This document provides an overview and summary of OSPF commands for the Matrix X Router. It describes the global OSPF command "router ospf" which is used to enter OSPF Router Configuration mode. It then lists and provides brief descriptions of various global OSPF commands including "advertise-subnet", "authentication", "compatible rfc1583", "dead-interval", and others. Tables are included that provide page references for additional command details.
STP prevents network loops by placing ports in blocking state. It establishes a root bridge with the lowest bridge ID, composed of priority and MAC address. STP transitions ports through blocking, listening, learning and forwarding states. When the network changes, STP maintains connectivity by transitioning some blocked ports to forwarding.
Presentation of internship subject, reached objectives and future work. Subject : Border router solution in Wireless Sensors Networks, running on the Contiki OS.
FabricPath is a Layer 2 technology from Cisco that provides multi-path Ethernet capabilities and eliminates the need for Spanning Tree Protocol. It combines the benefits of Layer 2 switching with greater scalability, availability, and loop prevention capabilities. FabricPath adds routing-like capabilities to Layer 2 switching such as all active links, fast convergence, and built-in loop avoidance mechanisms.
Mobicents Summit 2012 - Dmitri Soloviev - Telscale SS7 Cardtelestax
The document discusses the Telscale SS7 card, which converts SS7 signaling into SIGTRAN protocols. It can be used as a standalone SS7 terminal or to interface existing PBXs to SIP networks. The card uses an FPGA and DSP running Linux to interface E1/T1 lines and implement various SS7 protocols in software. Current goals include optimization, new features, and improving usability. The card is already in production use and aims to provide a flexible platform for SS7 and SIGTRAN applications.
Switching – A Process of using the MAC address on LAN is called Layer 2 Switching.
Layer 2 Switching is the process of using hardware address of devices on a LAN to segment a network.
Switching breaks up large collision domains into smaller ones and that a collision domain is a network
segment with two or more devices sharing the same bandwidth.
Difference between Spanning Tree Protocol (STP) and Rapid Spanning Tree
Protocol (RSTP)
1. The main difference between Rapid Spanning Tree Protocol (RSTP IEEE 802.1W) and Spanning
Tree Protocol (STP IEEE 802.1D) is that Rapid Spanning Tree Protocol (RSTP IEEE 802.1W)
assumes the three Spanning Tree Protocol (STP) ports states Listening, Blocking, and Disabled are
same (these states do not forward Ethernet frames and they do not learn MAC addresses).
Hence Rapid Spanning Tree Protocol (RSTP IEEE 802.1W) places them all into a new called
Discarding state. Learning and forwarding ports remain more or less the same.
Extending OpenVIM R3 to support Unikernels (and Xen)Stefano Salsano
After a short introduction to the goals and approach of the Superfluidity EU research project, we present the proposed extensions to OpenVIM to support ClickOS Unikernels and Xen.
We have implemented a scenario that can combines Unikernels and regular VMs in the same Network Service or VNF extending OpenVIM.We describe how we have extended the ETSI NFV models and OpenVIM. In particular, we provide the details of the OpenVIM descriptor extensions to support Unikernels.
As a background information, we discuss the Unikernels and their orchestration aspects. Unikernel technology allows to build tiny VMs with memory footprint in the order of hundreds of KBs and boot time in the order of milliseconds. We focus on ClickOS Unikernels. We have adapted 3 VIMs (OpenStack, Nomad, OpenVIM) to support ClickOS Unikernels and report a performance evaluation of the VM instantiation time.
Ch5 ccna exploration 3 lan swtching and wirelesskratos2424
The document contains a 20 question CCNA Exploration 3 Chapter 5 Exam with multiple choice answers regarding Spanning Tree Protocol (STP) and Rapid Spanning Tree Protocol (RSTP). The questions cover topics such as PortFast, STP states, RSTP roles, the convergence process, comparisons between STP and RSTP, BPDU content and usage, root bridge selection, and edge port behavior.
STP prevents network loops by placing ports in blocking state. It establishes a root bridge with the lowest bridge ID, composed of priority and MAC address. STP transitions ports through blocking, listening, learning and forwarding states. When the network changes, STP maintains connectivity by transitioning some blocked ports to forwarding.
Presentation of internship subject, reached objectives and future work. Subject : Border router solution in Wireless Sensors Networks, running on the Contiki OS.
FabricPath is a Layer 2 technology from Cisco that provides multi-path Ethernet capabilities and eliminates the need for Spanning Tree Protocol. It combines the benefits of Layer 2 switching with greater scalability, availability, and loop prevention capabilities. FabricPath adds routing-like capabilities to Layer 2 switching such as all active links, fast convergence, and built-in loop avoidance mechanisms.
Mobicents Summit 2012 - Dmitri Soloviev - Telscale SS7 Cardtelestax
The document discusses the Telscale SS7 card, which converts SS7 signaling into SIGTRAN protocols. It can be used as a standalone SS7 terminal or to interface existing PBXs to SIP networks. The card uses an FPGA and DSP running Linux to interface E1/T1 lines and implement various SS7 protocols in software. Current goals include optimization, new features, and improving usability. The card is already in production use and aims to provide a flexible platform for SS7 and SIGTRAN applications.
Switching – A Process of using the MAC address on LAN is called Layer 2 Switching.
Layer 2 Switching is the process of using hardware address of devices on a LAN to segment a network.
Switching breaks up large collision domains into smaller ones and that a collision domain is a network
segment with two or more devices sharing the same bandwidth.
Difference between Spanning Tree Protocol (STP) and Rapid Spanning Tree
Protocol (RSTP)
1. The main difference between Rapid Spanning Tree Protocol (RSTP IEEE 802.1W) and Spanning
Tree Protocol (STP IEEE 802.1D) is that Rapid Spanning Tree Protocol (RSTP IEEE 802.1W)
assumes the three Spanning Tree Protocol (STP) ports states Listening, Blocking, and Disabled are
same (these states do not forward Ethernet frames and they do not learn MAC addresses).
Hence Rapid Spanning Tree Protocol (RSTP IEEE 802.1W) places them all into a new called
Discarding state. Learning and forwarding ports remain more or less the same.
Extending OpenVIM R3 to support Unikernels (and Xen)Stefano Salsano
After a short introduction to the goals and approach of the Superfluidity EU research project, we present the proposed extensions to OpenVIM to support ClickOS Unikernels and Xen.
We have implemented a scenario that can combines Unikernels and regular VMs in the same Network Service or VNF extending OpenVIM.We describe how we have extended the ETSI NFV models and OpenVIM. In particular, we provide the details of the OpenVIM descriptor extensions to support Unikernels.
As a background information, we discuss the Unikernels and their orchestration aspects. Unikernel technology allows to build tiny VMs with memory footprint in the order of hundreds of KBs and boot time in the order of milliseconds. We focus on ClickOS Unikernels. We have adapted 3 VIMs (OpenStack, Nomad, OpenVIM) to support ClickOS Unikernels and report a performance evaluation of the VM instantiation time.
Ch5 ccna exploration 3 lan swtching and wirelesskratos2424
The document contains a 20 question CCNA Exploration 3 Chapter 5 Exam with multiple choice answers regarding Spanning Tree Protocol (STP) and Rapid Spanning Tree Protocol (RSTP). The questions cover topics such as PortFast, STP states, RSTP roles, the convergence process, comparisons between STP and RSTP, BPDU content and usage, root bridge selection, and edge port behavior.
This document discusses the Spanning Tree Protocol (STP) and Rapid Spanning Tree Protocol (RSTP) implemented on four switches separated into different VLANs. STP prevents redundant paths from causing broadcast storms. RSTP converges faster than STP by combining port states. The switches were configured with RSTP and PVST+ separately for each VLAN to prevent loops.
Shibu lijack is a technique used in advanced microprocessors where the microprocessor begins executing the second instruction before the first has been completed. It overlaps the execution of multiple instructions to increase CPU speed. There are three main types of hazards that can reduce this speed: structural hazards due to competing for limited hardware resources, data hazards when instructions depend on data that is not ready yet, and control hazards when the next instruction path is unknown until a branch is resolved. Solutions include stalling the pipeline, forwarding data early, or predicting instruction paths.
This slide contains the basic and advanced concept of OSPF routing protocol, according to the latest version of Cisco books, and I presented it at IRAN TIC company. In the next slide, I will upload an attractive advanced feature about OSPF.
The document provides answers to questions about CCNA 3 Chapter 5 on spanning tree protocol. It includes 20 multiple choice questions about concepts like the criteria switches use to select the root bridge, how STP prevents loops in a switched network, and how port roles are assigned in RSTP. It also includes exhibits showing STP output from switches to help illustrate concepts.
The document provides an overview of the Open Shortest Path First (OSPF) routing protocol, including that it is an interior gateway protocol that uses link state routing to establish neighbor relationships and exchange routing information within an autonomous system in order to determine the shortest path between any two routers on a network. OSPF detects changes in network topology quickly and converges on a new loop-free routing structure within seconds, and it has been widely implemented in large enterprise networks to provide efficient routing.
This document discusses linkers and loaders. It introduces the concepts of linking and loading, explaining that linkers resolve external references between separately compiled modules, while loaders bind relocatable addresses to absolute addresses so programs can execute. It describes two approaches for handling relocation - using transfer vectors or direct editing. The document then discusses how shared libraries allow code and data to be shared among multiple processes to reduce memory usage. It concludes by examining linking and loading specifically in Linux, covering topics like shared libraries, versioning, and dynamic linking.
- STP and RSTP are protocols that calculate a loop-free topology for a network. STP convergence for link failures can take Max_Age+2xForward_Time seconds in the worst case, while RSTP converges faster in under one second.
- The document discusses the convergence process and timers for STP, as well as improvements in RSTP that reduce convergence time for failures. It provides examples of how STP and RSTP handle different types of link failures.
- Understanding the convergence principles and optimizations of STP and RSTP is important, as they are still widely used despite being older protocols. The document aims to improve readers' understanding of how STP and RSTP
64bit SMP OS for TILE-Gx many core processorToru Nishimura
concise introduction of TILE-Gx many-core processor design and features, how SMP operating system was ported for the processor, and the proposed applications for the up to 72 core computer systems.
Spanning Tree Protocol (STP) resolves physically redundant topologies into loop-free, tree-like
topologies. The biggest issue with STP is that some hardware failures can cause it to fail. This failure
creates forwarding loops (or STP loops). Major network outages are caused by STP loops.
The loop guard STP feature that is intended to improve the stability of the Layer 2 networks. This
document also describes Bridge Protocol Data Unit (BPDU) skew detection. BPDU skew detection is a
diagnostic feature that generates syslog messages when BPDUs are not received in time.
IPv6 uses multicast instead of broadcasts for certain functions. Multicast requires configuration of multicast trees and topology information. Multicast addressing uses prefixes derived from unicast addresses, with scopes from link-local to global. The Multicast Listener Discovery (MLD) protocol allows hosts to join and leave multicast groups, while Protocol Independent Multicast (PIM) builds multicast distribution trees. Interdomain multicast uses Source-Specific Multicast (SSM) and Embedded Rendezvous Points (RPs) to map groups to RPs across domains.
STP prevents loops by electing a single root bridge and blocking redundant links. It uses BPDUs containing bridge IDs and path costs to elect the root bridge with the lowest bridge ID. The switch with bridge ID 32768.0001.964E.7EBB is elected as the root bridge based on having the lowest bridge ID of the switches shown.
- The document discusses redistributing different types of OSPF routes into BGP, including internal routes, external routes, and NSSA external routes.
- OSPF route types include internal routes within an area (intra-area) or between areas (inter-area), and external routes that have been redistributed into OSPF from other protocols.
- Keywords can be used in the BGP redistribute command to select the specific OSPF route types to redistribute, such as internal, external, or nssa-external. Redistribution defaults to only internal routes but filters can modify this behavior.
This document provides an overview of OSPF and EIGRP routing protocols including how they work, configure, and troubleshoot. It describes key concepts such as how OSPF uses the Dijkstra algorithm to calculate the shortest path and elect designated routers, and how EIGRP uses the DUAL algorithm and has characteristics of both distance vector and link state protocols. It also provides configuration examples and show commands for setting up and monitoring OSPF and EIGRP routing.
