Authentication can be configured in the IS-IS protocol to enhance IS-IS security. The IS-IS authentication functions include interface authentication, area authentication, and routing domain authentication.
A . TRUE
B . FALSE
Answer: A
Authentication can be configured in the IS-IS protocol to enhance IS-IS security. The IS-IS authentication functions include interface authentication, area authentication, and routing domain authentication.
A . TRUE
B . FALSE
Answer: A