Dasan V5808 User manual

V5808
GPON OLT system
User Manual

UMN:CLI User Manual
V5808
2
※Copyright 2017 ⓒDASAN Network Solutions, Inc.
Issued by Technical Documentation Team
Korea
Technical modifications possible.
Technical specifications and features are binding only insofar as
they are specifically and expressly agreed upon in a written contract.

User Manual UMN:CLI
V5808
3
Issue History
Issue
Number
Date
Update
-
05/2017
Initial release (NOS version 1.01 #0006)
Contents of update
Initial contents

UMN:CLI User Manual
V5808
4
Contents
1Introduction.......................................................................................32
1.1 Audience.............................................................................................32
1.2 Document Structure.............................................................................32
1.3 Document Convention.........................................................................33
1.4 Document Notation..............................................................................33
1.5 Virus Protection...................................................................................34
1.6 GPL/LGPLWarranty and Liability Exclusion........................................34
2System Overview ..............................................................................36
2.1 System Features.................................................................................37
3Command Line Interface (CLI).........................................................40
3.1 Configuration Mode.............................................................................40
3.1.1 Privileged EXEC View Mode...................................................................... 40
3.1.2 Privileged EXEC Enable Mode .................................................................. 41
3.1.3 Global Configuration Mode ........................................................................ 41
3.1.4 Bridge Configuration Mode ........................................................................ 42
3.1.5 DHCP Pool Configuration Mode ................................................................ 43
3.1.6 DHCP Option Configuration Mode............................................................. 43
3.1.7 DHCP Option 82 Configuration Mode........................................................ 43
3.1.8 Interface Configuration Mode..................................................................... 44
3.1.9 IP Tunnel Configuration Mode.................................................................... 44
3.1.10 Rule Configuration Mode ........................................................................... 45
3.1.11 RMON Configuration Mode........................................................................ 45
3.1.12 Router Configuration Mode........................................................................ 46
3.1.13 Route-Map Configuration Mode................................................................. 46
3.1.14 GPON Configuration Mode........................................................................ 47
3.1.14.1 GPON-OLT Configuration Mode....................................................................47
3.1.14.2 ONU Profile Configuration Mode ...................................................................47
3.2 Configuration Mode Overview.............................................................49
3.3 Useful Tips ..........................................................................................50
3.3.1 Listing Available Command........................................................................ 50
3.3.2 Calling Command History .......................................................................... 52
3.3.3 Using Abbreviation ..................................................................................... 54
3.3.4 Using Command of Privileged EXEC Enable Mode .................................. 54
3.3.5 Exit Current Command Mode .................................................................... 54
3.3.6 The Command Execution Limit.................................................................. 55
4System Connection and IP Address................................................56
4.1 System Connection.............................................................................56
4.1.1 System Login ............................................................................................. 56
4.1.2 Password for Privileged EXEC Enable Mode............................................ 56
4.1.3 Changing Login Password......................................................................... 57
4.1.4 Login Password Recovery Process ........................................................... 58
4.1.5 Management for System Account.............................................................. 59
4.1.5.1 Creating System Account...............................................................................59
4.1.5.2 Security Level................................................................................................59
4.1.6 Limiting the Number of Users .................................................................... 63

User Manual UMN:CLI
V5808
5
4.1.7 Limiting the Number of login attemps .........................................................64
4.1.8 Auto Log-out................................................................................................64
4.1.9 Telnet Access..............................................................................................65
4.1.10 IP Login Delay.............................................................................................66
4.1.11 System Rebooting.......................................................................................66
4.1.11.1 Manual System Rebooting.............................................................................66
4.1.11.2 System Rebooting Scheduler.........................................................................67
4.1.12 Auto Reset Configuration............................................................................68
4.1.12.1 CPU Load.......................................................................................................68
4.1.12.2 Memory..........................................................................................................68
4.2 System Authentication.........................................................................70
4.2.1 Authentication Method ................................................................................70
4.2.2 Authentication Interface ..............................................................................70
4.2.3 PrimaryAuthentication Method...................................................................71
4.2.4 RADIUS Server...........................................................................................71
4.2.4.1 RADIUS Server for System Authentication ....................................................71
4.2.4.2 RADIUS Server Priority..................................................................................71
4.2.4.3 Timeout of Authentication Request.................................................................72
4.2.4.4 Frequency of Retransmit................................................................................72
4.2.5 TACACS+ Server........................................................................................72
4.2.5.1 TACACS+ Server for System Authentication..................................................72
4.2.5.2 TACACS+ Server Priority...............................................................................72
4.2.5.3 Timeout of Authentication Request.................................................................73
4.2.5.4 Additional TACACS+ Configuration................................................................73
4.2.6 Accounting Mode ........................................................................................74
4.2.7 Displaying System Authentication...............................................................74
4.3 Configuring Interface ...........................................................................75
4.3.1 Enabling Interface.......................................................................................75
4.3.2 Assigning IP Address to Network Interface.................................................75
4.3.3 Static Route and Default Gateway..............................................................76
4.3.4 Interface Description...................................................................................77
4.3.5 Displaying Interface ....................................................................................78
4.3.6 Interface Identifier .......................................................................................78
4.3.7 Enabling Interface Overlapping ..................................................................78
4.4 Assigning an IPv6 Address..................................................................80
4.4.1 Enabling Interface.......................................................................................82
4.4.2 Assigning IPv6 Address to Network Interface.............................................83
4.4.3 Assigning Link Local Address to Network Interface....................................84
4.4.4 Static Route and Default Gateway..............................................................84
4.4.5 Enabling IPv6 Processing...........................................................................86
4.4.6 IPv6 Interface Mode....................................................................................86
4.4.7 Displaying Interface ....................................................................................87
4.5 Secure Shell (SSH)..............................................................................88
4.5.1 SSH Server.................................................................................................88
4.5.1.1 Enabling SSH Server.....................................................................................88
4.5.1.2 Displaying On-line SSH Client........................................................................88
4.5.1.3 Disconnecting SSH Client..............................................................................88
4.5.1.4 Assigning Specific Authentication Key............................................................88
4.5.1.5 Displaying Connection History of SSH Client.................................................89
4.5.2 SSH Client...................................................................................................89

