R3721-F3210-F3171-HP High-End Firewalls Network Management Configuration Guide-6PW101

Table Of Contents
499
Enabling the logging of neighbor state changes
Ste
p
Command
Remarks
1. Enter system view.
system-view N/A
2. Enter IS-IS view.
isis [ process-id ] [ vpn-instance
vpn-instance-name ]
N/A
3. Enable the logging of
neighbor state changes.
log-peer-change Enabled by default.
NOTE:
W
ith this feature enabled, the router delivers information about nei
g
hbor state chan
g
es to the terminal for
display.
Enhancing IS-IS network security
To enhance the security of an IS-IS network, you can configure IS-IS authentication. IS-IS authentication
involves neighbor relationship authentication, area authentication and routing domain authentication.
Configuration prerequisites
Before this configuration, complete the following tasks:
Configure network layer addresses for interfaces, and to make sure that all neighboring nodes can
reach each other at the network layer.
Enable IS-IS.
Configuring neighbor relationship authentication
With neighbor relationship authentication configured, an interface adds the password in the specified
mode into hello packets to the peer and checks the password in the received hello packets. If the
authentication succeeds, it forms the neighbor relationship with the peer.
The authentication mode and password at both ends must be identical.
To configure neighbor relationship authentication:
Ste
p
Command
Remarks
1. Enter system view.
system-view N/A
2. Enter interface view. interface interface-type interface-number
N/A
3. Specify the authentication
mode and password.
isis authentication-mode { md5 | simple }
password [ level-1 | level-2 ] [ ip | osi ]
By default, no authentication
is configured.