuration mode and
enters privileged EXEC mode.
Example:
Device(config-ext-nacl)# end
Step 25 show ip multicast topology multicast topology- Displays topology information for multicast streams.
name
Example:
Device# show ip multicast topology multicast
live-A
Step 26 debug ip multicast topology Enables debugging output for multicast stream topology.
Example:
Device# debug ip multicast topology
Cisco IOS commands Cisco IOS Master Command List, All Releases
Technical Assistance
Description Link
The Cisco Support website provides extensive http://www.cisco.com/support
online resources, including documentation and
tools for troubleshooting and resolving technical
issues with Cisco products and technologies.
To receive security and technical information about
your products, you can subscribe to various
services, such as the Product Alert Tool (accessed
from Field Notices), the Cisco Technical Services
Newsletter, and Really Simple Syndication (RSS)
Feeds.
Access to most tools on the Cisco Support website
requires a Cisco.com user ID and password.
HAPTER 21
OSPF Forwarding Address Suppression in
Translated Type-5 LSAs
The OSPF Forwarding Address Suppression in Translated Type-5 LSAs feature causes a not-so-stubby area
(NSSA) area border router (ABR) to translate Type-7 link state advertisements (LSAs) to Type-5 LSAs, but
to use the address 0.0.0.0 for the forwarding address instead of that specified in the Type-7 LSA. This feature
causes devices that are configured not to advertise forwarding addresses into the backbone to direct forwarded
traffic to the translating NSSA ABRs.
This problem is solved by suppressing the forwarding address on the ABR so that the forwarding address is set
to 0.0.0.0 in the Type-5 LSAs that were translated from Type-7 LSAs. A forwarding address set to 0.0.0.0
How to Suppress the OSPF Forwarding Address
indicates that packets for the external destination should be forwarded to the advertising OSPF device, in this
case, the translating NSSA ABR.
Before configuring this feature, consider the following caution.
Caution Configuring this feature causes the device to be noncompliant with RFC 1587. Also, suboptimal routing might
result because there might be better paths to reach the destination’s forwarding address. This feature should
not be configured without careful consideration and not until the network topology is understood.
Caution Configuring this feature causes the device to be noncompliant with RFC 1587. Also, suboptimal routing might
result because there might be better paths to reach the destination’s forwarding address. This feature should
not be configured without careful consideration and not until the network topology is understood.
SUMMARY STEPS
1. enable
2. configure terminal
3. router ospf process-id
4. area area-id nssa translate type7 suppress-fa
5. end
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables higher privilege levels, such as privileged EXEC
mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 4 area area-id nssa translate type7 suppress-fa Configures an area as a not-so-stubby-area (NSSA) and
suppresses the forwarding address in translated Type-7
Example: LSAs.
Device(config-router)# area 10 nssa
translate type7 suppress-fa
Additional References
The following sections provide references related to OSPF Forwarding Address Suppression in Translated
Type-5 LSAs:
Additional References
Related Documents
Related Topic Document Title
Cisco IOS master command list, all releases Cisco IOS Master Command List, All Releases
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/
provides online resources to download index.html
documentation, software, and tools. Use these
resources to install and configure the software and
to troubleshoot and resolve technical issues with
Cisco products and technologies. Access to most
tools on the Cisco Support and Documentation
website requires a Cisco.com user ID and
password.
Table 24: Feature Information for OSPF Forwarding Address Suppression in Translated Type-5 LSAs
CHAPTER 22
OSPF Inbound Filtering Using Route Maps
with a Distribute List
The OSPF Inbound Filtering Using Route Maps with a Distribute List feature allows users to define a
route map to prevent Open Shortest Path First (OSPF) routes from being added to the routing table. In the
route map, the user can match on any attribute of the OSPF route.
• match interface
• match ip address
• match ip next-hop
• match ip route-source
• match metric
• match route-type
• match tag
This feature can be useful during redistribution if the user tags prefixes when they get redistributed on
ASBRs and later uses the tag to filter the prefixes from being installed in the routing table on other routers.
1. enable
2. configure terminal
3. route-map map-tag [permit | deny] [sequence-number]
4. match tag tag-name
5. Repeat Steps 3 and 4 with other route-map and match commands if you choose.
6. exit
7. router ospf process-id
8. distribute-list route-map map-tag in
9. end
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Example:
Router# configure terminal
Step 3 route-map map-tag [permit | deny] [sequence- Defines a route map to control filtering.
number]
Example:
Router(config)# route-map tag-filter deny 10
Step 4 match tag tag-name Example: Matches routes with a specified name, to be used as the
route map is referenced.
Example:
Router(config-router)# exit
Example:
Router(config)# router ospf 1
Step 8 distribute-list route-map map-tag in Enables filtering based on an OSPF route map.
Example:
Router(config-router)# distribute- route-map
list tag-filter in
Example:
Router(config-router)# end
!
router ospf 1
router-id 10.0.0.2 log-adjacency-changes
network 172.16.2.1 0.0.0.255 area 0
distribute-list route-map tag-filter in
Additional References
The following sections provide references related to configuring the OSPF Inbound Filtering Using Route
Maps with a Distribute List feature.
Related Documents
Related Topic Document Title
Cisco IOS master command list, all releases Cisco IOS Master Command List, All Releases
Standards
Standard Title
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/
provides online resources to download index.html
documentation, software, and tools. Use these
resources to install and configure the software and
to troubleshoot and resolve technical issues with
Cisco products and technologies. Access to most
tools on the Cisco Support and Documentation
website requires a Cisco.com user ID and
password.
Table 25: Feature Information for OSPF Inbound Filtering Using Route Maps with a Distribute List
• distribute-list in (IP)
CHAPTER 23
OSPFv3 Route Filtering Using Distribute-List
The OSPFv3 route filtering using distribute-list feature allows users to filter the incoming routes that are
programmed in routing table, and the outgoing routes that are advertised.
This feature can be useful during redistribution if the user tags prefixes when they get redistributed on
Autonomous System Boundary Routers (ASBRs) and later uses the tag to filter the prefixes from being
installed in the routing table on other routers. The below mentioned options are available only for distribute-list
filtering using route-map.
Note The distribute-list in command can be configured to prevent routes from being installed in the global Routing
Information Base (RIB). Prior to the implementation of OSPF local RIB (for feature information on OSPF
local RIB, see OSPFv2 Local RIB), OSPF would attempt to install a less preferred route (e.g. an inter-area
route when the intra-area path is filtered). With OSPF local RIB, only the best route is considered (because
this is the only route the local RIB maintains). There is no concept of a "second-best" OSPF route. For
more information on the routing algorithm used by Cisco OSPF routers, please refer to RFC 2328.
Interface: Incoming (used with Inbound filtering) or outgoing (used with outbound filtering) interface.
Routing-process: Source protocol for the route to be filtered.
1. Configure OSPFv3.
2. Configure address-family ipv4 unicast.
3. Configure distribute list with the appropriate route-map. DETAILED STEPS
• match interface
• match ip address
• match ip next-hop
• match ip route-source
• match metric
• match route-type
• match tag
1. Configure OSPFv3.
2. Configure address-family ipv4 unicast.
3. Defines prefix list to be used and the direction for the filter. DETAILED STEPS
Step 3 Defines prefix list to be used and the direction for the filter.
Device(config-router-af)#distribute-list prefix pfxname in
Note The following are the available optional arguments. You can use these arguments to filter based on incoming
interface. Choose any interface that is available on your device.
Ethernet IEEE 802.3
Loopback Loopback interface
Null Null interface
Port-channel Ethernet Channel of interfaces
Serial Serial
Tunnel Tunnel interface
Vlan Catalyst Vlans
1. Configure OSPFv3.
2. Configure address-family ipv4 unicast.
3. Configure distribute list with the appropriate route-map. DETAILED STEPS
1. Configure OSPFv3.
2. Configure address-family ipv6unicast.
3. Define route map.
DETAILED STEPS
• match interface
• match ip address
• match ip next-hop
• match metric
• match route-type
• match tag
1. Configure OSPFv3.
2. Configure address-family ipv6 unicast.
3. Define prefix list name.
4. Define filter incoming routing updates.
DETAILED STEPS
Additional References
1. Configure OSPFv3.
2. Configure address-family ipv6 unicast.
3. Define prefix list name.
DETAILED STEPS
Additional References
Related Documents
Related Topic Document Title
MIBs
MIBs MIBs Link
None To locate and download MIBs for selected
platforms, Cisco software releases, and feature sets,
use Cisco MIB Locator found at the following
URL:
http://www.cisco.com/go/mibs
RFCs
RFCs Title
Table 26: Feature Information for OSPFv3 Route Filtering Using Distribute-List
HAPTER 24
OSPF Shortest Path First Throttling
The OSPF Shortest Path First Throttling feature makes it possible to configure shortest path first (SPF)
scheduling in millisecond intervals and to potentially delay SPF calculations during network instability. SPF
is scheduled to calculate the Shortest Path Tree (SPT) when there is a change in topology. One SPF run may
include multiple topology change events.
The interval at which the SPF calculations occur is chosen dynamically and is based on the frequency of
topology changes in the network. The chosen interval is within the boundary of the user-specified value ranges.
If the network topology is unstable, SPF throttling calculates SPF scheduling intervals to be longer until the
topology becomes stable.
The SPF timing can be better explained using an example. In this example the start interval is set at 5 milliseconds
(ms), the wait interval at 1000 milliseconds, and the maximum wait time is set at 90,000 milliseconds.
Figure 10: SPF Calculation Intervals Set by the timers throttle spf Command
Notice that the wait interval between SPF calculations doubles when at least one topology change event is received
during the previous wait interval. Once the maximum wait time is reached, the wait interval remains the same until the
topology stabilizes and no event is received in that interval.
If the first topology change event is received after the current wait interval, the SPF calculation is delayed by the
amount of time specified as the start interval. The subsequent wait intervals continue to follow the dynamic pattern.
If the first topology change event occurs after the maximum wait interval begins, the SPF calculation is again
scheduled at the start interval and subsequent wait intervals are reset according the parameters specified in the timers
throttle spfcommand. Notice in the figure below that a topology change event was received after the start of the
maximum wait time interval and that the SPF intervals have been reset.
1. enable
2. configure terminal
3. router ospf process-id
4. timers throttle spf spf-start spf-hold spf-max-wait
5. end
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables higher privilege levels, such as privileged
EXEC mode.
Example:
• Enter your password if prompted.
Router> enable
Example:
Router# configure terminal
Example:
Router(config)# router ospf 1
Step 4 timers throttle spf spf-start spf-hold spf-max-wait Sets OSPF throttling timers.
Example:
Router(config-router)# timers throttle spf 10
4800
90000
Example:
Router(config-router)# end
router ospf 1
router-id 10.10.10.2
log-adjacency-changes timers throttle
spf 5 1000 90000 redistribute static
subnets network 21.21.21.0 0.0.0.255
area 0 network 22.22.22.0 0.0.0.255
area 00
Additional References
The following sections provide references related to OSPF Shortest Path First Throttling.
st Path First Throttling
Additional References
Related Documents
Related Topic Document Title
Cisco IOS master command list, all releases Cisco IOS Master Command List, All Releases
Standards
Standards Title
None --
MIBs
MIBs MIBs Link
No new or modified MIBs are supported by this To locate and download MIBs for selected
feature, and support for existing MIBs has not been platforms, Cisco IOS XE releases, and feature sets,
modified by this feature. use Cisco MIB Locator found at the following
URL:
http://www.cisco.com/go/mibs
RFCs
RFCs Title
None --
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/
provides online resources to download index.html
documentation, software, and tools. Use these
resources to install and configure the software and
to troubleshoot and resolve technical issues with
Cisco products and technologies. Access to most
tools on the Cisco Support and Documentation
website requires a Cisco.com user ID and
password.
Feature Information for OSPF Shortest Path First Throttling
Table 27: Feature Information for OSPF Shortest Path First Throttling
• timer spf-interval
• timers throttle spf
HAPTER 25
OSPF Support for Fast Hello Packets
The OSPF Support for Fast Hello Packets feature provides a way to configure the sending of hello packets in
intervals less than 1 second. Such a configuration results in faster convergence in an Open Shortest Path First
(OSPF) network.
Note It is recommended to use Bidirectional Forwarding Detection (BFD) instead of Fast Hello Packets.
1. enable
2. configure terminal
3. interface type number
4. ip ospf dead-interval minimal hello-multiplier multiplier
5. end
6. show ip ospf interface [interface-type interface-number]
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables higher privilege levels, such as privileged EXEC mode.
Example:
Router# configure terminal
Step 3 interface type number Configures an interface type and enters interface configuration
mode.
Example:
Router(config)# interface
gigabitethernet 0/0/1
Step 4 ip ospf dead-interval minimal hello- Sets the interval during which at least one hello packet must be
multiplier multiplier received, or else the neighbor is considered down.
• In the example, OSPF Support for Fast Hello Packets is
Example: enabled by specifying the minimal keyword and the hello-
Router(config-if)# ip ospf dead- multiplier keyword and value. Because the multiplier is set to
interval minimal hello-multiplier 5 5, five hello packets will be sent every second.
Examples
The following sample output verifies that OSPF Support for Fast Hello Packets is configured. In the line
that begins with "Timer intervals configured," the hello interval is 200 milliseconds, the dead interval is 1
second, and the next hello packet is due in 76 milliseconds.
Additional References
Related Documents
Related Topic Document Title
Table 28: Feature Information for OSPF Support for Fast Hello Packets
CHAPTER 26
OSPF Incremental SPF
The Open Shortest Path First (OSPF) protocol can be configured to use an incremental SPF algorithm for
calculating the shortest path first routes. Incremental SPF is more efficient than the full SPF algorithm,
thereby allowing OSPF to converge faster on a new routing topology in reaction to a network event.
1. enable
2. configure terminal
3. router ospf process-id
4. ispf
5. end
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Example:
Router# configure terminal
Example:
Router(config)# router ospf 1
Example:
Router(config-router)# ispf
Example:
Router(config-router)# end
router ospf 1
ispf
Additional References
The following sections provide references related to OSPF Incremental SPF.
Related Documents
Related Topic Document Title
Cisco IOS master command list, all releases Cisco IOS Master Command List, All Releases
Feature Information for OSPF Incremental SPF
Standards
Standard Title
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature
Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
• ispf
HAPTER 27
OSPF Limit on Number of Redistributed Routes
Open Shortest Path First (OSPF) supports a user-defined maximum number of prefixes (routes) that are
allowed to be redistributed into OSPF from other protocols or other OSPF processes. Such a limit could help
prevent the router from being flooded by too many redistributed routes.
Note You cannot both limit redistributed prefixes and also choose to be warned.
SUMMARY STEPS
1. enable
2. configure terminal
3. router ospf process-id
4. redistribute protocol [process-id | as-number] [metric metric-value] [metric-type type-value]
[match{internal| external 1| external 2}][tag tag-value] [route-map map-tag] [subnets]
5. redistribute maximum-prefix maximum [threshold]
6. end
7. show ip ospf [process-id]
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Example:
Router# configure terminal
Requesting a Warning About the Number of Routes Redistributed into OSPF
Example:
Router(config)# router ospf 1
Step 4 redistribute protocol [process-id | as-number] Redistributes routes from one routing domain into another
[metric metric-value] [metric-type type-value] routing domain.
[match{internal| external 1| external 2}][tag tag-
value] [route-map map-tag] [subnets]
Example:
Router(config-router)# redistribute eigrp 10
Step 5 redistribute maximum-prefix maximum Sets a maximum number of IP prefixes that are allowed to be
[threshold] redistributed into OSPF.
Example:
Router(config-router)# end
Step 7 show ip ospf [process-id] (Optional) Displays general information about OSPF routing
processes.
Example: • If a redistribution limit was configured, the output will
include the maximum limit of redistributed prefixes and
Router# show ip ospf 1
the threshold for warning messages.
Note You cannot both limit redistributed prefixes and also choose to be warned.
Requesting a Warning About the Number of Routes Redistributed into OSPF
SUMMARY STEPS
1. enable
2. configure terminal
3. router ospf process-id
4. redistribute protocol [process-id | as-number] [metric metric-value] [metric-type type-value]
[match{internal| external 1| external 2}][tag tag-value] [route-map map-tag] [subnets]
5. redistribute maximum-prefix maximum [threshold] warning-only
6. end
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Example:
Router# configure terminal
Example:
Router(config)# router ospf 1
Step 4 redistribute protocol [process-id | as-number] Redistributes routes from one routing domain into another
[metric metric-value] [metric-type type-value] routing domain.
[match{internal| external 1| external 2}][tag tag-
value] [route-map map-tag] [subnets]
Example:
Router(config-router)# redistribute eigrp 10
Step 5 redistribute maximum-prefix maximum [threshold] Causes a warning message to be logged when the maximum
warning-only number of IP prefixes has been redistributed into OSPF.
Example: • Because the warning-only keyword is included, no
Router(config-router)# redistribute maximum- limit is imposed on the number of redistributed
prefix 1000 80 warning-only prefixes into OSPF.
• There is no default value for the maximum argument.
• The threshold value defaults to 75 percent.