UMN:CLI User Manual
V5808
6
4.5.2.1 Login to SSH Server......................................................................................89
4.5.2.2 Secured File Copy.........................................................................................89
4.5.2.3 Authentication Key.........................................................................................89
4.6 802.1x Authentication..........................................................................90
4.6.1 802.1x Authentication................................................................................. 92
4.6.1.1 Enabling 802.1x.............................................................................................92
4.6.1.2 RADIUS Server..............................................................................................92
4.6.1.3 Authentication Mode......................................................................................93
4.6.1.4 Authentication Port ........................................................................................94
4.6.1.5 Force Authorization........................................................................................94
4.6.1.6 Interval for Retransmitting Request/Identity Packet.......................................94
4.6.1.7 Interval of Authentication................................................................................94
4.6.1.8 Number of Requests to RADIUS Server........................................................95
4.6.1.9 Interval of Request to RADIUS Server...........................................................95
4.6.2 802.1x Re-Authentication........................................................................... 95
4.6.2.1 Enabling 802.1x Re-Authentication................................................................95
4.6.2.2 Interval of Re-Authentication..........................................................................96
4.6.2.3 Interval of Requesting Re-Authentication ......................................................96
4.6.2.4 802.1x Re-Authentication...............................................................................96
4.6.3 Initializing Authentication Status................................................................. 97
4.6.4 Restoring Default Value ............................................................................. 97
4.6.5 Displaying 802.1x Configuration ................................................................ 97
4.6.6 802.1x User Authentication Statistics......................................................... 97
4.6.7 Sample Configuration................................................................................. 98
5Port Configuration ............................................................................99
5.1 Ethernet Port Configuration.................................................................99
5.1.1 Enabling Ethernet Port............................................................................... 99
5.1.2 Auto-Negotiation ........................................................................................ 99
5.1.3 Transmit Rate........................................................................................... 100
5.1.4 Duplex Mode............................................................................................ 100
5.1.5 Flow Control............................................................................................. 100
5.1.6 Port Description........................................................................................ 101
5.1.7 Network Service Port ............................................................................... 101
5.1.8 L2 Port Bridge .......................................................................................... 101
5.1.9 Port Crossover ......................................................................................... 102
5.1.10 Traffic Statistics ........................................................................................ 102
5.1.10.1 Packet Statistics...........................................................................................102
5.1.10.2 CPU Statistics..............................................................................................103
5.1.10.3 Protocol Statistics ........................................................................................104
5.1.11 Port Information........................................................................................ 104
5.1.12 Port Debounce Timer............................................................................... 105
5.2 Port Mirroring ....................................................................................106
6System Environment ......................................................................109
6.1 Environment Configuration................................................................109
6.1.1 Host Name ............................................................................................... 109
6.1.2 Time and Date.......................................................................................... 109
6.1.3 Time Zone.................................................................................................110
6.1.4 Network Time Protocol (NTP) ...................................................................111

User Manual UMN:CLI
V5808
7
6.1.5 Simple Network Time Protocol (SNTP).....................................................112
6.1.6 Terminal Configuration..............................................................................113
6.1.7 Login Banner.............................................................................................113
6.1.8 DNS Server...............................................................................................114
6.1.9 Fan Operation...........................................................................................115
6.1.10 Enabling FTP/TFTP Connection...............................................................115
6.1.11 Disabling Daemon Operation....................................................................116
6.1.12 FTP Bind Address.....................................................................................116
6.1.13 System Threshold.....................................................................................117
6.1.13.1 CPU Load.....................................................................................................117
6.1.13.2 Port Traffic....................................................................................................117
6.1.13.3 Fan Operation..............................................................................................118
6.1.13.4 System Temperature....................................................................................118
6.1.13.5 System Memory...........................................................................................119
6.1.13.6 System/SFP Module Operation....................................................................119
6.1.14 Enabling DMI Module................................................................................120
6.1.15 Software Watchdog Configuration ............................................................121
6.2 Configuration Management................................................................122
6.2.1 Displaying System Configuration..............................................................122
6.2.2 Writing System Configuration ...................................................................122
6.2.3 Auto-Saving...............................................................................................123
6.2.4 System Configuration File.........................................................................123
6.2.5 Restoring Default Configuration................................................................124
6.2.6 Core Dump File.........................................................................................125
6.3 System Management.........................................................................126
6.3.1 Network Connection..................................................................................126
6.3.2 IP ICMP Source Routing...........................................................................128
6.3.3 Tracing Packet Route................................................................................129
6.3.4 Displaying User Connecting to System ....................................................130
6.3.5 MAC Table.................................................................................................131
6.3.6 System Running Time...............................................................................131
6.3.7 System Information...................................................................................131
6.3.8 System Memory Information.....................................................................132
6.3.9 CPU Packet Management ........................................................................133
6.3.9.1 CPU Packet Limit.........................................................................................133
6.3.9.2 CPU Packet Filtering....................................................................................133
6.3.10 Running Process.......................................................................................136
6.3.11 Displaying System Software.....................................................................136
6.3.12 Displaying Installed OS.............................................................................137
6.3.13 Default OS.................................................................................................137
6.3.14 Switch Status.............................................................................................137
6.3.15 Forwarding Information Base (FIB) Table.................................................137
6.3.16 Tech Support Information..........................................................................138
6.3.17 System Boot Information...........................................................................138
6.3.18 Network Service Module (NSM) Daemon Debugging ..............................139
7Network Management.....................................................................140
7.1 Simple Network Management Protocol (SNMP) ................................140
7.1.1 SNMP Service...........................................................................................140
7.1.2 SNMP Community.....................................................................................140

