IS-IS authentication configuration example
Network requirements
As shown in
domain.
Router A, Router B, and Router C belong to Area 10, and Router D belongs to Area 20.
Configure neighbor relationship authentication between neighbors. Configure area authentication in
Area 10 to prevent untrusted routes from entering into the area. Configure routing domain authentication
on Router C and Router D to prevent untrusted routes from entering the routing domain.
Figure 43 Network diagram
Configuration procedure
1.
Configure IP addresses for interfaces. (Details not shown.)
2.
Configure basic IS-IS:
# Configure Router A.
<RouterA> system-view
[RouterA] isis 1
[RouterA-isis-1] network-entity 10.0000.0000.0001.00
[RouterA-isis-1] is-level level-1
[RouterA-isis-1] quit
[RouterA] interface ethernet 1/1
[RouterA-Ethernet1/1] isis enable 1
[RouterA-Ethernet1/1] quit
# Configure Router B.
<RouterB> system-view
[RouterB] isis 1
[RouterB-isis-1] network-entity 10.0000.0000.0002.00
[RouterB-isis-1] is-level level-1
[RouterB-isis-1] quit
[RouterB] interface ethernet 1/1
[RouterB-Ethernet1/1] isis enable 1
[RouterB-Ethernet1/1] quit
Figure
43, Router A, Router B, Router C, and Router D reside in the same IS-IS routing
165