Configuration Examples for OSPF Limit on Number of Redistributed Routes
Example:
Router(config-router)# end
router ospf 1
router-id 10.0.0.1 domain-id 5.6.7.8
log-adjacency-changes timers lsa-
interval 2 network 10.0.0.1 0.0.0.0
area 0 network 10.1.5.1 0.0.0.0 area
0 network 10.2.2.1 0.0.0.0 area 0
redistribute static subnets
redistribute maximum-prefix 1200 80
router ospf 1
network 10.0.0.0 0.0.0.255 area 0 redistribute
eigrp 10 subnets
redistribute maximum-prefix 600 85 warning-only
Additional References
Additional References
Related Documents
Related Topic Document Title
Cisco IOS commands Cisco IOS Master Commands List, All Releases
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/
provides online resources to download index.html
documentation, software, and tools. Use these
resources to install and configure the software and
to troubleshoot and resolve technical issues with
Cisco products and technologies. Access to most
tools on the Cisco Support and Documentation
website requires a Cisco.com user ID and
password.
Table 30: Feature Information for OSPF Limit on Number of Redistributed Routes
OSPF Limit on Number of Cisco IOS XE Release 2.1 Cisco OSPF supports a user-defined
Redistributed Routes IOS XE Release 2.6 maximum number of prefixes
(routes) that are allowed to be
redistributed into OSPF from
other protocols or other OSPF
processes. Such a limit could help
prevent the router from being
flooded by too many redistributed
routes.
The following commands are
introduced or modified in the
feature documented in this
module:
• redistribute maximum-
prefix
• show ip ospf
• show ip ospf database
Feature Information for OSPF Limit on Number of Redistributed Routes
HAPTER 28
OSPFv3 Fast Convergence: LSA and SPF
Throttling
The Open Shortest Path First version 3 (OSPFv3) link-state advertisement (LSAs) and shortest-path first
(SPF) throttling feature provides a dynamic mechanism to slow down link-state advertisement updates in
OSPFv3 during times of network instability. It also allows faster OSPFv3 convergence by providing LSA rate
limiting in milliseconds.
SUMMARY STEPS
1. enable
2. configure terminal
3. router ospfv3 [process-id]
4. timers lsa arrival milliseconds
5. timers pacing flood milliseconds
6. timers pacing lsa-group seconds
7. timers pacing retransmission milliseconds
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode. •
Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 router ospfv3 [process-id] Enables OSPFv3 router configuration mode for the
IPv4 or IPv6 address family.
Example:
Device(config)# router ospfv3 1
Step 4 timers lsa arrival milliseconds Sets the minimum interval at which the software
accepts the same LSA from OSPFv3 neighbors.
Example:
Device(config-rtr)# timers lsa arrival 300
Step 5 timers pacing flood milliseconds Configures LSA flood packet pacing.
Example:
Device(config-rtr)# timers pacing flood 30
Step 6 timers pacing lsa-group seconds Changes the interval at which OSPFv3 LSAs are
collected into a group and refreshed, checksummed, or
Example: aged.
Device(config-router)# timers pacing lsa-group
300
Step 7 timers pacing retransmission milliseconds Configures LSA retransmission packet pacing in IPv4
OSPFv3.
Example:
Device(config-router)# timers pacing
retransmission 100
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 router ospf process-id
4. timers throttle spf spf-start spf-hold spf-max-wait
5. timers throttle lsa start-interval hold-interval max-interval
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 ipv6 router ospf process-id Enables OSPFv3 router configuration mode.
Example:
Device(config)# ipv6 router ospf 1
Step 4 timers throttle spf spf-start spf-hold spf-max-wait Turns on SPF throttling.
Example:
Device(config-rtr)# timers throttle spf 200 200
200
Step 5 timers throttle lsa start-interval hold-interval max-interval Sets rate-limiting values for OSPFv3 LSA
generation.
Example:
Device(config-rtr)# timers throttle lsa 300 300
300
Step 6 timers lsa arrival milliseconds Sets the minimum interval at which the software
accepts the same LSA from OSPFv3 neighbors.
Example:
Device(config-rtr)# timers lsa arrival 300
Configuration Examples for OSPFv3 Fast Convergence: LSA and SPF Throttling
Example:
Device(config-rtr)# timers pacing flood 30
Additional References
Related Documents
Related Topic Document Title
Feature Information for OSPFv3 Fast Convergence: LSA and SPF Throttling
Table 31: Feature Information for OSPFv3 Fast Convergence: LSA and SPF Throttling
Feature Information for OSPFv3 Fast Convergence: LSA and SPF Throttling
HAPTER 29
OSPFv3 Max-Metric Router LSA
The Open Shortest Path First version 3 (OSPFv3) max-metric router link-state advertisement (LSA) feature
enables OSPFv3 to advertise its locally generated router LSAs with a maximum metric. The feature allows
OSPFv3 processes to converge but not attract transit traffic through the device if there are better alternate
paths.
the device if there are better alternate paths. After a specified timeout or a notification from Border Gateway
Protocol (BGP), OSPFv3 advertises the LSAs with normal metrics.
The max-metric LSA control places the OSPFv3 router into the stub router role using its LSA advertisement. A
stub router only forwards packets destined to go to its directly connected links. In OSPFv3 networks, a device
could become a stub router by advertising large metrics for its connected links, so that the cost of a path
through this device becomes larger than that of an alternative path. OSPFv3 stub router advertisement allows a
device to advertise the infinity metric (0xFFFF) for its connected links in router LSAs and advertise the normal
interface cost if the link is a stub network.
1. enable
2. configure terminal
3. router ospfv3 process-id
4. address-family ipv6 unicast
5. max-metric router-lsa [external-lsa [max-metric-value]] [include-stub] [inter-area-lsas
[max-metric-value]] [on-startup {seconds | wait-for-bgp}] [prefix-lsa] [stub-prefix-lsa [max-metric-
value]] [summary-lsa [max-metric-value]]
6. end
7. show ospfv3 [process-id] max-metric
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Example:
Device(config)# router ospfv3 1
Step 5 max-metric router-lsa [external-lsa [max-metric-value]] Configures a device that is running the OSPFv3
[include-stub] [inter-area-lsas [max-metric-value]] protocol to advertise a maximum metric so that other
devices do
[on-startup {seconds | wait-for-bgp}] [prefix-lsa] not prefer the device as an intermediate hop in their
[stub-prefix-lsa [max-metric-value]] [summary-lsa [max- SPF calculations.
metric-value]]
Example:
Device(config-router-af)# max-metric router-lsa
on-startup wait-for-bgp
Step 7 show ospfv3 [process-id] max-metric Displays OSPFv3 maximum metric origination
information.
Example:
Device# show ospfv3 1 max-metric
Cisco IOS commands Cisco IOS Master Command List, All Releases
Configuring IETF NSF or Cisco NSF “Configuring NSF-OSPF” module in the Cisco IOS
High Availability Configuration Guide
Standard and RFCs
Standard/RFC Title
HAPTER 30
OSPF Link-State Advertisement Throttling
The OSPF Link-State Advertisement Throttling feature provides a dynamic mechanism to slow down link-
state advertisement (LSA) updates in Open Shortest Path First (OSPF) during times of network instability. It
also allows faster OSPF convergence by providing LSA rate limiting in milliseconds.
1. enable
2. configure terminal
3. router ospf process-id
4. timers throttle lsa all start-interval hold-interval max-interval
5. timers lsa arrival milliseconds
6. end
7. show ip ospf timers rate-limit
8. show ip ospf
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Example:
Router# configure terminal
Example:
Router(config)# router ospf 1
Step 4 timers throttle lsa all start-interval hold-interval max-interval (Optional) Sets the rate-limiting values (in
milliseconds) for LSA generation.
Example:
• The default values are as follows:
Router(config-router)# timers throttle lsa all 100 10000
45000 • start-intervalis 0 milliseconds.
• hold-intervalis 5000 milliseconds.
• max-intervalis 5000 milliseconds.
Step 5 timers lsa arrival milliseconds (Optional) Sets the minimum interval (in
milliseconds) between instances of receiving the
Example: same LSA.
Router(config-router)# timers lsa arrival 2000
• The default value is 1000 milliseconds.
• We suggest you keep the millisecondsvalue
of the LSA arrival timer less than or equal to
the neighbors’ hold-interval value of the
timers throttle lsa all command.
Example:
Router(config-router)# end
Example:
LSAID: 10.1.1.1 Type: 1 Adv Rtr: 172.16.2.2 Due in:
00:00:00.028
Example:
LSAID: 192.168.4.1 Type: 3 Adv Rtr: 172.17.2.2 Due in:
00:00:00.028
Example:
Example:
Routing Process "ospf 4" with ID 10.10.24.4
Example:
Supports only single TOS(TOS0) routes
Example:
Supports
opaque LSA
Example:
Supports
Link-local Signaling (LLS)
Example:
Initial
SPF schedule delay 5000 msecs
Customizing OSPF LSA Throttling
Example:
Number of opaque AS LSA 0. Checksum Sum 0x0
Example:
Number of
DCbitless external and opaque AS LSA 0
Example:
Number of
DoNotAge external and opaque AS LSA 0
Example:
Number of areas in this router is 1. 1 normal 0 stub 0
nssa
Example:
External flood list length 0
Example:
Area 24
Example:
Number of interfaces in this area is 2
Example:
Area has no authentication
Example:
SPF algorithm last executed 04:28:18.396 ago
Example:
SPF algorithm executed 8 times
Example:
Area ranges are
Example:
Numbe
r of LSA 4. Checksum Sum 0x23EB9
Example:
Numbe
r
of opaque link LSA 0. Checksum Sum 0x0
Example:
Numbe
r
of DCbitless LSA 0
Example:
Numbe
r
of indication LSA 0
Example:
Numbe
r
of DoNotAge LSA 0
Example:
Floo lis
d t length 0
router ospf 1
log-adjacency-changes
timers throttle lsa all 200 10000 45000
timers lsa arrival 2000 network 10.10.4.0
0.0.0.255 area 24 network 10.10.24.0
0.0.0.255 area 24
Additional References
The following sections provide references related to OSPF LSA throttling.
Additional References
Related Documents
Related Topic Document Title
Cisco IOS commands Cisco IOS Master Commands List, All Releases
None --
MIBs
MIB MIBs Link
No new or modified MIBs are supported by this To locate and download MIBs for selected
feature, and support for existing MIBs has not been platforms, Cisco IOS XE releases, and feature sets,
modified by this feature. use Cisco MIB Locator found at the following
URL:
http://www.cisco.com/go/mibs
RFCs
RFC Title
None --
Feature Information for OSPF Link-State Advertisement Throttling
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/
provides online resources to download index.html
documentation, software, and tools. Use these
resources to install and configure the software and
to troubleshoot and resolve technical issues with
Cisco products and technologies. Access to most
tools on the Cisco Support and Documentation
website requires a Cisco.com user ID and
password.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To
access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
• show ip ospf
• show ip ospf timers rate-
limit
• timers lsa arrival
• timers throttle lsa all
HAPTER 31
OSPF Support for Unlimited Software VRFs per
PE Router
In a Multiprotocol Label Switching--Virtual Private Network (MPLS-VPN) deployment, each VPN routing
and forwarding instance (VRF) needs a separate Open Shortest Path First (OSPF) process when configured to
run OSPF. The OSPF Support for Unlimited Software VRFs per Provider Edge (PE) Router feature addresses
the scalability issue for OSPF VPNs by eliminating the OSPF VPN limit of 32 processes.
Prerequisites for OSPF Support for Unlimited Software VRFs per PE Router
1. enable
2. configure terminal
3. ip vrf vpn-name
4. exit
5. router ospf process-id [vrf vpn-name]
6. end
7. show ip ospf [process-id]
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Example:
Router# configure terminal
Step 3 ip vrf vpn-name Defines a VPN routing and forwarding (VRF) instance and
enters VRP configuration mode.
Example:
Router(config)# ip vrf crf-1
Example:
Router(config-vrf)# exit
Example:
Router(config-router)# end
Step 7 show ip ospf [process-id] Displays general information about OSPF routing processes.
Example:
Router# show ip ospf 1
Router> enable
Router# configure terminal
Router(config)# ip vrf first
Router(config-vrf)# exit
Router(config)# ip vrf second
Router(config-vrf)# exit
Router(config)# ip vrf third
Router(config-vrf)# exit
Router(config)# router ospf 12 vrf first
Router(config-router)# exit
Router(config)# router ospf 13 vrf second
Router(config-router)# exit
Router(config)# router ospf 14 vrf third
Router(config)# end
Example Verifying OSPF Support for Unlimited Software VRFs per PE Router
Example Verifying OSPF Support for Unlimited Software VRFs per PE Router
This example illustrates the output from the show ip ospf command to verify that OSPF VRF process 12 has
been created for the VRF named first. The output that relates to the VRF first appears in bold.
Standard Title
None --
Number of areas in this router is 1. 1 normal 0 stub 0 nssa
Number of areas transit capable is 0
External flood list length 0
Area BACKBONE(0)
Number of interfaces in this area is 1
Area has no authentication
SPF algorithm last executed 00:00:15.204 ago
SPF algorithm executed 2 times
Area ranges are
Number of LSA 1. Checksum Sum 0xD9F3
Number of opaque link LSA 0. Checksum Sum 0x0
Number of DCbitless LSA 0
Number of indication LSA 0
Number of DoNotAge LSA 0
Flood list length 0
Additional References
The following sections provide references related to the OSPF Support for Unlimited Software VRFs per
Provider Edge Router feature.
Related Documents
Related Topic Document Title
MIBs
MIB MIBs Link
No new or modified MIBs are supported by this To locate and download MIBs for selected
feature, and support for existing MIBs has not been platforms, Cisco IOS XE releases, and feature sets,
modified by this feature. use Cisco MIB Locator found at the following
URL:
http://www.cisco.com/go/mibs
RFCs
RFC Title
None --
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/
provides online resources to download index.html
documentation, software, and tools. Use these
resources to install and configure the software and
to troubleshoot and resolve technical issues with
Cisco products and technologies. Access to most
tools on the Cisco Support and Documentation
website requires a Cisco.com user ID and
password.
Feature Information for OSPF Support for Unlimited Software VRFs per PE Router
Table 34: Feature Information for OSPF Support for Unlimited Software VRFs per Provider Edge Router
Feature Information for OSPF Support for Unlimited Software VRFs per PE Router
APTER 32
OSPF Area Transit Capability
The OSPF Area Transit Capability feature provides an OSPF Area Border Router (ABR) with the ability to
discover shorter paths through the transit area for forwarding traffic that would normally need to travel through
the virtual-link path. This functionality allows Cisco IOS XE software to be compliant with RFC 2328, OSPF
Version 2.
1. enable
2. configure terminal
3. router ospf process-id [vrf vpn-name]
4. no capability transit
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Example:
Router# configure terminal
Step 3 router ospf process-id [vrf vpn-name] Enables OSPF routing and enters router configuration
mode.
• The process-id argument identifies the OSPF process.
Example:
Router(config)# router ospf 100
Additional References
The following sections provide references related to the OSPF Area Transit Capability feature.
ransit Capability
Additional References
Related Documents
Related Topic Document Title
Cisco IOS master command list, all releases Cisco IOS Master Command List, All Releases
Standards
Standard Title
• capability transit
APTER 33
OSPF Per-Interface Link-Local Signaling
The OSPF Per-Interface Link-Local Signaling feature allows you to selectively enable or disable Link-Local
Signaling (LLS) for a specific interface regardless of the global (router level) setting that you have previously
configured.
LLS on an interface that is connected to a non-Cisco device that may be noncompliant with RFC 2328 can
prevent problems with the forming of OSPF neighbors in the network.
1. enable
2. configure terminal
3. interface type slot /port
4. ip address ip-address mask [secondary]
5. no ip directed-broadcast [access-list-number | extended access-list-number]
6. ip ospf message-digest-key key-id encryption-type md5 key
7. [no | default] ip ospf lls [disable]
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Example:
Router# configure terminal
Step 3 interface type slot /port Configures an interface type and enters interface
configuration mode.
Example:
Router(config)# interface gigabitethernet 1/1/0
Step 4 ip address ip-address mask [secondary] Sets a primary or secondary IP address for an interface.
Example:
Router(config-if)# ip address 10.2.145.20
255.255.255.0
Step 5 no ip directed-broadcast [access-list-number | extended Drops directed broadcasts destined for the subnet to
access-list-number] which that interface is attached, rather than
broadcasting them.
OSPF Per-Interface Link-Local Signaling
Step 6 ip ospf message-digest-key key-id encryption-type md5 Enables OSPF Message Digest 5 (MD5) algorithm
key authentication.
Example:
Router(config-if)# ip ospf message-digest-key
100 md5 testing
Step 7 [no | default] ip ospf lls [disable] Disables LLS on an interface, regardless of the global
(router level) setting.