UMN:CLI User Manual
V5808
8
7.1.3 SNMP Agent Administrator....................................................................... 141
7.1.4 Assigning IP Address of SNMPAgent ..................................................... 142
7.1.5 SNMP Com2sec....................................................................................... 142
7.1.6 SNMP Group............................................................................................ 143
7.1.7 SNMP View Record.................................................................................. 143
7.1.8 Permission to Access SNMP View Record.............................................. 144
7.1.9 SNMP Version 3 User .............................................................................. 144
7.1.10 SNMP Engine ID...................................................................................... 145
7.1.11 SNMPv3 Notification................................................................................ 145
7.1.11.1 Configuring SNMP Target ............................................................................145
7.1.11.2 SNMP Notification Type...............................................................................145
7.1.12 SNMP Trap............................................................................................... 145
7.1.12.1 SNMP Trap Mode ........................................................................................145
7.1.12.2 SNMP Trap Host..........................................................................................145
7.1.12.3 Enabling SNMP Trap ...................................................................................145
7.1.12.4 Displaying SNMP Trap.................................................................................145
7.1.12.5 SNMP Trap Message Logging and Threshold .............................................145
7.1.13 SNMPAlarm............................................................................................. 145
7.1.13.1 Alarm Notify Activity.....................................................................................145
7.1.13.2 Alarm Severity Criterion...............................................................................145
7.1.13.3 Default Alarm Severity .................................................................................145
7.1.13.4 Generic Alarm Severity................................................................................145
7.1.13.5 Displaying SNMP Alarm...............................................................................145
7.1.14 SNMP Message Logging ......................................................................... 145
7.1.15 Disabling SNMP....................................................................................... 145
7.1.16 Displaying SNMP Configuration............................................................... 145
7.2 Link Layer Discovery Protocol (LLDP)...............................................145
7.2.1 LLDP Operation ....................................................................................... 145
7.2.2 Enabling LLDP ......................................................................................... 145
7.2.3 LLDP Operation Type............................................................................... 145
7.2.4 Basic TLV................................................................................................. 145
7.2.5 LLDP Message......................................................................................... 145
7.2.6 Reinitiating Delay..................................................................................... 145
7.2.7 Displaying LLDP Configuration................................................................ 145
7.3 Remote Monitoring (RMON)..............................................................145
7.3.1 RMON History.......................................................................................... 145
7.3.1.1 Source Port of Statistical Data.....................................................................145
7.3.1.2 Subject of RMON History.............................................................................145
7.3.1.3 Number of Sample Data ..............................................................................145
7.3.1.4 Interval of Sample Inquiry............................................................................145
7.3.1.5 Activating RMON History.............................................................................145
7.3.1.6 Deleting Configuration of RMON History .....................................................145
7.3.1.7 Displaying RMON History............................................................................145
7.3.2 RMON Alarm............................................................................................ 145
7.3.2.1 Subject of RMON Alarm...............................................................................145
7.3.2.2 Object of Sample Inquiry..............................................................................145
7.3.2.3 Absolute and Delta Comparison ..................................................................145
7.3.2.4 Upper Bound of Threshold...........................................................................145
7.3.2.5 Lower Bound of Threshold...........................................................................145
7.3.2.6 Standard of the First Alarm ..........................................................................145

User Manual UMN:CLI
V5808
9
7.3.2.7 Interval of Sample Inquiry.............................................................................145
7.3.2.8 Activating RMON Alarm ...............................................................................145
7.3.2.9 Deleting Configuration of RMONAlarm........................................................145
7.3.3 RMON Event.............................................................................................145
7.3.3.1 Event Community.........................................................................................145
7.3.3.2 Event Description.........................................................................................145
7.3.3.3 Subject of RMON Event...............................................................................145
7.3.3.4 Event Type...................................................................................................145
7.3.3.5 Activating RMON Event ...............................................................................145
7.3.3.6 Deleting Configuration of RMON Event........................................................145
7.3.4 Simple RMON Event Configuration ..........................................................145
7.4 Syslog................................................................................................145
7.4.1 Syslog Output Level..................................................................................145
7.4.2 Facility Code .............................................................................................145
7.4.3 Syslog Bind Address.................................................................................145
7.4.4 Debug Message for Remote Terminal ......................................................145
7.4.5 Disabling Syslog .......................................................................................145
7.4.6 Syslog Local Message Configuration .......................................................145
7.4.7 Displaying Syslog Status...........................................................................145
7.5 Rule and QoS....................................................................................145
7.5.1 How to Operate QoS.................................................................................145
7.5.2 Packet Classification.................................................................................145
7.5.2.1 Flow Creation...............................................................................................145
7.5.2.2 Configuring Flow..........................................................................................145
7.5.2.3 Applying and modifying Flow........................................................................145
7.5.2.4 Class Creation..............................................................................................145
7.5.3 Packet Conditioning..................................................................................145
7.5.3.1 Policer Creation............................................................................................145
7.5.3.2 Packet Counter ............................................................................................145
7.5.3.3 Rate-limit......................................................................................................145
7.5.3.4 Applying and modifying Policer....................................................................145
7.5.4 Rule Action................................................................................................145
7.5.4.1 Policy Creation.............................................................................................145
7.5.4.2 Metering.......................................................................................................145
7.5.4.3 Policy Priority ...............................................................................................145
7.5.4.4 Policy Action.................................................................................................145
7.5.4.5 Setting CoS and ToS values.........................................................................145
7.5.4.6 Attaching a Policy to an interface.................................................................145
7.5.4.7 Applying and Modifying Policy......................................................................145
7.5.5 Displaying Rule.........................................................................................145
7.5.6 Admin Rule................................................................................................145
7.5.6.1 Creating Admin Flow for packet classification ..............................................145
7.5.6.2 Configuring Admin Flow...............................................................................145
7.5.6.3 Applying and modifying Admin Flow.............................................................145
7.5.6.4 Class Creation..............................................................................................145
7.5.7 Admin Rule Action.....................................................................................145
7.5.7.1 Admin Policy Creation..................................................................................145
7.5.7.2 Admin Policy Priority....................................................................................145
7.5.7.3 Admin Policy Action......................................................................................145
7.5.7.4 Applying and Modifying Admin Policy...........................................................145

UMN:CLI User Manual
V5808
10
7.5.8 Displaying Admin Rule............................................................................. 145
7.5.9 Scheduling ............................................................................................... 145
7.5.9.1 Scheduling mode.........................................................................................145
7.5.9.2 Weight and Quantum...................................................................................145
7.5.9.3 Maximum and Minimum Bandwidth.............................................................145
7.5.9.4 DSCP-to-CoS Mapping................................................................................145
7.5.9.5 The Traffic of Queue....................................................................................145
7.5.9.6 Displaying QoS............................................................................................145
7.5.9.7 Random Early Detection (WRED)................................................................145
7.6 EFM OAM.........................................................................................145
7.6.1 Enabling EFM OAM ................................................................................. 145
7.6.2 OAM Link Monitoring................................................................................ 145
7.6.3 EFM OAM Mode ...................................................................................... 145
7.6.4 OAM Loopback ........................................................................................ 145
7.6.5 OAM Unidirection..................................................................................... 145
7.6.6 Displaying EFM OAM Configuration ........................................................ 145
7.7 NetBIOS Filtering ..............................................................................145
7.8 Martian Filtering ................................................................................145
7.9 Max Host...........................................................................................145
7.10 Port Security......................................................................................145
7.10.1 Port Security on Port................................................................................ 145
7.10.2 Port Security Aging................................................................................... 145
7.10.3 Displaying Port Security........................................................................... 145
7.11 Outband Management Port Security .................................................145
7.12 Max Host...........................................................................................145
7.13 MAC Table.........................................................................................145
7.14 MAC Filtering ....................................................................................145
7.14.1 Default MAC Filter Policy......................................................................... 145
7.14.2 Configuring MAC Filter Policy.................................................................. 145
7.14.3 Listing MAC Filter Policy.......................................................................... 145
7.14.4 Displaying MAC Filter Policy.................................................................... 145
7.15 Address Resolution Protocol (ARP)...................................................145
7.15.1 ARP Table ................................................................................................ 145
7.15.1.1 Registering ARP Table.................................................................................145
7.15.1.2 Displaying ARP Table...................................................................................145
7.15.2 ARP Request Message Interval............................................................... 145
7.15.3 ARP Alias ................................................................................................. 145
7.15.4 ARP Inspection ........................................................................................ 145
7.15.4.1 ARP Access List ..........................................................................................145
7.15.4.2 Enabling ARP Inspection Filtering................................................................145
7.15.4.3 ARP Address Validation...............................................................................145
7.15.4.4 ARP Inspection on Trust Port.......................................................................145
7.15.4.5 ARP Inspection Log-buffer...........................................................................145
7.15.4.6 Displaying ARP Inspection...........................................................................145
7.15.5 Gratuitous ARP ........................................................................................ 145
7.15.6 Proxy ARP................................................................................................ 145
7.16.4 RA Destination Configuration................................................................... 145
7.16.11 Static IPv6 Neighbor Entry....................................................................... 145
7.16.12Setting the Stale Timer............................................................................. 145

