Cisco Cisco Prime Network 4.2 Guía Del Usuario
![Cisco](https://files.manualsbrain.com/attachments/7380d0050044647c30f5c24bbbf5d0c0b6d9bb84/common/fit/150/50/faa183d287233c52228cfea3dbc2a127fe780f60564fcb0955d9c3d1cd23/brand_logo.png)
Cisco Prime Network 4.2 Supported Technologies and Topologies
OL-31028-01
25
Ports in a multi chassis device will not be connected by CDP if there is no entry for them in
the CDP neighbors table.
the CDP neighbors table.
6.2.3 LLDP (Link Layer Discovery Protocol)
If LLDP is enabled, its information will be used for discovery and verification. In this technique, the
matching criterion is the LLDP neighbor information.
matching criterion is the LLDP neighbor information.
6.2.4 PNNI Information
In this technique, each port in the ATM switch is identified with two values:
Node ID.
Port ID.
6.2.5 BFD Session Source and Destination
In this technique, the source and destination addresses of a BDF session are verified by matching them
against the source and destination addresses of the potential adjacent neighbors. The session’s source
address is matched to the neighbor’s destination address and the session’s destination source is
matched to the neighbor’s source address since one side’s source is the other side’s destination. This
method works on the assumption that multiple BFD sessions running on the same router cannot have
the same source and destination address.
against the source and destination addresses of the potential adjacent neighbors. The session’s source
address is matched to the neighbor’s destination address and the session’s destination source is
matched to the neighbor’s source address since one side’s source is the other side’s destination. This
method works on the assumption that multiple BFD sessions running on the same router cannot have
the same source and destination address.
6.2.6 BGP Information
In this technique, the local BGP identifier is compared to the remote BGP identifier or a potential
neighbor for each BGP Neighbor Entry. This topology technique assumes uniqueness of the BGP
identifier in the network.
neighbor for each BGP Neighbor Entry. This topology technique assumes uniqueness of the BGP
identifier in the network.
6.2.7 MAC
In this technique, the Ethernet port MAC is checked to see if it is the only one learned on the other
Ethernet port (using bridge and ARP tables).
Ethernet port (using bridge and ARP tables).
This technique discovers links between two routers or the router and switch, but not between two
switches (includes the generic VNE).
switches (includes the generic VNE).
6.2.8 REP (Resilient Ethernet Protocol)
If REP is enabled between switches, the information that is provided by the 'show REP topology'
command is used to connect the topology according to the REP configuration.
command is used to connect the topology according to the REP configuration.