1. This document provides instructions for installing and configuring Danfoss VLT drives for use on a PROFIBUS network.
2. Key steps include cabling the bus line, configuring the PROFIBUS network and master, configuring the drive parameters for control over PROFIBUS, and programming the PLC.
3. The document covers PROFIBUS DP V1 profile support which enables both cyclic and acyclic communication between the drive and PLC master.
In 2001, the IEEE introduced Rapid Spanning Tree Protocol (RSTP) as 802.1w. RSTP provides significantly
faster spanning tree convergence after a topology change, introducing new convergence behavior and
bridge port roles to do this. RSTP was designed to be backwards-compatible with standard STP.
While STP can take 30 to 50 seconds to respond to a topology change, RSTP is typically able to respond
to changes within 3 × Hello times (default: 3 times 2 seconds) or within a few milliseconds of a physical
link failure. The so-called Hello time is an important and configurable time interval that is used by RSTP
for several purposes; its default value is 2 seconds.
The document discusses the configuration of static MPLS label switched paths (LSPs) across a network topology consisting of routers in various cities. It describes how each router is configured to either push a label, swap a label, or pop the top label as packets traverse the LSP from Jakarta to Makasar and back. Traceroute outputs are provided to show the functioning LSP paths versus normal IGP routing. Complete configuration snippets are included in an appendix.
OSPF is a link-state routing protocol that is widely used for routing traffic within autonomous systems. It works by flooding Link State Advertisements (LSAs) throughout a routing domain. OSPF supports various area types, uses Designated Routers to reduce the number of adjacencies needed, and has different LSA types that advertise routing information within and between areas. BGP can then be configured between autonomous systems to exchange routing information globally.
The document discusses Label Distribution Protocol (LDP) configuration on a MPLS network using Juniper routers. It describes using logical systems to partition a single physical router into multiple logical devices. LDP is configured between logical systems LS1-P1, LS11-PE1, and other logical systems. LDP establishes MPLS LSPs along the best path determined by OSPF. The label bindings are verified between routers to ensure end-to-end connectivity across the MPLS domain.
iCrossing UK Client Summit 2011 - An Update from iCrossing U.S.iCrossing
This document provides a summary of marketing trends over time and discusses the concept of "connectedness" in marketing. It can be summarized in 3 sentences:
Marketing has evolved dramatically from cave drawings to today's digital landscape. The presentation discusses how marketing must focus on engaging audiences through dialogue rather than just promoting messages, and how building trust over time is important in this new "connected" environment. An insights platform is suggested as a framework for connected marketing success.
1) The document discusses different types of noun clauses, including their functions and how they are introduced. It covers direct objects, indirect objects, subjects, and subject complements.
2) It examines how verbs are backshifted in reported speech and exceptions like "should." It also looks at verb forms used after expressions of wishing, urgency, and importance.
3) The homework is to study for a test. The next Moodle week will cover adverb clauses and transitivity of verbs.
This document discusses the Spanning Tree Protocol (STP) and Rapid Spanning Tree Protocol (RSTP) implemented on four switches separated into different VLANs. STP prevents redundant paths from causing broadcast storms. RSTP converges faster than STP by combining port states. The switches were configured with RSTP and PVST+ separately for each VLAN to prevent loops.
Shibu lijack is a technique used in advanced microprocessors where the microprocessor begins executing the second instruction before the first has been completed. It overlaps the execution of multiple instructions to increase CPU speed. There are three main types of hazards that can reduce this speed: structural hazards due to competing for limited hardware resources, data hazards when instructions depend on data that is not ready yet, and control hazards when the next instruction path is unknown until a branch is resolved. Solutions include stalling the pipeline, forwarding data early, or predicting instruction paths.
This slide contains the basic and advanced concept of OSPF routing protocol, according to the latest version of Cisco books, and I presented it at IRAN TIC company. In the next slide, I will upload an attractive advanced feature about OSPF.
The document provides answers to questions about CCNA 3 Chapter 5 on spanning tree protocol. It includes 20 multiple choice questions about concepts like the criteria switches use to select the root bridge, how STP prevents loops in a switched network, and how port roles are assigned in RSTP. It also includes exhibits showing STP output from switches to help illustrate concepts.
The document provides an overview of the Open Shortest Path First (OSPF) routing protocol, including that it is an interior gateway protocol that uses link state routing to establish neighbor relationships and exchange routing information within an autonomous system in order to determine the shortest path between any two routers on a network. OSPF detects changes in network topology quickly and converges on a new loop-free routing structure within seconds, and it has been widely implemented in large enterprise networks to provide efficient routing.
This document discusses linkers and loaders. It introduces the concepts of linking and loading, explaining that linkers resolve external references between separately compiled modules, while loaders bind relocatable addresses to absolute addresses so programs can execute. It describes two approaches for handling relocation - using transfer vectors or direct editing. The document then discusses how shared libraries allow code and data to be shared among multiple processes to reduce memory usage. It concludes by examining linking and loading specifically in Linux, covering topics like shared libraries, versioning, and dynamic linking.
- STP and RSTP are protocols that calculate a loop-free topology for a network. STP convergence for link failures can take Max_Age+2xForward_Time seconds in the worst case, while RSTP converges faster in under one second.
- The document discusses the convergence process and timers for STP, as well as improvements in RSTP that reduce convergence time for failures. It provides examples of how STP and RSTP handle different types of link failures.
- Understanding the convergence principles and optimizations of STP and RSTP is important, as they are still widely used despite being older protocols. The document aims to improve readers' understanding of how STP and RSTP
64bit SMP OS for TILE-Gx many core processorToru Nishimura
concise introduction of TILE-Gx many-core processor design and features, how SMP operating system was ported for the processor, and the proposed applications for the up to 72 core computer systems.
Spanning Tree Protocol (STP) resolves physically redundant topologies into loop-free, tree-like
topologies. The biggest issue with STP is that some hardware failures can cause it to fail. This failure
creates forwarding loops (or STP loops). Major network outages are caused by STP loops.
The loop guard STP feature that is intended to improve the stability of the Layer 2 networks. This
document also describes Bridge Protocol Data Unit (BPDU) skew detection. BPDU skew detection is a
diagnostic feature that generates syslog messages when BPDUs are not received in time.
IPv6 uses multicast instead of broadcasts for certain functions. Multicast requires configuration of multicast trees and topology information. Multicast addressing uses prefixes derived from unicast addresses, with scopes from link-local to global. The Multicast Listener Discovery (MLD) protocol allows hosts to join and leave multicast groups, while Protocol Independent Multicast (PIM) builds multicast distribution trees. Interdomain multicast uses Source-Specific Multicast (SSM) and Embedded Rendezvous Points (RPs) to map groups to RPs across domains.
STP prevents loops by electing a single root bridge and blocking redundant links. It uses BPDUs containing bridge IDs and path costs to elect the root bridge with the lowest bridge ID. The switch with bridge ID 32768.0001.964E.7EBB is elected as the root bridge based on having the lowest bridge ID of the switches shown.
- The document discusses redistributing different types of OSPF routes into BGP, including internal routes, external routes, and NSSA external routes.
- OSPF route types include internal routes within an area (intra-area) or between areas (inter-area), and external routes that have been redistributed into OSPF from other protocols.
- Keywords can be used in the BGP redistribute command to select the specific OSPF route types to redistribute, such as internal, external, or nssa-external. Redistribution defaults to only internal routes but filters can modify this behavior.
This document provides an overview of OSPF and EIGRP routing protocols including how they work, configure, and troubleshoot. It describes key concepts such as how OSPF uses the Dijkstra algorithm to calculate the shortest path and elect designated routers, and how EIGRP uses the DUAL algorithm and has characteristics of both distance vector and link state protocols. It also provides configuration examples and show commands for setting up and monitoring OSPF and EIGRP routing.
1. This document provides instructions for installing and configuring Danfoss VLT drives for use on a PROFIBUS network.
2. Key steps include cabling the bus line, configuring the PROFIBUS network and master, configuring the drive parameters for control over PROFIBUS, and programming the PLC.
3. The document covers PROFIBUS DP V1 profile support which enables both cyclic and acyclic communication between the drive and PLC master.
In 2001, the IEEE introduced Rapid Spanning Tree Protocol (RSTP) as 802.1w. RSTP provides significantly
faster spanning tree convergence after a topology change, introducing new convergence behavior and
bridge port roles to do this. RSTP was designed to be backwards-compatible with standard STP.
While STP can take 30 to 50 seconds to respond to a topology change, RSTP is typically able to respond
to changes within 3 × Hello times (default: 3 times 2 seconds) or within a few milliseconds of a physical
link failure. The so-called Hello time is an important and configurable time interval that is used by RSTP
for several purposes; its default value is 2 seconds.
The document discusses the configuration of static MPLS label switched paths (LSPs) across a network topology consisting of routers in various cities. It describes how each router is configured to either push a label, swap a label, or pop the top label as packets traverse the LSP from Jakarta to Makasar and back. Traceroute outputs are provided to show the functioning LSP paths versus normal IGP routing. Complete configuration snippets are included in an appendix.
OSPF is a link-state routing protocol that is widely used for routing traffic within autonomous systems. It works by flooding Link State Advertisements (LSAs) throughout a routing domain. OSPF supports various area types, uses Designated Routers to reduce the number of adjacencies needed, and has different LSA types that advertise routing information within and between areas. BGP can then be configured between autonomous systems to exchange routing information globally.
The document discusses Label Distribution Protocol (LDP) configuration on a MPLS network using Juniper routers. It describes using logical systems to partition a single physical router into multiple logical devices. LDP is configured between logical systems LS1-P1, LS11-PE1, and other logical systems. LDP establishes MPLS LSPs along the best path determined by OSPF. The label bindings are verified between routers to ensure end-to-end connectivity across the MPLS domain.
iCrossing UK Client Summit 2011 - An Update from iCrossing U.S.iCrossing
This document provides a summary of marketing trends over time and discusses the concept of "connectedness" in marketing. It can be summarized in 3 sentences:
Marketing has evolved dramatically from cave drawings to today's digital landscape. The presentation discusses how marketing must focus on engaging audiences through dialogue rather than just promoting messages, and how building trust over time is important in this new "connected" environment. An insights platform is suggested as a framework for connected marketing success.
1) The document discusses different types of noun clauses, including their functions and how they are introduced. It covers direct objects, indirect objects, subjects, and subject complements.
2) It examines how verbs are backshifted in reported speech and exceptions like "should." It also looks at verb forms used after expressions of wishing, urgency, and importance.
3) The homework is to study for a test. The next Moodle week will cover adverb clauses and transitivity of verbs.
The document summarizes a short horror story pitch and provides feedback on how to improve various elements of the story. The pitch involves two school friends, Marie and Johnny, who sneak away to the science lab after school and get intimate, but are then locked in when the lights go out. It's revealed the next day that they died in a suspicious fire. The feedback focuses on character development, showing physical affection between Marie and Johnny believably, and how to film scenes where the lights go out while still showing the action.
1) O documento discute se o desmatamento da Amazônia está causando as secas no sudeste do Brasil, concluindo que não há evidências científicas que apoiem essa afirmação e que as secas ocorreram no passado quando o desmatamento era menor.
2) Explica que a floresta amazônica recicla a maior parte da água das chuvas e não é a fonte de umidade para o sudeste, que vem do Oceano Atlântico.
3) Discutem outros fatores climáticos glob
Ringkasan dari presentasi tentang produk-produk perbankan syariah adalah sebagai berikut:
1. Membandingkan peran bank konvensional dan syariah serta sistem simpanan dan pembiayaannya.
2. Menguraikan prinsip-prinsip akad yang digunakan dalam perbankan syariah seperti akad musyarakah, mudharabah, dan murabahah.
3. Menjelaskan produk-produk pembiayaan syariah termasuk pembiayaan ekuitas dan
El documento proporciona instrucciones para configurar varios parámetros básicos en un router, incluyendo el nombre del host, contraseñas, interfaces, enrutamiento estático y dinámico, DHCP, y recuperación de contraseñas olvidadas. También incluye comandos para configurar switches, como interfaces de administración, dúplex y velocidad.