User Manual UMN:CLI
V5808
11
7.16.13IPv6 Neighbor Discovery (ND) Inspection ................................................145
7.16.13.1 ND Access List.............................................................................................145
7.16.13.2 Enabling ND Inspection Filtering..................................................................145
7.16.13.3 ND Inspection on Trust Port.........................................................................145
7.16.13.4 ND Inspection Log-buffer .............................................................................145
7.16.13.6 Displaying ND Inspection.............................................................................145
7.16.14Gratuitous ND ...........................................................................................145
7.16.15ND Alias ....................................................................................................145
7.17 ICMP Message Control......................................................................145
7.17.1 Blocking Echo Reply Message .................................................................145
7.17.2 Interval for Transmit ICMP Message.........................................................145
7.17.3 ICMP Destination Unreachable Message.................................................145
7.17.4 ICMP Redirect Message...........................................................................145
7.18 TCP Flag Control...............................................................................145
7.18.1 RST Configuration.....................................................................................145
7.18.2 SYN Configuration ....................................................................................145
7.19 The Utilization on L3 table .................................................................145
7.20 Packet Dump.....................................................................................145
7.20.1 Packet Dump by Protocol .........................................................................145
7.20.2 Packet Dump with Option .........................................................................145
7.20.3 Debug Packet Dump.................................................................................145
7.20.4 Displaying Dump Packets.........................................................................145
7.20.5 Dump File..................................................................................................145
7.21 Access List ........................................................................................145
7.21.1 Standard Access List.................................................................................145
7.21.2 Extended Access List................................................................................145
7.21.3 Named Access List ...................................................................................145
7.21.4 Access List Range ....................................................................................145
7.21.5 Named Access List for IPv6 address........................................................145
7.21.6 Displaying Access List Entries..................................................................145
8System Main Functions..................................................................145
8.1 Virtual Local Area Network (VLAN)....................................................145
8.1.1 Port-based VLAN......................................................................................145
8.1.1.1 Creating VLAN.............................................................................................145
8.1.1.2 Specifying PVID ...........................................................................................145
8.1.1.3 Adding Port to VLAN....................................................................................145
8.1.1.4 Deleting VLAN..............................................................................................145
8.1.2 Protocol-based VLAN ...............................................................................145
8.1.3 MAC-based VLAN.....................................................................................145
8.1.4 Subnet-based VLAN .................................................................................145
8.1.5 Tagged VLAN............................................................................................145
8.1.6 VLAN Description......................................................................................145
8.1.7 VLAN Precedence ....................................................................................145
8.1.8 Displaying VLAN Information....................................................................145
8.1.9 QinQ VLAN Mapping ................................................................................145
8.1.9.1 TPID Configuration.......................................................................................145
8.1.9.2 One-to-One VLAN Mapping between S-VID and C-VID ..............................145
8.1.9.3 One-to-Two VLAN Mapping between S-VID and C-VID...............................145
8.1.9.4 Two-to-One VLAN Mapping between S-VID and C-VID...............................145

UMN:CLI User Manual
V5808
12
8.1.9.5 Two-to-Two VLAN Mapping between S-VID and C-VID ..............................145
8.1.9.6 Double Tagging Operation...........................................................................145
8.1.9.7 Double Tagging Configuration......................................................................145
8.1.9.8 Inner Tag Configuration................................................................................145
8.1.9.9 Displaying VLAN Mapping and Translation..................................................145
8.1.10 Layer 2 Isolation....................................................................................... 145
8.1.10.1 Port Isolation................................................................................................145
8.1.10.2 Shared VLAN...............................................................................................145
8.1.11 Sample Configuration............................................................................... 145
8.2 Link Aggregation (LAG).....................................................................145
8.2.1 Port Trunk................................................................................................. 145
8.2.1.1 Configuring Port Trunk.................................................................................145
8.2.1.2 Disabling Port Trunk ....................................................................................145
8.2.1.3 Displaying Port Trunk...................................................................................145
8.2.2 Link Aggregation Control Protocol (LACP)............................................... 145
8.2.2.1 Configuring LACP........................................................................................145
8.2.2.2 Distribution Mode.........................................................................................145
8.2.2.3 Operation Mode...........................................................................................145
8.2.2.4 Priority of Switch..........................................................................................145
8.2.2.5 Manual Aggregation.....................................................................................145
8.2.2.6 BPDU Transmission Rate............................................................................145
8.2.2.7 Administrational Key....................................................................................145
8.2.2.8 Port Priority..................................................................................................145
8.2.2.9 Displaying LACP Configuration....................................................................145
8.3 Spanning Tree Protocol (STP)...........................................................145
8.3.1 STP Operation ......................................................................................... 145
8.3.1.1 Root Switch..................................................................................................145
8.3.1.2 Designated Switch.......................................................................................145
8.3.1.3 Designated Port and Root Port....................................................................145
8.3.1.4 Port Priority..................................................................................................145
8.3.2 RSTP Operation....................................................................................... 145
8.3.2.1 Port States...................................................................................................145
8.3.2.2 BPDU Policy................................................................................................145
8.3.2.3 Rapid Network Convergence.......................................................................145
8.3.2.4 Compatibility with 802.1d.............................................................................145
8.3.3 MSTP Operation ...................................................................................... 145
8.3.3.1 MSTP...........................................................................................................145
8.3.4 STP Mode ................................................................................................ 145
8.3.5 STP Basic Configuration.......................................................................... 145
8.3.5.1 Path-cost Method.........................................................................................145
8.3.5.2 Edge Ports...................................................................................................145
8.3.5.3 BPDU Transmit hold count...........................................................................145
8.3.5.4 Port Priority..................................................................................................145
8.3.5.5 Link Type .....................................................................................................145
8.3.5.6 Enabling STP configuration on the Port.......................................................145
8.3.5.7 Displaying Configuration..............................................................................145
8.3.6 Configuring MSTP.................................................................................... 145
8.3.6.1 MST Region.................................................................................................145
8.3.6.2 Enabling MSTP configuration ......................................................................145
8.3.6.3 Root Switch..................................................................................................145

