F3726, F3211, F3174, R5135, R3816-HP Firewalls and UTM Devices Network Management Configuration Guide-6PW100

755
1726BConfiguring poison reverse
The poison reverse function enables a route learned from an interface to be advertised through the
interface. However, the metric of the route is set to 16, which means the route is unreachable.
To configure poison reverse:
Ste
p
Command
Remarks
1079. Enter system view.
system-view N/A
1080. Enter interface view.
interface interface-type interface-number N/A
1081. Enable the poison reverse
function.
ripng poison-reverse Disabled by default.
889BConfiguring zero field check on RIPng packets
Some fields in the RIPng packet must be zero, which are called "zero fields." With zero field check on
RIPng packets enabled, if such a field contains a non-zero value, the entire RIPng packet is discarded. If
you are sure that all packets are reliable, disable the zero field check to reduce the CPU processing time.
To configure RIPng zero field check:
Ste
p
Command
Remarks
1082. Enter system view.
system-view N/A
1083. Enter RIPng view.
ripng [ process-id ] [ vpn-instance
vpn-instance-name ]
N/A
1084. Enable the zero field
check.
checkzero
Optional.
Enabled by default.
890BConfiguring the maximum number of ECMP routes
Ste
p
Command
Remarks
1085. Enter system view.
system-view N/A
1086. Enter RIPng view.
ripng [ process-id ] [ vpn-instance
vpn-instance-name ]
N/A
1087. Configure the
maximum number of ECMP
RIPng routes for load
balancing.
maximum load-balancing number
Optional.
By default, the maximum number is 8.
277B
Applying IPsec policies for RIPng
To protect routing information and defend attacks, RIPng supports using an IPsec policy to authenticate
protocol packets.
Outbound RIPng packets carry the Security Parameter Index (SPI) defined in the relevant IPsec policy. A
device uses the SPI carried in a received packet to match against the configured IPsec policy. If they