- Written by Sarah Chen
- Posted on 10月 9, 2019
- Updated on 10月 9, 2019
- 7542 Views
The General Router ID configuration provides the ability to configure a common Router ID for all routing protocols
- Written by Azad Kumar
- Posted on 1月 3, 2023
- Updated on 1月 3, 2023
- 5510 Views
ISIS Leaked Route Summarization is a feature which summarizes all the L1 leaked routes in L2 routers. With the help of this L2 LSP size reduces (smaller no of routes in L2 LSP).
- Written by Vivek Ilangovan
- Posted on 11月 12, 2019
- Updated on 11月 12, 2019
- 6789 Views
This feature implements support for RFC6232 that helps a user identify source of an LSP purge packet. It can be enabled
- Written by Arpit Bansal
- Posted on 8月 18, 2020
- Updated on 8月 18, 2020
- 7158 Views
Level 1 2 routers set attached bit in their Level 1 LSPs to indicate their reachability to the rest of the network. A
- Written by Romi Kumar
- Posted on 8月 16, 2018
- Updated on 2月 6, 2022
- 6687 Views
This feature allows user to configure adjacency SID of global scope for IS IS adjacencies. It is an extension to IS IS
- Written by Shimang Kumar
- Posted on 6月 19, 2022
- Updated on 6月 20, 2022
- 6087 Views
This feature enables the support of maximum SID depth advertisement by the IS-IS protocol in its LSPDB as defined in RFC8491, with this feature adding support for one type of MSD: Base MPLS Imposition (BMI-MSD).
- Written by Deeksha Srivastava
- Posted on 4月 16, 2020
- Updated on 4月 22, 2020
- 8509 Views
When there are multiple VRFs on the device and there is a need to share routes between them, typically for shared
- Written by Deeksha Srivastava
- Posted on 6月 3, 2020
- Updated on 6月 29, 2023
- 9180 Views
VRF Route leaking can be used when routes from one VRF are required in another VRF (e.g. in case of shared services). If VrfLeak Agent is being used to leak routes, the leaked routes (in destination VRF) can be redistributed into IGPs.
- Written by David Cronin
- Posted on 3月 3, 2022
- Updated on 11月 7, 2024
- 11970 Views
Routing Control Functions (RCF) is a language that can express route filtering and attribute modification logic in a powerful and programmatic fashion.The document covers: Configurations of a RCF function for BGP points of application
- Written by Shashank Manjunath
- Posted on 6月 5, 2023
- Updated on 9月 18, 2024
- 4065 Views
This feature adds support for configuring multiple authentication keys each with a specified lifetime using a shared secret profile. With a shared secret profile, a current key (key having the most recent start time) is automatically picked as per the lifetime specified. Authentication types supported are MD5 and SHA. The feature can be configured at both global and interface level. SHA algorithms supported are SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512.
- Written by Hariram Natarajan
- Posted on 1月 16, 2020
- Updated on 1月 17, 2020
- 5951 Views
Configuring the IGP cost for tunnels is a feature that allows influencing the BGP best path selection for routes