In deze blog presentatie wil ik met name het belang van community management bij interne communities onder de aandacht brengen. En de rol van de community manager voor een succesvolle interne community.
De belangrijkste rode draad van mijn presentatie is dat community management een continu proces is, waarbij een community manager uiteindelijk het verschil kan maken tussen een succesvolle en een niet succesvolle community. En dat het succes afgemeten kan worden aan de hand van de bijdrage die de community levert aan de bedrijfsdoelstellingen. Een community is geen doel op zich maar betere kennisdeling, verhogen medewerkerstevredenheid enz. zijn dat wel.
Picasso's Blue Period works were created between 1901 and 1904 and were characterized by a somber, monochromatic blue color palette and themes of isolation, poverty, and other bleak subjects that reflected Picasso's mood during this time in his life.
Zenith Networks is a network integration services company that has been providing LAN, WAN, routing, switching, and security services for 27 years. They are a partner of Juniper Networks and are headquartered in Philadelphia, PA. The document provides information on Zenith Networks' services and certifications, as well as background on their partner Juniper Networks. It also includes steps to access education slides on OSPF routing protocols hosted on Zenith Networks' website.
This document discusses IP addressing, subnet masks, default gateways, and the organizations that manage IP addresses. It describes public and private IP addresses and the different IP address classes. It also provides an overview of the 7-layer OSI model and describes each layer's function. Finally, it mentions some common protocol port numbers and introduces Cisco routers and switches.
An introduction to MPLS networks and applicationsShawn Zandi
Multiprotocol Label Switching (MPLS) provides label switched path to deliver packets in networks. This is an introduction course to understand different terminologies and concepts associated with MPLS.
Dynamische Routingprotokolle Aufzucht und Pflege - OSPFMaximilan Wilhelm
Herzlichen Glückwunsch! Sie dürfen ein Netzwerk mit mehr als 2 Routern administrieren. Dieser Vortrag erläutert, warum statisches Routing keine Lösung ist und schneller als einem lieb ist zum Problem werden kann. Als Einführung in dynamisches Routing und OSPF, erklärt dieser Vortrag wie sich Router gegenseitig finden, Routen austauschen, was eine Area ist und wie die Link-State Datenbank funktioniert.
OSPF wird praktisch am Beispiel des Bird Internet Routing Daemons und in Zusammenspiel mit klassischen Herstellern gezeigt.
This document provides 25 questions and answers related to CCNA 2 Chapter 11 on OSPF routing. OSPF is the Open Shortest Path First routing protocol. The questions cover topics like OSPF neighbor relationships, route calculations, DR/BDR elections, network statements, and troubleshooting.
Pyretic - A new programmer friendly language for SDNnvirters
Managing a network requires support for multiple concurrent tasks, from routing and traffic monitoring, to access control and server load balancing. Software-Defined Networking (SDN) allows applications to realize these tasks directly, by installing packet-processing rules on switches. However, today's SDN platforms provide limited support for creating modular applications.
Join Bay Area Network Virtualization as Dr. Joshua Reich, Postdoctoral Research Scientist and Computing Innovation Fellow at Princeton University presents Pyretic - a new programmer-friendly domain-specific language embedded in Python that enables modular programming for SDN applications. Pyretic is part of the Frenetic Network Programming Language initiative sponsored by Princeton University and Cornell University, with support from the National Science Foundation, the Office of Naval Research, Google, Intel and Dell.
eBPF has 64-bit general purpose registers, therefore 32-bit architectures normally need to use register pair to model them and need to generate extra instructions to manipulate the high 32-bit in the pair. Some of these overheads incurred could be eliminated if JIT compiler knows only the low 32-bit of a register is interested. This could be known through data flow (DF) analysis techniques. Either the classic iterative DF analysis or "path-sensitive" version based on verifier's code path walker.
In this talk, implementations for both versions of DF analyzer will be presented. We will see how a def-use chain based classic eBPF DF analyser looks first, and will see the possibility to integrate it with previous proposed eBPF control flow graph framework to make a stand-alone eBPF global DF analyser which could potentially serve as a library. Then, another "path-sensitive" DF analyser based on the existing verifier code path walker will be presented. We will discuss how function calls, path prune, path switch affect the implementation. Finally, we will summarize pros and cons for each, and will see how could each of them be adapted to 64-bit and 32-bit architecture back-ends.
Also, eBPF has 32-bit sub-register and ALU32 instructions associated, enable them (-mattr=+alu32) in LLVM code-gen could let the generated eBPF sequences carry more 32-bit information which could potentially easy flow analyser. This will be briefly discussed in the talk as well.
CCNA DC ,CCNP DC ,CCIE DC ,CCIE DC RACK RENTALS ,CCIE DC LEARNING PPT ,CCIE DC ONLINE TRAINING.
UCS RACK RENTALS ,MDS RACK RENTALS ,NEXUS 7000 RACK RENALS
EIGRP and OSPF are routing protocols. EIGRP uses the DUAL algorithm and metric to select fast, loop-free routes. It supports multiple network layers and rapid convergence. OSPF is an open standard link-state protocol that provides a common network view and calculates the shortest path. It can route between autonomous systems and uses link state updates and SPF algorithm. Configuring OSPF involves assigning networks to areas and defining the routing process. Verification includes checking neighbors, routes, and topology tables.
EIGRP and OSPF are routing protocols. EIGRP uses the DUAL algorithm and metric to select fast, loop-free routes. It supports multiple network layers and rapid convergence. OSPF is an open standard link-state protocol that provides a common network view and calculates the shortest path. It can route between autonomous systems and uses link state updates and SPF algorithm. Configuring OSPF involves assigning networks to areas and defining the routing process. Verification includes checking neighbors, routes, and topology tables.
Basically it contains information about the OSPF routing protocol. As much as possible the information was tried to be summarized and a slideshow of visual weight was made.
Dynamic routing protocols are used to automatically discover remote networks, maintain up-to-date routing information, and choose the best path to destination networks. There are two main types - interior gateway protocols (IGPs) like RIP, OSPF, and EIGRP that are used within an autonomous system, and exterior protocols like BGP that route between autonomous systems. IGPs use metrics like hop count or bandwidth to determine the best path. OSPF is a link-state protocol that floods link information, while EIGRP uses DUAL algorithm and maintains topology tables for fast convergence.
Testbeds IntErconnections with L2 overlays - SRv6 for SFCStefano Salsano
1) The TIE-SR demo shows a Service Function Chaining (SFC) scenario across different testbeds using SRv6 (Segment Routing over IPv6). It automatically designs and deploys an arbitrary Layer 2 overlay network topology over multiple SoftFIRE testbeds.
2) It creates an SRv6 domain on the overlay network and defines two SRv6 policies - one for traffic engineering and one for SFC. The SFC policy routes traffic through a snort intrusion detection system virtual network function.
3) An SDN controller can periodically change the SRv6 policies to route traffic through different paths and virtual network functions for testing purposes.
The document discusses configuring single-area OSPFv2 in point-to-point networks. It describes using the network command to enable OSPF on interfaces matching a network address and wildcard mask. Alternatively, OSPF can be configured directly on interfaces using the ip ospf command. Passive interfaces are used to prevent sending unnecessary routing updates on LAN links. Point-to-point networks are configured to disable DR/BDR election when only two routers connect an interface. Loopbacks can also be used as point-to-point networks.
The document discusses configuring single-area OSPFv2 in point-to-point networks. It describes using the network command to enable OSPF on interfaces matching a network address and wildcard mask. Alternatively, OSPF can be configured directly on interfaces using the ip ospf command. Passive interfaces are described to prevent unnecessary routing updates on interfaces. The network type is changed to point-to-point to disable DR/BDR election for links with only two routers. Loopbacks can also be used as point-to-point networks.
This document provides an overview of Multiprotocol Label Switching (MPLS) architecture and forwarding based on RFC 3031. It discusses key MPLS concepts like label switching routers, forwarding equivalence classes, label distribution, label retention modes, label stacks, tunnels, label distribution procedures, and MPLS schemes. MPLS allows routing and forwarding of data based on labels rather than network layer addresses, enabling traffic engineering and quality of service.
Cisco discovery drs ent module 6 - v.4 in english.igede tirtanata
The document contains multiple choice questions about OSPF routing. It tests knowledge of OSPF concepts like DR/BDR election, network types, route calculation, and configuration. The questions cover topics such as OSPF network statements, adjacency formation between routers, and using OSPF in different network types.
Lec12 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- P6, Netbur...Hsien-Hsin Sean Lee, Ph.D.
The document summarizes key aspects of the P6 microarchitecture used in processors like the Pentium Pro, Pentium II, and Pentium III. It describes the system architecture with separate front-side and back-side buses. It then details the instruction fetch, decode, register renaming, out-of-order execution, memory handling, and retirement stages of the processor pipeline. Diagrams illustrate the branch prediction, reservation stations, reorder buffer, and memory order buffer components that enable speculative and out-of-order execution in the P6.
This document provides an overview of IP routing and the Routing Information Protocol (RIP). It discusses the basic components and functions of routing, including static and dynamic routing. RIP is introduced as a distance-vector routing protocol that uses hop count as its metric. Key aspects of RIP covered include route updates every 30 seconds, supporting up to 15 hops, and RIP version 2 allowing for variable length subnet masks. The document also discusses verifying and troubleshooting RIP configurations.
El documento describe los contenidos de un curso sobre JDBC y URM. Explica que JDBC se utiliza para el acceso a bases de datos y URM para mapeadores de objetos relacionales. Detalla los conceptos clave de JDBC como drivers, conexión a la base de datos mediante DriverManager, ejecución de sentencias SQL y uso de ResultSet.
El documento describe los contenidos de un curso sobre JDBC y URM. Incluye dos bloques: JDBC para el acceso a bases de datos, y URM para mapeadores de objetos relacionales. Detalla los conceptos clave de JDBC como drivers, operaciones con JDBC, y ejemplos de código para conectarse a una base de datos, enviar consultas y cerrar la conexión. También cubre procedimientos almacenados, transacciones y otras funcionalidades avanzadas de JDBC.
El documento describe conceptos clave de seguridad en aplicaciones Java como criptografía, PKI, control de acceso, SSL y seguridad web. Explica la evolución del modelo de seguridad de Java desde JDK 1.1 hasta la introducción de ficheros de políticas de seguridad y JAAS, y cómo estos definen los permisos de acceso. También cubre temas como la implementación y localización por defecto de los ficheros de políticas de seguridad.
Este documento describe la administración de claves y certificados en aplicaciones Java. Explica las herramientas keytool y JarSigner para gestionar claves y firmar archivos JAR. También describe la infraestructura de clases clave KeyStore para la gestión programática de almacenes de claves.
Este documento describe los conceptos básicos de la criptografía en aplicaciones Java, incluyendo certificados digitales, autoridades certificadoras, el estándar X.509 para certificados y sus extensiones. Explica el formato de los certificados X.509, las funciones de las autoridades certificadoras y algunos ejemplos como FNMT.
Este documento describe la criptografía en aplicaciones Java. Explica el cálculo de huellas digitales usando la clase MessageDigest y los algoritmos hash. También cubre firmas digitales mediante el uso de claves públicas y privadas, describiendo las clases Signature, Mac, SignedObject y excepciones como SignatureException.
Este documento describe la criptografía en aplicaciones Java. Explica los conceptos clave de la arquitectura criptográfica de Java (JCA) y la extensión criptográfica de Java (JCE), incluidos los proveedores, clases engine, claves criptográficas, generación de claves y servicios criptográficos. También cubre temas como la encriptación, firma digital y seguridad en aplicaciones web.
Este documento describe la criptografía en aplicaciones Java. Explica conceptos clave como la seguridad, la evolución del modelo de seguridad de Java, y las características de seguridad en J2EE. También define la criptografía y los sistemas criptográficos simétricos y asimétricos, así como la confidencialidad y la integridad.
