Differences

This shows you the differences between two versions of the page.

ppslc [2009/09/13 14:37] (current)
Line 1: Line 1:
 +====== ISIS point to point configuration ======
 +Point to point configuration is the most used IS-IS configuration in real networks. The following configuration examples are treated in this chapter:
 +
 +  * ISIS point to point configuration with two routers in the same area
 +  * ISIS point to point configuration with two routers in different areas
 +  * ISIS point to point configuration with two routers in different areas and with authentication
 +  * ISIS point to point configuration with two routers in different areas with route summarization
 +
 +For easy traceability every configuration example is completed with a graphic of the network topology and also with the most important configuration-, show- and debug output. The used configuration and troubleshooting commands are explained in the [[konfiguration|configuration section]] and in the [[troubleshooting| troublehooting section]] of this paper.
 +
 +
 +===== ISIS point to point configuration with two routers in the same area =====
 +((IS-IS Network Design Solutions page 261))
 +
 +
 +{{isis_same_area-the_correct_one.jpg?600}}((IS-IS Network Design Solutions page 261 - figure 9-1))
 +
 +==== configuration ====
 +
 +[[Router1|Router1]]
 +
 +[[Router2|Router2]]
 +
 +
 +===== ISIS point to point configuration with two routers in different areas =====
 +((IS-IS Network Design Solutions page 262 to 266))
 +
 +
 +{{isis-different_areas.jpg?600}}((IS-IS Network Design Solutions page 262 - figure 9-2))
 +
 +==== configuration ====
 +
 +[[Router1differentareas|Router1]]
 +
 +[[Router2differentareas|Router2]]
 +
 +===== ISIS point to point configuration with two routers in different areas and with authentication =====
 +((IS-IS Network Design Solutions page 284 to 296))
 +
 +
 +{{isis_same_route-sum.jpg?600}}((IS-IS Network Design Solutions page 285 - figure 9-15))
 +
 +==== configuration ====
 +
 +[[Router1differentareasauthentication|Router1]]
 +
 +[[Router2differentareasauthentication|Router2]]
 +
 +
 +
 +===== ISIS point to point configuration with two routers in different areas with route summarization =====
 +((IS-IS Network Design Solutions page 278 to 280))
 +
 +
 +{{isis_same_route-sum.jpg?600}}((IS-IS Network Design Solutions page 279 - figure 9-11))
 +
 +==== configuration ====
 +
 +[[Router1differentareassumm|Router1]]
 +
 +[[Router2differentareassumm|Router2]]
 +
 +[[Host1differentareassumm|Host]]
 +
 +----
 +[[vorlageRouter|Router Vorlage]]
 +
 +----
 +
 +__Sources:__
 +
 +Abe Martey, IS-IS Network Design Solution, Chapter 9 - page 259 - 297 \\
 +the [[konfiguration|configuration section]] and the [[troubleshooting| troublehooting section]] of this paper
 
ppslc.txt · Last modified: 2009/09/13 14:37 (external edit)
 
Except where otherwise noted, content on this wiki is licensed under the following license:CC Attribution-Noncommercial-Share Alike 3.0 Unported
Recent changes RSS feed Donate Powered by PHP Valid XHTML 1.0 Valid CSS Driven by DokuWiki