EasyManua.ls Logo

3Com 8807 - Md5-Compatible; Network-Entity

3Com 8807
1099 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Integrated IS-IS Configuration Commands 487
Description
Use the log-peer-change command to log the peer changes.
Use the undo log-peer-change command to configure not to log the peer
changes.
By default, peer changes log disabled.
After peer changes log is enabled, the IS-IS peer changes will be output on the
configuration terminal until the log is disabled.
Example
# Configure to output the IS-IS peer changes on the current router.
[3Com-isis] log-peer-change
md5-compatible Syntax
md5-compatible
undo md5-compatible
View
IS-IS view
Parameter
None
Description
Use the md5-compatible command to set the IS-IS to use the MD5 algorithm
which is compatible with that of the other vendors.
Use the undo md5-compatible command to return to the defaults.
By default, the system uses the MD5 algorithm in IS-IS which is compatible with
that of 3Com.
To authenticate the devices of the vendors other than 3Com using MD5 algorithm
in IS-IS, configure this command.
Example
# Set the IS-IS to use the MD5 algorithm compatible with that of the other
vendors.
[SW8800] isis
[3Com-isis] md5-compatible
network-entity Syntax
network-entity network-entity-title
undo network-entity network-entity-title

Table of Contents

Other manuals for 3Com 8807

Related product manuals