Este documento establece las medidas de seguridad que deben aplicarse a los ficheros automatizados que contengan datos personales de acuerdo con tres niveles: básico, medio y alto. Define conceptos clave como sistema de información, usuario, recursos, accesos autorizados, e incidencia. Determina que todos los ficheros deben cumplir como mínimo el nivel básico y especifica cuales deben cumplir nivel medio u alto dependiendo del tipo de datos. Describe las medidas de seguridad de nivel básico como la elaboración de un document
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Diana Rendina
Librarians are leading the way in creating future-ready citizens – now we need to update our spaces to match. In this session, attendees will get inspiration for transforming their library spaces. You’ll learn how to survey students and patrons, create a focus group, and use design thinking to brainstorm ideas for your space. We’ll discuss budget friendly ways to change your space as well as how to find funding. No matter where you’re at, you’ll find ideas for reimagining your space in this session.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
1. 32
OSPF Commands
Overview
This chapter describes Open Shortest Path First (OSPF) router commands.
OSPF is a shortest path first or link‐state protocol. The Matrix X Router supports OSPF Version 2.0,
as defined in RFC 2328. OSPF is an interior gateway protocol that distributes routing information
between routers in a single autonomous system (AS). OSPF chooses the least‐cost path as the best
path. OSPF is suitable for complex networks with a large number of routers because it provides
equal‐cost multi‐path routing where packets to a single destination can be sent by more than one
interface simultaneously.
In a link‐state protocol, each router maintains a database that describes the entire AS topology,
which it builds out of the collected link state advertisements of all routers. Each participating
router distributes its local state (that is, the router’s usable interfaces and reachable neighbors)
throughout the AS by flooding. Each multi‐access network that has at least two attached routers
has a designated router and a backup designated router. The designated router floods a link state
advertisement for the multi‐access network and has other special responsibilities. The designated
router concept reduces the number of adjacencies required on a multi‐access network.
For information about... Refer to page...
Global Configuration Mode OSPF Command 32-2
Global Commands 32-2
Area Commands 32-32
Default Commands 32-51
Interface Commands 32-57
Querying Commands 32-73
Matrix X Router Command Line Interface Reference Guide 32-1
2. Global Configuration Mode OSPF Command
Global Configuration Mode OSPF Command
There is one global configuration mode OSPF command, router ospf.
router ospf
This command acquires configuration mode for an instance in OSPF.
Syntax
router ospf instance_id
no router ospf instance_id
Parameters
instance_id An integer from 1 to 4294967294 identifying the OSPF instance.
Up to 4 concurrent OSPF instances can be configured.
Mode
Global Router Configuration.
Usage
Use the router ospf command to enter OSPF Router Configuration mode for an OSPF instance.
Once in OSPF Router Configuration mode, begin adding or reconfiguring an OSPF instance.
Example
This example shows how to acquire OSPF Router Configuration mode for OSPF instance 1 from
the switch mode.
matrix-x(switch-su)->router
matrix-x(router-exec)# config
matrix-x(router-config)# router ospf 1
matrix-x(config-router-ospf)#
Global Commands
The global OSPF commands are listed below.
For information about... Refer to page...
advertise-subnet 32-3
authentication 32-5
compatible rfc1583 32-7
dead-interval 32-8
distance 32-9
enable 32-10
32-2 OSPF Commands
3. Global Commands
For information about... Refer to page...
hello-interval 32-11
igp-shortcut 32-12
inherit-metric 32-13
multicast-rib 32-14
network 32-15
nssa-inherit-metric 32-16
nssa-stability-interval 32-17
poll-interval 32-18
priority 32-19
redistribute 32-20
redistribute-nssa 32-22
require-vbit 32-23
retransmit-interval 32-24
router id 32-25
timers spf 32-26
trace file 32-27
trace flag 32-29
transmit-delay 32-31
advertise-subnet
This command determines whether OSPF will, when advertising point‐to‐point interfaces,
advertise the network number and netmask instead of a host route to the remote IP network.
Syntax
advertise-subnet
no advertise-subnet
Parameters
None.
Defaults
Disabled.
Mode
OSPF Router Configuration.
Matrix X Router Command Line Interface Reference Guide 32-3
4. Global Commands
Usage
This command determines whether OSPF will, when advertising point‐to‐point interfaces,
advertise the network number and netmask instead of a host route to the remote IP network.
Because the netmask is sometimes set improperly on point‐to‐point interfaces, this option is
disabled by default. This command can be overridden at the area and interface levels.
Example
The following example turns the global advertise‐subnet on, then turns it off for area 1.2.3.4:
matrix-x(router-config)# router ospf 1
matrix-x(config-router-ospf)# advertise-subnet
matrix-x(config-router-ospf)# no area 1.2.3.4 advertise-subnet
Related Commands
area advertise-subnet
ip ospf advertise-subnet
32-4 OSPF Commands
5. Global Commands
authentication
This command specifies the type of OSPF authentication employed.
Syntax
authentication {simple key | md5 id_number md5_key [start-generate date_time]
[stop-generate date_time] [start-accept date_time] [stop-accept date_time]}
no authentication {simple key | md5 id_number}
Parameters
simple key Specifies simple (clear password) authentication. The value for key
is specified as a one‐ to eight‐character string.
md5 id_number md5_key Specifies the authentication used for specifying MD5
cryptographic authentication.
The value for id_number is an integer ranging from 1 to 255.
The value for md5_key is a character string, ranging from 1 to 16
characters.
start‐generate date_time (Optional) Specifies the start and stop times for generating MD5
authentication. The date_time values must be in the format
stop‐generate date_time
YYYY‐MM‐DD.HH.MM.
Both parameters are optional and you may enter them in any
order when specifying multiple commands.
start‐accept date_time (Optional) Specifies the start and stop times for accepting MD5
authentication. The date_time values must be in the format
stop‐accept date_time
YYYY‐MM‐DD.HH.MM.
Both parameters are optional and you may enter them in any
order when specifying multiple commands.
Defaults
The default is for no authentication to be explicitly configured.
Mode
OSPF Router Configuration.
Usage
Authentication can help to guarantee that routing information is imported only from trusted
routers. A variety of authentication schemes can be used, but a single scheme must be configured
for each network. The use of different schemes enables some interfaces to use much stricter
authentication than others. The two authentication schemes available are simple and MD5.
Use the authentication command to specify the type of global authentication and key values used
in OSPF. Use the no form of this command to remove authentication for the area. Authentication is
used by OSPF to generate and verify the authentication field in the OSPF header. The global
authentication is the default and can be overridden at the area command and interface levels.
Matrix X Router Command Line Interface Reference Guide 32-5
6. Global Commands
When you want to keep certain routers from exchanging OSPF packets, use the simple form of
authentication. The interfaces that the packets are to be sent on still need to be trusted, because the
key will be placed in the packets and can be seen by anyone with access to the network.
When you do not trust other users of your network, use MD5 authentication. The system works by
using shared secret keys. Because the keys are used to sign the packets with an MD5 checksum,
they cannot be forged or tampered with. Because the keys are not included in the packet, snooping
the key is not possible. Users of the network can still snoop the contents of packets, however,
because the packets are not encrypted.
The Matrix X MD5 authentication is compliant with RFC 2328 which uses the MD5 algorithm and
an authentication key of up to 16 characters. RFC 2328 allows multiple MD5 keys per interface.
Each key has two associated time ranges.
In order to turn off authentication, you must include the authentication type in the no form of the
command. For example, if MD5 authentication was configured, then simply specifying no
authentication will not work. In addition, you must specify the simple key when turning off
simple authentication, and you must specify the MD5 id_number when turning off MD5
authentication.
Examples
The following example configures simple authentication in OSPF instance 1.
matrix-x(router-config)# router ospf 1
matrix-x(config-router-ospf)# authentication simple abc
The following example configures MD5 authentication for OSPF instance 2. The ID for this MD5
configuration is 1, and the key is configured as bar.
matrix-x(router-config)# router ospf 2
matrix-x(config-router-ospf)# authentication md5 1 bar
The following example turns off the MD5 authentication that was configured in the previous
example. Note that specifying the MD5 key is not required, but specifying the MD5 ID is.
matrix-x(router-config)# router ospf 2
matrix-x(config-router-ospf)# no authentication md5 1
The following example configures md5 authentication for OSPF instance 3. MD5 authentication is
configured with a start‐generate time set to November 2, 2004 at 9:30 p.m., a stop‐generate time set
to November 2, 2004 at 9:45 p.m., a start‐accept time set to December 2, 2004 at 9 p.m. and a stop‐
accept time set to December 31, 2004 at 2 p.m.:
matrix-x(router-config)# router ospf 3
matrix-x(config-router-ospf)# authentication md5 2 md5 start-generate 2004-11-
02.21.30 stop-generate 2004-11-02.21.45 start-accept 2004-12-02.21.00 stop-accept
2004-12-31.22.00
Related Commands
area authentication
ip ospf authentication
32-6 OSPF Commands
7. Global Commands
compatible rfc1583
This command specifies this Matrix X Router to run in RFC 1583 mode instead of RFC 2328 mode.
Syntax
compatible rfc1583
no compatible rfc1583
Parameters
None.
Defaults
Enabled.
Mode
OSPF Router Configuration.
Usage
Do not specify this command if all the routers using an OSPF implementation in your domain are
based on RFC 2328 or later. This option should be specified the same way on all routers in the
domain. If any router does not have this option, you should always enable this. When disabled,
the preference rules for best route election are changed to eliminate certain kinds of possible
routing loops.
Use the no form of this command removes the requirement to run in RFC 1583 mode and reverts
to RFC 2328.
Example
The following example disables RFC 1583 mode for instance 1 of OSPF:
matrix-x(router-config)# router ospf 1
matrix-x(config-router-ospf)# no compatible rfc1583
Matrix X Router Command Line Interface Reference Guide 32-7
8. Global Commands
dead-interval
This command specifies the interval that can elapse without receiving a router’s hello packets
before the router’s neighbors will declare it down.
Syntax
dead-interval time-seconds
no dead-interval time-seconds
Parameters
time‐seconds Interval ranging from 1 to 65535 seconds.
Defaults
40 seconds.
Mode
OSPF Router Configuration.
Usage
Use this command to specify the interval that can elapse without receiving a router’s hello packets
before the router’s neighbors will declare it down. This value can be overridden at the area and
interface levels. Generally, this value should equal four times the HELLO interval. Do not set this
value to be less than the HELLO interval or convergence will fail.
Use the no form of this command removes the configured value and returns to its default value of
40 seconds. Specifying a value for time‐seconds in the no form has no effect on configuration.
Example
The following example configures a global dead‐interval value of 30. This value is then overridden
in area 1.2.3.4 to be 25.
matrix-x(router-config)# router ospf 1
matrix-x(config-router-ospf)# dead-interval 30
matrix-x(config-router-ospf)# area 1.2.3.4 dead-interval 25
Related Commands
area dead-interval
ip ospf dead-interval
32-8 OSPF Commands
9. Global Commands
distance
This command specifies how active routes that are learned from OSPF internal reachability will be
selected, compared to other protocols.
Syntax
distance int_value
no distance [int_value]
Parameters
int_value The preference for internal routes, ranging from 1 and 255 inclusive.
Defaults
10.
Mode
OSPF Router Configuration.
Usage
Use the distance command to specify how active routes that are learned from the OSPF internal
reachability (compared to other protocols) will be selected. When a route has been learned from
more than one protocol, the active route will be selected from the protocol with the lowest
distance. Each protocol has a default distance in this selection.
Use the negative form of this command, no distance, to remove the configured value and return it
to its default value of 10.
Example
The following example configures the default distance for internal routes to be 100.
matrix-x(router-config)# router ospf 1
matrix-x(config-router-ospf)# distance ospf 100
Matrix X Router Command Line Interface Reference Guide 32-9
10. Global Commands
enable
This command enables an OSPF instance.
Syntax
enable
no enable
Mode
OSPF Router Configuration.
Defaults
Enabled.
Usage
The no form of this command disables the instance. If an enabled instance is disabled, then it is
stopped, and all running state is deleted but all configuration state is preserved. If a disabled instance
is enabled, it will start running again with its preserved configuration state.
