To disable a specific debug command, enter the keyword
no
then the
debug
command. For example, to disable debugging of IS-IS
updates, use the
no debug isis updates-packets
command.
To disable all IS-IS debugging, use the
no debug isis
command.
To disable all debugging, use the
undebug all
command.
IS-IS Metric Styles
The following sections provide additional information about the IS-IS metric styles.
•
Configuring the IS-IS Metric Style
•
Dell Networking OS supports the following IS-IS metric styles:
•
narrow (supports only type, length, and value [TLV] up to 63)
•
wide (supports TLV up to 16777215)
•
transition (supports both narrow and wide and uses a TLV up to 63)
•
narrow transition (accepts both narrow and wide and sends only narrow or old-style TLV)
•
wide transition (accepts both narrow and wide and sends only wide or new-style TLV)
Configure Metric Values
For any level (Level-1, Level-2, or Level-1-2), the value range possible in the
isis metric
command in INTERFACE mode changes
depending on the metric style.
The following describes the correct value range for the
isis metric
command.
Metric Style
Correct Value Range for the isis metric Command
wide
0 to 16777215
narrow
0 to 63
wide transition
0 to 16777215
narrow transition
0 to 63
transition
0 to 63
Maximum Values in the Routing Table
IS-IS metric styles support different cost ranges for the route. The cost range for the narrow metric style is 0 to 1023, while all other metric
styles support a range of 0 to 0xFE000000.
Change the IS-IS Metric Style in One Level Only
By default, the IS-IS metric style is narrow. When you change from one IS-IS metric style to another, the IS-IS metric value (configured
with the
isis metric
command) could be affected.
In the following scenarios, the IS-type is either Level-1 or Level-2 or Level-1-2 and the metric style changes.
Intermediate System to Intermediate System
415
Summary of Contents for S3048-ON
Page 1: ...Dell Configuration Guide for the S3048 ON System 9 11 2 5 ...
Page 137: ...0 Gi 1 1 Gi 1 2 rx Flow N A N A 0 0 No N A N A yes Access Control Lists ACLs 137 ...
Page 142: ...Figure 10 BFD Three Way Handshake State Changes 142 Bidirectional Forwarding Detection BFD ...
Page 241: ...Dell Control Plane Policing CoPP 241 ...
Page 287: ... RPM Synchronization GARP VLAN Registration Protocol GVRP 287 ...
Page 428: ...Figure 53 Inspecting the LAG Configuration 428 Link Aggregation Control Protocol LACP ...
Page 477: ...Figure 73 Configuring Interfaces for MSDP Multicast Source Discovery Protocol MSDP 477 ...
Page 478: ...Figure 74 Configuring OSPF and BGP for MSDP 478 Multicast Source Discovery Protocol MSDP ...
Page 483: ...Figure 77 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 483 ...
Page 484: ...Figure 78 MSDP Default Peer Scenario 3 484 Multicast Source Discovery Protocol MSDP ...
Page 745: ...Figure 104 Single and Double Tag TPID Match Service Provider Bridging 745 ...
Page 746: ...Figure 105 Single and Double Tag First byte TPID Match 746 Service Provider Bridging ...