IP Routing Features 
Configuring OSPF 
OSPF Trap Name  MIB Object 
originate-lsa-trap  ospfOriginateLsa 
originate-maxage-lsa-trap  ospfMaxAgeLsa 
link-state-database-overflow-trap  ospfLsdbOverflow 
link-state-database-approaching-overflow-trap  ospfLsdbApproachingOverflow 
Examples: 
1.  To stop an OSPF trap from being collected, use the following CLI 
command: 
HPswitch(ospf)# no trap < ospf-trap > 
2.  To disable reporting of the neighbor-state-change-trap, enter the following 
command: 
HPswitch(ospf)#no trap neighbor-state-change-trap 
3.  To reinstate the trap, enter the following command: 
HPswitch(ospf)# trap neighbor-state-change-trap 
Syntax:  [no] snmp-server trap ospf < ospf-trap > 
Modifying OSPF Standard Compliance Setting 
Note  All routes in an AS should be configured with the same compliance setting. If 
any routers in a domain support only RFC 1583, then all routers must be 
configured with 1583 compatibility. 
If all the routers support RFC 2178 or RFC 2328, you should disable RFC 1583 
compatibility on all the routers in the domain, since these standards are more 
robust against routing loops on external routes. 
The switch is configured, by default, to be compliant with the RFC 1583 OSPF 
V2 specification. 
To configure a switch to operate with the latest OSPF standard, RFC 2328, 
enter the following commands: 
HPswitch(config)# router ospf
HPswitch(ospf)# no rfc1583-compatibility 
Syntax:  [no] rfc1583-compatibility 
11-52