- Written by Sarah Chen
- Posted on 10月 9, 2019
- Updated on 10月 9, 2019
- 3286 Views
The General Router ID configuration provides the ability to configure a common Router ID for all routing protocols
- Written by Azad Kumar
- Posted on 1月 3, 2023
- Updated on 1月 3, 2023
- 1422 Views
ISIS Leaked Route Summarization is a feature which summarizes all the L1 leaked routes in L2 routers. With the help of this L2 LSP size reduces (smaller no of routes in L2 LSP).
- Written by Vivek Ilangovan
- Posted on 11月 12, 2019
- Updated on 11月 12, 2019
- 2783 Views
This feature implements support for RFC6232 that helps a user identify source of an LSP purge packet. It can be enabled
- Written by Arpit Bansal
- Posted on 8月 18, 2020
- Updated on 8月 18, 2020
- 2982 Views
Level 1 2 routers set attached bit in their Level 1 LSPs to indicate their reachability to the rest of the network. A
- Written by Romi Kumar
- Posted on 8月 16, 2018
- Updated on 2月 6, 2022
- 2924 Views
This feature allows user to configure adjacency SID of global scope for IS IS adjacencies. It is an extension to IS IS
- Written by Shimang Kumar
- Posted on 6月 19, 2022
- Updated on 6月 20, 2022
- 2157 Views
This feature enables the support of maximum SID depth advertisement by the IS-IS protocol in its LSPDB as defined in RFC8491, with this feature adding support for one type of MSD: Base MPLS Imposition (BMI-MSD).
- Written by Deeksha Srivastava
- Posted on 4月 16, 2020
- Updated on 4月 22, 2020
- 3616 Views
When there are multiple VRFs on the device and there is a need to share routes between them, typically for shared
- Written by Deeksha Srivastava
- Posted on 6月 3, 2020
- Updated on 6月 29, 2023
- 3942 Views
VRF Route leaking can be used when routes from one VRF are required in another VRF (e.g. in case of shared services). If VrfLeak Agent is being used to leak routes, the leaked routes (in destination VRF) can be redistributed into IGPs.
- Written by Shashank Manjunath
- Posted on 6月 5, 2023
- Updated on 6月 14, 2023
- 518 Views
This feature adds support for configuring multiple authentication keys each with a specified lifetime using a shared secret profile. With a shared secret profile, a current key (key having the most recent start time) is automatically picked as per the lifetime specified. Authentication types supported are MD5 and SHA. The feature can be configured at both global and interface level. SHA algorithms supported are SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512.
- Written by Hariram Natarajan
- Posted on 1月 16, 2020
- Updated on 1月 17, 2020
- 2619 Views
Configuring the IGP cost for tunnels is a feature that allows influencing the BGP best path selection for routes