TAILIEUCHUNG - The Complete IS-IS Routing Protocol- P36

The Complete IS-IS Routing Protocol- P36: IS-IS has always been my favourite Interior Gateway Protocol. Its elegant simplicity, its well-structured data formats, its flexibility and easy extensibility are all appealing – IS-IS epitomizes link-state routing. Whether for this reason or others, IS-IS is the IGP of choice in some of the world’s largest networks. | 350 13. IS-IS Extensions hannes@Frankfurt show isis database extensive . TLVs Area address 3 Speaks IP IPv6 IP router id IP address Hostname Stockholm IS neighbor Metric 1 IP address . IOS command output London show isis database verbose IS-IS Level-2 Link State Database LSPID LSP Seq Num LSP Checksum LSP Holdtime ATT P OL . 0x00000040 0xD323 491 0 0 0 Area Address NLPID 0x81 IS neighbor Metric 63 . The LSP shown in the IOS command output does not contain the Hostname TLV. As it does not list any IP-related TLVs it may be that this is a CLNS-only router that is probably running older software that does not support the Hostname TLV. If the hostnames made their way into the hostname cache then all IS-IS occurrences of the System-ID are replaced using their respective name. See Table for how Pennsauken s System Node and LSP-IDs are represented using the new name resolution service. Today IS-IS is one of the most convenient routing protocols. It aids the network engineer and troubleshooter by offering a kind of distributed name service. All of the IS-IS-related display functions like displaying adjacencies examining the link-state database or logging functions make use of a System-ID to hostname translation cache and display System-IDs Node-IDs and LSP-IDs with their name rather than their hexadecimal representation. The next extension to IS-IS will cover the authentication scheme of LSPs and their implementation. Authenticating Routing Information 351 Authenticating Routing Information Authenticating routing protocol messages is a basic building block for every network security strategy. Some people argue that authentication is pushing the envelope for IS-IS since all the messages run natively on Layer 2 which means that the protocol cannot be exposed to a remote attack from the Internet because there is simply no possibility for .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.