Example
The following example disables OSPF instance 3:
matrix-x(router-config)# router ospf 3
matrix-x(config-router-ospf)# no enable
32-10 OSPF Commands
11. Global Commands
hello-interval
This command specifies the interval between hello packets that a peer router sends on an
interface.
Syntax
hello-interval time-seconds
no hello-interval [time-seconds]
Parameters
time-seconds The interval between hello packet transmissions a peer router sends on
an interface, ranging from 1 to 65535 seconds.
Defaults
10 seconds.
Mode
OSPF Router Configuration.
Usage
Use this command to specify the interval between hello packets that a peer router sends on an
interface. Although specified here at the global level, it can be overridden in the area and interface
levels.
Use the no form of this command to remove the configured value and return it to the default.
Specifying a time‐seconds value in the no form has no effect on the configuration.
Example
The following example configures a global hello interval of 15 seconds which is then overridden in
the area statement where it is set to 5 seconds.
matrix-x(router-config)# router ospf 1
matrix-x(config-router-ospf)# hello-interval 15
matrix-x(config-router-ospf)# area 1.2.3.4 hello-interval 5
Related Commands
area hello-interval
ip ospf hello-interval
Matrix X Router Command Line Interface Reference Guide 32-11
12. Global Commands
igp-shortcut
This command enables the IGP shortcut feature for OSPF.
Syntax
igp-shortcut
no igp-shortcut
Mode
OSPF Router Configuration.
Defaults
Disabled.
Usage
This command enables the IGP shortcut feature for OSPF. When configured, OSPF will consider
MPLS tunnels as uni‐directional, directly connected, point‐to‐point links.
The no form of this command disables this feature.
Examples
The following command enables the IGP Shortcut feature for OSPF instance 1:
matrix-x(router-config)# router ospf 1
matrix-x(router-ospf)# igp-shortcut
The following command disables the IGP Shortcut feature for OSPF instance 1:
matrix-x(router-config)# router ospf 1
matrix-x(config-router-ospf)# no igp-shortcut
32-12 OSPF Commands
13. Global Commands
inherit-metric
This command configures an OSPF ASE (Autonomous System External) route to inherit the metric
of the external route when no metric is specified on the export policy.
Syntax
inherit-metric
no inherit-metric
Parameters
None.
Defaults
Disabled.
Mode
OSPF Router Configuration.
Usage
Use this command to configure an OSPF ASE route to inherit the metric of the external route when
no metric is specified on the export policy. This feature maintains compatibility with all current
export functions. A metric specified on the export policy takes precedence.
Note: The metric specified in the defaults section (default-metric) is used if this command is not
specified.
Example
The following example configures ASE routes exported into OSPF to inherit the metric of the
external route:
matrix-x(router-config)# router ospf 1
matrix-x(config-router-ospf)# inherit-metric
Matrix X Router Command Line Interface Reference Guide 32-13
14. Global Commands
multicast-rib
This command specifies the Routing Information Base (RIB) in which OSPF internal routes are
installed.
Syntax
multicast-rib
no multicast-rib
Parameters
None.
Defaults
Disabled.
Mode
OSPF Router Configuration.
Usage
Use this command to specify the RIB in which OSPF internal routes are installed. The unicast RIB
is required and is the default. In code bases supporting extended RIBs, OSPF routes can be
installed in the multicast RIB.
This command has no effect on self‐originated ASE (Autonomous System External) or NSSA
routes because they are exported from another protocol.
Use the no form of this command to change the parameter to its default.
Example
The following example configures OSPF routes to be installed in the unicast and multicast RIBs:
matrix-x(router-config)# router ospf 1
matrix-x(config-router-ospf)# multicast-rib
32-14 OSPF Commands
15. Global Commands
network
This command defines the interfaces on which OSPF will run and the area ID for those interfaces.
Syntax
network ip_address wildcard-mask area area_id
no network ip_address wildcard-mask area area_id
Parameters
ip_address A valid IP address.
wildcard‐mask IP‐address‐type mask that includes don’t care bits.
area area_id An ID for an area specified as an IP address in dotted‐quad format. A value
of 0.0.0.0 means the area is a backbone. If you want to associate areas with IP
subnets, you can specify a subnet address for this value.
Defaults
This command is not explicitly configured by default.
Mode
OSPF Router Configuration.
Usage
Use the network area command to specify interfaces on which OSPF runs and to define the area
ID for those interfaces. Use the negative form of this command, no network area, to disable OSPF
routing for any specified interfaces.
Examples
The following example defines network 192.168.10.5 0.0.0.255 in area 1.2.3.4:
matrix-x(router-config)# router ospf 1
matrix-x(config-router-ospf)# network 192.168.10.5 0.0.0.255 area 1.2.3.4
The following example disables OSPF routing on interface 102.168.10.10 in area 1.2.3.4:
matrix-x(router-config)# router ospf 1
matrix-x(config-router-ospf)# no network 192.168.10.10 0.0.0.0 area 1.2.3.4
Matrix X Router Command Line Interface Reference Guide 32-15
16. Global Commands
nssa-inherit-metric
This command allows an OSPF NSSA route to inherit the metric of the external route when no
metric is specified on the export policy. This feature maintains compatibility with all current
export functions. A metric specified on the export policy will take precedence.
Syntax
nssa-inherit-metric
no nssa-inherit-metric
Parameters
None.
Defaults
Disabled.
Mode
OSPF Router Configuration.
Example
The following example sets NSSA routes exported into OSPF to inherit the metric of the external
route:
matrix-x(router-config)# router ospf 1
matrix-x(config-router-ospf)# nssa-inherit-metric
32-16 OSPF Commands
17. Global Commands
nssa-stability-interval
This command sets the interval that an NSSA translator will continue to translate after losing the
translator election.
Syntax
nssa-stability-interval time-seconds
no nssa-stability-interval [time-seconds]
Parameters
time-seconds A period ranging from 1 to 65535 seconds.
Defaults
40 seconds.
Mode
Global Configuration.
Usage
An NSSA ABR can translate Type 7 LSAs into Type 5 LSAs. A translator election is run to
determine which one ABR for a given NSSA will translate.
When an ABR was a translator and loses this election, it will cease translating after the specified
seconds value. This allows newly translated Type 5 LSAs from the new translator to be flooded
throughout the domain before the currently translated Type 5 LSAs from this translator are
flushed and Type 5 LSAs resulting from direct translation are allowed to age out.
Example
The following example sets the nssa‐stability‐interval to 10 seconds:
matrix-x(router-config)# nssa-stability-interval 10
Matrix X Router Command Line Interface Reference Guide 32-17
18. Global Commands
poll-interval
This command specifies the interval between OSPF packets that the router sends before adjacency
is established with a neighbor.
Syntax
poll-interval time-seconds
no poll-interval [time-seconds]
Parameters
time-seconds A period ranging from 1 to 65535 seconds.
Defaults
120 seconds.
Mode
OSPF Router Configuration.
Usage
Use this command to reduce network overhead in cases where a router may have a neighbor on a
given interface at the expense of initial convergence time. The value configured here at the global
level can be overridden at the area and interface levels.
Use the no form of this command to reset the specified value to the default. Specifying a value for
time‐seconds in the no form has no effect on the configuration.
Example
The following example configures a global poll interval of 100 seconds. This value is overridden in
interface ge.4.2, where it is configured to be 110 seconds.
matrix-x(router-config)# router ospf 1
matrix-x(config-router-ospf)# poll-interval 100
matrix-x(config-router-ospf)# exit
matrix-x(router-config)# interface ge.4.2
matrix-x(config-router-if-ge.4.2)# ip ospf poll-interval 110
Related Commands
area poll-interval
ip ospf poll-interval
32-18 OSPF Commands
19. Global Commands
priority
This command specifies the priority for becoming the Designated Router (DR).
Syntax
priority level
no priority [level]
Parameters
level A priority number, ranging from 0 to 255, for becoming a DR.
Defaults
1.
Mode
OSPF Router Configuration.
Usage
Use this command to specify the priority for becoming the DR. When more than one router
attached to a network tries to become the DR, the one with the highest priority wins. If competing
routes have the same priority, the one with the highest router ID becomes the DR. The router
placing second in the election becomes the backup DR. A router with a router priority set to 0 is
ineligible to become the DR.
The value specified here at the global level can be overridden at the area and interface levels (area
priority and ip ospf priority commands).
Use the no form of this command to reset the specified value to the default. Specifying a value for
level in the no form has no effect on the configuration.
Example
The following example sets a global priority of 10 which is then overridden in area 1.2.3.4, where it
is set to 15:
matrix-x(router-config)# router ospf 1
matrix-x(config-router-ospf)# priority 10
matrix-x(config-router-ospf))# area 1.2.3.4 priority 15
Related Commands
area priority
ip ospf priority
Matrix X Router Command Line Interface Reference Guide 32-19
20. Global Commands
redistribute
This command specifies routes to import into OSPF.
Syntax
redistribute protocol [route-map name] {0-9}
no redistribute protocol [route-map name]
Parameters
protocol Protocol name for routes you want to redistribute to the current
protocol being configured. Valid choices are: aggregate, bgp, direct,
kernel, isis, ospf, ospf‐ase, rip, and static.
route‐map name (Optional) Name of a route map to apply to these routes.
{0-9} Although this command can be given multiple times, it can only be
given once to each of the nine configurable protocols. For example, if a
redistribute command is given for a protocol and route map, and then
given again for the same protocol with a different route map, the
second configuration overrides the first.
Defaults
The default is to redistribute OSPF and the direct routes associated with the interfaces on which
OSPF is running.
Note: This is an implicit default and is erased with the first redistribute configuration.
Mode
OSPF Router Configuration.
Usage
Use this command to specify routes to export to OSPF. This command causes routes from the
specified protocol to be considered for redistribution into the current protocol. Additionally, if a
route map is specified, then routes from the specified protocol matching the named route map will
be considered for redistribution into the current protocol.
If the referenced route map has not yet been configured, then an empty route map is created with
the specified name.
Note: Configuring away from the default removes the implicitly configured default. To export those
routes you must go back and specify to redistribute OSPF and direct routes after the first
redistribute configuration.
32-20 OSPF Commands
21. Global Commands
Examples
In the following example OSPF instance 2 is configured to redistribute all BGP and RIP routes:
matrix-x(router-config)# router ospf 2
matrix-x(config-router-ospf)# redistribute bgp
x-series(config-router-ospf)# redistribute rip
The following example configures a community set, set1, that permits AS:num 101:102. It then
configures an extended community set extset1, that permits Route Target AS:num 201:202.
matrix-x(router-config)# ip community-set set1 permit 101:102
matrix-x(router-config)# ip extcommunity-set ext-set1 permit rt 201:202
The two are then added to a community list, called commlist1:
matrix-x(router-config)# ip community-list commlist1 permit set1
matrix-x(router-config)# ip community-list commlist1 permit ext-set1
The community list is then applied to a route map called matchcommlist1. If the route map matches
BGP Community list commlist1, then the metric for routes is set to 20:
matrix-x(router-config)# route-map match-commlist1
matrix-x(config-route-map)# match community commlist1
matrix-x(config-route-map)# set metric 20
Finally, route map match‐commlist1 is applied to BGP routes and exported into instance 1 of OSPF:
matrix-x(router-config)# router ospf 1
matrix-x(config-router-ospf)# redistribute bgp route-map match- commlist1
In the following example, route map abc is configured with the following match criteria:
If a route matches interface ge.1.1 and a pre‐configured BGP Community labeled bgpcomm1, then
communities specified in community com‐set‐1 will be added to the route, communities specified
in community labeled com‐set‐2 will be deleted from the route, and the route metric set to 50.
matrix-x(router-config)# route-map abc
matrix-x(config-route-map)# match interface ge.1.1
matrix-x(config-route-map)# match community-set bgpcomm1
matrix-x(config-route-map)# set community-set com-set-1 additive
matrix-x(config-route-map)# set community-set com-set-2 delete
matrix-x(config-route-map)# set metric 50
This route map is then applied to static routes and exported into OSPF instance 2:
matrix-x(router-config)# router ospf 2
matrix-x(config-router-ospf)# redistribute static route-map abc
Matrix X Router Command Line Interface Reference Guide 32-21
22. Global Commands
redistribute-nssa
This command specifies routes to export to OSPF NSSA in an OSPF instance.