User Manual UMN:CLI
V5808
13
8.3.6.4 Path-cost......................................................................................................145
8.3.6.5 Port Priority ..................................................................................................145
8.3.6.6 Displaying Configuration ..............................................................................145
8.3.7 Configuring PVSTP...................................................................................145
8.3.7.1 Enabling PVSTP ..........................................................................................145
8.3.7.2 Root Switch..................................................................................................145
8.3.7.3 Path-cost......................................................................................................145
8.3.7.4 Port Priority ..................................................................................................145
8.3.7.5 Displaying Configuration ..............................................................................145
8.3.8 Root Guard................................................................................................145
8.3.9 Loop Guard...............................................................................................145
8.3.10 Topology Change Detection......................................................................145
8.3.11 Restarting Protocol Migration....................................................................145
8.3.12 Loop Back Detection.................................................................................145
8.3.13 BPDU Configuration..................................................................................145
8.3.13.1 Hello Time....................................................................................................145
8.3.13.2 Forward Delay Time.....................................................................................145
8.3.13.3 MaxAge.......................................................................................................145
8.3.13.4 BPDU Hop Count.........................................................................................145
8.3.13.5 BPDU Filtering .............................................................................................145
8.3.13.6 BPDU Guard................................................................................................145
8.3.14 Sample Configuration ...............................................................................145
8.4 Loop Detection ..................................................................................145
8.5 Dynamic Host Configuration Protocol (DHCP)...................................145
8.5.1 DHCP Server ............................................................................................145
8.5.1.1 DHCP Pool Creation ....................................................................................145
8.5.1.2 DHCP Subnet...............................................................................................145
8.5.1.3 Range of IPAddress ....................................................................................145
8.5.1.4 Default Gateway...........................................................................................145
8.5.1.5 IP Lease Time..............................................................................................145
8.5.1.6 DNS Server..................................................................................................145
8.5.1.7 Manual Binding ............................................................................................145
8.5.1.8 Domain Name..............................................................................................145
8.5.1.9 DHCP Server Option....................................................................................145
8.5.1.10 Static Mapping..............................................................................................145
8.5.1.11 Recognition of DHCP Client.........................................................................145
8.5.1.12 IP Address Validation ...................................................................................145
8.5.1.13 Authorized ARP............................................................................................145
8.5.1.14 Prohibition of 1:N IPAddress Assignment....................................................145
8.5.1.15 Ignoring BOOTP Request ............................................................................145
8.5.1.16 DHCP Packet Statistics................................................................................145
8.5.1.17 Setting DHCP Pool Size...............................................................................145
8.5.1.18 Displaying DHCP Pool Configuration...........................................................145
8.5.2 DHCP Address Allocation with Option 82 .................................................145
8.5.2.1 DHCP Class Capability ................................................................................145
8.5.2.2 DHCP Class Creation...................................................................................145
8.5.2.3 Relay Agent Information Pattern ..................................................................145
8.5.2.4 Associating DHCP Class..............................................................................145
8.5.2.5 Range of IPAddress for DHCP Class..........................................................145
8.5.3 DHCP Lease Database.............................................................................145
8.5.3.1 DHCP Database Agent.................................................................................145

UMN:CLI User Manual
V5808
14
8.5.3.2 Displaying DHCP Lease Status ...................................................................145
8.5.3.3 Deleting DHCP Lease Database..................................................................145
8.5.4 DHCP Relay Agent................................................................................... 145
8.5.4.1 DHCP Helper Address.................................................................................145
8.5.4.2 Smart Relay Agent Forwarding....................................................................145
8.5.4.3 DHCP Server ID Option...............................................................................145
8.5.4.4 DHCP Relay Statistics .................................................................................145
8.5.5 DHCP Option............................................................................................ 145
8.5.5.1 Entering DHCP Option Mode.......................................................................145
8.5.5.2 Configuring DHCP Option Format ...............................................................145
8.5.5.3 Deleting DHCP Option Format.....................................................................145
8.5.5.4 Displaying DHCP option ..............................................................................145
8.5.5.5 Different DHCP option Code Configurations................................................145
8.5.6 DHCP Option 82 ...................................................................................... 145
8.5.6.1 Enabling DHCP Option 82...........................................................................145
8.5.6.2 Option 82 Sub-Option..................................................................................145
8.5.6.3 Option 82 Reforwarding Policy ....................................................................145
8.5.6.4 Option 82 Trust Policy..................................................................................145
8.5.7 DHCP Snooping....................................................................................... 145
8.5.7.1 Enabling DHCP Snooping............................................................................145
8.5.7.2 DHCP Trust State.........................................................................................145
8.5.7.3 DHCP Filter on Trust Port............................................................................145
8.5.7.4 DHCP Rate Limit .........................................................................................145
8.5.7.5 DHCP Lease Limit .......................................................................................145
8.5.7.6 Source MAC Address Verification................................................................145
8.5.7.7 Static DHCP Snooping Binding....................................................................145
8.5.7.8 DHCP Snooping Database Agent................................................................145
8.5.7.9 ARP Inspection Start Time...........................................................................145
8.5.7.10 DHCP Snooping with Option82....................................................................145
8.5.7.11 DHCP Snooping Option...............................................................................145
8.5.7.12 Displaying DHCP Snooping Configuration...................................................145
8.5.8 IP Source Guard ...................................................................................... 145
8.5.8.1 Enabling IP Source Guard...........................................................................145
8.5.8.2 Static IP Source Binding ..............................................................................145
8.5.8.3 Displaying IP Source Guard Configuration ..................................................145
8.5.9 DHCP Client............................................................................................. 145
8.5.9.1 Enabling DHCP Client..................................................................................145
8.5.9.2 DHCP Client ID............................................................................................145
8.5.9.3 DHCP Class ID............................................................................................145
8.5.9.4 Host Name...................................................................................................145
8.5.9.5 IP Lease Time..............................................................................................145
8.5.9.6 Requesting Option.......................................................................................145
8.5.9.7 Forcing Release or Renewal of DHCP Lease..............................................145
8.5.9.8 Displaying DHCP Client Configuration.........................................................145
8.5.10 DHCP Filtering ......................................................................................... 145
8.5.10.1 DHCP Packet Filtering.................................................................................145
8.5.10.2 DHCP Server Packet Filtering .....................................................................145
8.5.11 Debugging DHCP..................................................................................... 145
8.6 Dynamic Host Configuration Protocol (DHCP) for IPv6 .....................145
8.6.1 DHCPv6 Server........................................................................................ 145
8.6.1.1 Creating DHCPv6 address Pool ..................................................................145

