3com 8807 Reference Guide
Integrated IS-IS Configuration Commands
487
Description
Use the log-peer-change command to log the peer changes.
Use the undo log-peer-change command to configure not to log the peer
changes.
changes.
By default, peer changes log disabled.
After peer changes log is enabled, the IS-IS peer changes will be output on the
configuration terminal until the log is disabled.
configuration terminal until the log is disabled.
Example
# Configure to output the IS-IS peer changes on the current router.
[3Com-isis] log-peer-change
md5-compatible
Syntax
md5-compatible
undo md5-compatible
View
IS-IS view
Parameter
None
Description
Use the md5-compatible command to set the IS-IS to use the MD5 algorithm
which is compatible with that of the other vendors.
which is compatible with that of the other vendors.
Use the undo md5-compatible command to return to the defaults.
By default, the system uses the MD5 algorithm in IS-IS which is compatible with
that of 3Com.
that of 3Com.
To authenticate the devices of the vendors other than 3Com using MD5 algorithm
in IS-IS, configure this command.
in IS-IS, configure this command.
Example
# Set the IS-IS to use the MD5 algorithm compatible with that of the other
vendors.
vendors.
[SW8800] isis
[3Com-isis] md5-compatible
network-entity
Syntax
network-entity network-entity-title
undo network-entity network-entity-title