Syntax
redistribute-nssa protocol [route-map name] {0-9}
no redistribute-nssa protocol [route-map name]
Parameters
protocol Protocol name for routes you want to redistribute to the current
protocol being configured. Valid choices are: aggregate, bgp, direct,
isis, kernel, ospf, ospf‐ase, rip, and static.
route‐map name Name of a route map to apply to these routes.
{0‐9} Although this command can be given multiple times, it can only be
given once to each of the nine configurable protocols. For example, if a
redistribute command is given for a protocol and route map, and then
given again for the same protocol with a different route map, the
second configuration overrides the first.
Defaults
OSPF does not redistribute any routes into NSSA.
Mode
OSPF Router Configuration.
Usage
This command specifies routes to export to OSPF NSSA in an OSPF instance. It causes routes from
the specified protocol to be considered for redistribution into OSPF‐NSSA. Also, if a route map is
specified, then routes from the specified protocol matching the named route map will be
considered for redistribution into OSPF‐NSSA.
If the referenced route map has not yet been configured, then an empty route map is created with
the specified name.
Examples
In the following example, route map abc is configured to match all IPv4 prefixes (configured in
prefix list pl1), to set the exported metric to 1, and to set the NSSA Propagate (P) bit:
matrix-x(router-config)# ip prefix-list pl1 seq 1 permit 0.0.0.0/0 le 32
matrix-x(router-config)# route-map abc
matrix-x(config-route-map)# match ip address prefix-list pl1
matrix-x(config-route-map)# set metric 1
matrix-x(config-route-map)# set propagate
This route map is then applied to static routes and exported into OSPF NSSA:
matrix-x(router-config)# router ospf 1
matrix-x(config-router-ospf)# redistribute-nssa static route-map abc
32-22 OSPF Commands
23. Global Commands
require-vbit
This command instructs the spf code to require that the vbit be set in the router LSAs of routers
that are the end points of virtual links.
Syntax
require-vbit
no require-vbit
Parameters
None.
Defaults
Disabled.
Mode
OSPF Router Configuration.
Usage
When this command is not specified, the vbit can be clear, and the virtual link will still be
considered. This command is a work around for issues in some OSPF implementations.
Example
The following example turns require‐vbit on:
matrix-x(router-config)# router ospf 1
matrix-x(config-router-ospf)# require-vbit
Matrix X Router Command Line Interface Reference Guide 32-23
24. Global Commands
retransmit-interval
This command sets the interval between Link State Advertisement (LSA) retransmissions for
adjacencies.
Syntax
retransmit-interval time-seconds
no retransmit-interval [time-seconds]
Parameters
time-seconds A period ranging from 1 to 65535 seconds.
Defaults
5 seconds.
Mode
OSPF Router Configuration.
Usage
This command sets the interval between LSA retransmissions for adjacencies. If a Link State
Protocol (LSP) is not acknowledged within the interval specified with this command, it is re‐sent.
This command is specified at the global level and can be overridden in the area and interface
levels with the area retransmit‐interval and ip ospf retransmit‐interval commands.
The no form of this command resets the specified value to the default. Specifying a value for
time‐seconds in the no form has no effect on the configuration.
Example
The following example configures the global retransmit interval to be 10 seconds. This value is
then overridden in area 1.2.3.4, where it is configured to be 15 seconds.
matrix-x(router-config)# router ospf 1
matrix-x(config-router-ospf)# retransmit-interval 10
matrix-x(config-router-ospf)# area 1.2.3.4 retransmit-interval 15
Related Commands
area retransmit-interval
ip ospf retransmit-interval
32-24 OSPF Commands
25. Global Commands
router id
This command sets the OSPF 32‐bit router ID for the specified instance. The Router ID set by this
command is the lowest loopback interface IP address on the Matris X router. If no loopback
interfaces are configured, then the lowest interface IP address is chosen. Finally, if no interface IP
addresses are configured, the IP address 127.0.0.1 is chosen. Once a Router ID has been selected, it
will change only as the result of entering the no router id command or a system reboot.
Syntax
router id rid_value
no router id rid_value
Parameters
rid_value A 32‐bit address in dotted‐quad notation.
Defaults
The globally specified Router ID. If a globally specified Router ID does not exist, then the highest
IP address will be used.
Mode
OSPF Router Configuration.
Usage
If the Router ID is not specified, then the instance uses the global default router ID.
The no form of this command resets the configured router ID to its default value specified by the
globally defined Router ID.
Example
The following example configures the OSPF router ID to be 4.3.2.1.
matrix-x(router-config)# router ospf 1
matrix-x(config-router-ospf)# router id 4.3.2.1
Matrix X Router Command Line Interface Reference Guide 32-25
26. Global Commands
timers spf
This command specifies the minimum period between when OSPF receives a topology change
and when it starts the Sender Policy Framework (SPF) computation.
Syntax
timers spf time-seconds
no timers spf [time-seconds]
Parameters
time-seconds The minimum interval in seconds between SPF calculations, ranging from 1 to
65535.
Defaults
5 seconds.
Mode
OSPF Router Configuration.
Usage
The no form of this command resets the specified value to its default.
Example
The following example configures the SPF timer interval to 15 seconds:
matrix-x(router-config)# router ospf 1
matrix-x(config-router-ospf)# timers spf 15
32-26 OSPF Commands
27. Global Commands
trace file
This command specifies the file to receive tracing information, the size of the file, whether to
overwrite existing files, and the maximum number of files allowed.
Syntax
trace file file_name [max-size file_size[M | m | K | k]] [max-files num_files]
[no-timestamp] [noverwrite]
no trace file file_name [max-size file_size[M | m | K | k]] [max-files num_files]
[no-timestamp] [overwrite]
Parameters
file_name The name of the file to receive the tracing information. Note that the file
name is not specified in quotes.
max‐size (Optional) Maximum file size in bytes (by default) or megabytes or
file_size[M|m|K|k] kilobytes, ranging from 10K to 4,095,000,000 bytes. Notice that there is no
space between the file_size parameter and the unit type.
M and m both specify megabytes. K and k both specify kilobytes. If no
unit type is entered, bytes is assumed.
If no maximum file size is specified, the default is “unlimited.” The size
of a trace file is limited by the file system on which the trace file resides.
max‐files num_files (Optional) Maximum number of files allowed in the directory, ranging
from 2 to 4,294,967,295.
If no maximum number of files is specified, the default is 4,294,967,295
no-timestamp (Optional) A timestamp should not be prepended to all trace lines. The
default is to prepend a timestamp to all lines written to a trace file.
overwrite (Optional) Begin tracing by overwriting, or truncating, an existing file.
The default is to append to an existing file.
Defaults
• Disabled.
• max-size file_size: Unlimited. The size of a trace file is limited by the file system on which
the trace file resides.
• max-files num_files: 4,294,967,295 files.
• no-timestamp: Prepend a timestamp to all lines written to a trace file.
• overwrite: Append to an existing file.
Mode
OSPF Router Configuration.
Matrix X Router Command Line Interface Reference Guide 32-27
28. Global Commands
Usage
This command specifies the file to receive tracing information for all OSPF events. The specific
events that are traced are controlled by the trace flag command. The trace file command is also
associated with each protocol, so that data pertaining to a single protocol can be written to its own
file.
On the Matrix X Router, trace files are stored in the /var/trace directory. When entering a trace file
name, specify only the file name, not the complete path. Trace files are not persistent across system
reboots.
The no form of this command disables tracing.
Command options are governed by the following rules:
• The max‐size option specifies a maximum size of the trace file which can be specified in
megabytes by giving ‘M’ or ‘m’ (without a leading space), or it can be specified in kilobytes by
giving ʹKʹ or ʹkʹ. If you specify no units, the size is assumed to be in bytes. When the maximum
file size is reached, the file is closed and renamed to fname.0, then fname.1, and so on, until the
maximum number of files specified by the max‐files option is reached.
• The max‐files option specifies the maximum number of files allowed in the specified directory
with a default of 4,294,967,295 files.
• The no‐timestamp option disables the pre‐pending of a timestamp to all lines written to the
trace file.
• The overwrite option specifies whether to start tracing by truncating or appending to an
existing file.
These options are not cumulative across multiple commands. Consider the following example:
matrix-x(config-router-ospf)# trace file ospf.log no-timestamp
matrix-x(config-router-ospf)# trace file ospf.log max-files 10
The option given in the second command completely replaces that given in the first. In order to
specify both no‐timestamp and max‐files 10, they must be entered on the same line as follows:
matrix-x(config-router-ospf)# trace file ospf.log max-files 10 no-timestamp
Example
In the following example, OSPF tracing is written to the file /var/trace/ospf.log. The maximum size
of the file is configured to be 1024 KB, and the maximum number of files permitted is 4. When the
file reaches 1 megabyte in size (the maximum size in this configuration), the file is renamed to
ospf.log.0, and ospf.log is re‐created. This continues until four log files exist (the maximum allowed
in this configuration). No timestamp will display at the beginning of the trace lines.
matrix-x(router-config)# router ospf 1
matrix-x(config-router-ospf)# trace file ospf.log max-size 1024k max-files 4 no-
timestamp
32-28 OSPF Commands
29. Global Commands
trace flag
This command sets OSPF‐specific tracing options as well as options common across all protocols.
Each flag must reside on its own configuration line, that is, you cannot specify to trace both task
and policy packets in the same command.
Syntax
trace flag {route | normal | state | policy | task | timer | all} |{db | ospf-
state | drelect | spf | flood | debug} | {packets | hello | dd | lsr | lsu | lsa
[send | receive | send-receive] [detail]}
no trace flag {route | normal | state | policy | task | timer | all} |{db | ospf-
state | drelect | spf | flood | debug} | {packets | hello | dd | lsr | lsu | lsa
[send | receive | send-receive] [detail]}
Parameters
The following tracing flags are common to all protocols. They cannot be associated with a send,
receive, or send‐receive action item. Similarly, you cannot specify to show detailed data when
tracing these flags
The following tracing flag is common to all protocols. It cannot be associated with a send,
receive, or send‐receive action item. Similarly, you cannot specify showing detailed data when
tracing all.
route Trace routing table changes for routes installed by this protocol or peer.
normal Trace normal protocol occurrences. Note: Abnormal protocol occurrences are
always traced.
state Trace state machine transition in the protocol.
policy Trace the application of protocol and user‐specified policy to routes being
imported or exported.
task Trace system interface and processing associated with this protocol.
timer Trace timer usage by this protocol.
all Turns on all trace flags.
The following OSPF‐specific flags cannot be associated with the send, receive, or send‐receive
action items:
db Trace the link‐state database operations.
ospf‐state Trace OSPF state change information.
drelect Trace the Designated Router operations.
spf Trace the Shortest Path First (SPF) calculations.
flood Trace the flooding procedure.
debug Trace OSPF at the debugging level of detail.
The following OSPF‐specific flags can be associated with the send, receive, or send‐receive action
items:
packets Trace all OSPF link‐state packets.
hello Trace OSPF hello packets, which are used to determine neighbor reachability.
Matrix X Router Command Line Interface Reference Guide 32-29
30. Global Commands
dd Trace OSPF Database Description (DD) packets, which are used in
synchronizing OSPF databases.
lsr Trace OSPF link‐state request packets, which are used in synchronizing OSPF
databases.
lsu Trace OSPF link‐state update packets, which are used in synchronizing OSPF
databases.
lsa Trace OSPF link‐state acknowledgement packets, which are used in
synchronizing OSPF databases.
These optional action items specify whether to limit the tracing to packets as follows:
send Optionally specify to limit tracing for packets sent.
receive Optionally specify to limit tracing for packets received.
send‐receive Optionally specify to limit tracing for packets sent and received.
detail Optionally specify to use a more verbose format when displaying information
about the contents of packets instead of one or two lines.
