3com 8807 Reference Guide

Page of 1099
Integrated IS-IS Configuration Commands
487
Description
Use the log-peer-change command to log the peer changes.
Use the undo log-peer-change command to configure not to log the peer 
changes.
By default, peer changes log disabled.
After peer changes log is enabled, the IS-IS peer changes will be output on the 
configuration terminal until the log is disabled.
Example
# Configure to output the IS-IS peer changes on the current router.
[3Com-isis] log-peer-change 
md5-compatible
Syntax
md5-compatible
undo md5-compatible
View
IS-IS view
Parameter
None
Description
Use the md5-compatible command to set the IS-IS to use the MD5 algorithm 
which is compatible with that of the other vendors.
Use the undo md5-compatible command to return to the defaults.
By default, the system uses the MD5 algorithm in IS-IS which is compatible with 
that of 3Com.
To authenticate the devices of the vendors other than 3Com using MD5 algorithm 
in IS-IS, configure this command.
Example
# Set the IS-IS to use the MD5 algorithm compatible with that of the other 
vendors.
[SW8800] isis
 
[3Com-isis] md5-compatible 
network-entity
Syntax
network-entity network-entity-title
undo network-entity network-entity-title