380
Step Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enter interface view.
interface
interface-type
interface-number
N/A
3.
Ignore MTU check for DD
packets.
ospfv3 mtu-ignore
[
instance
instance-id
]
By default, OSPFv3 does not
ignore MTU check for DD packets.
Disabling interfaces from receiving and sending OSPFv3
packets
After an OSPFv3 interface is set to
silent
, direct routes of the interface can still be advertised in
Intra-Area-Prefix LSAs through other interfaces, but other OSPFv3 packets cannot be advertised. No
neighboring relationship can be established on the interface. This feature can enhance the adaptability
of OSPFv3 networking.
To disable interfaces from receiving and sending OSPFv3 packets:
Step Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enter OSPFv3 view.
ospfv3
[
process-id
|
vpn-instance
vpn-instance-name
] *
N/A
3.
Disable interfaces from
receiving and sending
OSPFv3 packets.
silent-interface
{
interface-type
interface-number
|
all
}
By default, the interfaces are able to
receive and send OSPFv3 packets.
This command disables only the interfaces
associated with the current process, though
multiple OSPFv3 processes can disable the
same interface from receiving and sending
OSPFv3 packets.
Enabling the logging of neighbor state changes
With this feature enabled, the router delivers logs about neighbor state changes to its information center.
The information center processes logs according to user-defined output rules (whether to output logs and
where to output). For more information about the information center, see
Network Management and
Monitoring Configuration Guide
.
To enable the logging of neighbor state changes:
Step Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enter OSPFv3 view.
ospfv3
[
process-id
|
vpn-instance
vpn-instance-name
] *
N/A
3.
Enable the logging of
neighbor state changes.
log-peer-change
By default, this feature is enabled.