Which two statements about configuring the Intermediate System-to-Intermediate System domain policy on an ACI Fabric are true? (Choose two.)
Click on the arrows to vote for the correct answerA. B. C. D. E.
The Intermediate System-to-Intermediate System (IS-IS) domain policy is used to configure the behavior of the IS-IS protocol on an ACI Fabric. The IS-IS protocol is a link-state routing protocol that is used to determine the shortest path between network nodes in a network. The ACI Fabric is a software-defined networking solution that provides a centralized policy-based management and automation for data center networks.
Here are the explanations for the two true statements:
A. The IS-IS fast-flooding of link state packets improves IS-IS convergence time. Fast flooding is a feature of the IS-IS protocol that enables the rapid dissemination of Link State Packets (LSPs) to all routers in the network. This feature improves the IS-IS convergence time by reducing the time required for the routers to build their routing tables. With fast flooding, each router floods its LSPs to all its neighbors simultaneously, rather than waiting for an acknowledgment from each neighbor before forwarding the LSP to the next neighbor. This reduces the time required to propagate the LSPs throughout the network, which in turn reduces the time required to build the routing tables.
C. The IS-IS LSP generation initial wait, maximum wait, and second wait intervals can all be configured. The LSP generation wait intervals are used to control the frequency at which routers generate their LSPs. The initial wait interval specifies the time interval between the router's startup and the first LSP generation. The maximum wait interval specifies the maximum time interval between the generation of two consecutive LSPs. The second wait interval specifies the time interval between the generation of the second and subsequent LSPs. These intervals can be configured to optimize the LSP generation and propagation in the network, depending on the network topology and traffic patterns.
The other statements are not true:
B. The IS-IS domain policy is configured under Fabric > Access Policies. This statement is not true. The IS-IS domain policy is not configured under Fabric > Access Policies. Access Policies are used to configure the access policies for endpoints in the fabric. The IS-IS domain policy is configured under Fabric > Global Policies.
D. The IS-IS domain policy is configured under Fabric > Global Policies. This statement is true. The IS-IS domain policy is configured under Fabric > Global Policies. The IS-IS domain policy defines the IS-IS behavior for the entire fabric and is used to configure the IS-IS system ID, metric style, authentication, and other IS-IS parameters.
E. The IS-IS default MTU is set at 4352, and it cannot be changed. This statement is not true. The IS-IS protocol does not have a default MTU value. The maximum transmission unit (MTU) is the maximum size of a packet that can be transmitted over a network. The MTU value is determined by the underlying network technology and is not a configurable parameter of the IS-IS protocol.