Dell S6000 FTOS 9.0(2.0) Command Line Reference Guide for the System - Page 518
for IPv4, however, Domain-wide Prefix Distribution with, Two-Level IS-IS., Defaults, Command Modes
View all Dell S6000 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 518 highlights
www.dell.com | support.dell.com level2-into-level1 prefix-list-name Enter the keyword level2-into-level1 to advertise Level 2 inter-area routes into Level 1 LSPs. Described in RFC 2966. Enter the name of a configured IP prefix list. Routes meeting the criteria of the IP Prefix list are leaked. Defaults level1-into-level2 ( Level 1 to Level 2 leaking enabled.) Command Modes ROUTER ISIS (for IPv4) CONFIGURATION-ROUTER-ISIS-ADDRESS-FAMILY-IPV6 (for IPv6) Command History Version 9.0.2.0 Version 8.3.11.1 Version 8.3.7.0 Introduced on the S6000. Introduced on Z9000 Introduced on the S4810. Usage You cannot disable leaking from one level to another, however you can regulate the rate flow from one Information level to another via an IP Prefix list. If the IP Prefix list is not configured, all routes are leaked. Additional information can be found in IETF RFC 2966, Domain-wide Prefix Distribution with Two-Level IS-IS. area-password S6000 Configure a Hash Message Authentication Code (HMAC) authentication password for an area. Syntax area-password [hmac-md5 | encryption-type ] password To delete a password, enter no area-password. Parameters hmac-md5 encryption-type password (OPTIONAL) Enter the keyword hmac-md5 to encrypt the password. (OPTIONAL) Enter 7 to encrypt the password using DES. Enter a 1-16-character length alphanumeric string to prevent unauthorized access or incorrect routing information corrupting the link state database. The password is processed as plain text which only provides limited security. Defaults Not configured. Command Modes ROUTER ISIS Command History Version 9.0.2.0 Version 8.3.7.0 Introduced on S6000. Introduced on the S4810. Usage Use the area-password command on routers within an area to prevent the link state database from Information receiving incorrect routing information from unauthorized routers. The password configured is injected into Level 1 LSPs, CSNPs, and PSNPs. 518 |