Summary Example; Configuring Global Is-Is Parameters; Setting Authentication Passwords - Juniper JUNOSE SOFTWARE FOR E SERIES 11.3.X - IP-IPV6-IGP CONFIGURATION GUIDE 2010-10-31 Configuration Manual

Software for e series broadband services routers ip, ipv6, and igp configuration guide
Table of Contents

Advertisement

isis network point-to-point

Summary Example

Configuring Global IS-IS Parameters

Setting Authentication Passwords

area-authentication-key
Copyright © 2010, Juniper Networks, Inc.
The LAN must have only two routers.
Both routers must support the feature.
You must configure the interface at each end as a P2P connection.
If you are using numbered interfaces, both ends must be in same IPv4 subnet.
If you are using unnumbered interfaces, both ends require static ARP entry configuration.
Use to specify that the broadcast circuit is to be treated as a point-to-point circuit.
Issuing this command tears down existing adjacencies, originates or flushes LSPs, and
establishes new adjacencies
Example
host1(config-intf)#isis network point-to-point
Use the no version to restore the default value, treating the circuit as a broadcast circuit.
See isis network point-to-point
host1(config-router)#passive-interface loopback 0
host1(config-if)#interface atm 8/0
host1(config-if)#isis tag 55
host1(config-if)#isis metric 20 level-2
host1(config-if)#isis csnp-interval 30 level-1
host1(config-if)#isis hello-interval 6 level-1
host1(config-if)#isis hello-multiplier 10 level-1
host1(config-if)#isis lsp-interval 100
host1(config-if)#isis retransmit-interval 60
host1(config-if)#isis retransmit-throttle-interval 300
host1(config-if)#isis priority 80 level-1
host1(config-if)#isis circuit-type level-2-only
host1(config-intf)#no isis network point-to-point
This section describes the commands you can use to globally configure optional IS-IS
parameters.
In the following command guidelines, many parameters are preset to a default value.
Use the no version of those commands to restore default values.
You can configure simple authentication or HMAC MD5 authentication for either an area
or a domain.
Chapter 6: Configuring IS-IS
347

Advertisement

Table of Contents
loading

This manual is also suitable for:

Junose 11.3

Table of Contents