Example:
Router(config-if)# ip ospf lls disable
What to Do Next
To verify that LLS has been enabled or disabled for a specific interface, use the show ip ospf interface
command. See the "Example: Configuring and Verifying the OSPF Per-Interface Link-Local Signaling
Feature" section for an example of the information displayed.
interface gigabitethernet1/1/0
no ip directed-
broadcast !
router ospf 1
log-adjacency-changes detail area 0
authentication message-digest
redistribute connected subnets
network 10.0.0.0 0.255.255.255 area
1 network 10.2.3.0 0.0.0.255 area 1
In the following example, the show ip ospf interface command has been entered to verify that LLS has
been enabled for GigabitEthernet interface 1/1/0 and disabled for GigabitEthernet interface 2/1/0:
Additional References
The following sections provide references related to the OSPF Per-Interface Link-Local Signaling feature.
r-Interface Link-Local Signaling
Additional References
Related Documents
Related Topic Document Title
Cisco IOS master command list, all releases Cisco IOS Master Command List, All Releases
Standards
Standard Title
None --
MIBs
MIB MIBs Link
No new or modified MIBs are supported by this To locate and download MIBs for selected
feature, and support for existing MIBs has not been platforms, Cisco IOS XE releases, and feature sets,
modified by this feature. use Cisco MIB Locator found at the following
URL:
http://www.cisco.com/go/mibs
RFCs
RFC Title
• ip ospf lls
CHAPTER 34
OSPF Link-State Database Overload
Protection
The OSPF Link-State Database Overload Protection feature allows you to limit the number of nonself-
generated link-state advertisements (LSAs) for a given Open Shortest Path First (OSPF) process.
Excessive LSAs generated by other routers in the OSPF domain can substantially drain the CPU and
memory resources of the router.
1. enable
2. configure terminal
3. router ospf process-id
4. router-id ip-address
5. log -adjacency-changes [detail]
6. max-lsa maximum-number [threshold-percentage] [warning-only] [ignore-time minutes] [ignore-count
count-number] [reset-time minutes]
7. network ip-address wildcard-mask area area-id
8. end
9. show ip ospf [process-id area-id] database[database-summary]
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Example:
Router# configure terminal
Example:
Router(config-router)# router-id 10.0.0.1
Step log -adjacency-changes [detail] Configures the router to send a syslog message when an
5 OSPF neighbor goes up or down.
Example:
Router(config-router)# log-adjacency-changes
Step 6 max-lsa maximum-number [threshold-percentage] Limits the number of nonself-generated LSAs that an
[warning-only] [ignore-time minutes] [ignore- OSPF routing process can keep in the OSPF link-state
count count-number] [reset-time minutes] database (LSDB).
Example:
Router(config-router)# max-lsa 12000
Step 7 network ip-address wildcard-mask area area-id Defines the interfaces on which OSPF runs and defines
the area ID for those interfaces.
Example:
Router(config-router)# network 209.165.201.1
255.255.255.255 area 0
Step 9 show ip ospf [process-id area-id] database[database- Displays lists of information related to the OSPF
summary] database for a specific router.
Example
The show ip ospf command is entered with the database-summary keyword to verify the actual number of nonself-
generated LSAs on a router. This command can be used at any time to display lists of information related to the OSPF
database for a specific router.
Opaque Link 0 0 0
Opaque Area 0 0 0
Subtotal 15 2 2
Process 2000 database summary
LSA Type Count Delete Maxage
Router 5 0 0
Network 2 0 0
Summary Net 8 2 2
Summary ASBR 0 0 0
Type-7 Ext 0 0 0
Opaque Link 0 0 0
Opaque Area 0 0 0
Type-5 Ext 4 0 0
Prefixes redistributed in Type-5 0
Opaque AS 0 0 0
Non-self 16
Total 19 2 2
Additional References
The following sections provide references related to the OSPF Link-State Database Overload Protection
feature.
Related Documents
Related Topic Document Title
Cisco IOS master command list, all releases Cisco IOS Master Command List, All Releases
Standards
Standard Title
None --
Feature Information for OSPF Link-State Database Overload Protection
MIBs
MIB MIBs Link
No new or modified MIBs are supported by this To locate and download MIBs for selected
feature, and support for existing MIBs has not been platforms, Cisco IOS XE releases, and feature sets,
modified by this feature. use Cisco MIB Locator found at the following
URL:
http://www.cisco.com/go/mibs
RFCs
RFC Title
None --
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/
provides online resources to download index.html
documentation, software, and tools. Use these
resources to install and configure the software and
to troubleshoot and resolve technical issues with
Cisco products and technologies. Access to most
tools on the Cisco Support and Documentation
website requires a Cisco.com user ID and
password.
Table 37: Feature Information for OSPF Link-State Database Overload Protection
• max-lsa
APTER 35
OSPF MIB Support of RFC 1850 and Latest
Extensions
The OSPF MIB Support of RFC 1850 and Latest Extensions feature introduces the capability for Simple
Network Management Protocol (SNMP) monitoring on the Open Shortest Path First (OSPF) routing protocol.
Users have an improved ability to constantly monitor the changing state of an OSPF network by use of MIB
objects to gather information relating to protocol parameters and trap notification objects that can signal the
occurrence of significant network events such as transition state changes. The protocol information collected
by the OSPF MIB objects and trap objects can be used to derive statistics that will help monitor and improve
overall network performance.
information about the features documented in this module, and to see a list of the releases in which each
feature is supported, see the feature information table.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To
access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for OSPF MIB Support of RFC 1850 and Latest Extensions
• Simple Network Management Protocol (SNMP) must be enabled on the router before notifications (traps)
can be configured or before SNMP GET operations can be performed.
OSPF MIB
This section describes the new MIB objects that are provided by RFC 1850 definitions. These OSPF MIB
definitions provide additional capacity that is not provided by the standard OSPF MIB that supported the
previous RFC 1253. To see a complete set of OSPF MIB objects, see the OSPF-MIB file.
The table below shows the new OSPF-MIB objects that are provided by RFC 1850 definitions. The objects are
listed in the order in which they appear within the OSPF-MIB file, per the tables that describe them.
OspfStubAreaEntry
• OspfStubMetricType
OspfAreaRangeEntry
• OspfAreaRangeEffect
OspfHostEntry • OspfHostAreaID
OspfVirtIfEntry
• OspfVirtIfAuthType
OspfNbrEntry
• OspfNbmaNbrPermanence
• OspfNbrHelloSuppressed
OspfVirtNbrEntry
• OspfVirtNbrHelloSuppressed
OspfExtLsdbEntry
• OspfExtLsdbType
• OspfExtLsdbLsid
• OspfExtLsdbRouterId
• OspfExtLsdbSequence
• OspfExtLsdbAge
• OspfExtLsdbChecksum
• OspfExtLsdbAdvertisement
OspfAreaAggregateEntry
• OspfAreaAggregateAreaID
• OspfAreaAggregateLsdbType
• OspfAreaAggregateNet
• OspfAreaAggregateMask
• OspfAreaAggregateStatusospfSetTrap
• OspfAreaAggregateEffect
The following scalar objects are added to OSPF-TRAP-MIB and are listed in the order in which they appear in the
OSPF-TRAP-MIB file:
• OspfExtLsdbLimit
• OspfMulticastExtensions
• OspfExitOverflowInterval
• OspfDemandExtensions
The ospfSetTrap control MIB object contains the OSPF trap MIB objects that enable and disable OSPF traps in the
IOS CLI. These OSPF trap MIB objects are provided by the RFC 1850 standard OSPF MIB. To learn how to enable
and disable the OSPF traps, see the How to Enable OSPF MIB Support of RFC 1850 and Latest Extensions, on page
328.
The table below shows the OSPF trap MIB objects, listed in the order in which they appear within the OSPF-TRAP-
MIB file.
ospfSetTrap
• ospfIfStateChange
• ospfVirtIfStateChange
• ospfNbrStateChange
• ospfVirtNbrState
• ospfIfConfigError
• ospfVirtIfConfigError
• ospfIfAuthFailure
• ospfVirtIfAuthFailure
• ospfIfRxBadPacket
• ospfVirtIfRxBadPacket
• ospfTxRetransmit
• ospfVirtIfTxRetransmit
• ospfOriginateLsa
• ospfMaxAgeLsa
• cospfRFC1583Compatibility
• cospfOpaqueLsaSupport
• cospfOpaqueASLsaCount
• cospfOpaqueASLsaCksumSum
For each of the following table entries, the new Cisco-specific MIB objects that are provided as extensions to support the RFC 1850
OSPF MIB definitions are listed. To see the complete set of objects for the Cisco-specific OSPF MIB, refer to the CISCO-OSPF-MIB
file.
The table below shows the new CISCO-OSPF-MIB objects that are provided by RFC 1850 definitions. The objects are listed in the
order in which they appear within the CISCO-OSPF-MIB file, per the tables that describe them.
cospfAreaEntry
• cospfOpaqueAreaLsaCount
• cospfOpaqueAreaLsaCksumSum
• cospfAreaNssaTranslatorRole
• cospfAreaNssaTranslatorState
• cospfAreaNssaTranslatorEvents
cospfLsdbEntry
• cospfLsdbType
• cospfLsdbSequence
• cospfLsdbAge
• cospfLsdbChecksum
• cospfLsdbAdvertisement
cospfIfEntry
• cospfIfLsaCount
• cospfIfLsaCksumSum
cospfVirtIfEntry • cospfVirtIfLsaCount
• cospfVirtIfLsaCksumSum
cospfVirtLocalLsdbEntry
• cospfVirtLocalLsdbTransitArea
• cospfVirtLocalLsdbNeighbor
• cospfVirtLocalLsdbType
• cospfVirtLocalLsdbLsid
• cospfVirtLocalLsdbRouterId
• cospfVirtLocalLsdbSequence
• cospfVirtLocalLsdbAge
• cospfVirtLocalLsdbChecksum
• cospfVirtLocalLsdbAdvertisement
cospfTxRetransmit
This trap is generated in the case of opaque LSAs
when packets are sent by a nonvirtual interface. An
opaque link-state advertisement (LSA) is used in
MPLS traffic engineering to distribute attributes
such as capacity and topology of links in a network.
The scope of this LSA can be confined to the local
network (Type 9, Link-Local), OSPF area (Type
20, Area-Local), or autonomous system (Type 11,
AS scope). The information in an opaque LSA can
be used by an external application across the OSPF
network.
SUMMARY STEPS
1. enable
2. configure terminal
3. snmp-server community string1 ro
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Example:
Router# configure terminal
Step 3 snmp-server community string1 ro Enables read access to all objects in the MIB, but does not allow
access to the community strings.
Example:
Router(config)# snmp-server public
community ro
Step 5 snmp-server host {hostname | ip-address} [vrf Specifies a recipient (target host) for SNMP notification
vrf-name] [traps | informs] [version {1 | 2c | 3 operations.
[auth | noauth | priv]}] community-string • If no notification-type is specified, all enabled notifications
[udp-port port] [notification-type] (traps or informs) will be sent to the specified host.
Example: • If you want to send only the OSPF notifications to the
Router(config)# snmp-server host
specified host, you can use the optional ospfkeyword as
172.20.2.162 version 2c public ospf one of the notification-types. (See the example.) Entering
the ospf keyword enables the ospfSetTrap trap control
MIB object.
Step 6 snmp-server enable traps ospf Enables all SNMP notifications defined in the OSPF MIBs.
Note This step is required only if you wish to enable all OSPF
traps. When you enter the no snmp-server enable
Example: traps ospf command, all OSPF traps will be disabled.
Router(config)# snmp-server enable traps
ospf
Step 7 end Ends your configuration session and exits global configuration
mode.
Example:
Router(config)# end
What to Do Next
If you did not want to enable all OSPF traps, follow the steps in the following section to selectively enable one or
more types of OSPF trap:
Enabling Specific OSPF Traps
1. enable
2. configure terminal
3. snmp-server enable traps ospf cisco-specific errors [config-error] [virt-config-error]
4. snmp-server enable traps ospf cisco-specific retransmit [packets] [virt-packets]
5. snmp-server enable traps ospf cisco-specific state-change [nssa-trans-change] [shamlink-state-
change]
6. snmp-server enable traps ospf cisco-specific lsa [lsa-maxage] [lsa-originate]
7. snmp-server enable traps ospf errors [authentication-failure] [bad-packet] [config-error] [virt-
authentication-failure] [virt-config-error]
8. snmp-server enable traps ospf lsa [lsa-maxage] [lsa-originate]
9. snmp-server enable traps ospf rate-limit seconds trap-number
10. snmp-server enable traps ospf retransmit [packets] [virt-packets]
11. snmp-server enable traps ospf state-change [if-state-change] [neighbor-state-change]
[virtif-state-change] [virtneighbor-state-change]
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
Example:
Router# configure terminal
Step 3 snmp-server enable traps ospf cisco-specific errors Enables SNMP notifications for Cisco-specific OSPF
[config-error] [virt-config-error] configuration mismatch errors.
Example: • Entering the snmp-server enable traps ospf
Router(config)# snmp-server enable traps ospf
cisco-specific errors command with the optional
cisco-specific errors config-error virt-config-error keyword enables only the
SNMP notifications for configuration mismatch
errors on virtual interfaces.
Step 4 snmp-server enable traps ospf cisco-specific retransmit Enables error traps for Cisco-specific OSPF errors that
[packets] [virt-packets] involve re-sent packets.
Enabling Specific OSPF Traps
Example:
Router(config)# snmp-server enable traps ospf
retransmit
Step 11 snmp-server enable traps ospf state-change Enables SNMP OSPF notifications for OSPF
[if-state-change] [neighbor-state-change] [virtif-state- transition state changes.
change] [virtneighbor-state-change]
Example:
Router(config)# snmp-server enable traps ospf
state-change
1. enable
2. show running-config [options]
DETAILED STEPS
Command or Action Purpose
Step 2 show running-config [options] Displays the contents of the currently running configuration
file and includes information about enabled traps.
Example:
• Verifies which traps are enabled.
Router# show running-config | include
traps
Configuration Examples for OSPF MIB Support of RFC 1850 and Latest Extensions
Where to Go Next
For more information about SNMP and SNMP operations, see the "Configuring SNMP Support" chapter of the
Cisco IOS XE Network Management Configuration Guide, Release 2 .
Additional References
The following sections provide references related to the Area Command in Interface Mode for OSPFv2 feature.
Related Documents
Related Topic Document Title
MIBs
MIB MIBs Link
No new or modified MIBs are supported by this To locate and download MIBs for selected
feature, and support for existing MIBs has not been platforms, Cisco IOS releases, and feature sets, use
modified by this feature.
Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs
RFCs
RFC Title
Feature Information for OSPF MIB Support of RFC 1850 and Latest Extensions
Table 42: Feature Information for OSPF MIB Support of RFC 1850 and Latest Extensions
HAPTER 36
OSPF Enhanced Traffic Statistics
This document describes new and modified commands that provide enhanced OSPF traffic statistics for
OSPFv2 and OSPFv3. The ability to collect and display more detailed traffic statistics increases high
availability for the OSPF network by making the troubleshooting process more efficient.
New OSPF traffic statistics are collected and displayed to include the following information:
• OSPF Hello input queue and OSPF process queue status and statistics.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To
access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
• OSPF process queue status and statistical information can help the network administrator determine if an
OSPF process can handle the amount of traffic sent to OSPF.
• OSPF packet header errors and LSA errors statistics keep a record of different errors found in received
OSPF packets.
OSPF enhanced traffic control statistics also monitor the amount of traffic control exchanged between OSPF
processes--an important consideration in network environments with slow links and frequent topology changes.
