beautypg.com

Brocade Multi-Service IronWare Routing Configuration Guide (Supporting R05.6.00) User Manual

Page 207

background image

Multi-Service IronWare Routing Configuration Guide

179

53-1003033-02

Configuring OSPF

Simple text password

MD5 authentication

No authentication

Configuring a new simple text password or MD5 authentication key

Changing an existing simple text password or MD5 authentication key

To change the authentication-change interval, enter a command such as the following at the
interface configuration level of the CLI.

Brocade(config-if-e10000-2/5)# ip ospf auth-change-wait-time 400

Syntax: [no] ip ospf auth-change-wait-time secs

The secs parameter specifies the interval and can be from 0 – 14400 seconds. The default is 300
seconds (5 minutes).

NOTE

For backward compatibility, the ip ospf md5-authentication key-activation-wait-time seconds
command is still supported.

Block flooding of outbound LSAs on specific
OSPF interfaces

By default, the device floods all outbound LSAs on all the OSPF interfaces within an area. You can
configure a filter to block outbound LSAs on an OSPF interface. This feature is particularly useful
when you want to block LSAs from some, but not all, of the interfaces attached to the area.

This command blocks all outbound LSAs. Beginning with version 03.6.00, the command has been
enhanced to provide options for selective blocking of LSAs.

After you apply filters to block the outbound LSAs, the filtering occurs during the database
synchronization and flooding. When a filtering configuration is changed on a interface, all
adjacencies on the interface are set to the Extstart state to restart the database exchange process.
In cases where an LSA has already been flooded on an interface prior to application of the LSA
filter, the LSA will not be flushed out from the remote neighbors. In this situation the user must
clear the link state database and the adjacencies on all remote neighbors to flush out the leaked
LSAs or wait for the LSAs to be aged out.

If you remove the filters, the blocked LSAs are automatically re-flooded. You do not need to reset
OSPF to re-flood the LSAs.

NOTE

You cannot block LSAs on virtual links, and LSA filtering is not supported on sham links.

To apply a filter to an OSPF interface to block flooding of outbound LSAs on the interface, enter the
following command at the Interface configuration level for that interface.

Brocade(config-if-e10000-1/1)# ip ospf database-filter all out

The command in this example blocks all outbound LSAs on the OSPF interface configured on port
1/1.

Syntax: [no] ip ospf database-filter {all | all-external [allow-default | allow-default-and-type4] |

all-summary-external [allow-default | allow-default-and-type4] out