82
To disable interfaces from receiving and sending routing information:
Step Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enter OSPF view.
ospf
[
process-id
|
router-id
router-id
|
vpn-instance
vpn-instance-name
] * N/A
3.
Disable interfaces from
receiving and sending
OSPF packets.
silent-interface
{
interface-type
interface-number
|
all
}
By default, an OSPF interface can
receive and send OSPF packets.
The
silent-interface
command
disables only the interfaces
associated with the current process
rather than other processes.
Multiple OSPF processes can
disable the same interface from
receiving and sending OSPF
packets.
Configuring stub routers
A stub router is used for traffic control. It reports its status as a stub router to neighboring OSPF routers.
The neighboring routers do not use the stub router to forward data although they have a route to it.
Router LSAs from the stub router might contain different link type values. A value of 3 means a link to a
stub network, and the cost of the link will not be changed by default. To set the cost of the link to 65535,
specify the
include-stub
keyword in the
stub-router
command. A value of 1, 2 or 4 means a point-to-point
link, a link to a transit network, or a virtual link. On such links, a maximum cost value of 65535 is used.
Neighbors do not send packets to the stub router as long as they have a route with a smaller cost.
To configure a router as a stub router:
Step Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enter OSPF view.
ospf
[
process-id
|
router-id
router-id
|
vpn-instance
vpn-instance-name
] *
N/A
3.
Configure the router as a
stub router.
stub-router
[
external-lsa
[
max-metric-value
] |
include-stub
|
on-startup
{
seconds
|
wait-for-bgp
[
seconds
] } |
summary-lsa
[
max-metric-value
] ] *
By default, the router is not
configured as a stub router.
A stub router has no associations
with a stub area.
Configuring OSPF authentication
Perform this task to configure OSPF area and interface authentication.
OSPF adds the configured password into sent packets, and uses the password to authenticate received
packets. Only packets that pass the authentication can be received. If a packet fails the authentication,
the OSPF neighbor relationship cannot be established.
If you configure OSPF authentication for both an area and an interface in that area, the interface uses the
OSPF authentication configured on it.