1. enable
2. show ip ospf [process-id] traffic[interface-type interface-number]
3. clear ip ospf traffic
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
Step 2 show ip ospf [process-id] traffic[interface-type interface- Displays OSPFv2 traffic statistics.
number]
Example:
Router# show ip ospf 10 traffic gigabitethernet
0/0/0
Displaying and Clearing OSPF Traffic Statistics for OSPFv3
Example:
Router# clear ip ospf traffic
1. enable
2. show ipv6 ospf [process-id] traffic[interface-type interface-number]
3. clear ipv6 ospf traffic
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Step 2 show ipv6 ospf [process-id] traffic[interface-type Displays OSPFv3 traffic statistics.
interface-number]
Example:
Router# show ipv6 ospf traffic
Example:
Router# clear ipv6 ospf traffic
Authentication 0,
OSPF LSA errors
Type 0, Length 0, Data 0, Checksum 0,
OSPF Router with ID (10.1.1.4) (Process ID 1) OSPF queues statistic for
process ID 1:
OSPF Hello queue size 0, no limit, drops 0, max size 2
OSPF Router queue size 0, limit 200, drops 0, max size 2 Interface statistics:
Interface Serial2/0/0
OSPF packets received/sent
Type Packets Bytes
RX Invalid 0 0
RX Hello 11 528
RX DB des 4 148
RX LS req 1 60
RX LS upd 3 216
RX LS ack 2 128
RX Total 21 1080
TX Failed 0 0
TX Hello 14 1104
TX DB des 3 252
TX LS req 1 56
TX LS upd 3 392
TX LS ack 2 128
TX Total 23 1932
OSPF header errors
Length 0, Checksum 0, Version 0, Bad Source 0,
No Virtual Link 0, Area Mismatch 0, No Sham Link 0,
Self Originated 0, Duplicate ID 0, Hello 0,
MTU Mismatch 0, Nbr Ignored 0, LLS 0,
Authentication 0,
OSPF LSA errors
IP Routing: OSPF Configuration Guide
343
Type 0, Length 0, Data 0, Checksum 0,
Interface GigabitEthernet0/0/0
OSPF packets received/sent
Type Packets Bytes
RX Invalid 0 0
RX Hello 13 620
RX DB des 3 116
RX LS req 1 36
RX LS upd 3 228
RX LS ack 4 216
RX Total 24 1216
TX Failed 0 0
TX Hello 17 1344
TX DB des 4 276
TX LS req 1 56
TX LS upd 7 656
TX LS ack 2 128
TX Total 31 2460
OSPF header errors
Length 0, Checksum 0, Version 0, Bad Source 13,
No Virtual Link 0, Area Mismatch 0, No Sham Link 0,
Self Originated 0, Duplicate ID 0, Hello 0,
MTU Mismatch 0, Nbr Ignored 0, LLS 0,
Authentication 0,
OSPF LSA errors
Type 0, Length 0, Data 0, Checksum 0,
OSPF Enhanced Traffic Statistics
TX LS upd 10 1048
TX LS ack 4 256
TX Total 54 4392
OSPF header errors
Length 0, Checksum 0, Version 0, Bad Source 13,
No Virtual Link 0, Area Mismatch 0, No Sham Link 0,
Self Originated 0, Duplicate ID 0, Hello 0,
MTU Mismatch 0, Nbr Ignored 0, LLS 0,
Authentication 0,
OSPF LSA errors
Type 0, Length 0, Data 0, Checksum 0,
The network administrator can issue the clear ip ospf traffic command to reset all counters and restart all
statistics collections:
TX LS upd 3 252
TX LS ack 3 148
TX Total 18 900
OSPFv3 header errors
Length 0, Checksum 0, Version 0, No Virtual Link 0,
Area Mismatch 0, Self Originated 0, Duplicate ID 0,
Instance ID 0, Hello 0, MTU Mismatch 0,
Nbr Ignored 0, Authentication 0,
OSPFv3 LSA errors
Type 0, Length 0, Data 0, Checksum 0,
Interface GigabitEthernet0/0/0
OSPFv3 packets received/sent
Type Packets Bytes
RX Invalid 0 0
RX Hello 6 240
RX DB des 3 144
RX LS req 1 52
RX LS upd 5 372
Additional References
RX LS ack 2 152
RX Total 17 960
TX Failed 0 0
TX Hello 11 420
TX DB des 9 312
TX LS req 1 52
TX LS upd 5 376
TX LS ack 3 148
TX Total 29 1308
OSPFv3 header errors
Length 0, Checksum 0, Version 0, No Virtual Link 0,
Area Mismatch 0, Self Originated 0, Duplicate ID 0,
Instance ID 0, Hello 0, MTU Mismatch 0,
Nbr Ignored 0, Authentication 0,
OSPFv3 LSA errors
Type 0, Length 0, Data 0, Checksum 0, Summary
traffic statistics for process ID 6:
OSPFv3 packets received/sent
Type Packets Bytes
RX Invalid 0 0
RX Hello 11 436
RX DB des 7 316
RX LS req 2 104
RX LS upd 9 692
RX LS ack 4 264
RX Total 33 1812
TX Failed 0 0
TX Hello 19 724
TX DB des 12 456
TX LS req 2 104
TX LS upd 8 628
TX LS ack 6 296
TX Total 47 2208
OSPFv3 header errors
Length 0, Checksum 0, Version 0, No Virtual Link 0,
Area Mismatch 0, Self Originated 0, Duplicate ID 0,
Instance ID 0, Hello 0, MTU Mismatch 0,
Nbr Ignored 0, Authentication 0,
OSPFv3 LSA errors
Type 0, Length 0, Data 0, Checksum 0,
The network administrator can issue the clear ipv6 ospf traffic command to reset all counters and restart all
statistics collections:
Additional References
The following sections provide references related to the OSPF Sham-Link MIB Support feature.
Related Documents
Related Topic Document Title
Standards
Standard Title
None --
MIBs
MIB MIBs Link
To locate and download MIBs for selected
platforms,
• CISCO-OSPF-MIB Cisco IOS releases, and feature sets, use Cisco MIB
Locator found at the following URL:
• CISCO-OSPF-TRAP-MIB
http://www.cisco.com/go/mibs
RFCs
RFC Title
None --
Technical Assistance
Description Link
http://www.cisco.com/techsupport
The Cisco Support website provides extensive
online resources, including documentation and
tools for troubleshooting and resolving technical
issues with Cisco products and technologies.
Access to most tools on the Cisco Support website
requires a Cisco.com user ID and password. If you
have a valid service contract but do not have a user
ID or password, you can register on Cisco.com.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To
access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Table 43: Feature Information for OSPF Enhanced Traffic Statistics for OSPFv2 and OSPFv3
HAPTER 37
TTL Security Support for OSPFv3 on IPv6
The Time To Live (TTL) Security Support for Open Shortest Path First version 3 (OSPFv3) on IPv6 feature
increases protection against OSPFv3 denial of service attacks.
• OSPFv3 TTL security can be configured for virtual and sham links only.
• OSPFv3 TTL security must be configured in IPv6 address family configuration mode (config-router-af).
To enter IPv6 address family configuration mode you use the address-family ipv6 command.
• Sham links must not be configured on the default Virtual Routing and Forwarding (VRF).
Prerequisites for TTL Security Support for OSPFv3 on IPv6
Note Multihop adjacencies such as virtual links and sham links use global IPv6 addresses that require you to
configure TTL security to control the number of hops that a packet can travel.
If TTL security is enabled, OSPFv3 sends outgoing packets with an IP header TTL value of 255 and discards
incoming packets that have TTL values less than the configurable threshold. Because each device that forwards
an IP packet decreases the TTL value, packets received via a direct (one-hop) connection will have a value of
255. Packets that cross two hops will have a value of 254, and so on. The receive threshold is configured in
terms of the maximum number of hops that a packet may have traveled. The value for this hop-count argument
is a number from 1 to 254, with a default of 1.
To establish a virtual link or a sham link, use the area virtual-link or area sham-link cost commands
respectively. To configure TTL security on a virtual link or a sham link, configure the ttl-security keyword
and the hop-count argument in either command. Note that the hop-count argument value is mandatory in this
case.
Note OSPFv3 TTL Security can be configured for virtual and sham links only, and must be configured in address
family configuration (config-router-af) mode for IPv6 address families.
1. enable
2. configure terminal
3. router ospfv3 [process-id]
4. address-family ipv6 unicast vrf vrf-name
5. area area-ID virtual-link router-id ttl-security hops hop-count
6. end
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 router ospfv3 [process-id] Enables router configuration mode for the IPv4 or IPv6
address family.
Example:
Device(config)# router ospfv3 1
Step 4 address-family ipv6 unicast vrf vrf-name Enters address family configuration mode for OSPFv3,
specifies IPv6 unicast address prefixes, and specifies the
Example: name of the VRF instance to associate with subsequent
address family configuration mode commands.
Device(config-router)# address-family ipv6
unicast vrf vrf1
Example:
Device(config-router-af)# area 1 virtual-link
10.1.1.1 ttl-security hops 10
Example:
Device(config-router-af)# end
1. enable
2. configure terminal
3. router ospfv3 [process-id]
4. address-family ipv6 unicast vrf vrf-name
5. area area-id sham-link source-address destination-address ttl-security hops hop-count
6. end
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 4 address-family ipv6 unicast vrf vrf-name Enters address family configuration mode for OSPFv3,
specifies IPv6 unicast address prefixes, and specifies the
Example: name of the VRF instance to associate with subsequent
address family configuration mode commands.
Device(config-router)# address-family ipv6
unicast vrf vrf1
Step 5 area area-id sham-link source-address destination- Defines an OSPFv3 sham link and configures TTL
address ttl-security hops hop-count security on the sham link.
Example:
Device(config-router-af)# area 1 sham-link
2001:DB8:1::1 2001:DB8:0:A222::2 ttl-security
hops 10
Example:
Device(config-router-af)# end
Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5
Strict TTL checking enabled, up to 10 hops allowed
Additional References
Related Documents
Related Topic Document Title
Cisco IOS commands Cisco IOS Master Commands
List,
All Releases
OSPF commands Cisco IOS IP Routing: OSPF
Command Reference
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/
provides online resources to download index.html
documentation, software, and tools. Use these
resources to install and configure the software and
to troubleshoot and resolve technical issues with
Cisco products and technologies. Access to most
tools on the Cisco Support and Documentation
website requires a Cisco.com user ID and
password.
HAPTER 38
Configuring OSPF TTL Security Check and OSPF
Graceful Shutdown
This module describes configuration tasks to configure various options involving Open Shortest Path First
(OSPF). This module contains tasks that use commands to configure a lightweight security mechanism to
protect OSPF sessions from CPU-utilization-based attacks and to configure a router to shut down a protocol
temporarily without losing the protocol configuration.
Information About OSPF TTL Security Check and OSPF Graceful Shutdown
connected to a network segment between the local and remote OSPF networks. This solution greatly reduces
the effectiveness of Denial of Service (DoS) attacks against an OSPF autonomous system.
1. enable
2. configure terminal
3. router ospf process-id
4. ttl-security all-interfaces [ hops hop-count ]
5. end
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 4 ttl-security all-interfaces [ hops hop-count Configures TTL security check on all OSPF interfaces.
]
Note This configuration step applies only to normal OSPF
interfaces. This step does not apply to virtual links or
Example: sham links that require TTL security protection.
Device(config-router)# ttl-security all- Virtual links and sham links must be configured
interfaces independently.
Example:
Device(config-router)# end
1. enable
2. configure terminal
3. interface type number
4. ip ospf ttl-security [hops hop-count | disable]
5. end
6. show ip ospf [process-id] interface [interface type interface-number] [brief] [multicast] [topology
topology-name | base}]
7. show ip ospf neighbor interface-type interface-number [neighbor-id][detail]
8. show ip ospf [process-id] traffic [interface-type interface-number]
9. debug ip ospf adj
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
360
Configuring TTL Security Check on a Per-Interface Basis
rpose
Step 9 debug ip ospf adj (Optional) Initiates debugging of OSPF adjacency events.
• Information about dropped packets, including interface
Example: type and number, neighbor IP address, and TTL value, is
Device# debug ip ospf adj included in the command output.
1. enable
2. configure terminal
3. interface type number
4. ip ospf shutdown
5. end
6. show ip ospf [ process-id ] interface [ interface type interface-number ] [ brief ] [multicast] [topology
topology-name | base}]
7. show ip ospf [ process-id ]
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Configuration Examples for OSPF TTL Security Check and OSPF Graceful Shutdown
Step 3 interface type number Configures an interface type and number and enters
interface configuration mode.
Example:
Example:
Device(config-if)# end
Step 6 show ip ospf [ process-id ] interface [ interface (Optional) Displays OSPF-related interface information.
type interface-number ] [ brief ] [multicast]
[topology topology-name | base}]
Example:
Device# show
0/1/0 ip ospf interface GigabitEthernet
Step 7 show ip ospf [ process-id ] (Optional) Displays general information about OSPF
routing processes.
Example:
1 Configure TTL security with a hop count of 254 on the OSPF interface on the sending side device.
2 Configure TTL security with no hop count on the OSPF interface on the receiving side device.
configure terminal
! Configure the following command on the sending side router.
interface gigabitethernet 0/1/0 ip ospf
ttl-security hops 254
! Configure the next command on the receiving side router.
interface gigabitethernet 0/1/0 ip ospf
ttl-security
Additional References
The following sections provide references related to the OSPF TTL Security Check and OSPF Graceful
Shutdown features.
Related Documents
Related Topic Document Title
Cisco IOS master command list, all releases Cisco IOS Master Command List, All Releases
Standards
Standard Title
No new or modified standards are supported and --
support for existing standards has not been
modified.
MIBs
MIB MIBs Link
No new or modified MIBs are supported and To locate and download MIBs for selected
support for existing MIBs has not been modified. platforms, software releases, and feature sets, use
Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs
Feature Information for Configuring OSPF TTL Security Check and OSPF Graceful Shutdown
RFCs
RFC Title
Feature Information for Configuring OSPF TTL Security Check and OSPF Graceful Shutdown
Table 45: Feature Information for Configuring OSPF TTL Security Check and OSPF Graceful Shutdown
• ip ospf shutdown
• show ip ospf
• show ip ospf interface
• shutdown (router OSPF)
OSPF TTL Security Check Cisco IOS XE Release 2.1 This feature increases protection
against OSPF denial of service
attacks, enables checking of TTL
values on OSPF packets from
neighbors, and allows users to set
TTL values sent to neighbors.
The following commands were
introduced or modified:
APTER 39
OSPF Sham-Link MIB Support
This feature introduces MIB support for the OSPF Sham-Link feature through the addition of new tables and
trap MIB objects to the Cisco OSPF MIB (CISCO-OSPF-MIB) and the Cisco OSPF Trap MIB (CISCO-OSPF-
TRAP-MIB). New commands have been added to enable Simple Network Management
Protocol (SNMP) notifications for the Open Shortest Path First (OSPF) sham-link trap objects. Notifications
are provided for errors, state changes, and retransmissions across a sham-link interface.
• SNMP must be enabled on the router before notifications (traps) can be configured or before SNMP GET
operations can be performed.
• cospfShamLinksAreaId
• cospfShamLinksLocalIpAddrType
• cospfShamLinksLocalIpAddr
• cospfShamLinksRemoteIpAddrType
• cospfShamLinksRemoteIpAddr
• cospfShamLinksRetransInterval
• cospfShamLinksHelloInterval
• cospfShamLinksRtrDeadInterval
• cospfShamLinksState
Cisco OSPF MIB and Cisco OSPF Trap MIB Enhancements
• cospfShamLinksEvents
• cospfShamLinksMetric
• cospfShamLinkNbrArea
• cospfShamLinkNbrIpAddrType
• cospfShamLinkNbrIpAddr
• cospfShamLinkNbrRtrId
• cospfShamLinkNbrOptions
• cospfShamLinkNbrState
• cospfShamLinkNbrEvents
• cospfShamLinkNbrLsRetransQLen
• cospfShamLinkNbrHelloSuppressed
• ospfRouterId
• cospfShamLinksAreaId
• cospfShamLinksLocalIpAddrType
• cospfShamLinksLocalIpAddr
• cospfShamLinksRemoteIpAddrType
• cospfShamLinksRemoteIpAddr
• cospfShamLinksState
• ospfRouterId
• cospfShamLinkNbrArea
How to Configure OSPF Sham-Link MIB Support
• cospfShamLinksLocalIpAddrType
• cospfShamLinksLocalIpAddr
• cospfShamLinkNbrIpAddrType
• cospfShamLinkNbrIpAddr
• cospfShamLinkNbrRtrId
• cospfShamLinkNbrState
Sham-Link Errors
Trap notifications are provided for OSPF sham-link configuration, authentication, and bad packet errors. These
errors include the following trap objects:
• cospfShamLinkConfigError
• cospfShamLinkAuthFailure
• cospfShamLinkRxBadPacket
1. enable
2. show running-config
3. configure terminal
4. snmp-server host {hostname | ip-address} [vrf vrf-name] [traps | informs] [version {1 | 2c | 3 [auth |
noauth | priv]}] community-string [udp-port port] [notification-type]
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode. •
Enter your password if prompted.
Example:
Router> enable
Example:
Router# configure terminal
Step 4 snmp-server host {hostname | ip-address} Specifies a recipient (target host) for SNMP notification operations.
[vrf vrf-name] [traps | informs] [version {1 |
2c | 3
[auth | noauth | priv]}] community-string • If no notification-type is specified, all enabled notifications
[udp-port port] [notification-type] (traps or informs) will be sent to the specified host.
• If you want to send only the OSPF notifications to the
specified host, you can use the optional ospfkeyword as one of
Example: the notification-types. (See the example.)
Router(config)# snmp-server host
172.20.2.162 version 2c public ospf
Step 5 snmp-server enable traps ospf Enables all SNMP notifications defined in the OSPF MIBs.
Note This step is required only if you want to enable all OSPF traps,
including the traps for OSPF sham-links. When you enter
Example: the no snmp-server enable traps ospf command, all OSPF
Router(config)# snmp-server enable traps, including the OSPF sham-link trap, will be disabled.
traps ospf
Step 6 end Ends your configuration session and exits global configuration
mode.
Example:
Router(config)# end
1. enable
2. configure terminal
3. snmp-server enable traps ospf cisco-specific errors config-error
4. snmp-server enable traps ospf cisco-specific errors shamlink [authentication [bad-packet [config] |
config [bad-packet]]
5. end
Enabling Sending of OSPF Sham-Link Error Traps
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Example:
Router# configure terminal
Step 3 snmp-server enable traps ospf cisco- Enables error traps for OSPF nonvirtual interface mismatch errors.
specific errors config-error Note You must enter the snmp-server enable traps ospf cisco-specific
errors config-error command before you enter the snmp-
Example: server enable traps ospf cisco-specific errors shamlink
Router(config)# snmp-server enable command, in order for both traps to be generated at the same
traps ospf cisco-specific errors
config-error place and maintain consistency with a similar case for
configuration errors across virtual links. If you try to enable
the
cospfShamLinkConfigError trap before configuring the
cospfospfConfigError trap you will receive an error message
stating you must first configure the cospfConfigError trap.
