LDP Configuration Commands
755
key
: Authentication on the interface.
keyid
is from 1 to 255 and
key
is a string up
to 16 characters. It must be consistent with the authentication of a Sham-link
peer. When the
display current-configuration
command is executed, the
system displays the 24-character MD5 authentication in cipher text. You can also
input a 24-character authentication in cipher text.
dead
seconds
: Specifies the interval, in seconds, for the dead timer. This value
ranges from 1 to 8192 and defaults 40. It must be consistent with the value of
dead
seconds
for a Sham-link peer router.
hello
seconds
: Specifies the interval, in seconds, between Hello message
transmission through the interface. This value ranges from 1 to 8192 and defaults
to 10. It must be consistent with the value of
hello
seconds
for a Sham-link peer
router.
retransmit
seconds
: Specifies the internal, in seconds, for LSA packet
retransmission through the interface. This value ranges from 1 to 8192 and
defaults to 5.
trans-delay
seconds
: Specifies the delay period, in seconds, for LSA packet
transmission through the interface. This value ranges from 1 to 8192 and defaults
to 1.
Description
Use the
sham-link
command to configure a Sham-link.
Use the
undo sham-link
command to delete a Sham-link.
In the OSPF PE-CE connection, suppose that in an OSPF area there are two sites
which belong to the same VPN. They are connected to different PE routers and
there is an intra-domain OSPF link (Backdoor) between them. Though there may
be other routes connecting the two sites via PE routers, these routes are
intra-domain routes, and OSPF will first select those routes through the Backdoor
link. Sometimes, users desire to first select the routes through VPN Backbone.
Hence it is required to establish Sham-links between PE routers. In this case, the
routes through VPN Backbone are of the highest priority within the OSPF area.
If a Backdoor link (an OSPF link that does not pass the MPLS backbone) exists
between two PE routers and you want the data to be transported over the MPLS
backbone, you need to configure a Sham-link between the two PE routers. The
sham link between VPN PE routers is taken as a link within the OSPF area. When
configuring the Sham-link command, the optional parameters are not mutually
exclusive. You can only choose in the undo command those parameters which are
selected in the corresponding
sham-link
command.
c
CAUTION:
■
The source and destination addresses of a sham link are both Loopback
interface addresses with a 32-bit mask, which must be bound to a VPN
instance and imported into BGP through a direct-connect route.
■
In an OSPF processes of VPN, the Loopback interface routes used by the
Sham-link cannot be imported directly (so the
import direct
command cannot
be used in the OSPF processes of VPN). OSPF can only advertise the route by
importing a BGP route.
Summary of Contents for Switch 8807
Page 30: ......
Page 68: ...66 CHAPTER 2 COMMANDS USED TO LOG IN TO SWITCH ...
Page 78: ...76 CHAPTER 3 CONFIGURATION FILE MANAGEMENT COMMANDS ...
Page 96: ...94 CHAPTER 5 SUPER VLAN CONFIGURATION COMMANDS ...
Page 122: ...120 CHAPTER 8 IP PERFORMANCE CONFIGURATION COMMANDS ...
Page 130: ...128 CHAPTER 9 GARP GVRP CONFIGURATION COMMANDS ...
Page 162: ...160 CHAPTER 11 ETHERNET LINK AGGREGATION CONFIGURATION COMMANDS ...
Page 212: ...210 CHAPTER 13 MSTP CONFIGURATION COMMANDS ...
Page 234: ...232 CHAPTER 16 ACL COMMANDS ...
Page 282: ...280 CHAPTER 18 ACL CONTROL COMMANDS TO CONTROL LOGIN USERS ...
Page 293: ......
Page 294: ...292 CHAPTER 19 VLAN ACL CONFIGURATION COMMANDS ...
Page 310: ...308 CHAPTER 20 802 1X CONFIGURATION COMMANDS ...
Page 370: ...368 CHAPTER 21 AAA AND RADIUS HWTACACS PROTOCOL CONFIGURATION COMMANDS ...
Page 398: ...396 CHAPTER 23 STATIC ROUTE CONFIGURATION COMMANDS ...
Page 462: ...460 CHAPTER 25 OSPF CONFIGURATION COMMANDS ...
Page 498: ...496 CHAPTER 26 INTEGRATED IS IS CONFIGURATION COMMANDS ...
Page 548: ...546 CHAPTER 27 BGP CONFIGURATION COMMANDS ...
Page 570: ...568 CHAPTER 30 RECURSIVE ROUTING CONFIGURATION ...
Page 584: ...582 CHAPTER 32 MULTICAST VLAN CONFIGURATION COMMANDS ...
Page 600: ...598 CHAPTER 33 MULTICAST COMMON CONFIGURATION COMMANDS ...
Page 604: ...602 CHAPTER 34 STATIC MULTICAST MAC ADDRESS CONFIGURATION COMMAND ...
Page 656: ...654 CHAPTER 37 MSDP CONFIGURATION COMMANDS ...
Page 682: ...680 CHAPTER 38 MBGP MULTICAST EXTENSION CONFIGURATION COMMANDS ...
Page 762: ...760 CHAPTER 40 BGP MPLS VPN CONFIGURATION COMMANDS ...
Page 808: ...806 CHAPTER 44 HA CONFIGURATION COMMANDS_HA_CONFIGURATION ...
Page 820: ...818 CHAPTER 45 ARP CONFIGURATION COMMANDS ...
Page 824: ...822 CHAPTER 46 ARP TABLE SIZE CONFIGURATION COMMANDS max arp entry config of slot 13 8192 ...
Page 862: ...860 CHAPTER 47 DHCP CONFIGURATION COMMANDS ...
Page 870: ...868 CHAPTER 48 DNS CONFIGURATION COMMANDS ...
Page 972: ...970 CHAPTER 56 SSH TERMINAL SERVICE CONFIGURATION COMMANDS ...
Page 982: ...980 CHAPTER 57 FILE SYSTEM MANAGEMENT COMMANDS ...
Page 1026: ...1024 CHAPTER 60 INFORMATION CENTER ...
Page 1046: ...1044 CHAPTER 63 PORT PACKET STATISTICS COMMANDS ...
Page 1051: ...Ethernet Port Detection Configuration Commands 1049 ...
Page 1052: ...1050 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1053: ...Ethernet Port Detection Configuration Commands 1051 ...
Page 1054: ...1052 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1055: ......
Page 1056: ...1054 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1057: ......
Page 1058: ...1056 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1059: ...Ethernet Port Detection Configuration Commands 1057 ...
Page 1060: ...1058 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1061: ......
Page 1062: ...1060 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1063: ...Ethernet Port Detection Configuration Commands 1061 ...
Page 1064: ...1062 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1065: ......
Page 1066: ...1064 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1090: ...1088 CHAPTER 66 NQA CONFIGURATION COMMANDS ...