User Manual UMN:CLI
V5808
15
8.6.1.4 Range of IPv6 Address ................................................................................145
8.6.1.5 DHCPv6 Options..........................................................................................145
8.6.1.6 Enabling DHCPv6 Server on Interface.........................................................145
8.6.1.7 Displaying DHCPv6 Information...................................................................145
8.6.2 DHCPv6 Snooping....................................................................................145
8.6.2.1 Enabling DHCPv6 Snooping........................................................................145
8.6.2.2 DHCPv6 Snooping Port State ......................................................................145
8.6.2.4 DHCP Lease Limit........................................................................................145
8.6.2.6 DHCP Snooping Option ...............................................................................145
8.6.2.7 Displaying DHCPv6 Snooping Configuration ...............................................145
8.6.3 DHCPv6 Relay Agent................................................................................145
8.6.3.1 DHCPv6 Relay Agent Destination................................................................145
8.6.4 DHCPv6 Option ........................................................................................145
8.6.4.1 Entering DHCPv6 Option Mode ...................................................................145
8.6.4.2 Configuring DHCPv6 Option Format............................................................145
8.6.4.3 Deleting DHCPv6 Option Format.................................................................145
8.6.4.4 Displaying DHCPv6 option...........................................................................145
8.6.5 Debugging DHCPv6..................................................................................145
8.7 Virtual Router Redundancy Protocol (VRRP).....................................145
8.7.1 Configuring VRRP.....................................................................................145
8.7.1.1 Associated IP Address .................................................................................145
8.7.1.2 Access to Associated IP Address.................................................................145
8.7.1.3 Master Router and Backup Router...............................................................145
8.7.1.4 VRRP Track Function...................................................................................145
8.7.1.5 Authentication Password..............................................................................145
8.7.1.6 Preempt........................................................................................................145
8.7.2 VRRP Monitoring and Management.........................................................145
8.7.2.1 Displaying VRRP Protocol Information.........................................................145
8.7.2.2 VRRP Statistics............................................................................................145
8.7.2.3 VRRP Debug................................................................................................145
8.8 Rate Limit ..........................................................................................145
8.9 Flood Guard.......................................................................................145
8.9.1 MAC Flood Guard.....................................................................................145
8.9.2 CPU Flood Guard .....................................................................................145
8.9.3 System Flood Guard.................................................................................145
8.9.4 Invalid Traffic Guard..................................................................................145
8.9.4.1 Attack Guard................................................................................................145
8.9.4.2 Error Guard..................................................................................................145
8.10 PPS Control.......................................................................................145
8.11 Storm Control.....................................................................................145
8.12 Jumbo Frame Capacity......................................................................145
8.13 Configuring PPPoE Tag Option Format..............................................145
8.13.1 PPPoE Vendor Tag Option........................................................................145
8.13.1.1 Entering PPPoE Vendor Tag Option Mode...................................................145
8.13.1.2 Configuring PPPoE Vendor Tag Option Format ...........................................145
8.13.1.3 Deleting PPPoE Vendor Tag Option Format.................................................145
8.13.1.4 Displaying PPPoE Vendor Tag option ..........................................................145
8.13.2 PPPoE Vendor Tag Filtering .....................................................................145
8.13.2.1 PPPoE Snooping Mode ...............................................................................145

UMN:CLI User Manual
V5808
16
8.13.2.2 Configuring PPPoE Vendor Tag Filtering.....................................................145
8.13.3 PPPoE Debug.......................................................................................... 145
8.14 Bandwidth .........................................................................................145
8.15 Maximum Transmission Unit (MTU) ..................................................145
8.16 Blocking Packet Forwarding..............................................................145
9IP Multicast ......................................................................................145
9.1 Multicast Group Membership.............................................................145
9.1.1 IGMP Basic .............................................................................................. 145
9.1.1.1 IGMP Version...............................................................................................145
9.1.1.2 Querier’s Robustness Variable ....................................................................145
9.1.1.3 Clearing IGMP Entry....................................................................................145
9.1.1.4 IGMP Debug................................................................................................145
9.1.2 IGMP Version 2........................................................................................ 145
9.1.2.1 IGMP Static Join ..........................................................................................145
9.1.2.2 IGMP Access Control...................................................................................145
9.1.2.3 IGMP Querier Configuration ........................................................................145
9.1.2.4 IGMP Immediate Leave...............................................................................145
9.1.3 IGMP Version 3........................................................................................ 145
9.1.4 Displaying IGMP Information ................................................................... 145
9.2 Multicast Functions............................................................................145
9.2.1 Multicast Forwarding Database................................................................ 145
9.2.1.1 Blocking Unknown Multicast Traffic..............................................................145
9.2.1.2 Forwarding Entry Aging ...............................................................................145
9.2.1.3 Displaying McFDB Information ....................................................................145
9.2.2 IGMP Snooping Basic.............................................................................. 145
9.2.2.1 Enabling IGMP Snooping.............................................................................145
9.2.2.2 IGMP Snooping Version...............................................................................145
9.2.2.3 IGMP Snooping Robustness Value..............................................................145
9.2.3 IGMPv2 Snooping.................................................................................... 145
9.2.3.1 IGMP Snooping Querier Configuration ........................................................145
9.2.3.2 IGMP Snooping Last Member Query Interval..............................................145
9.2.3.3 IGMP Snooping Immediate Leave...............................................................145
9.2.3.4 IGMP Snooping Report Suppression...........................................................145
9.2.3.5 IGMP Snooping S-Query Report Agency.....................................................145
9.2.3.6 Explicit Host Tracking ..................................................................................145
9.2.3.7 Multicast Router Port Configuration.............................................................145
9.2.3.8 TCN Multicast Flooding................................................................................145
9.2.4 IGMPv3 Snooping.................................................................................... 145
9.2.5 Displaying IGMP Snooping Information................................................... 145
9.2.6 Multicast VLAN Registration (MVR)......................................................... 145
9.2.6.1 Enabling MVR..............................................................................................145
9.2.6.2 MVR Group..................................................................................................145
9.2.6.3 Source/Receiver Port...................................................................................145
9.2.6.4 MVR Helper Address ...................................................................................145
9.2.6.5 Displaying MVR Configuration.....................................................................145
9.2.7 IGMP Filtering and Throttling ................................................................... 145
9.2.7.1 IGMP Filtering..............................................................................................145
9.2.7.2 IGMP Throttling............................................................................................145
9.2.7.3 Displaying IGMP Filtering and Throttling......................................................145