Step 4 snmp-server enable traps ospf cisco- Enables error traps for OSPF sham-link errors.
specific errors shamlink [authentication
• The authentication keyword enables SNMP notifications only for
[bad-packet [config] | config [bad-packet]] authentication failures on OSPF sham-link interfaces.
Example:
• The bad-packet keyword enables SNMP notifications only for
packet parsing failures on OSPF sham-link interfaces.
Router(config)# snmp-server enable
traps ospf cisco-specific errors • The config keyword enables SNMP notifications only for
shamlink
configuration mismatch errors on OSPF sham-link interfaces.
Step 5 end Ends your configuration session and exits global configuration mode.
Example:
Router(config)# end
1. enable
2. configure terminal
3. snmp-server enable traps ospf cisco-specific retransmit [packets [shamlink | virt-packets] | shamlink
[packets | virt-packets] | virt-packets [shamlink]]
4. end
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Example:
Router# configure terminal
Step 3 snmp-server enable traps ospf cisco-specific retransmit Enables error traps for OSPF sham-link
[packets [shamlink | virt-packets] | shamlink [packets | retransmission errors.
virt-packets] | virt-packets [shamlink]]
Example:
Router(config)# snmp-server enable traps ospf
cisco-specific retransmit shamlink
Note The replaced cospfShamLinkChange trap can still be enabled, but not when you want to enable the new
cospfShamLinksStateChange trap.
SUMMARY STEPS
1. enable
2. configure terminal
3. snmp-server enable traps ospf cisco-specific state-change [nssa-trans-change | shamlink [interface |
interface-old | neighbor]]
4. end
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Example:
Router# configure terminal
Step 3 snmp-server enable traps ospf cisco- Enables all Cisco-specific OSPF state change traps including the
specific state-change cospfShamLinksStateChange and cospfShamLinkNbrStateChange traps.
[nssa-trans-change | shamlink [interface | • The neighbor keyword enables the OSPF sham-link neighbor state
interface-old | neighbor]] change traps.
Example: • The interface keyword enables the OSPF sham-link interface state
Router(config)# snmp-server enable change traps.
traps ospf cisco-specific state-
change • The interface-old keyword enables the original OSPF sham-link
Note You cannot enter both the interface and interface-old keywords
because you cannot enable both the new and replaced sham-
link interface transition state change traps. You can configure
only one of the two traps, but not both.
Verifying OSPF Sham-Link MIB Traps on the Router
Example:
Router(config)# end
1. enable
2. show running-config | include traps
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Step 2 show running-config | include traps Displays the contents of the currently running configuration
file and includes information about enabled traps.
Example:
• Verifies if the trap is enabled.
Router# show running-config | include
traps
Where to Go Next
For more information about SNMP and SNMP operations, see the "Configuring SNMP Support" part of the
Cisco IOS XE Network Management Configuration Guide, Release 2 .
Additional References
The following sections provide references related to the OSPF Sham-Link MIB Support feature.
Related Documents
Related Topic Document Title
Cisco IOS commands Cisco IOS Master Commands List, All Releases
Cisco IOS master command list, all releases Cisco IOS Master Command List, All Releases
Standards
Standard Title
MIBs
MIB MIBs Link
To locate and download MIBs for selected
platforms,
• CISCO-OSPF-MIB Cisco IOS XE software releases, and feature sets,
use Cisco MIB Locator found at the following
• CISCO-OSPF-TRAP-MIB
URL:
http://www.cisco.com/go/mibs
RFCs
RFC Title
OSPF Sham-Link MIB Support Cisco IOS XE Release 2.1 Cisco This feature introduces MIB
IOS XE Release 2.6 support for the OSPF Sham-Link
feature through the addition of
new
tables and trap MIB objects to the
Cisco OSPF MIB
(CISCO-OSPF-MIB) and to the
Cisco OSPF Trap MIB
(CISCO-OSPF-TRAP-MIB).
New commands have been added
to enable Simple Network
Management Protocol (SNMP)
notifications for the Open
Shortest Path First (OSPF) sham-
link trap objects. Notifications are
provided for errors, state changes,
and retransmissions across a
sham-link interface.
The following commands are
introduced or modified in the
feature documented in this
module:
APTER 40
OSPF SNMP ifIndex Value for Interface ID in
Data Fields
This feature allows you to configure the interface ID value Open Shortest Path First version 2 (OSPFv2) and
Open Shortest Path First version 3 (OSPFv3) data fields. You can choose to use either the current interface
number or the Simple Network Management Protocol (SNMP) MIB-II interface index (ifIndex) value for the
interface ID. The advantage to using the SNMP MIB-II ifIndex value is that this number corresponds to the
number that the user will see reported by SNMP.
• Using the SNMP MIB-II ifIndex identification numbers to identify OSPF interfaces makes it easier for
network administrators to identify interfaces because the numbers will correspond to the numbers that
they will see reported by SNMP.
• In the link-state advertisements (LSAs), the value used in fields that have the interface ID will be the
same as the value that is reported by SNMP.
• In the output from the show ipv6 ospf interface command, the interface ID number will have the same
value that is reported by SNMP.
• Using the SNMP MIB-II IfIndex is also suggested, but not required, by the OSPF RFC 2328 for OSPFv2
and the RFC 2740 for OSPFv3.
How OSPFv2 and OSPFv3 Use the SNMP MIB-II ifIndex Value
The user chooses for OSPF interfaces to use the SNMP MIB-II ifIndex number by entering the interface-id
snmp-if-index command for a specific OSPF process. If an interface under the specific OSPF process does not
have an SNMP ifIndex number, OSPF will not be enabled on that interface.
For OSPFv2, the ifIndex number is used for the Link Data field in the Router LSA for unnumbered point-to-
point interfaces and sham links. When the interface-id snmp-if-index command is entered, the affected LSAs
will immediately be reoriginated.
For OSPFv3, the ifIndex number is used for the interface ID in router LSAs, as the LSID in Network and
Link LSAs, and also as the interface ID in Hello packets. Intra-Area-Prefix LSAs that reference Network LSAs
have the Network LSAs LSID in the Referenced LSID field, so they will also be updated when the interface-
id snmp-if-index command is entered. The old Network, Link, and Intra-Area-Prefix LSAs that are associated
with a Network LSA will be flushed.
For both OSPFv2 and OSPFv3, adjacencies are not flapped, except for affected OSPFv3 demand circuits
(including virtual links) with full adjacencies.
How to Configure SNMP ifIndex Value for Interface ID in Data Fields
For both OSPFv2 and OSPFv3, if an interface does not have an SNMP ifIndex number and an interface ID is
needed (for OSPFv2 this applies only to unnumbered interfaces and sham links), an error message will be
generated and the interface will be disabled. The interface will be reenabled if the no interface-id snmp-if-
index command is entered.
1. enable
2. configure terminal
3. Do one of the following:
4. interface-id snmp-if-index
5. end
6. show snmp mib ifmib ifindex [type number] [detail][free-list]
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 Do one of the following: Configures an OSPFv2 routing process and enters router
configuration mode.
• router ospf process-id [vrf vpn-name]
Configures an OSPFv3 routing process and enters router
• configuration mode.
• ipv6 router ospf process-id
Configuration Examples for SNMP ifIndex Value for Interface ID in Data Fields
Example:
Example:
Device(config)# ipv6 router ospf 4
Step 4 interface-id snmp-if-index Configures OSPF interfaces with the SNMP interface index
identification numbers (ifIndex values).
Example:
Device(config-router)# interface-id snmp-if-
index
Step 6 show snmp mib ifmib ifindex [type number] Displays SNMP interface index identification numbers
[detail][free-list] (ifIndex values) for all the system interfaces or the specified
system interface.
Example:
Device# show snmp mib ifmib ifindex
GigabitEtherent 0/0
Serial13/0: Ifindex = 53
LS age: 151
LS Type: Intra-Area-Prefix-LSA Link State ID: 1006
Advertising Router: 172.16.0.1
LS Seq Number: 80000001
Checksum: 0x6E24
Length: 44
Referenced LSA Type: 2002
Referenced Link State ID: 6
Referenced Advertising Router: 172.16.0.1 Number of Prefixes: 1
Prefix Address: 2002:0:1::
Prefix Length: 64, Options: None, Metric: 0 Device# show ipv6 ospf database
router
OSPFv3 Router with ID (10.0.0.1) (Process ID 1)
Router Link States (Area 0)
Routing Bit Set on this LSA
LS age: 5 (DoNotAge)
Options: (V6-Bit E-Bit R-bit DC-Bit)
LS Type: Router Links
Link State ID: 0
Advertising Router: 10.0.0.1
LS Seq Number: 80000004
Checksum: 0xEE5C
Length: 40
Area Border Router
Number of Links: 1
Link connected to: a Virtual Link
Link Metric: 10
Local Interface ID: 70
Neighbor Interface ID: 71
Neighbor Router ID: 172.16.0.1 LS age: 162
Options: (V6-Bit E-Bit R-bit DC-Bit)
Number of Links: 1
Link connected to: a Transit Network
Link Metric: 10
Local Interface ID: 6
Neighbor (DR) Interface ID: 6
Neighbor (DR) Router ID: 172.16.0.1
Device# show ipv6 ospf database link adv-router 172.16.0.1
OSPFv3 Router with ID (172.16.0.1) (Process ID 1)
Link (Type-8) Link States (Area 0) LS age: 245
Options: (V6-Bit E-Bit R-bit DC-Bit)
LS Type: Link-LSA (Interface: GigabitEthernet2/0)
Link State ID: 10 (Interface ID)
Advertising Router: 172.16.0.1
LS Seq Number: 80000002
Checksum: 0xA0CB
Length: 56
Router Priority: 1
Link Local Address: FE80::A8BB:CCFF:FE00:6F02 Number of Prefixes: 1 Prefix
Address: 2002:0:2::
Prefix Length: 64, Options: None Link (Type-8) Link States (Area 1)
LS age: 250
Additional References
Related Documents
Related Topic Document Title
Cisco IOS commands Cisco IOS Master Commands List, All Releases
MIBs
MIB MIBs Link
To locate and download MIBs for selected
platforms,
• None Cisco software releases, and feature sets, use Cisco
MIB Locator found at the following URL:
http://www.cisco.com/go/mibs
RFCs
RFC Title
RFC 5286 Basic Specification for IP Fast Reroute: Loop-Free
Alternates
Technical Assistance
Description Link
Table 47: Feature Information for OSPF: SNMP ifIndex Value for Interface ID in OSPFv2 and OSPFv3 Data Fields
HAPTER 41
OSPFv2 Local RIB
With the OSPFv2 Local RIB feature, each OSPF protocol instance has its own local Routing Information
Base (RIB). The OSPF local RIB serves as the primary state for OSPF SPF route computation. The global
RIB is not updated with intermediate results during the SPF. Instead, the global RIB is updated only when
routes are added, deleted, or changed, thereby reducing global RIB computation. This reduced update activity
may result in fewer dropped packets.
This feature is enabled by default and does not need to be configured. This document describes some optional
configuration tasks to modify how the global and local RIBs function, although it is recommended to keep the
default settings.
information about the features documented in this module, and to see a list of the releases in which each
feature is supported, see the feature information table.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To
access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
1. enable
2. configure terminal
3. router ospf process-id [vrf vpn-name]
4. local-rib-criteria [forwarding-address] [inter-area-summary] [nssa-translation]
5. end
6. show ip ospf process-id rib [redistribution] [network-prefix] [network-mask] [detail]
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 router ospf process-id [vrf vpn-name] Configures an OSPFv2 routing process and enters
router configuration mode.
Example:
Device(config)# router ospf 23
Step 4 local-rib-criteria [forwarding-address] [inter-area- Specifies that the OSPF local RIB will be used
summary] [nssa-translation] for route validation.
Example:
Device(config-router)# local-rib-criteria
forwarding-address
Example:
Device(config-router)# end
Example:
Device# show ip ospf 23 rib
Note It is recommended that you keep the default settings. However, you can follow the steps in this section to change
the administrative distance for discard routes.
SUMMARY STEPS
1. enable
2. configure terminal
3. router ospf process-id [vrf vpn-name]
4. discard-route [external [distance]] [internal [distance]]
5. end
6. show ip route [ip-address [mask] [longer-prefixes] | protocol [process-id] | list [access-list-number |
access-list-name] | static download]
DETAILED STEPS
Command or Action Purpose
Example:
Device# configure terminal
router ospf process-id [vrf vpn-name] Configures an OSPFv2 routing process and enters router
configuration mode.
Example:
Device(config)# router ospf 23
discard-route [external [distance]] [internal Reinstalls either an external or internal discard route that
[distance]] was previously removed.
Note You can now specify the administrative distance
Example: for internal and external discard routes.
Device(config-router)# discard-route external
150
Example:
Device(config-router)# end
show ip route [ip-address [mask] [longer-prefixes] | Displays the current state of the routing table.
protocol [process-id] | list [access-list-number | Note Entering the show ip route command will verify
access-list-name] | static download] the changed administrative distance values for
external and internal discard routes.
Example:
Device# show ip route ospf 23
Example
The sample output displayed for the show ip route command confirms that the administrative distance for the IP route 192.168.0.0/24
is 110.
Known via "ospf 1", distance 110, metric 0, type intra area
Troubleshooting Tips
You can research the output from the debug ip ospf rib command to learn about the function of the local RIB
and the interaction between the route redistribution process and the global RIB. For example, you can learn
why the routes that OSPF placed in the global RIB are not the same ones that you anticipated.
router ospf 1
router-id 10.0.0.6 local-rib-criteria
router ospf 1
router-id 10.0.0.6 log-adjacency-changes
discard-route external 25 internal 30 area 4
range 10.2.0.0 255.255.0.0 summary-address
192.168.130.2 255.255.255.0 redistribute
static subnets network 192.168.129.2
0.255.255.255 area 0 network 192.168.130.12
0.255.255.255 area 0
The output from the show ip route command verifies that the administrative distance for the internal route
10.2.0.0/16 is set to 30.
Known via "ospf 1", distance 30, metric 1, type intra area Routing
Descriptor Blocks:
* directly connected, via Null0
Route metric is 1, traffic share count is 1
The output from the show ip route command verifies that the administrative distance for the external route
192.168.130.2/24 is set to 25.
Additional References
The following sections provide references related to OSPFv2 Local RIB.
Related Documents
Related Topic Document Title
Cisco IOS master command list, all releases Cisco IOS Master Command List, All Releases
Standards
Standard Title
None --
MIBs
MIB MIBs Link
No new or modified MIBs are supported by this To locate and download MIBs for selected
feature, and support for existing MIBs has not been platforms, Cisco IOS XE releases, and feature sets,
modified by this feature. use Cisco MIB Locator found at the following
URL:
http://www.cisco.com/go/mibs
RFCs
RFC Title
None --
Feature Information for OSPFv2 Local RIB
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/
provides online resources to download index.html
documentation, software, and tools. Use these
resources to install and configure the software and
to troubleshoot and resolve technical issues with
Cisco products and technologies. Access to most
tools on the Cisco Support and Documentation
website requires a Cisco.com user ID and
password.
42
OSPF Support for Forwarding Adjacencies over MPLS TE
Tunnels
The OSPF Support for Forwarding Adjacencies over MPLS Traffic Engineered Tunnels feature adds Open
Shortest Path First (OSPF) support to the Multiprotocol Label Switching (MPLS) Traffic Engineering (TE) Forwarding Adjacency
feature, which allows a network administrator to handle a traffic engineering, label-switched path (LSP) tunnel as a link in an Interior
Gateway Protocol (IGP) network based on the shortest path first (SPF) algorithm. An OSPF forwarding adjacency can be created
between routers in the same area.
History for the OSPF Support for Forwarding Adjacencies over MPLS Traffic Engineered Tunnels Feature
Release Modification
Cisco IOS XE Release 2.1 This feature was implemented on Cisco ASR 1000
series routers.
• Finding Feature Information, page 402
• Prerequisites for OSPF Forwarding Adjacency, page 402
• Information About OSPF Forwarding Adjacency, page 402
• How to Configure OSPF Forwarding Adjacency, page 402
• You should understand MPLS TE tunnels for forwarding adjacency as described in the " MPLS Traffic Engineering Forwarding
Adjacency" module.
Note Configure a forwarding adjacency on two LSP tunnels bidirectionally, from A to B and B to A. Otherwise, the
forwarding adjacency is advertised, but not used in the IGP network.
SUMMARY STEPS
1. enable
2. configure terminal
3. ip cef distributed
4. mpls traffic-eng tunnels
5. interface loopback number
6. ip address ip-address mask
7. no shutdown
8. exit
9. interface tunnel number
10. tunnel mode mpls traffic-eng
11. tunnel mpls traffic-eng forwarding-adjacency {holdtime value}
12. ip ospf cost cost
13. exit
14. router ospf process-id
15. mpls traffic-eng router-id interface
16. mpls traffic-eng area number
17. end
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Example:
Router# configure terminal
Example:
Router(config)# ip cef distributed
Step 4 mpls traffic-eng tunnels Enables MPLS traffic engineering tunnel signaling on a
device.
