- Written by Sarah Chen
- Posted on October 9, 2019
- Updated on October 9, 2019
- 7639 Views
The General Router ID configuration provides the ability to configure a common Router ID for all routing protocols
- Written by Azad Kumar
- Posted on January 3, 2023
- Updated on January 3, 2023
- 5611 Views
ISIS Leaked Route Summarization is a feature which summarizes all the L1 leaked routes in L2 routers. With the help of this L2 LSP size reduces (smaller no of routes in L2 LSP).
- Written by Vivek Ilangovan
- Posted on November 12, 2019
- Updated on November 12, 2019
- 6886 Views
This feature implements support for RFC6232 that helps a user identify source of an LSP purge packet. It can be enabled
- Written by Arpit Bansal
- Posted on August 18, 2020
- Updated on August 18, 2020
- 7253 Views
Level 1 2 routers set attached bit in their Level 1 LSPs to indicate their reachability to the rest of the network. A
- Written by Romi Kumar
- Posted on August 16, 2018
- Updated on February 6, 2022
- 6783 Views
This feature allows user to configure adjacency SID of global scope for IS IS adjacencies. It is an extension to IS IS
- Written by Shimang Kumar
- Posted on June 19, 2022
- Updated on June 20, 2022
- 6178 Views
This feature enables the support of maximum SID depth advertisement by the IS-IS protocol in its LSPDB as defined in RFC8491, with this feature adding support for one type of MSD: Base MPLS Imposition (BMI-MSD).
- Written by Deeksha Srivastava
- Posted on April 16, 2020
- Updated on April 22, 2020
- 8620 Views
When there are multiple VRFs on the device and there is a need to share routes between them, typically for shared
- Written by Deeksha Srivastava
- Posted on June 3, 2020
- Updated on June 29, 2023
- 9289 Views
VRF Route leaking can be used when routes from one VRF are required in another VRF (e.g. in case of shared services). If VrfLeak Agent is being used to leak routes, the leaked routes (in destination VRF) can be redistributed into IGPs.
- Written by David Cronin
- Posted on March 3, 2022
- Updated on December 2, 2024
- 12137 Views
Routing Control Functions (RCF) is a language that can express route filtering and attribute modification logic in a powerful and programmatic fashion.The document covers: Configurations of a RCF function for BGP points of application
- Written by Shashank Manjunath
- Posted on June 5, 2023
- Updated on September 18, 2024
- 4166 Views
This feature adds support for configuring multiple authentication keys each with a specified lifetime using a shared secret profile. With a shared secret profile, a current key (key having the most recent start time) is automatically picked as per the lifetime specified. Authentication types supported are MD5 and SHA. The feature can be configured at both global and interface level. SHA algorithms supported are SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512.
- Written by Hariram Natarajan
- Posted on January 16, 2020
- Updated on January 17, 2020
- 6044 Views
Configuring the IGP cost for tunnels is a feature that allows influencing the BGP best path selection for routes