[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z] scalability design principles:scalability principles of network design:scalability scalar link costs metrics:scalar link costs routing protocols:metrics:scalar link costs security:authentication authentication packets:authentication security:authentication:troubleshooting authentication:troubleshooting troubleshooting:authentication problems;passwords:authentication;troubleshooting;clear-text password selective interface blocking sequence number packets packets:sequence number SequenceModulus set-overload-bit command commands:set-overload-bit sh clns neighbor command commands:sh clns neighbor ships in the night routing protocols:ships in the night shortest path tree:building building:shortest path tree SPF algorithm:shortest path tree, building;path determination:SPF algorithm:shortest path tree, buil 2nd show clns command commands:show clns 2nd show clns command:output, interpreting interpreting:show clns command output output:show clns command:interpreting;commands:show clns:output, interpreting 2nd 3rd show clns interface command commands:show clns interface 2nd 3rd 4th show clns interface command:output, interpreting interpreting:show clns interface command output output:show clns interface command:interpreting;commands:show clns interface:output, interpreting 2nd show clns neighbor command commands:show clns neighbor 2nd 3rd show clns neighbors command commands:show clns neighbors 2nd 3rd show clns neighbors command:output, interpreting interpreting:show clns neighbors command output output:show clns neighbors command:interpreting;commands:show clns neighbors:output, interpreting 2nd show clns protocol command commands:show clns commands:show clns protocol 2nd 3rd show clns protocol command:output, interpreting interpreting:show clns protocol command output output:show clns protocol command:interpreting;commands:show clns protocol:output, interpreting 2nd show commands:output, interpreting interpreting:show command output output:show commands:interpreting show ip interface brief command commands:show ip interface brief show isis database command commands:show isis database 2nd 3rd 4th 5th 6th 7th show isis database command:output, interpreting interpreting:show isis database command output output:show isis database command:interpreting;commands:show isis database:output, interpreting 2nd 3rd show isis database output command commands:show isis database output show isis database private command commands:show isis database private show isis spf-log command commands:show isis spf-log 2nd commands:show isis-spf-log 2nd show isis spf-log command:output, interpreting interpreting:show isis spf-log command output output:show isis spf-log command:interpreting;commands:show isis spf-log:output, interpreting 2nd show isis topology command commands:show isis topology show isis topology command:output, interpreting interpreting:show isis topology command output output:show isis topology command:interpreting;commands:show isis topology:output, interpreting simplified NSAP format NSAP addresses:simplified format 2nd simplified NSAP format:Area ID field NSAP addresses:simplified format:Area ID field Area ID field (simplified NSAP addresses) SNPAs (subnetwork point of Attachments) SNPAs (subnetwork points of attachment) SNPs (sequence number packets) packets:SNPs (sequence number packets) flooding;LSPs:flooding;packets:LSPS:flooding Source ID field (LAN hello) specifying interval between SPF calculation events 2nd SPF (Shortest Path First) algorithm SPF algorithm:IS-IS routes, calculating calculating:IS-IS routes path determination:SPF algorithm:IS-IS routes, calculating;routing protocols:SPF algorithm:IS-IS rou 2nd 3rd SPF algorithm:memory requirements routing protocols:SPF algorithm:memory requirements path determination:SPF algorithm:memory requirements;memory requirements:SPF algorithm;calculating:m SPF algorithm:operation on Cisco routers routing procols:SPF algorithm:operation on Cisco routers path determination:SPF algorithm:operation on Cisco routers;Cisco 7500 routers:SPF process 2nd 3rd SPF process:debugging OSPF:SPF process:debugging link-state routing protocols:SPF process:debugging 2nd spf-interval command commands:spf-interval 2nd 3rd SPF:example calculation example SPF calculation calculating:best path determination:example;routing protocols:SPF algorithm:example calculation;path 2nd 3rd SRM (Send Routing Message) flag SSN (Send Sequence Number) flag SSN (Send Sequence Number) flag SRM (Send Routing Message) flag link-state database synchronization:SRM flag;synchronization:LDB:SRM flag;database:LDB:synchronizati 2nd link-state database synchronization:SSN flag;synchronization:LDB:SSN flag;database:LDB:synchronizati 2nd stability design principles:stability principles of network design:stability static routes static routes:redistribution redistribution:static routes internal metric;metrics:internal;external metrics;metrics:external subnets subnets:advertising advertising:subnets subnetwork point of Attachments (SNPAs) subnetwork-dependent functions subnetwork-independent functions routing protocol functions:subnetwork-independent 2nd IS-IS routing engine:subnetwork-independent functions subnetwork-independent functions: routing protocol functions:subnetwork-independent:See also IS-IS routing engine [See also IS-IS routing engine ] subnetworks broadcast 2nd general topology suppressing:protocol activity over specific interfaces interfaces:protocol activity, suppressing protocol activity:suppressing over specific interfaces switching mechanisms:CEF CEF (Cisco Express Forwarding) 2nd switching mechanisms:fast switching fast switching switching mechanisms:process switching process switching synchronization BGP:synchronization synchronization:effect on convergence database synchronization:effect on convergence SysID (NSAP addresses) NSAP addresses:SysID SysID (system identifier) addressing:node-based:SysID node-based addressing:SysID System ID field (NSAP addresses) NSAP addresses:System ID field |