Example:
Router(config)# mpls traffic-eng tunnels
Step 6 ip address ip-address mask Configures the IP address and subnet mask of the loopback
interface.
Example:
Router(config-if)# ip address 10.1.1.1
255.255.255.255
Example:
Router(config-if)# no shutdown
Example:
Router(config-if)# exit
Step 9 interface tunnel number Designates a tunnel interface for the forwarding adjacency
and enters interface configuration mode.
Example:
Router(config)# interface tunnel 1
Step 10 tunnel mode mpls traffic-eng Sets the mode of a tunnel to MPLS for traffic engineering.
Example:
Router(config-if)# tunnel mode mpls
traffic-eng
Step 11 tunnel mpls traffic-eng forwarding-adjacency Advertises a TE tunnel as a link in an IGP network.
{holdtime value}
• The holdtime value keyword argument combination
is the time in milliseconds (ms) that a TE tunnel waits
Step 12 ip ospf cost cost (Optional) Configures the cost metric for a tunnel interface
to be used as a forwarding adjacency.
Example:
Router(config-if)# ip ospf cost 4
Example:
Router(config-if)# exit
Step 14 router ospf process-id Configures an OSPF routing process and enters router
configuration mode.
Example:
Router(config)# router ospf 1
Step 15 mpls traffic-eng router-id inte rface Specifies that the traffic engineering router identifier for
the node is the IP address associated with a given interface.
Example:
Router(config-router)# mpls traffic-eng
router-id ethernet 1/0
Step 16 mpls traffic-eng area number Configures a router running OSPF MPLS so that it floods
traffic engineering for the indicated OSPF area.
Example:
Router(config-router)# mpls
1 traffic-eng area
Example:
Router(config-router)# end
0. The last five lines of the example set up the routing protocol for the MPLS network, which is OSPF in this
case.
Example OSPF Forwarding Adjacency
Note Do not use the mpls traffic-eng autoroute announce command if you configure a forwarding adjacency in the tunnel.
Additional References
The following sections provide references related to OSPF Forwarding Adjacency.
Related Documents
Related Topic Document Title
MPLS traffic engineering forwarding adjacency MPLS Traffic Engineering Forwarding Adjacency
Configuring OSPF for MPLS traffic engineering MPLS Traffic Engineering and Enhancements
MPLS Traffic Engineering - LSP Attributes MPLS Traffic Engineering - LSP Attributes
Standards
Standards Title
Description Link
APTER 43
Enabling OSPFv2 on an Interface Basis
This document describes how to enable Open Shortest Path First version 2 (OSPFv2) on a per-interface basis
to simplify the configuration of unnumbered interfaces. The ip ospf area command allows you to enable
OSPFv2 explicitly on an interface. The ip ospf area command is an alternative to enabling OSPFv2 through
the address of the interface that matches the address range specified by the network area command.
Interface Is Already OSPFv2-Enabled by network area Command with Same Area and Process
If you enter the ip ospf area command on an interface that is enabled in OSPFv2 by the network
areacommand, the process ID or area ID of the interface does not change, and the interface status will not be
changed. However, the interface will be flagged as being configured from interface configuration mode, and
the configuration data will be saved in the interface description block (IDB).
Interface Is Already Configured by network area Command with Different Area or Process
If you enter the ip ospf area command on an interface that is enabled in OSPFv2 by the network
areacommand, but you change the configuration by changing the process ID and area ID of the interface, after
the new configuration information is stored in the IDB, the interface will be removed and reattached.
Therefore, the interface will be removed from the original area and process and be added to the new ones. The
state of the interface will also be reset.
initialization is complete. To remove an OSPF router instance, enter the no router ospf command. Removing
the ip ospf area command in interface mode will not result in removing an OSPF router instance.
New Processes
If an OSPF process does not already exist, and a router ID cannot be chosen when either the router ospf
command or the interface command is configured, a Proximity Database (PDB) and a process will be created,
but the process will be inactive. The process will become active when a router ID is chosen, either when it is
explicitly configured using the router-id command or when an IP address becomes available. Note that the
router ospf command will now be accepted even if a router ID cannot be chosen, putting the command-line
interface (CLI) into the OSPF configuration context. Therefore, the router-id command is to be entered before
an IP address is available. If the process is not active and the show ip ospfcommand is entered, the message
"%OSPF: Router process X is not running, please provide a router-id" will be displayed.
1. enable
2. configure terminal
3. interface type number
4. ip ospf process-id area area-id [secondaries none]
5. end
6. show ip ospf interface [type -number]
DETAILED STEPS
Command or Action Purpose
Enabling OSPFv2 on an Interface Basis
Example:
Device> enable
Step 2 configure terminal Enters global configuration mode.
Example:
Device# configure terminal
Step 3 interface type number Configures an interface type and enters interface
configuration mode.
Example:
Device(config)# interface GigabitEthernet
0/2/1
Step 6 show ip ospf interface [type -number] Displays OSPF-related interface information.
• Once you have enabled OSPFv2 on the interface, you
Example: can enter the show ip ospf interfacecommand to verify
Device# show ip ospf interface the configuration.
GigabitEthernet 0/2/1
Additional References
Additional References
The following sections provide references related to enabling OSPFv2 on an interface.
Related Documents
Related Topic Document Title
Cisco IOS master command list, all releases Cisco IOS Master Command List, All Releases
Standards
Standard Title
MIBs
MIB MIBs Link
No new or modified MIBs are supported by this To locate and download MIBs for selected
feature, and support for existing MIBs has not been platforms, Cisco IOS XE releases, and feature sets,
modified by this feature. use Cisco MIB Locator found at the following
URL:
http://www.cisco.com/go/mibs
RFCs
RFC Title
• ip ospf area.
CHAPTER 44
OSPF Nonstop Routing
The OSPF Nonstop Routing feature allows a device with redundant Route Processors (RPs) to maintain its
Open Shortest Path First (OSPF) state and adjacencies across planned and unplanned RP switchovers. The
OSPF state is maintained by checkpointing the state information from OSPF on the active RP to the
standby RP. After a switchover to the standby RP, OSPF uses the checkpointed information to continue
operations without interruption.
SUMMARY STEPS
1. enable
2. configure terminal
3. router ospf process-id
4. nsr
5. end
6. show ip ospf [ process-id ] nsr [[ objects ]|[ statistics ]]
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Example:
Router# configure terminal
Step 3 router ospf process-id Places the router in router configuration mode and
configures an OSPF routing process.
Example:
Router(config)# router ospf 109
Example:
Router(config-router)# nsr
Step 6 show ip ospf [ process-id ] nsr [[ objects ]|[ statistics Displays OSPF NSR status information.
]]
Example:
Router# show ip ospf 109 nsr
Troubleshooting Tips
OSPF NSR can increase the amount of memory used by the OSPF device process. To determine how much
memory OSPF is currently using without NSR, you can use the show processes and show processes
memory commands:
Process 276 is the OSPF device process that is to be checked. Use the show processes memory command
to display its current memory use:
In the above example, OSPF is using 4,454,800 bytes, or approximately 4.5 megabytes (MB). Because
OSPF NSR can consume double this memory for brief periods, ensure that the device has at least 5 MB of
free memory before enabling OSPF NSR.
Device> enable
Device# configure terminal
Device(config)# router ospf 1
Device(config-router)# nsr
Device(config-router)# end
Device# show ip ospf 1 nsr
Standby RP
Operating in duplex mode
Redundancy state: STANDBY HOT
Peer redundancy state: ACTIVE
ISSU negotation complete
ISSU versions compatible
Routing Process "ospf 1" with ID 10.1.1.100
NSR configured
Checkpoint message sequence number: 3290
Standby synchronization state: synchronized
Bulk sync operations: 1
Last sync start time: 15:22:48.971 UTC Fri Jan 14 2011
Last sync finish time: 15:22:48.971 UTC Fri Jan 14 2011
Last sync lost time: -
Last sync reset time: -
LSA Count: 2, Checksum Sum 0x00008AB4
The output shows that OSPF NSR is configured and that OSPF on the standby RP is fully synchronized and
ready to continue operation should the active RP fail or if a manual switchover is performed.
OSPF Nonstop Routing
Additional References
Additional References
Related Documents
Related Topic Document Title
Cisco IOS commands Cisco IOS Master Commands
List,
All Releases
OSPF commands: complete command syntax, command mode, Cisco IOS IP Routing: OSPF
defaults, command history, usage guidelines, and examples Command Reference
CHAPTER 45
OSPFv3 NSR
The OSPFv3 NSR feature allows a router with redundant Route Processors (RPs) to maintain its Open
Shortest Path First (OSPF) state and adjacencies across planned and unplanned RP switchovers. It does
this by checkpointing state information from OSPFv3 on the active RP to the standby RP. Later, following
a switchover to the standby RP, OSPFv3 can use this checkpointed information to continue operation
without interruption.
extensions to the OSPFv3 protocol to recover its state from neighboring OSPFv3 devices. For this to work, the
neighbors must support the graceful restart protocol extensions and be able to act as helpers to the restarting
device. They must also continue forwarding data traffic to the restarting device while this recovery is taking
place.
With NSR, by contrast, the device performing the switchover preserves its state internally, and in most cases
the neighbors are unaware that anything has happened. Because no assistance is needed from neighboring
devices, NSR can be used in situations where graceful restart cannot; for example, graceful restart is unreliable
in networks where not all the neighbors implement the graceful restart protocol extensions or where the
network topology changes during the recovery.
Note When NSR is enabled, the responsiveness and scalability of OSPF is degraded. The performance degradation
happens because OSPF uses cpu and memory to checkpoint data to the standby Route Processor (RP).
Note Devices that do not support NSR will not accept the nsr (OSPFv3) command.
SUMMARY STEPS
1. enable
2. configure terminal
3. router ospfv3 process-id
4. nsr
5. end
6. show ospfv3 [process-id] [address-family] nsr
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode. •
Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 router ospfv3 process-id Places the device in router configuration mode and
configures an OSPFv3 routing process.
Example:
Device(config)# router ospfv3 109
Example:
Device(config-router)# nsr
Step 6 show ospfv3 [process-id] [address-family] nsr Displays OSPFv3 NSR status information.
Example:
Device# show ospfv3 109 nsr
Note Devices that do not support NSR will not accept the nsr (OSPFv3) command.
SUMMARY STEPS
DETAILED STEPS
Command or Action Purpose
Step 1 router ospfv3 process-id Places the device in router configuration mode and
configures an OSPFv3 routing process.
Example:
Device(config)# router ospfv3 109
Step 2 address-family {ipv4 | ipv6} unicast [vrf vrf-name] Enters IPv4 or IPv6 address family configuration mode
for OSPFv3 router configuration mode.
Example:
Device(config-router)# address-family ipv4
unicast
Step 3 nsr [disable] Enables NSR for the address family that is configured.
Example:
Device(config-router-af)# nsr
SUMMARY STEPS
DETAILED STEPS
Command or Action Purpose
Step 1 router ospfv3 process-id Places the device in router configuration mode and
configures an OSPFv3 routing process.
Example:
Device(config)# router ospfv3 109
Step 3 nsr [disable] Disables NSR for the address family that is configured.
Example:
Device(config-router-af)# nsr disable
Troubleshooting Tips
OSPFv3 NSR can increase the amount of memory used by the OSPFv3 device process. To determine how
much memory OSPFv3 is currently using without NSR, you can use the show processes and show processes
memory commands:
In this case OSPFv3 is using 4,454,800 bytes or approximately 4.5 megabytes (MB). OSPFv3 NSR could
double this for brief periods, so you should make sure the device has at least 5 MB of free memory before
enabling OSPFv3 NSR.
Area 1
Number of interfaces in this area is 4 SPF
algorithm executed 2 times
Number of LSA 7. Checksum Sum 0x04FF3A
Number of DCbitless LSA 0
Number of indication LSA 0
Number of DoNotAge LSA 0
Flood list length 0
Area 3
Number of interfaces in this area is 1
It is a NSSA area
Perform type-7/type-5 LSA translation
SPF algorithm executed 3 times
Number of LSA 5. Checksum Sum 0x011014
Number of DCbitless LSA 0
Number of indication LSA 0
Number of DoNotAge LSA 0
Flood list length 0
The output shows that OSPFv3 NSR is configured.
Additional References
Related Documents
Related Topic Document Title
Cisco IOS commands Cisco IOS Master Commands List, All Releases
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/
provides online resources to download index.html
documentation, software, and tools. Use these
resources to install and configure the software and
to troubleshoot and resolve technical issues with
Cisco products and technologies. Access to most
tools on the Cisco Support and Documentation
website requires a Cisco.com user ID and
password.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To
access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
The OSPFv2 Loop-Free Alternate Fast Reroute feature uses a precomputed alternate next hop to reduce
failure reaction time when the primary next hop fails. It lets you configure a per-prefix loop-free alternate
(LFA) path that redirects traffic to a next hop other than the primary neighbor. The forwarding decision is
made and service is restored without other routers’ knowledge of the failure.
1 srlg
LFA Repair Path Attributes
2 primary-path
3 interface-disjoint
4 lowest-metric
5 linecard-disjoint
6 node-protecting
7 broadcast-interface-disjoint
If the evaluation does not select any candidate, the repair path is selected by implicit load balancing. This means
that repair path selection varies depending on prefix.
You can use the show ip ospf fast-reroute command to display the current configuration.
You can use the fast-reroute tie-break command to configure one or more of the repair-path attributes described
in the following sections to select among the candidates:
Interface Protection
Point-to-point interfaces have no alternate next hop for rerouting if the primary gateway fails. You can set the
interface-disjoint attribute to prevent selection of such repair paths, thus protecting the interface.
Node Protection
The default repair-path attributes might not protect the router that is the next hop in a primary path. You can
configure the node-protecting attribute to specify that the repair path will bypass the primary-path gateway router.
Candidate Repair-Path Lists
Downstream Path
In the case of a high-level network failure or multiple simultaneous network failures, traffic sent over an
alternate path might loop until OSPF recomputes the primary paths. You can configure the downstream
attribute to specify that the metric of any repair path to the protected destination must be lower than that of
the protecting node to the destination. This might result in lost traffic but it prevents looping.
Metric
An LFA repair path need not be the most efficient of the candidates. A high-cost repair path might be
considered more attractive if it provides protection against higher-level network failures. You can configure
the metric attribute to specify a repair-path policy that has the lowest metric.
SUMMARY STEPS
1. enable
2. configure terminal
3. router ospf process-id
4. fast-reroute per-prefix enable prefix-priority priority-level
5. exit
DETAILED STEPS
Command or Action Purpose
Example:
Router# configure terminal
Step 3 router ospf process-id Enables OSPF routing and enters router configuration mode.
Example:
Router(config)# router ospf 10
Step 4 fast-reroute per-prefix enable prefix-priority Enables repair-path computation and selects the priority level
priority-level for repair paths.
Note Only the following three match keywords are recognized in the route map: match tag, match route-type, and
match ip address prefix-list.
>
SUMMARY STEPS
1. enable
2. configure terminal
3. route-map map-tag [permit | deny] [sequence-number]
4. match tag tag-name
5. exit
6. router ospf process-id
7. prefix-priority priority-level route-map map-tag
8. exit
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Example:
Router# configure terminal
Step 3 route-map map-tag [permit | deny] [sequence-number] Enters route-map configuration mode and specifies the
map name.
Example:
Router(config)# route-map OSPF-PREFIX-PRIORITY
Step 7 prefix-priority priority-level route-map map-tag Sets the priority level for repair paths and specifies the
route map that defines the prefixes.
Example:
Router(config-router)# prefix-priority high
route-map OSPF-PREFIX-PRIORITY
SUMMARY STEPS
1. enable
2. configure terminal
3. router ospf process-id
4. fast-reroute per-prefix tie-break attribute [required] index index-level
5. exit
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode. •
Enter your password if prompted.
Example:
Router> enable
Example:
Router# configure terminal
Step 3 router ospf process-id Enables OSPF routing and enters router configuration
mode.
Example:
Router(config)# router ospf 10
Step 4 fast-reroute per-prefix tie-break attribute [required] Configures a repair path selection policy by specifying
index index-level a tiebreaking condition and setting its priority level.
Example:
Router(config-router)# fast-reroute per-prefix
tie-break srlg required index 10
SUMMARY STEPS
1. enable
2. configure terminal
3. router ospf process-id
4. fast-reroute keep-all-paths
5. exit
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
440
Prohibiting an Interface From Being Used as the Next Hop
Example:
Router# configure terminal
Step 3 router ospf process-id Enables OSPF routing and enters router configuration
mode.
Example:
Router(config)# router ospf 10
Step 4 fast-reroute keep-all-paths Specifies creating a list of repair paths considered for
LFA FRR.
Example:
Router(config-router)# fast-reroute keep-all-
paths
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ip ospf fast-reroute per-prefix candidate disable
5. exit
Configuration Examples for OSPFv2 Loop-Free Alternate Fast Reroute
DETAILED STEPS
Command or Action Purpose
Example:
Router# configure terminal
Step 3 interface type number Enters interface configuration mode for the interface
specified.
Example:
Router(config)# interface GigabitEthernet 0/0/0
Step 4 ip ospf fast-reroute per-prefix candidate disable Prohibits the interface from being used as the next hop
in a repair path.
