- Written by Vivek Ilangovan
- Posted on 10月 24, 2024
- Updated on 10月 24, 2024
- 147 Views
Proxy node segment helps in advertising segments in a segment-routing domain for prefixes that are originated outside the segment-routing domain. Node B in the SR domain can advertise proxy-segments to node A for the loopacks of C and D which are not present in the SR domain. This feature will help in creating mpls routes for those loopbacks on node B. Note that if C and D loopbacks have LDP enabled and if they have exchanged the LDP labels with B then B can by default create a SR to LDP stitched mpls route even without enabling this feature. This feature is specific to the case where such stitched routes cannot be created.
- Written by Vivek Ilangovan
- Posted on 7月 2, 2024
- Updated on 7月 3, 2024
- 1270 Views
Segment Routing Traffic Engineering Policy (SR-TE) aka SR Policy makes use of Segment Routing (SR) to allow a headend to steer traffic along any path without maintaining per flow state in every node. A headend steers traffic into an SR Policy. SR-TE policies allow creating segment lists using segments along the shortest path or along a flex algo path. These policies can be traffic engineered to avoid the shortest or flex-algo paths.
- Written by Vivek Ilangovan
- Posted on 6月 19, 2022
- Updated on 10月 11, 2024
- 5972 Views
This feature allows redistribution of bgp unicast routes into multicast address families. Specifically it allows redistribution of ipv4 unicast routes into the ipv4 multicast address family and ipv6 unicast routes into the ipv6 multicast address family.
- Written by Vivek Ilangovan
- Posted on 11月 12, 2019
- Updated on 11月 12, 2019
- 6675 Views
This feature implements support for RFC6232 that helps a user identify source of an LSP purge packet. It can be enabled
- Written by Vivek Ilangovan
- Posted on 1月 18, 2019
- Updated on 7月 20, 2023
- 6591 Views
This feature implements RFC 5310 that allows IS-IS PDUs to be authenticated using following secure hash algorithms (SHA): SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512. The feature is supported in both default and non-default vrf. Unlike the existing authentication scheme based on MD5 and ClearText, with this feature two IS-IS nodes can be configured with different SHA algorithm and secret-key and can still exchange IS-IS PDUs.