User Manual UMN:CLI
V5808
17
9.2.8 IGMP Proxy...............................................................................................145
9.2.8.1 Designating Downstream Interface..............................................................145
9.2.8.2 Designating Upstream Interface...................................................................145
9.2.8.3 Configuring Upstream Interface Mode..........................................................145
9.2.8.4 IGMP-Proxy IF Flap Discredit.......................................................................145
9.2.8.5 Disabling Verification of Source IP of IGMP Packets....................................145
9.2.8.6 Specifying IGMP Report/Leave’s Source IP Address ...................................145
9.2.8.7 Querying with Real Querirer’s Source IP Address........................................145
9.2.8.8 Displaying IGMP Proxy Information .............................................................145
9.2.9 IGMP State Limit.......................................................................................145
9.2.10 Multicast-Source Trust Port.......................................................................145
9.3 Multicast Routing...............................................................................145
9.3.1 Multicast Routing ......................................................................................145
9.3.1.1 Enabling Multicast Routing...........................................................................145
9.3.1.2 TTL Threshold..............................................................................................145
9.3.1.3 ECMP Load Splitting ....................................................................................145
9.3.1.4 MRIB Entry Limit..........................................................................................145
9.3.1.5 Displaying MRIB Entry .................................................................................145
9.3.1.6 Displaying MRIB Statistics............................................................................145
9.3.1.7 Displaying MFIB Information........................................................................145
9.3.1.8 MRIB Debug.................................................................................................145
9.3.2 PIM Basic..................................................................................................145
9.3.2.1 PIM Mode.....................................................................................................145
9.3.2.2 DR Priority....................................................................................................145
9.3.2.3 Neighbor Filtering.........................................................................................145
9.3.2.4 PIM Join/Prune Message Group Filtering ....................................................145
9.3.2.5 PIM Hello Message......................................................................................145
9.3.2.6 PIM Join/Prune Interval................................................................................145
9.3.2.7 PIM VIF Flap Discredit.................................................................................145
9.3.2.8 PIM Static Join .............................................................................................145
9.3.2.9 Displaying PIM Information ..........................................................................145
9.3.3 PIM-SM.....................................................................................................145
9.3.3.1 Rendezvous Point........................................................................................145
9.3.3.2 Bootstrap Router..........................................................................................145
9.3.3.3 Source Registration......................................................................................145
9.3.3.4 SPT Switchover............................................................................................145
9.3.3.5 Cisco’s Router Interoperability .....................................................................145
9.3.3.6 PIM Debug...................................................................................................145
9.3.4 Source Specific Multicast (SSM)...............................................................145
9.3.4.1 PIM-SSM......................................................................................................145
9.3.4.2 Static SSM Mapping.....................................................................................145
10 IPv6 Multicast..................................................................................145
10.1 Multicast Listener Discovery (MLD)....................................................145
10.1.1 MLD Version..............................................................................................145
10.1.2 MLD Querier’s Robustness Variable.........................................................145
10.1.3 Clearing MLD Entry...................................................................................145
10.1.4 MLD Debug...............................................................................................145
10.1.5 MLD Access Control .................................................................................145
10.1.6 MLD Querier Configuration.......................................................................145
10.1.6.1 MLD Query Interval......................................................................................145

UMN:CLI User Manual
V5808
18
10.1.6.2 MLD Query Response Time.........................................................................145
10.1.6.3 MLD Querier Timeout ..................................................................................145
10.1.6.4 MLD Last Member Query Count and Interval ..............................................145
10.1.6.5 MLD Immediate Leave.................................................................................145
10.1.6.6 MLD Static Join............................................................................................145
10.1.7 Displaying MLD Information..................................................................... 145
10.2 IPv6 Multicast Functions ...................................................................145
10.2.1 Multicast Forwarding Database................................................................ 145
10.2.1.1 Blocking Unknown Multicast Traffic..............................................................145
10.2.1.2 Forwarding Entry Aging ...............................................................................145
10.2.1.3 Displaying McFDB Information ....................................................................145
10.2.2 MLD Snooping Basic................................................................................ 145
10.2.2.1 Enabling MLD Snooping..............................................................................145
10.2.2.2 MLD Snooping Version................................................................................145
10.2.2.3 MLD Snooping Robustness Value ...............................................................145
10.2.3 MLD Snooping ......................................................................................... 145
10.2.3.1 MLD Snooping Querier Configuration..........................................................145
10.2.3.2 MLD Snooping Fast Leave ..........................................................................145
10.2.3.3 MLD Snooping Last Member Query Interval................................................145
10.2.3.4 MLD Snooping Report Suppression ............................................................145
10.2.3.5 Multicast Router Port Configuration.............................................................145
10.2.4 MLD State Limit........................................................................................ 145
10.2.5 MLD Snooping Debug.............................................................................. 145
10.2.6 MLD-Proxy IF Flap Discredit.................................................................... 145
10.3 IPv6 Multicast Routing.......................................................................145
10.3.1 Multicast Routing...................................................................................... 145
10.3.1.1 Enabling Multicast Routing ..........................................................................145
10.3.1.2 ECMP Load Splitting....................................................................................145
10.3.1.3 MRIB Entry Limit..........................................................................................145
10.3.1.4 Displaying MRIB Entry.................................................................................145
10.3.1.5 Clearing MRIB Entry....................................................................................145
10.3.1.6 Displaying MRIB Statistics...........................................................................145
10.3.1.7 Displaying MFIB Information........................................................................145
10.3.1.8 MRIB Debug................................................................................................145
10.3.2 PIMv6 Basic ............................................................................................. 145
10.3.2.1 PIMv6 Mode.................................................................................................145
10.3.2.2 DR Priority ...................................................................................................145
10.3.2.3 Neighbor Filtering ........................................................................................145
10.3.2.4 PIMv6 Hello Message..................................................................................145
10.3.2.5 PIMv6 Join/Prune Interval............................................................................145
10.3.2.6 Displaying PIMv6 Information......................................................................145
10.3.3 PIMv6 Rendezvous Point (RP) ................................................................ 145
10.3.3.1 Static RP......................................................................................................145
10.3.3.2 Keep Alive Time...........................................................................................145
10.3.3.3 Interface for Candidate RP ..........................................................................145
10.3.3.4 Ignoring RP Priority......................................................................................145
10.3.4 Bootstrap Router...................................................................................... 145
10.3.4.1 Interface for Candidate BSR........................................................................145
10.3.4.2 Clearing RP-Set...........................................................................................145
10.3.4.3 Displaying BSR Configuration......................................................................145