Example:
Router(config-if)# ip ospf fast-reroute per-
prefix candidate disable
router ospf 10
fast-reroute per-prefix enable prefix-priority low fast-reroute
per-prefix tie-break srlg required index 10 fast-reroute per-
prefix tie-break linecard-disjoint index 15 fast-reroute per-
prefix tie-break downstream index 20 network 192.0.2.1
255.255.255.0 area 0
router ospf 10
fast-reroute per-prefix enable prefix-priority low
fast-reroute keep-all-paths network 192.0.2.1
255.255.255.0 area 0
Additional References
The following sections provide references related to the OSPF RFC 3623 Graceful Restart feature.
Related Documents
Related Topic Document Title
None --
MIBs
MIB MIBs Link
None To locate and download MIBs for selected
platforms, Cisco IOS releases, and feature sets, use
Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs
RFCs
RFC Title
Table 52: Feature Information for OSPFv2 Loop-Free Alternate Fast Reroute
CHAPTER 47
OSPFv3 MIB
The OSPFv3 MIB feature enables remote monitoring and troubleshooting of Open Shortest Path First
version 3 (OSPFv3) processes using standard Simple Network Management Protocol (SNMP)
management workstations. The protocol information collected by the OSPFv3 MIB objects and trap
objects can be used to derive statistics that helps monitor and improve overall network performance.
• Ensure that Simple Network Management Protocol (SNMP) is enabled on the device before
notifications (traps) can be configured or before SNMP GET operations can be performed.
Restrictions for OSPFv3 MIB Support
1. enable
2. configure terminal
3. snmp-serverhost {hostname | ip-address} [vrf vrf-name] [traps | informs] [version {1 | 2c | 3 [auth |
noauth | priv]}] community-string [udp-port port] [notification-type]
4. snmp-server enable traps ospfv3 errors [bad-packet] [config-error] [virt-bad-packet] [virt-config-
error]
5. snmp-server enable traps ospfv3 rate-limit seconds trap-number
6. snmp-server enable traps ospfv3 state-change [if-state-change] [neighbor-restart-helper-status-
change] [neighbor-state-change] [nssa-translator-status-change] [restart-status-change] [virtif-
state-change]
[virtneighbor-restart-helper-status-change] [virtneighbor-state-change]
7. end
OSPFv3 MIB
Enabling Specific OSPFv3 Traps
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 snmp-serverhost {hostname | ip-address} [vrf vrf-name] Specifies a recipient (target host) for Simple Network
[traps | informs] [version {1 | 2c | 3 [auth | noauth | Management Protocol (SNMP) notification operations.
priv]}] community-string [udp-port port] [notification-
type] • If the notification-type is not specified, all enabled
notifications (traps or informs) are sent to the
Example: specified host.
Device(config)# snmp-server host 172.20.2.162 • If you want to send only the Open Shortest Path
version 2c public ospfv3
First version 3 (OSPFv3) notifications to the
specified host, you can use the optional ospfv3
keyword as the notification-types . Entering the
ospfv3 keyword enables the ospfv3Notifications
MIB object.
Step 4 snmp-server enable traps ospfv3 errors [bad-packet] Enables SNMP notifications for OSPFv3 errors.
[config-error] [virt-bad-packet] [virt-config-error]
Example:
Device(config)# snmp-server enable traps ospfv3
errors
Step 6 snmp-server enable traps ospfv3 state-change Enables SNMP OSPFv3 notifications for OSPFv3
[if-state-change] [neighbor-restart-helper-status- transition state changes.
change]
[neighbor-state-change] [nssa-translator-status-change]
[restart-status-change] [virtif-state-change]
[virtneighbor-restart-helper-status-change]
[virtneighbor-state-change]
Verifying OSPFv3 MIB Traps on the Device
Example:
Device(config)# snmp-server enable traps ospfv3
state-change
1. enable
2. show running-config [options]
DETAILED STEPS
Step 1 enable
Example:
Device> enable
Example:
Device# show running-config | include traps
Displays the contents of the currently running configuration file and includes information about enabled traps.
OSPFv3 MIB
Configuration Examples for OSPFv3 MIB
Device> enable
Device# configure terminal
Device(config)# snmp-server enable traps ospfv3 errors Device(config)# end
The following example shows how to verify that the traps are enabled:
Device> enable
Device# show running-config | include traps snmp-server enable traps ospfv3 errors
Cisco IOS commands Cisco IOS Master Command List, All Releases
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/
provides online resources to download index.html
documentation, software, and tools. Use these
resources to install and configure the software and
to troubleshoot and resolve technical issues with
Cisco products and technologies. Access to most
tools on the Cisco Support and Documentation
website requires a Cisco.com user ID and
password.
CHAPTER 48
Prefix Suppression Support for OSPFv3
This feature enables Open Shortest Path First version 3 (OSPFv3) to hide the IPv4 and IPv6 prefixes of
connected networks from link-state advertisements (LSAs). When OSPFv3 is deployed in large networks,
limiting the number of IPv4 and IPv6 prefixes that are carried in the OSPFv3 LSAs can speed up OSPFv3
convergence.
This feature can also be utilized to enhance the security of an OSPFv3 network by allowing the network
administrator to prevent IP routing toward internal nodes.
Note Prefixes that are associated with loopbacks, secondary IP addresses, and passive interfaces are not suppressed
by the router mode or the address-family configuration commands because typical network designs
require prefixes to remain reachable.
Note If you have globally suppressed IPv4 and IPv6 prefixes from connected IP networks by configuring the
prefix-suppression router configuration command, the interface configuration command takes precedence
over the router configuration command.
How to Configure Prefix Suppression Support for OSPFv3
1. enable
2. configure terminal
3. router ospfv3 process-id [vrf vpn-name]
4. prefix-suppression
5. end
6. show ospfv3
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 router ospfv3 process-id [vrf vpn-name] Configures an OSPFv3 routing process and enters router
configuration mode.
Example:
Device(config)# router ospfv3 23
Step 4 prefix-suppression Prevents OSPFv3 from advertising all IPv4 and IPv6 prefixes,
except prefixes that are associated with loopbacks, secondary
Example: IP addresses, and passive interfaces.
Device(config-router)# prefix-suppression
Example:
Device(config-router)# end
Step 6 show ospfv3 Displays general information about OSPFv3 routing processes.
Configuring Prefix Suppression Support of the OSPFv3 Process in Address-Family Configuration Mode
1. enable
2. configure terminal
3. router ospfv3 process-id [vrf vpn-name]
4. address-family ipv6 unicast
5. prefix-suppression
6. end
7. show ospfv3
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 router ospfv3 process-id [vrf vpn-name] Configures an OSPFv3 routing process and enters router
configuration mode.
Example:
Device(config)# router ospfv3 23
Step 4 address-family ipv6 unicast Enters IPv6 address family configuration mode for OSPFv3.
Example:
Device(config-router)# address-family ipv6
unicast
Step 5 prefix-suppression Prevents OSPFv3 from advertising all IPv4 and IPv6
prefixes, except prefixes that are associated with loopbacks,
Example: secondary IP addresses, and passive interfaces.
Device(config-router-af)# prefix-
suppression
Example:
Device(config-router-af)# end
1. enable
2. configure terminal
3. interface type number
4. Do one of the following:
5. end
6. show ospfv3 interface
Configuring Prefix Suppression Support on a Per-Interface Basis
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 interface type number Configures an interface type and enters interface configuration
mode.
Example:
Device(config)# interface serial 0/0
Step 4 Do one of the following: Prevents OSPFv3 from advertising IPv4 and IPv6 prefixes that
belong to a specific interface, except those that are associated
• ipv6 ospf prefix-suppression [disable] with secondary IP addresses.
• ospfv3 prefix-suppression disable • When you enter the ipv6 ospf prefix-suppression
command or the ospfv3 prefix-suppression command in
interface configuration mode, it takes precedence over the
Example: prefix-suppression command that is entered in router
Device(config-if)# ipv6 ospf configuration mode.
prefix-suppression
Example:
Device(config-if)# ospfv3 1
prefix-suppression disable
Example:
Device(config-if)#
end
Step 6 show ospfv3 interface Displays OSPFv3-related interface information.
Note Use this command to verify that IPv4 and IPv6 prefix
suppression has been enabled for a specific interface.
Example:
Device# show ospfv3 interface
Troubleshooting IPv4 and IPv6 Prefix Suppression
1. enable
2. debug ospfv3 lsa-generation
3. debug condition interface interface-type interface-number [dlci dlci] [vc {vci | vpi | vci}]
4. show debugging
5. show logging [slot slot-number | summary]
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Step 2 debug ospfv3 lsa-generation Displays informations about each OSPFv3 LSA that is
generated.
Example:
Device# debug ospfv3 lsa-generation
Step 3 debug condition interface interface-type interface- Limits output for some debug commands on the basis of
number [dlci dlci] [vc {vci | vpi | vci}] the interface or virtual circuit.
Example:
Device# debug condition interface serial 0/0
Step 4 show debugging Displays information about the types of debugging that
are enabled for your device.
Example:
Device# show debugging
Step 5 show logging [slot slot-number | summary] Displays the state of syslog and the contents of the
standard system logging buffer.
Example:
Device# show logging
interface Ethernet0/0
ip address 10.0.0.1 255.255.255.0
ipv6 address 2001:201::201/64 ipv6
enable ospfv3 prefix-suppression
ospfv3 1 ipv4 area 0 ospfv3 1 ipv6
area 0 end
Cisco IOS commands Cisco IOS Master Command List, All Releases
Feature Information for Prefix Suppression Support for OSPFv3
Technical Assistance
Description Link
Table 54: Feature Information for Prefix Suppression Support for OSPFv3
• ospfv3 prefix-suppression
• prefix-suppression
(OSPFv3)
Feature Information for Prefix Suppression Support for OSPFv3
The OSPFv3 VRF-Lite/PE-CE feature adds Open Shortest Path First version 3 (OSPFv3) support for
nondefault VPN routing and forwarding (VRF) instances. OSPFv3 can be used as a
provider-edge-customer-edge (PE-CE) routing protocol as specified in RFC 6565, OSPFv3 as a Provider
Edge to Customer Edge (PE-CE) Routing Protocol. OSPFv3 in a nondefault VRF instance supports
routing of IPv4 and IPv6 address families.
• ospfv3 —Applies to all OSPFv3 processes and address families on a given interface.
Information About OSPFv3 VRF-Lite/PE-CE
• ospfv3 process-id —Applies to an OSPFv3 process with the configured process ID and to both IPv4
and IPv6 address families.
• ospfv3 process-id address-family-ID —Applies to an OSPFv3 process with the configured process ID
and the configured address family.
More specific commands take precedence over less specific commands, as shown in the following
descending order:
In Cisco IOS Release 15.2(2)S and later releases, you cannot use the ipv6 ospf router process-id command
to configure OSPFv3 VRF instances. You must configure the router ospfv3 process-id command in global
configuration mode and specify the address family for the configured VRF in router configuration mode.
Domain IDs are used to determine whether the routes are internal or external. They describe the
administrative domain of the OSPFv3 instance from which the route originates. Every PE has a 48-bit
primary domain ID (which may be NULL) and zero or more secondary domain IDs.
How to Configure VRF-Lite/PE-CE
1. enable
2. configure terminal
3. vrf definition vrf-name
4. rd route-distinguisher
5. exit
6. router ospfv3 [process-id]
7. address-family ipv6 [unicast] [vrf vrf-name]
8. end
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 vrf definition vrf-name Configures a VRF routing table and enters VRF
configuration mode.
Example:
Device(config)# vrf definition vrfsample
Example:
Device(config-vrf)# rd 10:1
Step 7 address-family ipv6 [unicast] [vrf vrf-name] Configures an instance of the OSPFv3 process in the VRF
routing table for the IPv6 address family and enters router
Example: address family configuration mode.
Device(config-router)# address-family ipv6
unicast vrf vrfsample
1. enable
2. configure terminal
3. interface type number
4. vrf forwarding vrf-name [downstream vrf-name2]
5. ipv6 enable
6. ospfv3 process-id {ipv4 | ipv6} area area-id [instance instance-id]
7. end
DETAILED STEPS
Command or Action Purpose
Example:
Device# configure terminal
Step 3 interface type number Specifies an interface type and number and enters
interface configuration mode.
Example:
Device(config)# interface Serial6/0
Step 4 vrf forwarding vrf-name [downstream vrf-name2] Associates an interface with a VRF.
Example:
Device(config-if)# vrf forwarding v1
Step 6 ospfv3 process-id {ipv4 | ipv6} area area-id Enables the OSPFv3 IPv6 address family on the VRF
[instance instance-id] interface.
Example:
Device(config-if)# ospfv3 1 ipv6 area 0
Before you configure a sham-link, you must create a Multiprotocol Label Switching (MPLS) backbone,
configure a device as an MPLS VPN PE device, and configure OSPFv3 as the provider-edge-customer-
edge (PE-CE) protocol in a virtual routing and forwarding (VRF) instance.
Configuring a Sham-Link for OSPFv3 PE-CE
SUMMARY STEPS
1. enable
2. configure terminal
3. interface loopback interface-number
4. description string
5. vrf forwarding vrf-name
6. ipv6 address ipv6-address/prefix-length
7. ipv6 enable
8. end
9. router ospfv3 process-id
10. address-family {ipv4 | ipv6} [unicast | multicast] [vrf vrf-name]
11. redistribute process-id [options]
12. area area-id sham-link source-address destination-address [cost number] [ttl-security hops hop-
count]
13. end
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 4 description string Provides a description of the interface to help you track
its status.
Example:
Device(config-if)# description Sham-link
endpoint
Step 5 vrf forwarding vrf-name Associates the loopback interface with a VRF.
Example:
Device(config-if)# vrf forwarding vrf1
ose
igures an IPv6 address of the loopback interface
provider edge device.
1. enable
2. configure terminal
3. vrf definition vrf-name
4. rd route-distinguisher
5. exit
6. router ospfv3 [process-id]
7. address-family ipv6 [unicast] [vrf vrf-name]
8. domain-id type type value hex-value
9. end
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 vrf definition vrf-name Configures a VRF routing table and enters VRF
configuration mode.
Example:
Device(config)# vrf definition vrfsample
Example:
Device(config-vrf)# rd 10:1
Example:
Device(config)# router ospfv3 2
Step 7 address-family ipv6 [unicast] [vrf vrf-name] Configures an instance of the OSPFv3 process in the VRF
routing table for the IPv6 address family and enters
Example: address family configuration mode..
Device(config-router)# address-family ipv6
unicast vrf vrfsample
Step 8 domain-id type type value hex-value Configures the BGP domain ID.
• The value for type can be 0005, 0105, 0205, or 8005.
Example:
• The value for value is an arbitrary 48-bit number
Device(config-router-af)# domain-id type encoded as 12 hexadecimal digits.
0205 value 800EFFFF12AB
Step 9 end Exists router address family mode and returns to privileged
EXEC mode.
Example:
Device(config-router-af)# end
1. enable
2. configure terminal
3. vrf definition vrf-name
4. rd route-distinguisher
5. exit
6. router ospfv3 [process-id]
7. address-family ipv6 [unicast] [vrf vrf-name]
8. capability vrf-lite
9. end
Configuring VRF-Lite Capability for OSPFv3
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 vrf definition vrf-name Configures a VRF routing table and enters VRF
configuration mode.
Example:
Device(config)# vrf definition vrfsample
Example:
Device(config-vrf)# rd 10:1
Step 6 router ospfv3 [process-id] Enables router configuration mode for the IPv4 or IPv6
address family.
Example:
Device(config)# router ospfv3 2
Step 7 address-family ipv6 [unicast] [vrf vrf-name] Configures an instance of the OSPFv3 process in the VRF
routing table for the IPv6 address family and enters
Example: address family configuration mode.
Device(config-router)# address-family ipv6
unicast vrf vrfsample
Step 8 capability vrf-lite Applies the multi-VRF capability to the OSPF process.
Example:
Device(config-router-af)# capability vrf-
lite
Configuration Examples for OSPFv3 VRF-Lite/PE-CE
vrf definition v1
rd 1:1 route-target
export 100:1 route-target
import 100:1 ! address-
family ipv4 exit-address-
family
! address-family
ipv6 exit-address-
family
!
vrf definition v2
rd 2:2 route-target
export 200:2 route-target
import 200:2 ! address-
family ipv6 exit-address-
family
! interface
Loopback1
vrf forwarding v1 ipv6 address
2001:DB8:0:ABCD::1/48 ! interface
Serial5/0
vrf forwarding v2
no ip address
ipv6 address 2001:DB8:0:ABCD::3/48
ospfv3 1 ipv6 area 1
! interface
Serial6/0
vrf forwarding v1
ip address 10.0.0.1 255.255.255.0
ipv6 enable ospfv3 1 ipv6 area 0
ospfv3 1 ipv4 area 10.1.1.1 !
router
ospfv3 !
log-adjacency-changes
detail !
address-family ipv4 unicast vrf v1
router-id 10.2.2.2
redistribute bgp 1 Example:
Configuring a Provider Edge Device for
VRF-Lite
exit-address-family
!
address-family ipv6 unicast vrf v1
router-id 2001:DB8:1::1 domain-id type 0205 value 111111222222 area 0 sham-link
2001:DB8:0:ABCD::5 2001:DB8:0:ABCD::7 redistribute bgp 1 exit-address-family
address-family ipv6 unicast vrf v2
router-id 2001:DB8:1::3 redistribute bgp 1
exit
!
router bgp 1
bgp router-id 10.3.3.3 no bgp default ipv4-unicast neighbor 10.0.0.4
remote-as 1 neighbor 10.0.0.4 update-source-Loopback0 ! address-
family ipv4 exit-address-family
! address-family vpnv4
neighbor 10.0.0.4
neighbor 10.0.0.4 send-community extended
exit-address-family
! address-family vpnv6
neighbor 10.0.0.4 activate neighbor 10.0.0.4 send-community extended
exit-address-family
!
address-family ipv4 vrf v1
redistribute ospfv3 1 exit-address-family
!
address-family ipv6 vrf v1
redistribute ospf 1 exit-address-family
!
address-family ipv6 vrf v2
redistribute ospf 1 exit-address-family
!
