Acknowledgments
- Introduction
- Acronyms
1.OSPF Basics
- 1.1Evolution
- 1.2Principles of operation
- 1.3The LSDB
- 1.4OSPF messages
- 1.5Basic configuration
- 1.6OSPF Finite State Machine
- 1.7References
2.LSA Types
- 2.1LSA structure
- 2.2LSDB synchronization
- 2.3Router LSA
- 2.4Network LSA
- 2.5Summary LSAs
- 2.6AS-external LSA
- 2.7NSSA-external LSA
- 2.8Opaque LSA (type 9, 10, 11 LSA)
- 2.9LSA flooding
- 2.10LSA MaxAge
- 2.11Multi-area design considerations
3.OSPF Network Types
- 3.1Point-to-Point
- 3.2Broadcast
- 3.3Point-to-multipoint
- 3.4Point-to-multipoint non-broadcast
- 3.5Non-broadcast multi-access (NBMA)
- 3.6Virtual links
- 3.7Loopback
- 3.8OSPF DR/BDR Election
- 3.9DR Preemption in DMVPN deployments (or the lack thereof)
- 3.10OSPF over DMVPN
4.OSPF Stub Areas
- 4.1Stub Areas
- 4.2Totally Stubby Areas
- 4.3Not-So-Stubby Areas
- 4.4NSSA Totally Stub Areas
- 4.5NSSA type-7 to type-5 Translator(s)
5.Path Selection
- 5.1Introduction
- 5.2OSPF RIB
- 5.3Cost
- 5.4Intra-area path selection
- 5.5Inter-area path selection
- 5.6Virtual links
- 5.7Transit areas
- 5.8Hot potato versus cold potato routing
- 5.9External destinations
- 5.10RFC 1583 Compatibility
6.Summarization in OSPF
- 6.1Internal Summarization
- 6.2Summarization of redistributed prefixes (external summarization)
- 6.3Summarization example 2
- 6.4Path selection with summarization
- 6.5Discard Routes
7.Filtering in OSPF
- 7.1Distribute Lists
- 7.2Administrative Distance
- 7.3Filtering during summarization
- 7.4Area filtering
- 7.5Filtering redistributed routes at the ASBR
- 7.6Filtering at the NSSA translator
- 7.7Scalability filtering
- 7.8LSDB Overload Protection
- 7.9Transit Network prefix suppression
- 7.10Database Filtering
- 7.11References
8.Default Routing in OSPF
- 8.1Default routing in stub areas
- 8.2Default routing in NSSAs
- 8.3Unconditional default routing
- 8.4Default routing
- 8.5Conditional default routing
- 8.6Reliable Conditional Default Routing
9.OSPF Security
- 9.1Overview of security mechanisms
- 9.2OSPFv2 Authentication
- 9.3OSPFv3 Security
- 9.4TTL Security
10.OSPF Optimizations
- 10.1Detection
- 10.2Propagation
- 10.3Process
- 10.4RIB/FIB
- 10.5Scalability in OSPF
- 10.6Other OSPF optimizations