No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


CX11x, CX31x, CX710 (Earlier Than V6.03), and CX91x Series Switch Modules V100R001C10 Configuration Guide 12

The documents describe the configuration of various services supported by the CX11x&CX31x&CX91x series switch modules The description covers configuration examples and function configurations.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Configuration Task Summary

Configuration Task Summary

After basic IS-IS(IPv6) functions are configured, you can build a Layer 3 network using the IS-IS(IPv6) protocol. If other IS-IS(IPv6) functions are required, configure them according to reference sections.

Table 7-45 describes the IS-IS configuration tasks.

Table 7-45 IS-IS configuration tasks




Configuring basic IS-IS(IPv6) functions

To deploy the IS-IS protocol on IPv6 networks, configure basic IS-IS functions to enable communication between different nodes on the network. Other IS-IS features can only be configured after the basic functions are configured.

Configuring Basic IPv6 IS-IS Functions

Configuring IS-IS(IPv6) network security

On IS-IS networks, unauthorized users can attack the IS-IS network by modifying data packets or forging authorized users. To ensure security of services carried on IS-IS networks, configure the area or domain authentication and interface authentication.

Improving IPv6 IS-IS Network Security

Configuring IS-IS(IPv6) route selection

If multiple redundant links are available in the network using the IS-IS protocol, the route in the IS-IS routing table may not be the expected optimal route. This does not meet the network planning and traffic management requirements. To optimize the IS-IS network and facilitate traffic management, more accurate control of the routes on the network is required.

Controlling IPv6 IS-IS Route Selection

Configuring IS-IS(IPv6) routing information exchange

In practical applications, to meet network requirements, configure route policies to accurately control advertising and receiving of IS-IS routing information.

Controlling IPv6 IS-IS Route Exchange

Configuring IS-IS(IPv6) route aggregation

Route aggregation allows multiple routes with the same IP prefix to be aggregated into one route.

Route aggregation on a large IS-IS network can effectively reduce entries in the routing table. This minimizes system resource consumption and facilitates management. In addition, if a link in the aggregated IP address segment frequently alternates between Up and Down, devices outside this segment will not be affected by the change. This prevents route flapping and improves network stability.

Configuring IPv6 IS-IS Route Summarization

Configuring IS-IS(IPv6) route convergence

To enable IS-IS to rapidly detect the network changes, speed up the IS-IS network convergence. To minimize the effect on networks from route flapping and reduce load on the device, slow down the IS-IS network convergence.

Controlling IPv6 IS-IS Route Convergence

Configuring LSP fragment extension

When information contained in the LSP data packet Protocol Data Unit (PDU) to be advertised by IS-IS increases greatly, the IS-IS device will generate multiple LSP fragments to carry and advertise more information.

Configuring LSP Fragment Extension

Configuring mesh groups

On the NBMA network, when an interface of the switch modules receives a new LSP, the LSP is flooded to other interfaces of the switch modules. On highly-connected networks that have multiple P2P links, this processing method results in repeated LSP flooding and wastes bandwidth resources.

To solve this problem, create a mesh group and add some interfaces to the group. The switch modules never floods the LSPs received at interfaces in the mesh group to other interfaces from the same group, and only floods the LSPs to interfaces from other groups or interfaces that are not configured to any mesh groups.

Configuring a Mesh Group on an NBMA Network

Configuring BFD for IS-IS(IPv6)

To ensure rapid recovery from failures on networks using the IS-IS protocol, adopt the solution of fast fault detection and standby link switchover. However, the IS-IS fault detection mechanism and link switchover require a long period of time, which fails to meet the requirements of services that are highly sensitive to packet loss and packet delay. To ensure that users of delay-sensitive services such as voice service do not detect the service interruption, associate IS-IS with BFD to implement fast fault detection.

Configuring Dynamic IPv6 BFD for IS-IS

Configuring IS-IS(IPv6) auto FRR

With the development of networks, Voice over IP (VoIP) and online video services require high-quality real-time transmission. Nevertheless, if an IS-IS fault occurs, multiple processes including fault detection, LSP update, LSP flooding, route calculation, and FIB entry delivery must be performed to switch traffic to a new link. As a result, the traffic interruption time is much longer than 50 ms, which cannot meet the requirement for real-time services.

IS-IS auto FRR can rapidly switch traffic to the standby link, avoiding traffic interruption. This protects the traffic and improves reliability of the IS-IS network. As a result, IS-IS auto FRR is applicable to services that are highly sensitive to packet delay and packet loss.

Configuring IPv6 IS-IS Auto FRR

Configuring IS-IS(IPv6) overload

If the system cannot store new LSPs or synchronize the LSDB normally, the calculated routing information will be incorrect. In this case, the system can enter the overload state. Routes reached through the device will not be calculated, but routes directly connected to the device will not be ignored.

When an IS-IS device on the network requires upgrade or maintenance, the device needs to be temporarily isolated from the network. To prevent other devices from forwarding traffic through this node, set the overload bit for the device in question.

Configuring the Overload Bit for an IS-IS Device

Updated: 2019-08-09

Document ID: EDOC1000041694

Views: 57133

Downloads: 3617

Average rating:
This Document Applies to these Products
Related Version
Related Documents
Previous Next