HP 5500 Ei 5500 Si Switch Series Configuration Guide
Here you can view all the pages of manual HP 5500 Ei 5500 Si Switch Series Configuration Guide. The HP manuals for Printer are available online for free. You can easily download all the documents as PDF.
Page 841
152 Configuring LSP parameters Configuring LSP timers • Specify the maximum age of LSPs. Each LSP has an age that decreases in the LSDB. An y LSP with an age of 0 is deleted from the LSDB. You can adjust the age value based on the scale of a network. To specify the maximum age of LSPs: Step Command Remarks 1. Enter system view. system-view N/A 2. Enter IS-IS view. isis [ process-id ] [ vpn-instance vpn-instance-name ] N/A 3. Specify the maximum LSP age. timer lsp-max-age...
Page 842
153 Step Command Remarks 1. Enter system view. system-view N/A 2. Enter interface view. interface interface-type interface-number N/A 3. Specify the minimum interval for sending LSPs and the maximum LSP number that can be sent at a time. isis timer lsp time [ count count ] Optional. By default, the minimum interval is 33 milliseconds, and the maximum LSP n u m b e r t h a t c a n b e s e n t a t a t i m e i s 5 . 4. Specify the LSP retransmission interval on a P2P...
Page 843
154 Enabling LSP fragment extension After LSP fragment extension is enabled for an IS-IS process, the MTUs of all the interfaces running the IS-IS process must not be less than 512; otherwise, LSP fragment extension will not take effect. A t l e a s t o n e vi r t u a l sys t e m m u s t b e c o n fi g u re d f o r t h e ro u t e r t o g e n e ra t e ex t e n d e d L S P f ra g m e n t s . A n I S - I S process allows 50 virtual systems. To enable LSP fragment extension: Step...
Page 844
155 Step Command Remarks 3. Assign a high priority to IS-IS routes. priority high { ip-prefix prefix-name | tag tag-value } Optional. Not assigned by default. If no IS-IS route is assigned a high priority, IS-IS host routes are processed first in network convergence because they have higher priority than other types of IS-IS routes. Setting the LSDB overload bit By setting the overload bit in sent LSPs, a router info rms other routers of a failure that makes it incapable of...
Page 845
156 Step Command Remarks 3. Configure a system ID to host name mapping for a remote IS. is-name map sys-id map-sys-name A system ID can only correspond to a host name. Configuring dynamic system ID to host name mapping Configure a static system ID to host name mapping for any other router in a network. When a new router is added into the network or a mapping must be mo dified, perform configuration on all routers. You can configure dynamic system ID to host name mapping. To do so, you...
Page 846
157 Enhancing IS-IS network security To enhance the security of an IS-IS network, you can configure IS-IS authentication. IS-IS authentication involves neighbor relationship authentication, area authentication and routing domain authentication. Configuration prerequisites Before you enhance IS-IS network security, complete the following tasks: • Configure IP addresses for interfaces, and make sure that all neighboring nodes can reach each other at the network layer. • Enable IS-IS....
Page 847
158 Step Command Remarks 3. Specify the area authentication mode and password. area-authentication-mode { md5 | simple } [ cipher ] password [ ip | osi ] By default, no area authentication is configured. Configuring routing domain authentication Routing domain authentication prevents untrusted routing information from entering into a routing domain. A router with the authentication configured encapsulates the password in the specified mode into Level-2 packets (LSP, CSNP, PSNP)...
Page 848
159 Step Command Remarks 5. Suppress the SA bit during restart. graceful-restart suppress-sa Optional. By default, the SA bit is not suppressed. By enabling the GR Restarter to suppress the Suppress-Advertisement (SA) bit in the hello PDUs, the neighbors will still advertise their adjacency with the GR Restarter. Configuring IS-IS NSR According to the GR feature, after a master/sla ve switchover, the GR Restarter obtains routing information from its neighbors and the IS-IS process on...
Page 849
160 traffic recovery time. Meanwhile, IS-IS calculates the shortest path based on the new network topology, and forwards packets over the path after network convergence. You can either enable IS-IS FRR to calculate a backup next hop automatically, or to designate a backup next hop with a routing policy for routes matching specific criteria. Configuration prerequisites Before you configure IS-IS FRR, complete the following tasks: • Configure IP addresses for interfaces, and make sure that all...
Page 850
161 Step Command Remarks 1. Enter system view. system-view N/A 2. Enter IS-IS view. isis [ process-id ] [ vpn-instance vpn-instance-name ] N/A 3. Enable SNMP trap. is-snmp-traps enable Enabled by default Binding an IS-IS process with MIBs Step Command Remarks 1. Enter system view. system-view N/A 2. Enter IS-IS view. isis [ process-id ] [ vpn-instance vpn-instance-name ] N/A 3. Bind the IS-IS process with MIBs. isis mib-binding process-id By default, MIBs are...