F3726, F3211, F3174, R5135, R3816-HP Firewalls and UTM Devices Network Management Configuration Guide-6PW100

441
Ste
p
Command
Remarks
405. Specify the maximum length
of generated Level-1 LSPs or
Level-2 LSPs.
lsp-length originate size [ level-1 |
level-2 ]
By default, the maximum length of
generated Level-1 LSPs or Level-2
LSPs is 1497 bytes.
406. Specify the maximum length
of received LSPs.
lsp-length receive size
By default, the maximum length of
received LSPs is 1497 bytes.
1465BEnabling LSP flash flooding
Changed LSPs can trigger SPF recalculation. To advertise the changed LSPs before the router recalculates
routes for faster network convergence, enable LSP flash flooding.
To enable LSP flash flooding:
Ste
p
Command
Remarks
407. Enter system view.
system-view N/A
408. Enter IS-IS view. isis [ process-id ] [ vpn-instance vpn-instance-name ]
N/A
409. Enable LSP flash
flooding.
flash-flood [ flood-count flooding-count |
max-timer-interval flooding-interval | [ level-1 |
level-2 ] ] *
By default, LSP flash
flooding is disabled.
1466BEnabling LSP fragment extension
After LSP fragment extension is enabled for an IS-IS process, the MTUs of all the interfaces running the
IS-IS process must not be less than 512. Otherwise, LSP fragment extension will not take effect.
At least one virtual system must be configured for the router to generate extended LSP fragments. An IS-IS
process allows a maximum of 50 virtual systems.
To enable LSP fragment extension:
Ste
p
Command
Remarks
410. Enter system view.
system-view N/A
411. Enter IS-IS view.
isis [ process-id ] [ vpn-instance
vpn-instance-name ]
N/A
412. Enable LSP fragment
extension and specify the
working mode.
lsp-fragments-extend [ [ level-1 | level-1-2 |
level-2 ] | [ mode-1 | mode-2 ] ] *
By default, this feature is
disabled.
413. Configure a virtual system
ID.
virtual-system virtual-system-id
By default, no virtual system
ID is configured.
1467BLimiting LSP flooding
In NBMA networks such as ATM, FR, many P2P links exist. As shown in 2643HFigure 278, Router A, Router B,
Router C and Router D run IS-IS. When Router A generates an LSP, it floods the LSP out of Ethernet 1/1,
Ethernet 1/2 and Ethernet 1/3. After Router D receives the LSP from Ethernet 1/3, Router D floods it out
of Ethernet 1/1 and Ethernet 1/2 to Router B and Router C. However, Router B and Router C have
already received the LSP from Router A. Repeated LSP flooding consumes extra bandwidth.