Chapter 10

1:

List the two main categories of IS-IS problems discussed in this chapter and provide examples of each.

A:

Adjacency formation problems (for example, misconfigured IP interface addresses) and route maintenance problems (for example, route advertisement problems).

2:

List two show commands that are useful for troubleshooting adjacency problems.

A:

show clns neighbors and show clns interface

3:

List a debug command that provides help in troubleshooting IS-IS adjacency problems.

A:

debug isis adj-packet

4:

What are LSP corruption storms, and how do they impact a network's performance.

A:

LSP corruption storms occur when LSPs are continuously corrupted by a malfunctioning device in the network; the corrupted LSPs are purged from the network and then reflooded by their sources. This flooding and purging leads to a waste of network bandwidth and might cause high CPU utilization in the routers. If CPU is continuously pegged high levels, the routers might eventually run out of processing resources leading to disruption of network services.

5:

Describe the methodology for troubleshooting an LSP corruption storm .

A:

Because the routers in the network might already be overloaded, debugging is used as a last resort. You can use the show process cpu command to track CPU utilization, and you can use show isis spf log to determine the LSPs responsible for any SPF churns. A trail can then be followed to determine the location of the culprit device that is corrupting LSPs.



IS-IS Network Design Solutions
IS-IS Network Design Solutions (Networking Technology)
ISBN: 1578702208
EAN: 2147483647
Year: 2005
Pages: 144
Authors: Abe Martey

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net