- Written by Vivek Ilangovan
- Posted on October 24, 2024
- Updated on October 24, 2024
- 439 Views
Proxy node segment helps in advertising segments in a segment-routing domain for prefixes that are originated outside the segment-routing domain. Node B in the SR domain can advertise proxy-segments to node A for the loopacks of C and D which are not present in the SR domain. This feature will help in creating mpls routes for those loopbacks on node B. Note that if C and D loopbacks have LDP enabled and if they have exchanged the LDP labels with B then B can by default create a SR to LDP stitched mpls route even without enabling this feature. This feature is specific to the case where such stitched routes cannot be created.
- Written by Vivek Ilangovan
- Posted on July 2, 2024
- Updated on July 3, 2024
- 1565 Views
Segment Routing Traffic Engineering Policy (SR-TE) aka SR Policy makes use of Segment Routing (SR) to allow a headend to steer traffic along any path without maintaining per flow state in every node. A headend steers traffic into an SR Policy. SR-TE policies allow creating segment lists using segments along the shortest path or along a flex algo path. These policies can be traffic engineered to avoid the shortest or flex-algo paths.
- Written by Vivek Ilangovan
- Posted on June 19, 2022
- Updated on October 11, 2024
- 6279 Views
This feature allows redistribution of bgp unicast routes into multicast address families. Specifically it allows redistribution of ipv4 unicast routes into the ipv4 multicast address family and ipv6 unicast routes into the ipv6 multicast address family.
- Written by Vivek Ilangovan
- Posted on November 12, 2019
- Updated on November 12, 2019
- 6951 Views
This feature implements support for RFC6232 that helps a user identify source of an LSP purge packet. It can be enabled
- Written by Vivek Ilangovan
- Posted on January 18, 2019
- Updated on July 20, 2023
- 6874 Views
This feature implements RFC 5310 that allows IS-IS PDUs to be authenticated using following secure hash algorithms (SHA): SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512. The feature is supported in both default and non-default vrf. Unlike the existing authentication scheme based on MD5 and ClearText, with this feature two IS-IS nodes can be configured with different SHA algorithm and secret-key and can still exchange IS-IS PDUs.