Mode
OSPF Router Configuration.
Usage
Use the trace flag command to specify tracing flags for OSPF tracing. Each flag must reside on its
own configuration line. For example, you cannot specify to trace both task and policy packets in
the same command. On the Matrix X Router, trace files are stored in the /var/trace directory. When
entering a trace file name, specify only the file name, not the complete path. Trace files are not
persistent across system reboots.
Defaults
No flags to be explicitly configured.
Example
In the following example, trace flags specify that both the sent and received link state request and
hello messages are traced in detail. This tracing data will be written to the file /var/trace/ospf.log.
matrix-x(router-config)# router ospf 1
matrix-x(config-router-ospf)# trace file ospf max-size 1024k
matrix-x(config-router-ospf)# trace flag lsr send-receive detail
matrix-x(config-router-ospf)# trace flag hello send-receive detail
32-30 OSPF Commands
31. Global Commands
transmit-delay
This command specifies the time in seconds required to transmit a link state update.
Syntax
transmit-delay time-seconds
no transmit-delay [time-seconds]
Parameters
time-seconds An interval ranging from 1 to 65535 seconds.
Defaults
1 second.
Mode
OSPF Router Configuration.
Usage
This command sets the estimated time in seconds required to transmit a link state update. It takes
into account transmission and propagation delays and must be greater than 0. The transmit delay
is specified here at the global level. It can be overridden at the area and interface levels (area
transmit‐delay and ip ospf transmit‐delay) as well as within a virtual link (area virtual‐link).
The no form of this command resets the specified value to the default. Specifying a value for time‐
seconds in the no form has no effect on the configuration.
Example
The following example configures a global transmit delay of 5 seconds. This value is then
overridden in area 1.2.3.4 to be 3 seconds.
matrix-x(router-config)# router ospf 1
matrix-x(config-router-ospf)# transmit-delay 5
matrix-x(config-router-ospf)# area 1.2.3.4 transmit-delay 3
Matrix X Router Command Line Interface Reference Guide 32-31
32. Area Commands
Area Commands
The area commands are listed below.
For information about... Refer to page...
area advertise-subnet 32-33
area authentication 32-34
area dead-interval 32-36
area hello-interval 32-37
area nssa 32-38
area nssa-range 32-39
area nssa-translate-always 32-40
area poll-interval 32-41
area priority 32-42
area range 32-43
area retransmit-interval 32-44
area stub 32-45
area stubhost 32-46
area stubnetwork 32-47
area transmit-delay 32-48
area virtual-link 32-49
32-32 OSPF Commands
33. Area Commands
area advertise-subnet
This command specifies whether OSPF will, when advertising point‐to‐point interfaces, advertise
the network number and netmask instead of a host route to the remote IP.
Syntax
area area_id advertise-subnet
no area area_id advertise-subnet
Parameters
area_id An ID for an area specified as an IP address in dotted‐quad format. A value of
0.0.0.0 means that the area is a backbone.
Defaults
Disabled.
Mode
OSPF Router Configuration.
Usage
Use this command to specify whether OSPF will, when advertising point‐to‐point interfaces,
advertise the network number and netmask instead of a host route to the remote IP. Because the
netmask is sometimes set improperly on point‐to‐point interfaces, this option is disabled by
default.
Configuring this command in an area overrides a global advertise‐subnet command. Similarly,
this command can be overridden in an interface command.
Examples
The following example turns advertise‐subnet on for area 1.2.3.4 and off for interface ge.1.1 in the
same area:
matrix-x(router-config)# router ospf 1
matrix-x(config-router-ospf)# area 1.2.3.4 advertise-subnet
matrix-x(config-router-ospf)# exit
matrix-x(router-config)# interface ge.1.1
matrix-x(router-config-if-ge.1.1)# no ip ospf advertise-subnet
Related Commands
advertise-subnet
ip ospf advertise-subnet
Matrix X Router Command Line Interface Reference Guide 32-33
34. Area Commands
area authentication
This command specifies the type of OSPF authentication used and any key values.
Syntax
area area-id authentication {simple key]} | {md5 id_number md5_key [start-generate
date_time] [stop-generate date_time] [start-accept date_time] [stop-accept
date_time]}
no area area-id authentication {simple key | md5 id_number}
Parameters
area-id An ID for OSPF area to be authenticated, expressed as an IP
address in dotted‐quad format. A value of 0.0.0.0 means the area
is a backbone.
simple key Specifies simple (clear password} authentication. The value for
key is specified as a one‐ to eight‐character string.
md5 id_number md5_key Specifies the authentication used for specifying MD5
cryptographic authentication. The value for id_number is an
number from 1 to 255. The value for md5_key is a one‐ to sixteen‐
character string.
start‐generate date_time (Optional) The start and stop values must be in the format:
YYYY‐MM‐DD.HH.MM. Each start and stop value is optional,
stop‐generate date_time
and order is not important when specifying multiple
start‐accept date_time commands.
stop‐accept date_time
Defaults
No authentication.
Mode
OSPF Router Configuration.
Usage
Authentication can help to guarantee that routing information is imported only from trusted
routers. A variety of authentication schemes can be used, but a single scheme must be configured
for each network. The use of different schemes enables some interfaces to use much stricter
authentication than others. The two authentication schemes available are simple, and MD5.
Authentication is used by OSPF to generate and verify the authentication field in the OSPF header.
The area authentication command specifies the type of authentication and key values used in
OSPF. The negative form of this command removes authentication for the area.
The global authentication is the default and can be overridden here in the area command.
Similarly, this command can be overridden at the interface level.
32-34 OSPF Commands
35. Area Commands
When you want to keep certain routers from exchanging OSPF packets, use the simple form of
authentication. The interfaces that the packets are to be sent on still need to be trusted, because the
key will be placed in the packets and can be seen by anyone with access to the network.
When you do not trust other users of your network, use MD5 authentication. The system works by
using shared secret keys. Because keys are used to sign the packets with an MD5 checksum, they
cannot be forged or tampered with and because they are not included in the packet, snooping the
key is not possible. Network users can still snoop the contents of packets, though, because packets
are not encrypted.
The Matrix X MD5 authentication is compliant with the specification in OSPF RFC 2328. This
specification uses the MD5 algorithm and an authentication key of up to 16 characters. RFC 2328
allows multiple MD5 keys per interface. Each key has two associated time ranges.
In order to turn off authentication, you must include the authentication type in the no form of the
command. For example, if MD5 authentication was configured, then simply specifying no area
authentication will not work. In addition, you must specify the simple key when turning off
simple authentication, and you must specify the MD5 id_number when turning off MD5
authentication.
Examples
The following example configures simple authentication in OSPF instance 1:
matrix-x(router-config)# router ospf 1
matrix-x(config-router-ospf)# area 1.2.3.4 authentication simple abc
The following example configures MD5 authentication for OSPF area 1.2.3.4. The ID for this MD5
configuration is 1, and the key is configured as bar.
matrix-x(router-config)# router ospf 2
matrix-x(config-router-ospf)# area 1.2.3.4 authentication md5 1 bar
The following example turns off the MD5 authentication that was configured in the previous
example. Note that you need not specify the MD5 key, but must specify the MD5 ID.
matrix-x(router-config)# router bgp ospf 2
matrix-x(config-router-ospf)# no area 1.2.3.4 authentication md5 1
The following example configures MD5 authentication for OSPF instance 3. MD5 authentication is
configured with a start‐generate time of January 2, 2005 at 9:30 p.m., a stop‐generate time of
January 2, 2005 at 9:45 p.m., a start‐accept time set to January 2, 2005 at 9:00 p.m, and a stop‐accept
time set to January 2, 2005 at 10:00 p.m.
matrix-x(router-config)# router ospf 3
matrix-x(config-router-ospf)# area 1.1.1.1 authentication md5 2 md5 start-
generate 2005-01-02.21.30 stop-generate 2005-01-02.21.45 start-accept 2005-01-
02.21.00 stop-accept 2005-01-02.22.00
Related Commands
authentication
ip ospf authentication
Matrix X Router Command Line Interface Reference Guide 32-35
36. Area Commands
area dead-interval
This command specifies the interval that can elapse without receiving a router’s hello packets
before the router’s neighbors will declare it down.
Syntax
area area_id dead-interval time-seconds
no area area_id dead-interval [time-seconds]
Parameters
area_id An ID for an area specified as an IP address in dotted‐quad format. A value of
0.0.0.0 means the area is a backbone.
time-seconds An integer ranging from 1 to 65535 seconds.
Mode
OSPF Router Configuration.
Defaults
40 seconds.
Usage
Use this command to specify the interval that can elapse without receiving a router’s hello packets
before the router’s neighbors will declare it down. It is specified here at the area level, and it can be
overridden in the equivalent interface command, ip ospf dead‐interval.
Generally speaking, this value should be equal to four times the HELLO interval. (Refer to the area
hello‐interval command.) Do not set this value to less than the HELLO interval because
convergence will not occur.
Use the no form of this command to reset the specified value to the default. Specifying a value for
time‐seconds in the no form has no effect on the configuration.
Example
The following example configures a dead‐interval of 80 seconds for area 1.2.3.4, and a dead‐
interval of 60 seconds on interface ge.1.1:
matrix-x(router-config)# router ospf 1
matrix-x(config-router-ospf)# area 1.2.3.4 dead-interval 80
matrix-x(config-router-ospf)# exit
matrix-x(router-config)# interface ge.1.1
matrix-x(router-config-if-ge.1.1)# ip ospf dead-interval 60
Related Commands
dead-interval
ip ospf dead-interval
32-36 OSPF Commands
37. Area Commands
area hello-interval
This command specifies the interval between Hello packets that the router sends.
Syntax
area area_id hello-interval time-seconds
no area area_id hello-interval [time-seconds]
Parameters
area_id An ID for an area specified as an IP address in dotted‐quad format. A value of
0.0.0.0 means the area is a backbone.
time-seconds An integer ranging from 1 to 65535 seconds.
Mode
OSPF Router Configuration.
Defaults
10 seconds.
Usage
Use this command to specify the interval between Hello packets that the router sends. It is
specified here at the area level, and it can be overridden in the equivalent interface command.
(Refer to ip ospf hello‐interval). A general rule for configuring this value is that it should be equal
to one fourth the dead interval. (Refer to area dead‐interval.) This value should never be less than
the dead interval value.
Use the no form of this command resets the specified value to the default. Specifying a value for
time‐seconds in the no form has no effect on the configuration.
Example
The following example configures a hello interval of 20 seconds for area 1.2.3.4, and a hello
interval of 15 seconds on interface ge.1.1:
matrix-x(router-config)# router ospf 1
matrix-x(config-router-ospf)# area 1.2.3.4 hello-interval 20
matrix-x(config-router-ospf)# exit
matrix-x(router-config)# interface ge.1.1
matrix-x(router-config-if-ge.1.1)# ip ospf hello-interval 15
Related Commands
hello-interval
ip ospf hello-interval
Matrix X Router Command Line Interface Reference Guide 32-37
38. Area Commands
area nssa
This command configures a Not So Stubby Area (NSSA).
Syntax
area area-id nssa [metric] [metric-type]
no area area-id nssa
Parameters
area_id NSSA area expressed in as an IP address in dotted‐quad format. A value of
0.0.0.0 means the area is a backbone.
metric (Optional) The default OSPF metric, ranging from 1 to 65535. If area nssa is
configured, then this value defaults to 1.
metric-type (Optional) Specify 1 or 2 as the default metric type. Routes exported from the
routing table into OSPF default to becoming Type 1 ASEs. If area nssa is
configured, then this value defaults to 1.
Mode
OSPF Router Configuration.
Defaults
Non‐stub, non‐NSSA. If area nssa is set, the default metric is 1 and the default metric type is 1.
Usage
Use this command to configure an area as a NSSA. External routes that are not imported into an
NSSA can be represented by means of a default route. It is used when an OSPF inter‐network is
connected to multiple non‐OSPF routing domains.
Using the no form of this command changes the NSSA back to a plain area.
