ISIS Authentication types (packet captures)

In this post i would like to highlight a couple of “features” of ISIS.

More specifically the authentication mechanism used and how it looks in the data plane.

I will do this by configuring a couple of routers and configure the 2 authentication types available. I will then look at packet captures taken from the link between them and illustrate how its used by the ISIS process.

[Read More]