Cisco IOS commands Cisco IOS Master Command List, All Releases
RFC Title
RFC Title
RFC 6565 OSPFv3 as a Provider Edge to Customer Edge
(PE-CE) Routing Protocol
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/
provides online resources to download index.html
documentation, software, and tools. Use these
resources to install and configure the software and
to troubleshoot and resolve technical issues with
Cisco products and technologies. Access to most
tools on the Cisco Support and Documentation
website requires a Cisco.com user ID and
password.
HAPTER 50
OSPFv3 ABR Type 3 LSA Filtering
This feature extends the ability of an Area Border Router (ABR) that is running the Open Shortest Path First
version 3 (OSPFv3) protocol to filter type 3 link-state advertisements (LSAs) that are sent between different
OSPFv3 areas. This feature allows only packets with specified prefixes to be sent from one area to another
area and restricts all packets with other prefixes. This type of area filtering can be applied out of a specific
OSPFv3 area, into a specific OSPFv3 area, or into and out of the same OSPFv3 areas at the same time.
1. enable
2. configure terminal
3. router ospfv3 process-id
4. area area-id filter-list prefix prefix-list-name {in | out}
5. end
6. ipv6 prefix-list list-name [seq seq-number] {deny ipv6-prefix/prefix-length | permit ipv6-prefix/prefix-
length | description text} [ge ge-value] [le le-value]
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
Example:
Device# configure terminal
Example:
Device(config)# router ospfv3 1
Step 4 area area-id filter-list prefix prefix-list-name {in | out} Configures the router to filter interarea routes out
of the specified area.
Example:
Device(config-router)# area 1 filter-list prefix
test_ipv6 out
Example:
Device(config-router)# end
Step 6 ipv6 prefix-list list-name [seq seq-number] {deny ipv6- Creates a prefix list with the name specified for
prefix/prefix-length | permit ipv6-prefix/prefix-length | the list-name argument.
description text} [ge ge-value] [le le-value]
Example:
Device(config)# ipv6 prefix-list test_ipv6 seq 5
permit 2011::1/128
Cisco IOS master command list, all releases Cisco IOS Master Command List, All Releases
Standards
Standard Title
No new or modified standards are supported and —
support for existing standards has not been
modified.
RFCs
RFC Title
Table 56: Feature Information for OSPFv3 ABR Type 3 LSA Filtering
HAPTER 51
OSPFv3 Demand Circuit Ignore
This feature enables you to prevent an interface from accepting demand-circuit requests from other devices by
specifying the ignore keyword in the ipv6 ospf demand-circuit command.
1. enable
2. configure terminal
3. interface type number
4. Enter one of the following commands:
5. end
6. show ospfv3 process-id [ area-id ] [ address-family ] [vrf {vrf-name |* }] interface [type number]
[brief]
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 interface type number Configures an interface type and number and
enters interface configuration mode.
Example:
Device(config)# interface GigabitEthernet 0/1/0
Step 4 Enter one of the following commands: Prevents an interface from accepting demand-
circuit requests from other devices.
• ipv6 ospf demand-circuit ignore
Example:
Device(config-if)# ipv6 ospf demand-circuit ignore
Example:
Device(config-if)# ospfv3 demand-circuit ignore
Example:
Device(config-if)# end
Step 6 show ospfv3 process-id [ area-id ] [ address-family ] [vrf (Optional) Displays OSPFv3-related interface
{vrf-name |* }] interface [type number] [brief] information.
Example:
Device# show ospfv3 interface GigabitEthernet 0/1/0
Related Documents
Related Topic Document Title
Cisco IOS commands Cisco IOS Master Command List, All Releases
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/
provides online resources to download index.html
documentation, software, and tools. Use these
resources to install and configure the software and
to troubleshoot and resolve technical issues with
Cisco products and technologies. Access to most
tools on the Cisco Support and Documentation
website requires a Cisco.com user ID and
password.
HAPTER 52
OSPF IPv4 Remote Loop-Free Alternate IP Fast
Reroute
OSPF IPv4 remote loop-free alternate (LFA) IP fast reroute (IPFRR) uses a backup route, precomputed using
the dynamic routing protocol, whenever a network fails. The backup routes (repair paths) are pre-computed
and installed in the router as the backup for the primary paths. Once the router detects a link or adjacent node
failure, it switches to the backup path to avoid traffic loss.
OSPF IPv4 remote LFA IPFRR allows the backup path to be more than one hop away. This feature is
particularly useful in some topologies (such as the commonly used ring topology) where an LFA does not have
to be directly connected to the protecting router.
• You cannot configure a traffic engineering (TE) tunnel interface as a protected interface. Use the MPLS
Traffic Engineering—Fast Reroute Link and Node Protection feature to protect these tunnels. For more
information, see the “MPLS Traffic Engineering—Fast Reroute Link and Node Protection” section in the
Multiprotocol Label Switching Configuration Guide.
• You can configure a TE tunnel interface in a repair path, but OSPF will not verify the tunnel’s
placement; you must ensure that it is not crossing the physical interface that it is intended to protect.
• Not all routes can have repair paths. Multipath primary routes might have repair paths for all, some, or
no primary paths, depending on the network topology, the connectivity of the computing router, and the
attributes required of repair paths.
• Devices that can be selected as tunnel termination points must have a /32 address advertised in the area
in which remote LFA is enabled. This address will be used as a tunnel termination IP. If the device does
not advertise a /32 address, it may not be used for remote LFA tunnel termination.
• All devices in the network that can be selected as tunnel termination points must be configured to accept
targeted LDP sessions using the mpls ldp discovery targeted-hello accept command.
Information About OSPF IPv4 Remote Loop-Free Alternate IP Fast Reroute
The red looping arrow represents traffic that is looping immediately after a failure between node A and C
(before network reconvergence). Device A tries to send traffic destined to F to next-hop B. Device B cannot be
used as an LFA for prefixes advertised by nodes C and F. The actual LFA is node D. However, node D is not
directly connected to the protecting node A. To protect prefixes advertised by C, node A must tunnel the
packet around the failed link A-C to node D, provided that the tunnel does not traverse the failing link.
The OSPF IPv4 Remote Loop-Free Alternate IP Fast Reroute feature enables you to tunnel a packet around a
failed link to a remote loop-free alternate that is more than one hop away. In the figure above, the green arrow
between A and D shows the tunnel that is automatically created by the OSPF IPv4 Remote Loop-Free
Alternate IP Fast Reroute feature to bypass looping.
How to Configure OSPF IPv4 Remote Loop-Free Alternate IP Fast Reroute
Note In the figure above, device A must be configured with fast-reroute per-prefix remote-lfa tunnel mpls-ldp to
enable remote LFA, and device D must be configured with mpls ldp discovery targeted-hello accept to
accept targeted LDP sessions.
SUMMARY STEPS
1. enable
2. configure terminal
3. router ospf process-id
4. fast-reroute per-prefix remote-lfa [area area-id] tunnel mpls-ldp
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode. •
Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 router ospf process-id Enables OSPF routing and enters router configuration
mode.
Example:
Device(config)# router ospf 10
Step 4 fast-reroute per-prefix remote-lfa [area area-id] Configures a per-prefix LFA FRR path that redirects traffic
tunnel mpls-ldp to a remote LFA tunnel via MPLS-LDP.
Configuring the Maximum Distance to a Tunnel Endpoint
SUMMARY STEPS
1. enable
2. configure terminal
3. router ospf process-id
4. fast-reroute per-prefix remote-lfa [area area-id] maximum-cost distance
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode. •
Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 router ospf process-id Enables OSPF routing and enters router configuration
mode.
Example:
Device(config)# router ospf 10
Step 4 fast-reroute per-prefix remote-lfa [area area-id] Configures the maximum distance to the tunnel endpoint in
maximum-cost distance a per-prefix LFA FRR path that redirects traffic to a remote
LFA tunnel.
Example:
• Use the area area-id keyword and variable to specify
Device(config-router)# fast-reroute per- an area in which to enable LFA FRR.
prefix remote-lfa area 2 maximum-cost 30
1. enable
2. show ip ospf fast-reroute remote-lfa tunnels
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode. •
Enter your password if prompted.
Example:
Device> enable
Step 2 show ip ospf fast-reroute remote-lfa tunnels Displays information about the OSPF per-prefix LFA
FRR configuration.
Example:
Device# show ip ospf fast-reroute remote-lfa
tunnels
Configuration Examples for OSPF IPv4 Remote Loop-Free Alternate IP Fast Reroute
Interface MPLS-Remote-Lfa3
Tunnel type: MPLS-LDP
Tailend router ID: 192.168.3.3
Termination IP address: 192.168.3.3
Outgoing interface: Ethernet0/0
First hop gateway: 192.168.14.4
Tunnel metric: 20 Protects:
192.168.12.2 Ethernet0/1, total metric 30
Additional References
Related Documents
Related Topic Document Title
Cisco IOS commands Cisco IOS Master Commands
List,
All Releases
OSPF commands: complete command syntax, command mode, Cisco IOS IP Routing: OSPF
defaults, command history, usage guidelines, and examples Command Reference
Feature Information for OSPF IPv4 Remote Loop-Free Alternate IP Fast Reroute
Free
Alternates
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/
provides online resources to download index.html
documentation, software, and tools. Use these
resources to install and configure the software and
to troubleshoot and resolve technical issues with
Cisco products and technologies. Access to most
tools on the Cisco Support and Documentation
website requires a Cisco.com user ID and
password.
Feature Information for OSPF IPv4 Remote Loop-Free Alternate IP Fast Reroute
Table 58: Feature Information for OSPF IPv4 Remote Loop-Free Alternate IP Fast Reroute
Feature Information for OSPF IPv4 Remote Loop-Free Alternate IP Fast Reroute
HAPTER 53
OSPFv3 Multiarea Adjacency
The OSPFv3 Multiarea Adjacency feature allows you to configure a link that multiple Open Shortest Path First
version 3 (OSPFv3) areas can share to enable optimized routing. You can add more than one area to an
existing OSPFv3 primary interface.
1. enable
2. configure terminal
3. interface type number
4. ipv6 enable
5. ospfv3 multi-area multi-area-id
6. ospfv3 multi-area multi-area-id cost interface-cost
7. ospfv3 process-id ipv6 area area-id
8. serial restart-delay count
9. end
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode. •
Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 interface type number Specifies the interface type and number.
Example:
Device(config)# interface serial 2/0
Step 4 ipv6 enable Enables IPv6 processing on an interface that has not been
configured with an explicit IPv6 address.
Example:
Device(config-if)# ipv6 enable
Step 7 ospfv3 process-id ipv6 area area-id Configures the OSPFv3 interface.
• The process-id argument identifies the OSPF process. The
Example:
Device(config-if)# ospfv3 1 ipv6 area 0 range is from 1 to 65535.
Step 8 serial restart-delay count Sets the amount of time that the router waits before trying to bring
up a serial interface when it goes down. The count argument
Example: specifies the frequency (in seconds) at which that hardware is
Device(config-if)# serial restart-delay reset. The range is from 0 to 900.
0
Example:
Device(config-if)# end
1. enable
2. show ospfv3 interface brief
3. show ospfv3 multi-area
4. show ospfv3 interface
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode. •
Enter your password if prompted.
Example:
Device> enable
Step 3 show ospfv3 multi-area Displays information about OSPFv3 multiarea interfaces.
Example:
Device# show ospfv3 multi-area
Example:
Device# show ospfv3 interface
Cisco IOS commands Cisco IOS Master Command List, All Releases
Technical Assistance
Description Link
The Cisco Support website provides extensive http://www.cisco.com/support
online resources, including documentation and
tools for troubleshooting and resolving technical
issues with Cisco products and technologies.
To receive security and technical information about
your products, you can subscribe to various
services, such as the Product Alert Tool (accessed
from Field Notices), the Cisco Technical Services
Newsletter, and Really Simple Syndication (RSS)
Feeds.
Access to most tools on the Cisco Support website
requires a Cisco.com user ID and password.
APTER 54
OSPF Limiting Adjacency Formations
The OSPF: Limit Simultaneous Adjacency Formations feature allows you to limit to the number of adjacencies
in an OSPF area.
Limit. At a given point of time, process limit and initial limit are effective in an OSPF area. When there are no
adjacencies “forming” in an area, at least one adjacency is allowed to form regardless of the maximum limit
specified for it. In other words, the maximum number of adjacencies can be exceeded before adjacencies form
in one or more areas. The maximum limit can be exceeded by the number of areas minus one.
When a limit is reached, adjacencies in a state less than EXCHANGE are terminated. To terminate the
adjacency, a hello packet is sent to the neighbor which does not have the neighbor’s device ID. This causes the
neighbor to put the adjacency in the INIT state. This prevents a deadlock with the neighbor, which could
otherwise happen if the neighbor is blocking an adjacency from forming on a different interface. By causing
the neighbor to bring the adjacency to INIT, it allows the neighbor to form an adjacency on a different
interface. Packets from unknown neighbors are ignored when the limit has been reached or exceeded.
If graceful restart or Cisco nonstop forwarding is configured, the hello packets must be accepted from every
neighboring device The restarting device must include the neighbors’ device IDs in its hello packets to prevent
the adjacency from being dropped by the neighbor. If graceful restart is in configured, the grace link-state
advertisements (LSAs) must be sent in a normal mode and not in a throttling mode. When the device is
performing graceful restart and if the limit is reached, new adjacencies are allowed to remain in 2-WAY or
EXSTART. However, they are prevented from proceeding to EXCHANGE until the number of forming
adjacencies is less than the limit.
Note When using the no adjacency stagger command to disable the feature, the command is displayed in the
running configuration. To return to the default values, use the default adjacency stagger command. After
using this command, the adjacency stagger command does not appear in the running configuration.
1. enable
2. configure terminal
3. router ospf process-id
4. adjacency stagger {initial-limit | none} maximum-limit
5. end
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 router ospf process-id Enables OSPF routing and enters router configuration mode.
Example:
Device(config)# router ospf 109
Step 4 adjacency stagger {initial-limit | none} Controls the number of adjacencies forming in an area.
maximum-limit
• initial-limit—Minimum number of adjacencies allowed in
an area.
Example:
Device(config-router)# adjacency stagger • maximum-limit—Maximum number of adjacencies
10 50
allowed in an area.
1. enable
2. configure terminal 3. router ospfv3 [process-id]
4. Do one of the following:
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# configure terminal
Step 3 router ospfv3 [process-id] Enables OSPFv3 router configuration mode for the IPv4 or
IPv6 address family.
Example:
Device(config)# router ospfv3 1
Step 4 Do one of the following: Enters IPv4 or IPv6 address family configuration mode for
OSPFv3.
• address-family ipv4 unicast
• address-family ipv6 unicast
Disabling Adjacency Staggering in the Interface Configuration Mode
Example:
Device(config-router)# address-family ipv4
unicast
Example:
Device(config-router)# address-family ipv6
unicast
Step 5 adjacency stagger {initial-limit | none} Controls the number of adjacencies forming in an area.
{maximum-limit| disable}
• initial-limit—Minimum number of adjacencies
allowed in an area.
Example:
Device(config-router-af)# adjacency stagger • none—No minimum number for adjacencies allowed
10 50 in an area.
1. enable
2. configure terminal
3. interface type number
4. Do one of the following:
5. end
Verifying Adjacency Staggering
DETAILED STEPS
Command or Action Purpose
Example:
Device# configure terminal
Step 3 interface type number Specifies the interface and enters interface
configuration mode.
Example:
Device(config)# interface serial 2/0
Example:
Device(config-if)# ip ospf adjacency stagger
disable
Example:
Device(config-if)# ospfv3 adjacency stagger disable
Example:
Device(config-if)# end
1. enable
2. show ip ospf
3. show ospfv3
DETAILED STEPS
Step 1 enable
Verifying Adjacency Staggering
Example:
Device# show ip ospf
Example:
Device# show ospfv3
Cisco IOS commands Cisco IOS Master Command List, All Releases
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/
provides online resources to download index.html
documentation, software, and tools. Use these
resources to install and configure the software and
to troubleshoot and resolve technical issues with
Cisco products and technologies. Access to most
tools on the Cisco Support and Documentation
website requires a Cisco.com user ID and
password.