328
C
HAPTER
35: IS-IS C
ONFIGURATION
IS-IS network types
IS-IS supports two network types:
■
Broadcast networks, such as Ethernet and Token-Ring
■
Point-to-point networks, such as PPP and HDLC
For non-broadcast multi-access (NBMA) network, such as ATM, you need to
configure point-to-point or broadcast network on its sub-interfaces. IS-IS does not
run on point to multipoint (P2MP) links.
IS-IS Domain (Area)
Two-level hierarchy
The IS-IS uses two-level hierarchy in the routing domain to support large scale
routing networks. A large routing domain is divided into multiple Areas. The
Level-1 router is in charge of forwarding routes within an area, and the Level-2
router is in charge of forwarding routes between areas.
Level-1 and Level-2
1
Level-1 router
The Level-1 router only forms the neighbor relationship with Level-1 and Level-1-2
routers in the same area. The LSDB maintained by the Level-1 router contains the
local area routing information. It directs the packets out of the area to the nearest
Level-1-2 router.
2
Level-2 router
The Level-2 router forms the neighbor relationship with the Level-2 and Level-1-2
routers in the same or in different areas. It maintains a Level-2 LSDB which
contains routing information for routing between areas. All Level-2 routers must
be contiguous to form the backbone in a routing domain. Only Level-2 routers can
directly communicate with routers outside the routing domain.
3
Level-1-2 router
A router functions as a Level-1 and a Level-2 router is called a Level-1-2 router. It
can form the Level-1 neighbor relationships with the Level-1 and Level-1-2 routers
in the same area, or form Level-2 neighbor relationships with the Level-2 and
Level-1-2 routers in the same area or in different areas. A Level-1 router can be
connected to other areas only via a Level-1-2 router. The Level-1-2 router
maintains two LSDBs, where the Level-1 LSDB is for routing within the area, and
the Level-2 LSDB is for routing between areas.
n
Level-1 routers in different areas cannot form neighbor relationships.
Level-2 routers in different areas can form neighbor relationships.
Figure 76 shows a network topology running the IS-IS protocol. Area 1 is a set of
the Level-2 routers, called backbone network. The other four areas are
non-backbone networks connected to the backbone through Level-1-2 routers.
Summary of Contents for Switch 7757
Page 32: ...32 CHAPTER 1 CLI OVERVIEW...
Page 70: ...70 CHAPTER 5 LOGGING IN USING MODEM...
Page 76: ...76 CHAPTER 7 LOGGING IN THROUGH NMS...
Page 86: ...86 CHAPTER 9 CONFIGURATION FILE MANAGEMENT...
Page 120: ...120 CHAPTER 13 ISOLATE USER VLAN CONFIGURATION...
Page 126: ...126 CHAPTER 14 SUPER VLAN...
Page 136: ...136 CHAPTER 16 IP PERFORMANCE CONFIGURATION...
Page 152: ...152 CHAPTER 17 IPX CONFIGURATION...
Page 164: ...164 CHAPTER 19 QINQ CONFIGURATION...
Page 172: ...172 CHAPTER 21 SHARED VLAN CONFIGURATION...
Page 182: ...182 CHAPTER 22 PORT BASIC CONFIGURATION...
Page 198: ...198 CHAPTER 24 PORT ISOLATION CONFIGURATION...
Page 208: ...208 CHAPTER 25 PORT SECURITY CONFIGURATION...
Page 224: ...224 CHAPTER 27 DLDP CONFIGURATION...
Page 232: ...232 CHAPTER 28 MAC ADDRESS TABLE MANAGEMENT...
Page 240: ...240 CHAPTER 29 CENTRALIZED MAC ADDRESS AUTHENTICATION CONFIGURATION...
Page 280: ...280 CHAPTER 30 MSTP CONFIGURATION...
Page 348: ...348 CHAPTER 35 IS IS CONFIGURATION...
Page 408: ...408 CHAPTER 39 802 1X CONFIGURATION...
Page 412: ...412 CHAPTER 40 HABP CONFIGURATION...
Page 422: ...422 CHAPTER 41 MULTICAST OVERVIEW...
Page 426: ...426 CHAPTER 42 GMRP CONFIGURATION...
Page 480: ...480 CHAPTER 47 PIM CONFIGURATION...
Page 506: ...506 CHAPTER 48 MSDP CONFIGURATION...
Page 552: ...552 CHAPTER 51 TRAFFIC ACCOUNTING CONFIGURATION...
Page 570: ...570 CHAPTER 53 HA CONFIGURATION...
Page 582: ...582 CHAPTER 54 ARP CONFIGURATION SwitchA arp protective down recover interval 200...
Page 622: ...622 CHAPTER 58 DHCP RELAY AGENT CONFIGURATION...
Page 684: ...684 CHAPTER 61 QOS CONFIGURATION...
Page 718: ...718 CHAPTER 63 CLUSTER...
Page 738: ...738 CHAPTER 67 UDP HELPER CONFIGURATION...
Page 752: ...752 CHAPTER 69 RMON CONFIGURATION...
Page 772: ...772 CHAPTER 70 NTP CONFIGURATION...
Page 796: ...796 CHAPTER 72 FILE SYSTEM MANAGEMENT...
Page 802: ...802 CHAPTER 73 BIMS CONFIGURATION...
Page 814: ...814 CHAPTER 74 FTP AND TFTP CONFIGURATION...
Page 830: ...830 CHAPTER 75 INFORMATION CENTER...
Page 836: ...836 CHAPTER 76 DNS CONFIGURATION...
Page 852: ...852 CHAPTER 77 BOOTROM AND HOST SOFTWARE LOADING...
Page 858: ...858 CHAPTER 78 BASIC SYSTEM CONFIGURATION DEBUGGING...