If the router is an ABR and has the highest router ID of all the ABRs in the area, and no other ABR
in the area is configured to translate always, it will translate Type 7 LSAs with the P‐bit (set by the
propagate flag in an export command) to Type 5 LSAs. When an ABR that was translating loses a
translator election, it will cease translating, and after a number of seconds (determined by nssa‐
stability‐ interval), it will flush any Type 5 LSAs resulting from aggregation. Any Type 5 LSAs
resulting from direct translation of Type 7 LSAs will be allowed to age out.
An ABR will always originate a default route into any attached NSSAs. The metric of this default
route can be specified in the command and defaults to 1. If there are any filters for the NSSA, the
default will be Type 3 LSA.
Note: NSSA and Stub are mutually exclusive.
Example
The following example changes the default metric type to 2:
matrix-x(router-config)# router ospf 1
32-38 OSPF Commands
39. Area Commands
matrix-x(config-router-ospf)# area 1.2.3.4 nssa 10 2
area nssa-range
This command specifies the network ranges that should be translated into Type 5 LSas from NSSA
Type 7 LSAs.
Syntax
area area_id nssa-range ip_address mask [no-advertise]
no area area_id nssa-range ip_address mask [no-advertise]
Parameters
area_id An ID for an area specified as IP address in dotted‐quad format. A value of
0.0.0.0 means the area is a backbone.
ip_address The IPv4 address associated with this range.
mask The network mask for the specified IP address.
no-advertise (Optional) Sets the address range status to DoNotAdvertise. The Type 3
summary LSA will not be suppressed, and the component networks will
remain hidden from other networks.
Mode
OSPF Router Configuration.
Defaults
NSSA net ranges are not configured by default.
Usage
Use this command to specify the network ranges that should be translated into Type 5 LSas from
NSSA Type 7 LSAs. The default behavior is to translate Type 7 LSas that do not fall within a
configured net range.
This command is valid only in an NSSA. It will be ignored when configured in a non‐NSSA.
Example
The following example configures an NSSA range on address 192.168.110.0 with a mask of
255.255.0.0:
matrix-x(router-config)# router ospf 1
matrix-x(config-router-ospf)# area 1.2.3.4 nssa-range 192.168.110.0 255.255.0.0
Matrix X Router Command Line Interface Reference Guide 32-39
40. Area Commands
area nssa-translate-always
This command allows an Area Border Router (ABR) to always translate Type 7 LSAs into Type 5
LSAs for the specified area.
Syntax
area area_id nssa-translate-always
no area area_id nssa-translate-always
Parameters
area_id NSSA area expressed as an IP address in dotted‐quad format. A value of
0.0.0.0 means the area is a backbone.
Mode
OSPF Router Configuration.
Defaults
Disabled.
Usage
Use this command to allow an ABR to always translate Type 7 LSAs into Type 5 LSAs for the
specified area. Ordinarily, a translator election is run to determine which on ABR for a given
NSSA will translate. But this option allows an ABR to always translate Type 7 LSAs into Type 5
LSAs for the containing area. If an ABR is configured to always translate, then no other ABR will
translate unless it is also configured to always translate.
Example
The following example configures area 1.2.3.4 to always translate Type 7 LSAs into Type 5 LSAs.
matrix-x(router-config)# router ospf 1
matrix-x(config-router-ospf)# area 1.2.3.4 nssa-translate-always
32-40 OSPF Commands
41. Area Commands
area poll-interval
This command specifies the interval between OSPF packets that the router sends before adjacency
is established with a neighbor.
Syntax
area area_id poll-interval time-seconds
no area area_id poll-interval [time-seconds]
Parameters
area_id An ID for an area specified as an IP address in dotted‐quad format. A value
of 0.0.0.0 means that the area is a backbone.
time‐seconds The poll interval, ranging from 1 to 65535 seconds.
Mode
OSPF Router Configuration.
Defaults
120 seconds.
Usage
Use this command to specify the interval between OSPF packets that the router sends before
adjacency is established with a neighbor. Utilizing this command reduces network overhead in
cases where a router may have a neighbor on a given interface at the expense of initial
convergence time.
Specifying a poll interval for an area overrides the default configured poll interval. Similarly, an
interface‐specific poll interval overrides a value configured here.
Use the no form of this command to reset the configured time‐seconds to the default. Specifying a
value for time‐seconds in the no form has no effect on the configuration.
Examples
The following example configures an area poll interval of 100 seconds. This value is overridden in
interface ge.1.1, where it is configured to be 110 seconds.
matrix-x(router-config)# router ospf 1
matrix-x(config-router-ospf)# area 1.2.3.4 poll-interval 100
matrix-x(config-router-ospf)# exit
matrix-x(router-config)# interface ge.1.1
matrix-x(router-config-if-ge.1.1)# ip ospf poll-interval 110
Related Commands
poll-interval
ip ospf poll-interval
Matrix X Router Command Line Interface Reference Guide 32-41
42. Area Commands
area priority
This command specifies the priority for becoming the Designated Router (DR).
Syntax
area area_id priority level
no area area_id priority [level]
Parameters
area_id An ID for an area specified as an IP address in dotted‐quad format. A value
of 0.0.0.0 means the area is a backbone.
level A priority number, ranging from 0 to 255, for becoming a DR. A priority of 0
indicates that the router is ineligible to become the DR.
Mode
OSPF Router Configuration.
Defaults
1.
Usage
Use this command to specify the priority for becoming the DR. The priority specified at the area
level can be overridden at the interface level. When more than one router attached to a network
attempts to become the DR, the one with the highest priority wins. If the competing routers have
the same priority, the one with the highest router ID becomes the DR. The router coming in second
in the election becomes the backup DR. A router with a priority set to 0 is ineligible to become the
DR.
Note: This command applies only to broadcast or NBMA media.
Use the no form of this command to reset the configured value to its default. Specifying a value for
level in the no form has no effect on the configuration.
Example
The following example configures an area priority of 10. It also sets the priority for interface ge.1.1
to be 5:
matrix-x(router-config)# router ospf 1
matrix-x(config-router-ospf)# area 1.2.3.4 priority 10
matrix-x(config-router-ospf)# exit
matrix-x(router-config)# interface ge.1.1
matrix-x(router-config-if-ge.1.1)# ip ospf priority 5
Related Commands
priority
32-42 OSPF Commands
43. Area Commands
ip ospf priority
area range
This command configures the scope of an area on an Area Border Router (ABR).
Syntax
area area_id range ip_address mask [no-advertise]
no area area_id range ip_address mask [no-advertise]
Parameters
area_id The area ID, specified as an IP address in dotted‐quad format. A value of
0.0.0.0 means the area is a backbone.
ip_address IPv4 address associated with this range.
mask Network mask of the specified IP address.
no-advertise Optional. Sets the address range status to DoNotAdvertise. Type 3 summary
LSAs will not be suppressed, and component networks will remain hidden
from other networks.
Defaults
Not explicitly configured.
Mode
OSPF Router Configuration.
Usage
Use this command to define the range of addresses to be used by an ABR when it communicates
routes to other areas. Intra‐area LSAs that fall within the specified ranges are not advertised into
other areas as inter‐area routes. Instead, the specified ranges are advertised as summary network
LSAs.
If no‐advertise is specified, the summary network LSAs and all LSAs within the range are not
advertised. Intra‐area LSAs that do not fall into any range are also advertised as summary
network LSAs.
On well‐designed networks, this command reduces routing data overhead propagated between
areas. The entries in this command can be either networks or subnetwork/mask‐length pairs.
Specifying the command on a non‐ABR will have no effect.
Use the no form of this command to remove the configured summarization.
Example
The following example configures an area range on address 192.168.0.0 with a mask of 255.255.0.0:
matrix-x(router-config)# router ospf 1
matrix-x(config-router-ospf)# area 1.2.3.4 range 192.168.0.0 255.255.0.0
Matrix X Router Command Line Interface Reference Guide 32-43
44. Area Commands
area retransmit-interval
This command specifies the interval between Link State Advertisement (LSA) retransmissions for
adjacencies.
Syntax
area area_id retransmit-interval time-seconds
no area area_id retransmit-interval [time-seconds]
Parameters
area_id An ID for an area specified as an IP address in dotted‐quad format. A value
of 0.0.0.0 means the area is a backbone.
time-seconds The retransmit interval, ranging from 1 to 65535 seconds.
Mode
OSPF Router Configuration.
Defaults
5 seconds.
Usage
Use this command to specify the interval between LSA retransmissions for adjacencies. If a Link
State Protocol (LSP) is not acknowledged within the specified period, then it is re‐sent. This setting
is another convergence/network traffic trade‐off.
This command overrides the global retransmit interval and can be overridden at the interface
level.
Use the no form of this command to reset the specified value to its default. Specifying a value for
time‐ seconds in the no form has no effect on the configuration.
Example
The following example configures the retransmit interval for area 1.2.3.4 at 10 seconds. This value
is then overridden in interface ge.1.1, where it is set to 7 seconds.
matrix-x(router-config)# router ospf 1
matrix-x(config-router-ospf)# area 1.2.3.4 retransmit-interval 10
matrix-x(config-router-ospf)# exit
matrix-x(router-config)# interface ge.1.1
matrix-x(router-config-if-ge.1.1)# ip ospf retransmit-interval 7
Related Commands
retransmit-interval
ip ospf retransmit-interval
32-44 OSPF Commands
45. Area Commands
area stub
This command configures an area as a stub area where there are no Autonomous System External
(ASE) or NSSA routes.
Syntax
area area_id stub [metric]
no area area_id stub [metric]
Parameters
area_id An ID for an area specified as an IP address in dotted‐quad format. A value
of 0.0.0.0 means the area is a backbone.
metric Metric for the stub area, ranging from 1 to 65535. If a stub area is
configured, then this value defaults to 1.
Mode
OSPF Router Configuration.
Defaults
• No stub areas are explicitly configured.
• Metric: 1
Usage
Use this command to configure an area as a stub area. A stub area is one in which there are no ASE
or NSSA routes. Each router in the area must specify that the area is a stub, or adjacencies will not
form. If a metric is specified, then it is used to inject a default route into the area with the specified
value originating from this router. A metric value should only be specified on an ABR. It is
possible to use stub on multiple ABRs and give them different metrics.
Note: NSSA and stub areas are mutually exclusive.
Use the no form of this command to remove the configured stub area.
Example
The following example configures area 4.3.2.1 as a stub area with a metric of 15:
matrix-x(router-config)# router ospf
matrix-x(config-router-ospf)# area 4.3.2.1 stub 15
Matrix X Router Command Line Interface Reference Guide 32-45
46. Area Commands
area stubhost
This command specifies directly attached hosts that should be advertised as reachable from the
router and the metrics with which they should be advertised.
Syntax
area area_id stubhost ip_address metric_value
no area area_id stubhost ip_address metric_value
Parameters
area_id An ID for an area specified as an IP address in dotted‐quad format. A value
of 0.0.0.0 means the area is a backbone.
ip_addres The address of the host to be advertised.
metric_value Metric to be advertised for the host, ranging from 1 to 65535. If a stubhost is
configured, then this value defaults to 1.
Mode
OSPF Router Configuration.
Defaults
• The area stubhost command is not explicitly configured.
• Metric: 1
Usage
Use this command to specify directly attached hosts that should be advertised as reachable from
the router and the metrics with which they should be advertised. Point‐to‐point interfaces on
which it is not desirable to run OSPF should be specified here. It is also useful to assign an
additional address to the loopback interface (one not on the 127 network) and advertise it as a
stubhost.
If this address is the same as the router ID, it enables routing to OSPF routers by router ID instead
of by interface address. Routing by router ID is more reliable than routing to one of the router’s
interface addresses, which may not always be reachable.
Note: This command is identical to area stubnetwork in function except that a 32-bit mask is
assumed.
Use the no form of this command removes the configured stubhost.
Example
The following example configures a single stubhost, 192.1.1.1 with a metric of 2 in area 1.2.3.4:
matrix-x(router-config)# router ospf 1
matrix-x(config-router-ospf)# area 1.2.3.4 stubhost 192.1.1.1 2
32-46 OSPF Commands