28.06.2014 Views

Discussion

Discussion

Discussion

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Level Adjacencies Priority Metric Hello (s) Hold (s) Designated Router<br />

1 0 64 0 Passive<br />

2 0 64 0 Passive<br />

Unlike OSPF, which has a “sticky” DR, in IS-IS, if a new router with a higher priority<br />

than the existing DR becomes active, or if the new router has an equal priority<br />

and a higher MAC address, it becomes the new DR. In this recipe, for RouterH to<br />

become the DR, its priority needs to be greater than 64. After changing the value,<br />

you see that RouterH has become the Level 2 DR:<br />

aviva@RouterG> show isis interface<br />

IS-IS interface database:<br />

Interface L CirID Level 1 DR Level 2 DR L1/L2 Metric<br />

fe-0/0/1.0 3 0x2 RouterG.02 RouterH.02 10/10<br />

fe-1/0/0.0 1 0x3 RouterA.02 Disabled 10/10<br />

lo0.0 0 0x1 Passive Passive 0/0<br />

Looking at RouterH, you see it has a DR priority of 65:<br />

aviva@RouterH> show isis interface fe-0/0/1 detail<br />

IS-IS interface database:<br />

fe-0/0/1.0<br />

Index: 67, State: 0x6, Circuit id: 0x2, Circuit type: 3<br />

LSP interval: 100 ms, CSNP interval: 10 s<br />

Level Adjacencies Priority Metric Hello (s) Hold (s) Designated Router<br />

1 0 64 10 9.000 27<br />

2 1 65 10 3.000 9 RouterH.02 (us)<br />

11.7 Enabling IS-IS Authentication<br />

Problem<br />

You want to ensure that all IS-IS protocol traffic that your router accepts comes from<br />

devices known to you so that only trusted routers participate in determining the contents<br />

of the IS-IS routing database.<br />

Solution<br />

Configure MD5 authentication for IS-IS:<br />

[edit protocols isis]<br />

aviva@RouterG# set level 2 authentication-type md5<br />

aviva@RouterG# set level 2 authentication-key $1991poPPi<br />

<strong>Discussion</strong><br />

It is a good security measure to authenticate IS-IS protocol packet exchanges to<br />

ensure that only trusted routers participate in the IS-IS network and in the exchange<br />

of LSA packets.<br />

This recipe shows how to configure IS-IS to use MD5 authentication for the Level 2<br />

area. First you configure MD5 authentication for the entire area, then you set the<br />

366 | Chapter 11: IS-IS<br />

This is the Title of the Book, eMatter Edition<br />

Copyright © 2008 O’Reilly & Associates, Inc. All rights reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!