No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

CX11x, CX31x, CX710 (Earlier Than V6.03), and CX91x Series Switch Modules V100R001C10 Configuration Guide 13

The documents describe the configuration of various services supported by the CX11x&CX31x&CX91x series switch modules The description covers configuration examples and function configurations.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Configuration Task Summary

Configuration Task Summary

After basic IS-IS functions are configured, you can build a Layer 3 network using the IS-IS protocol. If other IS-IS functions are required, configure them according to reference sections.

Table 7-41 describes the IS-IS configuration tasks.

Table 7-41 IS-IS configuration tasks

Scenario

Description

Task

Configuring basic IS-IS functions

To deploy the IS-IS protocol on IPv4 networks, configure basic IS-IS functions to enable communication between different nodes on the network. Other IS-IS features can only be configured after the basic functions are configured.

Configure Basic IS-IS Functions

Configuring IS-IS network security

On IS-IS networks, unauthorized users can attack the IS-IS network by modifying data packets or forging authorized users. To ensure security of services carried on IS-IS networks, configure the area or domain authentication and interface authentication.

Improving IS-IS Network Security

Configuring IS-IS route selection

If multiple redundant links are available in the network using the IS-IS protocol, the route in the IS-IS routing table may not be the expected optimal route. This does not meet the network planning and traffic management requirements. To optimize the IS-IS network and facilitate traffic management, more accurate control of the routes on the network is required.

Controlling IS-IS Route Selection

Configuring IS-IS routing information exchange

In practical applications, to meet network requirements, configure route policies to accurately control advertising and receiving of IS-IS routing information.

Controlling IS-IS Route Exchange

Configuring IS-IS route aggregation

Route aggregation allows multiple routes with the same IP prefix to be aggregated into one route.

Route aggregation on a large IS-IS network can effectively reduce entries in the routing table. This minimizes system resource consumption and facilitates management. In addition, if a link in the aggregated IP address segment frequently alternates between Up and Down, devices outside this segment will not be affected by the change. This prevents route flapping and improves network stability.

Configuring IS-IS Route Summarization

Configuring IS-IS route convergence

To enable IS-IS to rapidly detect the network changes, speed up the IS-IS network convergence. To minimize the effect on networks from route flapping and reduce load on the device, slow down the IS-IS network convergence.

Controlling IS-IS Route Convergence

Configuring LSP fragment extension

When information contained in the LSP data packet Protocol Data Unit (PDU) to be advertised by IS-IS increases greatly, the IS-IS device will generate multiple LSP fragments to carry and advertise more information.

Configuring LSP Fragment Extension

Configuring mesh groups

On the NBMA network, when an interface of the switch modules receives a new LSP, the LSP is flooded to other interfaces of the switch modules. On highly-connected networks that have multiple P2P links, this processing method results in repeated LSP flooding and wastes bandwidth resources.

To solve this problem, create a mesh group and add some interfaces to the group. The switch modules never floods the LSPs received at interfaces in the mesh group to other interfaces from the same group, and only floods the LSPs to interfaces from other groups or interfaces that are not configured to any mesh groups.

Configuring a Mesh Group on an NBMA Network

IS-IS Reliability

To ensure rapid recovery from failures on networks using the IS-IS protocol, adopt the solution of fast fault detection and standby link switchover. However, the IS-IS fault detection mechanism and link switchover require a long period of time, which fails to meet the requirements of services that are highly sensitive to packet loss and packet delay.

To meet requirements of these services, use BFD for IS-IS to implement fast fault detection and use IS-IS Auto FRR and IS-IS GR helper to implement fast switchover. This improves IS-IS reliability.

Configuring IS-IS Reliability

Configuring IS-IS overload

If the system cannot store new LSPs or synchronize the LSDB normally, the calculated routing information will be incorrect. In this case, the system can enter the overload state. Routes reached through the device will not be calculated, but routes directly connected to the device will not be ignored.

When an IS-IS device on the network requires upgrade or maintenance, the device needs to be temporarily isolated from the network. To prevent other devices from forwarding traffic through this node, set the overload bit for the device in question.

Configuring the Overload Bit for an IS-IS Device

Translation
Download
Updated: 2019-12-13

Document ID: EDOC1000041694

Views: 59964

Downloads: 3623

Average rating:
This Document Applies to these Products
Related Version
Related Documents
Share
Previous Next