HP VPN Firewall Appliances Network Management Configuration Guide

404
Enabling compatibility with RFC 1583
RFC 1583 specifies a different method than RFC 2328 for selecting an external route from multiple LSAs.
This task enables RFC 2328 to be compatible with RFC 1583 so that the intra-area route in the backbone
area is preferred. If they are not compatible, the intra-area route in a non-backbone area is preferred to
reduce the burden of the backbone area.
To avoid routing loops, configure all the routers in a routing domain to be either compatible or
incompatible with RFC 1583.
To make them compatible:
Ste
p
Command
Remarks
1. Enter system view.
system-view N/A
2. Enter OSPF view.
ospf [ process-id | router-id router-id |
vpn-instance vpn-instance-name ] *
N/A
3. Enable compatibility
with RFC 1583.
rfc1583 compatible
Optional.
Enabled by default.
Logging neighbor state changes
Perform this task to enable output of log information to the terminal upon neighbor state changes.
To enable the logging of neighbor state changes:
Ste
p
Command
Remarks
1. Enter system view.
system-view N/A
2. Enter OSPF view.
ospf [ process-id | router-id router-id |
vpn-instance vpn-instance-name ] *
N/A
3. Enable the logging of
neighbor state changes.
log-peer-change
Optional.
Enabled by default.
Configuring OSPF network management
With trap generation enabled, OSPF generates traps to report important events. Traps include the
following levels:
Level-3—Fault traps
Level-4—Alarm traps
Level-5—Normal but important traps
Level-6—Notification traps
The generated traps are sent to the information center of the device. The output rules of the traps (whether
to output the traps and the output direction) are determined according to the information center
configuration. (For more information about information center, see Network Management and
Monitoring Configuration Guide.)
To configure OSPF network management:
Ste
p
Command
Remarks
1. Enter system view.
system-view N/A