User Manual UMN:CLI
V5808
19
10.3.5 Source Registration ..................................................................................145
10.3.5.1 Registration Rate Limit.................................................................................145
10.3.5.2 Registration Suppression Time ....................................................................145
10.3.5.3 Register Message Filtering...........................................................................145
10.3.5.4 RP Reachability Validation ...........................................................................145
10.3.5.5 Source Address of Register Message..........................................................145
10.3.6 IPv6 SPT Switchover ................................................................................145
10.3.7 IPv6 Cisco’s Router Interoperability..........................................................145
10.3.7.1 Register Message Checksum ......................................................................145
10.3.7.2 Candidate RP Message ...............................................................................145
10.3.7.3 Excluding GenID Option...............................................................................145
10.3.8 IPv6 PIM Debug........................................................................................145
10.3.9 Source Specific Multicast (SSM)...............................................................145
10.3.9.1 PIMv6-SSM..................................................................................................145
10.3.9.2 Static SSM Mapping.....................................................................................145
10.3.10IPv6 Prefix Lists ........................................................................................145
11 IP Routing Protocol.........................................................................145
11.1 Border Gateway Protocol (BGP)........................................................145
11.1.1 Basic Configuration...................................................................................145
11.1.1.1 Configuration Type of BGP...........................................................................145
11.1.1.2 Enabling BGP Routing .................................................................................145
11.1.1.3 Disabling BGP Routing.................................................................................145
11.1.1.4 Router ID......................................................................................................145
11.1.1.5 Registering BGP Neighbor...........................................................................145
11.1.1.7 Maximum Path.............................................................................................145
11.1.1.8 BGP Aggregation .........................................................................................145
11.1.1.9 BGP Path Selection .....................................................................................145
11.1.2 Advanced Configuration............................................................................145
11.1.2.1 Summary of Path .........................................................................................145
11.1.2.2 Automatic Summarization of Path................................................................145
11.1.2.3 BGP Next-Hop Address Tracking.................................................................145
11.1.2.4 Local Preference..........................................................................................145
11.1.2.5 Multi-Exit Discriminator (MED).....................................................................145
11.1.2.6 Choosing Best Path .....................................................................................145
11.1.2.7 Graceful Restart...........................................................................................145
11.1.3 Administrative Distance for BGP...............................................................145
11.1.4 IP Address Family.....................................................................................145
11.1.5 BGP Neighbor...........................................................................................145
11.1.5.1 Default Route...............................................................................................145
11.1.5.2 Peer Group...................................................................................................145
11.1.5.3 Route Map....................................................................................................145
11.1.5.4 Force Shutdown...........................................................................................145
11.1.5.5 Changing the Nexthop Information...............................................................145
11.1.5.6 Neighbor Password......................................................................................145
11.1.5.7 Neighbor Description....................................................................................145
11.1.5.8 Source of Routing Updates..........................................................................145
11.1.5.9 Updates for Inbound Soft Reconfiguration ...................................................145
11.1.6 BGP Community List.................................................................................145
11.1.7 BGP Timers...............................................................................................145
11.1.8 External Routes to BGP Network..............................................................145

UMN:CLI User Manual
V5808
20
11.1.9 Route Flap Dampening............................................................................ 145
11.1.10 BGP Session Reset ................................................................................. 145
11.1.10.1 Session Reset of All Peers...........................................................................145
11.1.10.2 Session Reset of Peers within ParticularAS................................................145
11.1.10.3 Session Reset of Specific Route..................................................................145
11.1.10.4 Session Reset of External Peer...................................................................145
11.1.10.5 Session Reset of Peer Group......................................................................145
11.1.11 BGP AS-path Access List......................................................................... 145
11.1.13 BGP Debug.............................................................................................. 145
11.1.14 BGP Monitoring and Management........................................................... 145
11.1.14.1 Displaying BGP Information.........................................................................145
11.1.14.2 BGP Neighbor..............................................................................................145
11.1.14.3 Logging Neighbor Changes.........................................................................145
11.1.14.4 Checking the BGP Network Route...............................................................145
11.1.14.5 Sending SNMP Trap....................................................................................145
11.1.15 Displaying BGP Information..................................................................... 145
11.2 Open Shortest Path First (OSPF)......................................................145
11.2.1 Enabling OSPF ........................................................................................ 145
11.2.2 ABR Type Configuration........................................................................... 145
11.2.3 Compatibility Support............................................................................... 145
11.2.4 OSPF Interface ........................................................................................ 145
11.2.4.1 Authentication Type .....................................................................................145
11.2.4.2 Authentication Key.......................................................................................145
11.2.4.3 Interface Cost ..............................................................................................145
11.2.4.4 Blocking Transmission of Route Information Database ...............................145
11.2.4.5 Routing Protocol Interval..............................................................................145
11.2.4.6 OSPF Resynchronization Timeout...............................................................145
11.2.4.7 OSPF Maximum Transmission Unit (MTU)..................................................145
11.2.4.8 OSPF Priority...............................................................................................145
11.2.4.9 OSPF Network Type....................................................................................145
11.2.4.10 Disabling OSPF Packet Processing.............................................................145
11.2.5 Non-Broadcast Network........................................................................... 145
11.2.6 OSPF Area............................................................................................... 145
11.2.6.1 Area Authentication......................................................................................145
11.2.6.2 Default Cost of Area.....................................................................................145
11.2.6.3 Blocking the Transmission of Routing Information Between Area................145
11.2.6.4 Not So Stubby Area (NSSA) ........................................................................145
11.2.6.5 Area Range..................................................................................................145
11.2.6.6 Shortcut Area...............................................................................................145
11.2.6.7 Stub Area.....................................................................................................145
11.2.6.8 Maximum Area.............................................................................................145
11.2.6.9 Virtual Link...................................................................................................145
11.2.7 Default Metric........................................................................................... 145
11.2.8 Graceful Restart Support ......................................................................... 145
11.2.9 Opaque-LSA Support............................................................................... 145
11.2.10 Default Route ........................................................................................... 145
11.2.11 ECMP Route Hashing.............................................................................. 145
11.2.12 Finding Period.......................................................................................... 145
11.2.13 External Routes to OSPF Network .......................................................... 145
11.2.14 OSPF Distance ........................................................................................ 145
11.2.15 Host Route ............................................................................................... 145
Table of contents